insights-operator/gathers.json0000640000000000000000000002723615114405106015260 0ustar0000000000000000{"status_reports":[{"name":"clusterconfig/machine_sets","duration_in_ms":27,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image","duration_in_ms":34,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cluster_apiserver","duration_in_ms":34,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_images","duration_in_ms":98,"records_count":18,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkconfigurationpolicies","duration_in_ms":23,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_classes","duration_in_ms":24,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_runtime_configs","duration_in_ms":36,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/support_secret","duration_in_ms":38,"records_count":0,"errors":["secrets \"support\" not found"],"warnings":null,"panic":null},{"name":"clusterconfig/networks","duration_in_ms":52,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"conditional/conditional_gatherer_rules","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"conditional/rapid_container_logs","duration_in_ms":0,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/proxies","duration_in_ms":24,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/infrastructures","duration_in_ms":33,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"workloads/helmchart_info","duration_in_ms":12,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/mutating_webhook_configurations","duration_in_ms":27,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/olm_operators","duration_in_ms":38,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanedeployments","duration_in_ms":31,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_pruners","duration_in_ms":32,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodes","duration_in_ms":36,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_configs","duration_in_ms":130,"records_count":3,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/validating_webhook_configurations","duration_in_ms":25,"records_count":9,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress","duration_in_ms":28,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pdbs","duration_in_ms":30,"records_count":3,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/dvo_metrics","duration_in_ms":29,"records_count":0,"errors":null,"warnings":["warning: no service found with label selector name=deployment-validation-operator"],"panic":null},{"name":"clusterconfig/ingress_certificates","duration_in_ms":61,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ceph_cluster","duration_in_ms":23,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_cluster","duration_in_ms":22,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/aggregated_monitoring_cr_names","duration_in_ms":63,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators_pods_and_events","duration_in_ms":1871,"records_count":13,"errors":null,"warnings":null,"panic":null},{"name":"workloads","duration_in_ms":7048,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/jaegers","duration_in_ms":15,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/monitoring_persistent_volumes","duration_in_ms":32,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/overlapping_namespace_uids","duration_in_ms":33,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/schedulers","duration_in_ms":50,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/service_accounts","duration_in_ms":12426,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"conditional/remote_configuration","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_config_pools","duration_in_ms":27,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/certificate_signing_requests","duration_in_ms":30,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_machine_api_events","duration_in_ms":35,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/tsdb_status","duration_in_ms":33,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/api/v1/status/tsdb\": dial tcp 172.30.17.228:9091: connect: connection refused"],"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanenodesets","duration_in_ms":35,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/silenced_alerts","duration_in_ms":1058,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators","duration_in_ms":3301,"records_count":57,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_registries","duration_in_ms":27,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_pods","duration_in_ms":32,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pod_network_connectivity_checks","duration_in_ms":18,"records_count":0,"errors":["the server could not find the requested resource (get podnetworkconnectivitychecks.controlplane.operator.openshift.io)"],"warnings":null,"panic":null},{"name":"clusterconfig/authentication","duration_in_ms":24,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_version","duration_in_ms":27,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/qemu_kubevirt_launcher_logs","duration_in_ms":33,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/oauths","duration_in_ms":49,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/lokistack","duration_in_ms":16,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_datahubs","duration_in_ms":23,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/crds","duration_in_ms":62,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/config_maps","duration_in_ms":87,"records_count":9,"errors":["configmaps \"cluster-monitoring-config\" not found","configmaps \"gateway-mode-config\" not found","configmaps \"insights-config\" not found"],"warnings":["warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt\""],"panic":null},{"name":"clusterconfig/node_logs","duration_in_ms":191,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/active_alerts","duration_in_ms":1059,"records_count":1,"errors":null,"warnings":["warning: the record with the same fingerprint \"4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945\" was already recorded at path \"config/namespaces_with_overlapping_uids.json\", recording another one with a different path \"config/alerts.json\""],"panic":null},{"name":"clusterconfig/machines","duration_in_ms":12,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/clusterroles","duration_in_ms":50,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig","duration_in_ms":12429,"records_count":145,"errors":["function \"pod_network_connectivity_checks\" failed with an error","function \"tsdb_status\" failed with an error","function \"metrics\" failed with an error","function \"support_secret\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error"],"warnings":null,"panic":null},{"name":"clusterconfig/metrics","duration_in_ms":32,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/federate?match%5B%5D=cluster_installer\u0026match%5B%5D=namespace%3Acontainer_cpu_usage%3Asum\u0026match%5B%5D=namespace%3Acontainer_memory_usage_bytes%3Asum\u0026match%5B%5D=vsphere_node_hw_version_total\u0026match%5B%5D=virt_platform\u0026match%5B%5D=console_helm_installs_total\u0026match%5B%5D=console_helm_upgrades_total\u0026match%5B%5D=console_helm_uninstalls_total\u0026match%5B%5D=openshift_apps_deploymentconfigs_strategy_total\u0026match%5B%5D=etcd_server_slow_apply_total\u0026match%5B%5D=etcd_server_slow_read_indexes_total\u0026match%5B%5D=haproxy_exporter_server_threshold\": dial tcp 172.30.17.228:9091: connect: connection refused"],"warnings":null,"panic":null},{"name":"clusterconfig/version","duration_in_ms":60,"records_count":4,"errors":null,"warnings":null,"panic":null},{"name":"conditional","duration_in_ms":293,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_healthchecks","duration_in_ms":28,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/number_of_pods_and_netnamespaces_with_sdn_annotations","duration_in_ms":100,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkstates","duration_in_ms":24,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_logging","duration_in_ms":23,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/feature_gates","duration_in_ms":28,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cost_management_metrics_configs","duration_in_ms":31,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_controlplanes","duration_in_ms":34,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/install_plans","duration_in_ms":11639,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"workloads/workload_info","duration_in_ms":7048,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_config","duration_in_ms":15,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_autoscalers","duration_in_ms":12,"records_count":0,"errors":null,"warnings":null,"panic":null}],"container_memory_bytes_usage":0,"uptime_seconds":1273.991,"is_global_obfuscation_enabled":false}insights-operator/remote-configuration.json0000640000000000000000000000443515114405106017757 0ustar0000000000000000{"conditional_gathering_rules":[{"conditions":[{"alert":{"name":"APIRemovedInNextEUSReleaseInUse"},"type":"alert_is_firing"}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedReload"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedToSendAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"KubePodCrashLooping"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","previous":true,"tail_lines":20}}},{"conditions":[{"alert":{"name":"KubePodNotReady"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},{"conditions":[{"alert":{"name":"PrometheusOperatorSyncFailed"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},{"conditions":[{"alert":{"name":"PrometheusRemoteStorageFailures"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},{"conditions":[{"alert":{"name":"PrometheusTargetSyncFailure"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},{"conditions":[{"alert":{"name":"SamplesImagestreamImportFailing"},"type":"alert_is_firing"}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},{"conditions":[{"alert":{"name":"ThanosRuleQueueIsDroppingAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}}],"container_logs":[],"version":"1.2.0"}insights-operator/conditional-gatherer-rules.json0000640000000000000000000000577515114405106021061 0ustar0000000000000000{"version":"1.2.0","conditional_gathering_rules":[{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"APIRemovedInNextEUSReleaseInUse"}}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedReload"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedToSendAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodCrashLooping"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","tail_lines":20,"previous":true}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodNotReady"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusOperatorSyncFailed"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusRemoteStorageFailures"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusTargetSyncFailure"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"SamplesImagestreamImportFailing"}}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"ThanosRuleQueueIsDroppingAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false}],"endpoint":"https://console.redhat.com/api/gathering/v2/%s/gathering_rules"}config/workload_info.json0000640000000000000000000007157615114405106014252 0ustar0000000000000000{"pods":100,"imageCount":80,"images":{"sha256:50e368e01772dd0dc9c4f9a6cdd5a9693a224968f75dc19eafe2a416f583bdab":{"layerIDs":["sha256:25c75c34b2e2b68ba9245d9cddeb6b8a0887371ed30744064f85241a75704d87","sha256:a7afe321285e421a0de5ee7eb5b7f1872a31252aedbece4162ec13a35b1c88e0","sha256:b45b4080e75db66dbb2f4d8403f29133c1829a6e7a5055752f4267aea3a23894","sha256:52445dcc2525a6a1af5c23690894dfb632a19a8912d9b564ac304978a4fe2d77","sha256:e870e615c4d922da296c881e2cb66f6e2f882f1f1051efb17eb832c7a56c1977"],"repository":"hKMJN5dXJmuI"},"sha256:79f99fd6cce984287932edf0d009660bb488d663081f3d62ec3b23bc8bfbf6c2":{"layerIDs":["sha256:25c75c34b2e2b68ba9245d9cddeb6b8a0887371ed30744064f85241a75704d87","sha256:a7afe321285e421a0de5ee7eb5b7f1872a31252aedbece4162ec13a35b1c88e0","sha256:b45b4080e75db66dbb2f4d8403f29133c1829a6e7a5055752f4267aea3a23894","sha256:52445dcc2525a6a1af5c23690894dfb632a19a8912d9b564ac304978a4fe2d77"],"repository":"vXIOZyWw1exO"}},"namespaces":{"0LiT6ZNtbpYL":{"count":4,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:cfde59e48cd5dee3721f34d249cb119cc3259fd857965d34f9c7ed83b0c363a1","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:916566bb9d0143352324233d460ad94697719c11c8c9158e3aea8f475941751f","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:8a3d37aa7a22c68afa963ecfb4b43c52cccf152580cd66e4d5382fb69e4037cc","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:9432c13d76bd4ba4eb9197c050cf88c0d701fa2055eeb59257e2e23901f9fdff","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:631a3798b749fecc041a99929eb946618df723e15055e805ff752a1a1273481c","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:631a3798b749fecc041a99929eb946618df723e15055e805ff752a1a1273481c","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:9014f384de5f9a0b7418d5869ad349abb9588d16bd09ed650a163c045315dbff","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:4ecc5bac651ff1942865baee5159582e9602c89b47eeab18400a32abcba8f690","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:9014f384de5f9a0b7418d5869ad349abb9588d16bd09ed650a163c045315dbff","firstCommand":"N9KxLV2avCo2","firstArg":"BuLIUMMJnyP_"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:2632d7f05d5a992e91038ded81c715898f3fe803420a9b67a0201e9fd8075213","firstCommand":"FC0eu9ID58Bm","firstArg":"47DEQpj8HBSa"}]}]},"0h5ohwdJx4S5":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:1f952cec1e5332b84bdffa249cd426f39087058d6544ddcec650a414c15a9b68","firstCommand":"buSkac1OkQU4","firstArg":"XV1E-c-gSQmZ"}]}]},"2IqVYeidVUxV":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:b00c658332d6c6786bd969b26097c20a78c79c045f1692a8809234f5fb586c22","firstCommand":"po5yju59c7HJ"}],"containers":[{"imageID":"sha256:3b8d91a25eeb9f02041e947adb3487da3e7ab8449d3d2ad015827e7954df7b34","firstCommand":"UcO4la9rqCTe"}]}]},"43Xz0HbE9FHX":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:f1ca78c423f43f89a0411e40393642f64e4f8df9e5f61c25e31047c4cce170f9","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:7cb47edc9be58d3cb9c151bdb1213930bdfd633f2454a4a4235783e5d46b2d66","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:01d2e67fd74086da701c39dac5b821822351cb0151f9afe72821c05df19953ad","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:f1ca78c423f43f89a0411e40393642f64e4f8df9e5f61c25e31047c4cce170f9","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:0ded9f6c34f8927b8e6f3e300988f6d16be1bdbf6a58bb5467e75f16a61c2416","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:01d2e67fd74086da701c39dac5b821822351cb0151f9afe72821c05df19953ad","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:7664a2d4cb10e82ed32abbf95799f43fc3d10135d7dd94799730de504a89680a","firstCommand":"4MEQ8E7-fUvu","firstArg":"mDEjdpyJDBZ4"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:f1ca78c423f43f89a0411e40393642f64e4f8df9e5f61c25e31047c4cce170f9","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:e8990432556acad31519b1a73ec32f32d27c2034cf9e5cc4db8980efc7331594","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:01d2e67fd74086da701c39dac5b821822351cb0151f9afe72821c05df19953ad","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:f1ca78c423f43f89a0411e40393642f64e4f8df9e5f61c25e31047c4cce170f9","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:4280d1c2b296ebd2f6e9726ec95c50469c1c29a9bb75a77b085a0fb5890c4b41","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:01d2e67fd74086da701c39dac5b821822351cb0151f9afe72821c05df19953ad","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]}]},"47HAKWqp7-jn":{"count":3,"terminalCount":2,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:188637a52cafee61ec461e92fb0c605e28be325b9ac1f2ac8a37d68e97654718","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:188637a52cafee61ec461e92fb0c605e28be325b9ac1f2ac8a37d68e97654718","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:188637a52cafee61ec461e92fb0c605e28be325b9ac1f2ac8a37d68e97654718","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:188637a52cafee61ec461e92fb0c605e28be325b9ac1f2ac8a37d68e97654718","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:188637a52cafee61ec461e92fb0c605e28be325b9ac1f2ac8a37d68e97654718","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:f4d4282cb53325e737ad68abbfcb70687ae04fb50353f4f0ba0ba5703b15009a","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:f4d4282cb53325e737ad68abbfcb70687ae04fb50353f4f0ba0ba5703b15009a","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:188637a52cafee61ec461e92fb0c605e28be325b9ac1f2ac8a37d68e97654718","firstCommand":"N9KxLV2avCo2"}]}]},"4k7XyKW2A17e":{"count":3,"terminalCount":2,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:6d5891cdd7dcf7c9081de8b364b4c96446b7f946f7880fbae291a4592a198264","firstCommand":"930btY2ohuPL","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:6d5891cdd7dcf7c9081de8b364b4c96446b7f946f7880fbae291a4592a198264","firstCommand":"aC8iSHmKHojh","firstArg":"r7zEsGNvlNrk"},{"imageID":"sha256:f042fa25014f3d37f3ea967d21f361d2a11833ae18f2c750318101b25d2497ce","firstCommand":"WFJEBSInAJpw","firstArg":"5gS4z5mOnDuY"},{"imageID":"sha256:f042fa25014f3d37f3ea967d21f361d2a11833ae18f2c750318101b25d2497ce","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"}]}]},"5fn-sCitjq6a":{"count":3,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:97d26892192b552c16527bf2771e1b86528ab581a02dd9279cdf71c194830e3e","firstCommand":"HgS-rIunFHfD","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d3ce2cbf1032ad0f24f204db73687002fcf302e86ebde3945801c74351b64576","firstArg":"ESRPWfqdsWE1"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:10e57ca7611f79710f05777dc6a8f31c7e04eb09da4d8d793a5acfbf0e4692d7","firstArg":"zO0oxtw_mcI5"}]}]},"5oRWKKS3566n":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8860e00f858d1bca98344f21b5a5c4acc43c9c6eca8216582514021f0ab3cf7b","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"6KbiDGNUd_ub":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:e3e65409fc2b27ad0aaeb500a39e264663d2980821f099b830b551785ce4ce8b","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:e3e65409fc2b27ad0aaeb500a39e264663d2980821f099b830b551785ce4ce8b","firstCommand":"N9KxLV2avCo2"}]}]},"6bLpdRMvgXVP":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:7e438b814f8e16f00b3fc4b69991af80eee79ae111d2a707f34aa64b2ccbb6eb","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"},{"imageID":"sha256:7e438b814f8e16f00b3fc4b69991af80eee79ae111d2a707f34aa64b2ccbb6eb","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]}]},"9dJB3pvMrhr8":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c416b201d480bddb5a4960ec42f4740761a1335001cf84ba5ae19ad6857771b1","firstCommand":"51QuNwyM-xYf","firstArg":"r7zEsGNvlNrk"}]}]},"AN3N38xANElq":{"count":3,"terminalCount":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d64c13fe7663a0b4ae61d103b1b7598adcf317a01826f296bcb66b1a2de83c96","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"},{"imageID":"sha256:6d5891cdd7dcf7c9081de8b364b4c96446b7f946f7880fbae291a4592a198264","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"},{"imageID":"sha256:a824e468cf8dd61d347e35b2ee5bc2f815666957647098e21a1bb56ff613e5b9","firstCommand":"FATPL2W-sitV","firstArg":"5gS4z5mOnDuY"},{"imageID":"sha256:a824e468cf8dd61d347e35b2ee5bc2f815666957647098e21a1bb56ff613e5b9","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"}]}]},"CMkFy_B6OMUO":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8139ed65c0a0a4b0f253b715c11cc52be027efe8a4774da9ccce35c78ef439da","firstCommand":"7aQQEh6Tr2m7","firstArg":"r7zEsGNvlNrk"}]}]},"C_9an18W0cU6":{"count":6,"terminalCount":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:f1ca78c423f43f89a0411e40393642f64e4f8df9e5f61c25e31047c4cce170f9","firstCommand":"ZS9VAWJDvxuf","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:f1ca78c423f43f89a0411e40393642f64e4f8df9e5f61c25e31047c4cce170f9","firstCommand":"ArvlNzaZtYpC","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:f1ca78c423f43f89a0411e40393642f64e4f8df9e5f61c25e31047c4cce170f9","firstCommand":"PPJ_dAh1Wl4S","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:f1ca78c423f43f89a0411e40393642f64e4f8df9e5f61c25e31047c4cce170f9","firstCommand":"5-ZY-7KtGiOe"}]}]},"EOB8Fqt74gVH":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:61664aa69b33349cc6de45e44ae6033e7f483c034ea01c0d9a8ca08a12d88e3a","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"}]}]},"EyQn00UhCg7z":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:9724d2036305cbd729e1f484c5bad89971de977fff8a6723fef1873858dd1123","firstCommand":"bsRjeCtd7lVU","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:9724d2036305cbd729e1f484c5bad89971de977fff8a6723fef1873858dd1123","firstCommand":"ZDrZSWYe4Hpn"}]}]},"F-y2qosZEzxd":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8139ed65c0a0a4b0f253b715c11cc52be027efe8a4774da9ccce35c78ef439da","firstCommand":"7aQQEh6Tr2m7","firstArg":"gcNszUTvGLqr"}]}]},"ICyEPw5KVYuy":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:eb928c13a46d3fb45f4a881892d023a92d610a5430be0ffd916aaf8da8e7d297","firstCommand":"ijLlFtdBW-Uk","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:79f99fd6cce984287932edf0d009660bb488d663081f3d62ec3b23bc8bfbf6c2","firstCommand":"N9KxLV2avCo2"}]}]},"KETRwZOPBpF9":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:3f0aa9cd04713acc5c6fea721bd849e1500da8ae945e0b32000887f34d786e0b","firstCommand":"buSkac1OkQU4","firstArg":"47DEQpj8HBSa"}]}]},"Kt0qS5G8piJp":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:831f30660844091d6154e2674d3a9da6f34271bf8a2c40b56f7416066318742b","firstCommand":"9RqZYN0XQJuD"}]}]},"LBp1kjMRhgCD":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:91af633e585621630c40d14f188e37d36b44678d0a59e582d850bf8d593d3a0c","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:91af633e585621630c40d14f188e37d36b44678d0a59e582d850bf8d593d3a0c","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"M9RntwZOZgi3":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:b0c3d16a01c2d60f9b536ca815ed8dc6abdca2b78e392551dc3fb79be537a354","firstCommand":"k9iHTIyG8PyJ","firstArg":"r7zEsGNvlNrk"}]}]},"MBms5agiSYKb":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:33a20002692769235e95271ab071783c57ff50681088fa1035b86af31e73cf20","firstArg":"zO0oxtw_mcI5"}]}]},"N3z7Gdl4s2xN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:3c1edf52f70bf9b1d1457e0c4111bc79cdaa1edd659ddbdb9d8176eff8b46956","firstCommand":"vLhjmt4GJVrQ"},{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"47DEQpj8HBSa"}]}]},"NJ5StnkN7lNJ":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5451aa441e5b8d8689c032405d410c8049a849ef2edf77e5b6a5ce2838c6569b","firstCommand":"euUHIZmT1r6w","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:5451aa441e5b8d8689c032405d410c8049a849ef2edf77e5b6a5ce2838c6569b","firstCommand":"euUHIZmT1r6w"}]}]},"NuNApgGLWU3S":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1386b0fcb731d843f15fb64532f8b676c927821d69dd3d4503c973c3e2a04216","firstCommand":"loDbMsNsNHAN"},{"imageID":"sha256:1386b0fcb731d843f15fb64532f8b676c927821d69dd3d4503c973c3e2a04216","firstCommand":"BWdk-C4p4WVi","firstArg":"ov8ZFLf4OaCu"}]}]},"QRCRK87Nh9-g":{"count":4,"terminalCount":3,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:6d5891cdd7dcf7c9081de8b364b4c96446b7f946f7880fbae291a4592a198264","firstCommand":"930btY2ohuPL","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:6d5891cdd7dcf7c9081de8b364b4c96446b7f946f7880fbae291a4592a198264","firstCommand":"N9KxLV2avCo2","firstArg":"OOfnAGgDw729"},{"imageID":"sha256:0f43c31aa3359159d4557dad3cfaf812d8ce44db9cb9ae970e06d3479070b660","firstCommand":"VvlllczXFX2z","firstArg":"5gS4z5mOnDuY"},{"imageID":"sha256:0f43c31aa3359159d4557dad3cfaf812d8ce44db9cb9ae970e06d3479070b660","firstCommand":"VvlllczXFX2z","firstArg":"5gS4z5mOnDuY"},{"imageID":"sha256:0f43c31aa3359159d4557dad3cfaf812d8ce44db9cb9ae970e06d3479070b660","firstCommand":"VvlllczXFX2z","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:0f43c31aa3359159d4557dad3cfaf812d8ce44db9cb9ae970e06d3479070b660","firstCommand":"VvlllczXFX2z","firstArg":"Yfg8wToYnj2U"}]}]},"QhwI_DkC7RkW":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:e3e65409fc2b27ad0aaeb500a39e264663d2980821f099b830b551785ce4ce8b","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:e3e65409fc2b27ad0aaeb500a39e264663d2980821f099b830b551785ce4ce8b","firstCommand":"N9KxLV2avCo2"}],"containers":[{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:e3e65409fc2b27ad0aaeb500a39e264663d2980821f099b830b551785ce4ce8b","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:e3e65409fc2b27ad0aaeb500a39e264663d2980821f099b830b551785ce4ce8b","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:e3e65409fc2b27ad0aaeb500a39e264663d2980821f099b830b551785ce4ce8b","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:e3e65409fc2b27ad0aaeb500a39e264663d2980821f099b830b551785ce4ce8b","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:e3e65409fc2b27ad0aaeb500a39e264663d2980821f099b830b551785ce4ce8b","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:e3e65409fc2b27ad0aaeb500a39e264663d2980821f099b830b551785ce4ce8b","firstCommand":"N9KxLV2avCo2"}]}]},"RGIC92MKxXzi":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:8cc27777e72233024fe84ee1faa168aec715a0b24912a3ce70715ddccba328df","firstCommand":"RxKEaTc90uWM","firstArg":"r7zEsGNvlNrk"}]}]},"WPOX0dN4tqDv":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:831f30660844091d6154e2674d3a9da6f34271bf8a2c40b56f7416066318742b","firstCommand":"9RqZYN0XQJuD"},{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"47DEQpj8HBSa"}]}]},"XStfgPOmHYzB":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:75d996f6147edb88c09fd1a052099de66638590d7d03a735006244bc9e19f898","firstCommand":"AiycEq1CClLy","firstArg":"r7zEsGNvlNrk"}]}]},"YgQZCjyI6D9c":{"count":1,"terminalCount":1,"shapes":[]},"cMIdS73ad1cT":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:f4d4282cb53325e737ad68abbfcb70687ae04fb50353f4f0ba0ba5703b15009a","firstCommand":"09D_XsQaIohy","firstArg":"r7zEsGNvlNrk"}]}]},"cWNZj9dm5f4i":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:f042fa25014f3d37f3ea967d21f361d2a11833ae18f2c750318101b25d2497ce","firstCommand":"WFJEBSInAJpw","firstArg":"r7zEsGNvlNrk"}]}]},"coRkJ8lvmtSk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:2b3d313c599852b3543ee5c3a62691bd2d1bbad12c2e1c610cd71a1dec6eea32"}]}]},"de1zmznD1F_L":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8eabac819f289e29d75c7ab172d8124554849a47f0b00770928c3eb19a5a31c4","firstCommand":"rb3iLnl9GmZR","firstArg":"r7zEsGNvlNrk"}]}]},"eCjF12pGOLUF":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:dd38b8be3af889b0f97e2df41517c89a11260901432a9a1ee943195bb3a22737","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:dd38b8be3af889b0f97e2df41517c89a11260901432a9a1ee943195bb3a22737","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"}]}]},"ecUe5cl6bPwX":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:72bbe2c638872937108f647950ab8ad35c0428ca8ecc6a39a8314aace7d95078","firstCommand":"pgaYl1gqTV2L","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:a92c310ce30dcb3de85d6aac868e0d80919670fa29ef83d55edd96b0cae35563","firstCommand":"kwBOP3_4oVMx","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:fd3e9f8f00a59bda7483ec7dc8a0ed602f9ca30e3d72b22072dbdf2819da3f61","firstCommand":"buSkac1OkQU4","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:7c2431a990bcddde98829abda81950247021a2ebbabc964b1516ea046b5f1d4e","firstCommand":"Tt12uskXp-TN","firstArg":"zO0oxtw_mcI5"}]}]},"inQbBSWydCWk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:e85850a4ae1a1e3ec2c590a4936d640882b6550124da22031c85b526afbf52df","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"ioFx0itCFPcs":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:3f0aa9cd04713acc5c6fea721bd849e1500da8ae945e0b32000887f34d786e0b","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:1f952cec1e5332b84bdffa249cd426f39087058d6544ddcec650a414c15a9b68","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"}],"containers":[{"imageID":"sha256:86af77350cfe6fd69280157e4162aa0147873d9431c641ae4ad3e881ff768a73","firstCommand":"bFMn8sKmxXTo","firstArg":"zO0oxtw_mcI5"}]}]},"jmuesrd3LOV1":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:b472823604757237c2d16bd6f6221f4cf562aa3b05942c7f602e1e8b2e55a7c6","firstCommand":"aDHd4M_0XUOd","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:b472823604757237c2d16bd6f6221f4cf562aa3b05942c7f602e1e8b2e55a7c6","firstCommand":"wCdwTcAdXQ_H","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:b472823604757237c2d16bd6f6221f4cf562aa3b05942c7f602e1e8b2e55a7c6","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:b472823604757237c2d16bd6f6221f4cf562aa3b05942c7f602e1e8b2e55a7c6","firstCommand":"jXkiIgNfKeEy","firstArg":"zO0oxtw_mcI5"}]}]},"k2lPYOlQaXUX":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8375671da86aa527ee7e291d86971b0baa823ffc7663b5a983084456e76c0f59","firstCommand":"XqE_QmN1P920","firstArg":"r7zEsGNvlNrk"}]}]},"n8ih8iFf25K7":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:79f99fd6cce984287932edf0d009660bb488d663081f3d62ec3b23bc8bfbf6c2","firstCommand":"CX8KiHZjJyVD"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:9724d2036305cbd729e1f484c5bad89971de977fff8a6723fef1873858dd1123","firstCommand":"N9KxLV2avCo2"}]}]},"nMMaB9HQd060":{"count":12,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:7d0b49cba33162ab0c486a96c5767cf5ed237a065cf6a4e2fc01d60a13f418bf","firstCommand":"NJuOSOguFZRT","firstArg":"3NvCs-dGLEBM"}],"containers":[{"imageID":"sha256:91795c7ae050c24ea79ae91b18a4e39a1a527b046deecf7fc795c22caf0b3f59","firstArg":"rDQv7paSi7RY"},{"imageID":"sha256:7d0b49cba33162ab0c486a96c5767cf5ed237a065cf6a4e2fc01d60a13f418bf","firstCommand":"NJuOSOguFZRT","firstArg":"nw1jEXz0CN6o"},{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:7c84b5ebe858246af77fb40b85b6ea917fa2a4a651b740cd3320d461164d0ef8","firstArg":"TIre9pmD-tbd"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:c3a77aa4d03b89ea284e3467a268e5989a77a2ef63e685eb1d5c5ea5b3922b7a","firstArg":"aZFPdeh8u0QY"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:2f41e33fa119d569ba903ae6b18ec7cf1626d8c24da6f8acf9bcbafef2f043ae","firstArg":"5wzTZA9Ffwb3"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:0824d9b793abc22c69ad35697e1bd3e725f07be0485f504d710ea1e8632d06ad","firstArg":"P0uRYWPWnbxt"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:f228d55f3812fdc1e6b37262baea72b19443d64142aaf5ac748ff875b15a1c9a","firstCommand":"K8aRMFBO_jyE","firstArg":"vWfRLhDFJlMA"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:df4cf41b98aaa1978e682187fd6d8e934d70cea9b500033fec197ffcb5c75ab6","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:df4cf41b98aaa1978e682187fd6d8e934d70cea9b500033fec197ffcb5c75ab6","firstCommand":"icTsn2s_EIax","firstArg":"SCcKjYHEPDKM"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:ee8240dce6c308012c91feac525db3c5df2d91c631d071881b61f0528929e904","firstArg":"5wzTZA9Ffwb3"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:7d0b49cba33162ab0c486a96c5767cf5ed237a065cf6a4e2fc01d60a13f418bf","firstCommand":"NJuOSOguFZRT","firstArg":"3NvCs-dGLEBM"}],"containers":[{"imageID":"sha256:7d0b49cba33162ab0c486a96c5767cf5ed237a065cf6a4e2fc01d60a13f418bf","firstCommand":"NJuOSOguFZRT","firstArg":"nw1jEXz0CN6o"},{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:03d91f263cf6eef98d53e83e218e32a55576ebdd31daa8f6abd33b8866c3d5c4","firstArg":"cteiHEtNKHn0"},{"imageID":"sha256:a9a6271d3a19d3ceff897d9d414271723a984d7c45b94aa521b2c8aa20e95983","firstArg":"bItFNczIfxkG"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:ca1daf0b5b8e7f3f14effdd82b3ff227ad2706feb90490aa43f37fbbaa5903a0","firstArg":"e1V8mDIYJ-Es"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d2d169850894a59fb18012f5b1cde98a7e30fa5b86967c9d16e4cba5e88d9a8d","firstArg":"Sr6QxZ9vlnXv"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:7d0b49cba33162ab0c486a96c5767cf5ed237a065cf6a4e2fc01d60a13f418bf","firstArg":"ZaBBgxOjhLhc"},{"imageID":"sha256:445efcbc0255b904e1584fe9be9a513c1a9784088e35dd0abbdff5cae0961861","firstCommand":"oudKofjVo8ML"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:7c84b5ebe858246af77fb40b85b6ea917fa2a4a651b740cd3320d461164d0ef8","firstArg":"TIre9pmD-tbd"},{"imageID":"sha256:a9a6271d3a19d3ceff897d9d414271723a984d7c45b94aa521b2c8aa20e95983","firstArg":"qLdxkguDGeRy"}]}]},"nO8YkKLJMsaW":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:df606f3b71d4376d1a2108c09f0d3dab455fc30bcb67c60e91590c105e9025bf","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:df606f3b71d4376d1a2108c09f0d3dab455fc30bcb67c60e91590c105e9025bf","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:0f43c31aa3359159d4557dad3cfaf812d8ce44db9cb9ae970e06d3479070b660","firstCommand":"VvlllczXFX2z","firstArg":"47DEQpj8HBSa"}]}]},"nTf6g7hF1YMN":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:aa24edce3d740f84c40018e94cdbf2bc7375268d13d57c2d664e43a46ccea3fc","firstArg":"8DZ1gO9Xqn6d"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:3ebe19b23694155a15d0968968fdee3dcf200ab9718ae1fcbd05f4d24960b827","firstCommand":"icTsn2s_EIax"}]}]},"oNeg9VIL3k3N":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:eddedae7578d79b5a3f748000ae5c00b9f14a04710f9f9ec7b52fc569be5dfb8","firstCommand":"oNeg9VIL3k3N","firstArg":"r7zEsGNvlNrk"}]}]},"p1tmSwFC_Q2L":{"count":3,"shapes":[{"duplicates":1,"restartAlways":true,"containers":[{"imageID":"sha256:e27a636083db9043e3e4bbdc336b5e7fb5693422246e443fd1d913e157f01d46","firstCommand":"F_KbBzFD2M2X"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:50e368e01772dd0dc9c4f9a6cdd5a9693a224968f75dc19eafe2a416f583bdab","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"}]}]},"pepxDbsB4SPa":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:0f43c31aa3359159d4557dad3cfaf812d8ce44db9cb9ae970e06d3479070b660","firstCommand":"VvlllczXFX2z","firstArg":"r7zEsGNvlNrk"}]}]},"q1TpN3EUiKjG":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:a824e468cf8dd61d347e35b2ee5bc2f815666957647098e21a1bb56ff613e5b9","firstCommand":"FATPL2W-sitV","firstArg":"r7zEsGNvlNrk"}]}]},"vDGHaQt8x6K_":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8c885ea0b3c5124989f0a9b93eba98eb9fca6bbd0262772d85d90bf713a4d572","firstArg":"zO0oxtw_mcI5"}]}]}}}config/serviceaccounts.json0000640000000000000000000003703215114405077014611 0ustar0000000000000000{"serviceAccounts":{"TOTAL_COUNT":364,"namespaces":{"default":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-public":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-system":[{"name":"attachdetach-controller","secrets":1},{"name":"builder","secrets":1},{"name":"certificate-controller","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"clusterrole-aggregation-controller","secrets":1},{"name":"cronjob-controller","secrets":1},{"name":"daemon-set-controller","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"deployment-controller","secrets":1},{"name":"disruption-controller","secrets":1},{"name":"endpoint-controller","secrets":1},{"name":"endpointslice-controller","secrets":1},{"name":"endpointslicemirroring-controller","secrets":1},{"name":"ephemeral-volume-controller","secrets":1},{"name":"expand-controller","secrets":1},{"name":"generic-garbage-collector","secrets":1},{"name":"horizontal-pod-autoscaler","secrets":1},{"name":"job-controller","secrets":1},{"name":"legacy-service-account-token-cleaner","secrets":1},{"name":"namespace-controller","secrets":1},{"name":"node-controller","secrets":1},{"name":"persistent-volume-binder","secrets":1},{"name":"pod-garbage-collector","secrets":1},{"name":"pv-protection-controller","secrets":1},{"name":"pvc-protection-controller","secrets":1},{"name":"replicaset-controller","secrets":1},{"name":"replication-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"root-ca-cert-publisher","secrets":1},{"name":"service-account-controller","secrets":1},{"name":"service-ca-cert-publisher","secrets":1},{"name":"statefulset-controller","secrets":1},{"name":"ttl-after-finished-controller","secrets":1},{"name":"validatingadmissionpolicy-status-controller","secrets":1}],"openshift":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-sa","secrets":1}],"openshift-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-operator","secrets":1}],"openshift-authentication":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-openshift","secrets":1}],"openshift-authentication-operator":[{"name":"authentication-operator","secrets":1},{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-catalogd":[{"name":"builder","secrets":1},{"name":"catalogd-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager":[{"name":"builder","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"cloud-node-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"cluster-cloud-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-credential-operator":[{"name":"builder","secrets":1},{"name":"cloud-credential-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-network-config-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-platform-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-csi-drivers":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-machine-approver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-approver-sa","secrets":1}],"openshift-cluster-node-tuning-operator":[{"name":"builder","secrets":1},{"name":"cluster-node-tuning-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"tuned","secrets":1}],"openshift-cluster-olm-operator":[{"name":"builder","secrets":1},{"name":"cluster-olm-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-samples-operator":[{"name":"builder","secrets":1},{"name":"cluster-samples-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-storage-operator":[{"name":"builder","secrets":1},{"name":"cluster-storage-operator","secrets":1},{"name":"csi-snapshot-controller","secrets":1},{"name":"csi-snapshot-controller-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-version":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-managed":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-config-operator","secrets":1}],"openshift-console":[{"name":"builder","secrets":1},{"name":"console","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-console-operator":[{"name":"builder","secrets":1},{"name":"console-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-console-user-settings":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-sa","secrets":1}],"openshift-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-operator","secrets":1}],"openshift-dns":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns","secrets":1},{"name":"node-resolver","secrets":1}],"openshift-dns-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns-operator","secrets":1}],"openshift-etcd":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-backup-sa","secrets":1},{"name":"etcd-sa","secrets":1},{"name":"installer-sa","secrets":1}],"openshift-etcd-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-operator","secrets":1}],"openshift-host-network":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-image-registry":[{"name":"builder","secrets":1},{"name":"cluster-image-registry-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"node-ca","secrets":1},{"name":"pruner","secrets":1}],"openshift-infra":[{"name":"build-config-change-controller","secrets":1},{"name":"build-controller","secrets":1},{"name":"builder","secrets":1},{"name":"cluster-csr-approver-controller","secrets":1},{"name":"cluster-quota-reconciliation-controller","secrets":1},{"name":"default","secrets":1},{"name":"default-rolebindings-controller","secrets":1},{"name":"deployer","secrets":1},{"name":"deployer-controller","secrets":1},{"name":"deploymentconfig-controller","secrets":1},{"name":"image-import-controller","secrets":1},{"name":"image-trigger-controller","secrets":1},{"name":"ingress-to-route-controller","secrets":1},{"name":"namespace-security-allocation-controller","secrets":1},{"name":"node-bootstrapper","secrets":1},{"name":"origin-namespace-controller","secrets":1},{"name":"podsecurity-admission-label-syncer-controller","secrets":1},{"name":"privileged-namespaces-psa-label-syncer","secrets":1},{"name":"pv-recycler-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"serviceaccount-controller","secrets":1},{"name":"serviceaccount-pull-secrets-controller","secrets":1},{"name":"template-instance-controller","secrets":1},{"name":"template-instance-finalizer-controller","secrets":1},{"name":"unidling-controller","secrets":1}],"openshift-ingress":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"router","secrets":1}],"openshift-ingress-canary":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ingress-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ingress-operator","secrets":1}],"openshift-insights":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"gather","secrets":1},{"name":"operator","secrets":1}],"openshift-kni-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-kube-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-apiserver-operator","secrets":1}],"openshift-kube-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"kube-controller-manager-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-controller-manager-operator","secrets":1}],"openshift-kube-scheduler":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1},{"name":"openshift-kube-scheduler-sa","secrets":1}],"openshift-kube-scheduler-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-kube-scheduler-operator","secrets":1}],"openshift-kube-storage-version-migrator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-sa","secrets":1}],"openshift-kube-storage-version-migrator-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-operator","secrets":1}],"openshift-machine-api":[{"name":"builder","secrets":1},{"name":"cluster-autoscaler","secrets":1},{"name":"cluster-autoscaler-operator","secrets":1},{"name":"cluster-baremetal-operator","secrets":1},{"name":"control-plane-machine-set-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-api-controllers","secrets":1},{"name":"machine-api-operator","secrets":1},{"name":"machine-api-termination-handler","secrets":1}],"openshift-machine-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-config-controller","secrets":1},{"name":"machine-config-daemon","secrets":1},{"name":"machine-config-operator","secrets":1},{"name":"machine-config-server","secrets":1},{"name":"machine-os-builder","secrets":1},{"name":"machine-os-puller","secrets":1},{"name":"node-bootstrapper","secrets":1}],"openshift-marketplace":[{"name":"builder","secrets":1},{"name":"certified-operators","secrets":1},{"name":"community-operators","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"marketplace-operator","secrets":1},{"name":"redhat-marketplace","secrets":1},{"name":"redhat-operators","secrets":1}],"openshift-monitoring":[{"name":"alertmanager-main","secrets":1},{"name":"builder","secrets":1},{"name":"cluster-monitoring-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-state-metrics","secrets":1},{"name":"metrics-server","secrets":1},{"name":"monitoring-plugin","secrets":1},{"name":"node-exporter","secrets":1},{"name":"openshift-state-metrics","secrets":1},{"name":"prometheus-k8s","secrets":1},{"name":"prometheus-operator","secrets":1},{"name":"prometheus-operator-admission-webhook","secrets":1},{"name":"telemeter-client","secrets":1},{"name":"thanos-querier","secrets":1}],"openshift-multus":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"metrics-daemon-sa","secrets":1},{"name":"multus","secrets":1},{"name":"multus-ac","secrets":1},{"name":"multus-ancillary-tools","secrets":1}],"openshift-network-diagnostics":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-diagnostics","secrets":1}],"openshift-network-node-identity":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-node-identity","secrets":1}],"openshift-network-operator":[{"name":"builder","secrets":1},{"name":"cluster-network-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"iptables-alerter","secrets":1}],"openshift-node":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-nutanix-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-oauth-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-apiserver-sa","secrets":1}],"openshift-openstack-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-operator-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"operator-controller-controller-manager","secrets":1}],"openshift-operator-lifecycle-manager":[{"name":"builder","secrets":1},{"name":"collect-profiles","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"olm-operator-serviceaccount","secrets":1}],"openshift-operators":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovirt-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovn-kubernetes":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ovn-kubernetes-control-plane","secrets":1},{"name":"ovn-kubernetes-node","secrets":1}],"openshift-route-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"route-controller-manager-sa","secrets":1}],"openshift-service-ca":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca","secrets":1}],"openshift-service-ca-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca-operator","secrets":1}],"openshift-user-workload-monitoring":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-vsphere-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}]}}}config/installplans.json0000640000000000000000000000010015114405076014076 0ustar0000000000000000{"items":null,"stats":{"TOTAL_COUNT":0,"TOTAL_NONUNIQ_COUNT":0}}config/clusteroperator/operator.openshift.io/storage/cluster.json0000640000000000000000000000024015114405065024216 0ustar0000000000000000{"apiVersion":"operator.openshift.io/v1","kind":"Storage","name":"cluster","spec":{"logLevel":"Normal","managementState":"Managed","operatorLogLevel":"Normal"}}config/clusteroperator/storage.json0000640000000000000000000000346615114405065016313 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"storage","uid":"09896699-f7ff-4b2b-a3bc-4f0392d5fdb6","resourceVersion":"9789","generation":1,"creationTimestamp":"2025-12-04T21:54:31Z","annotations":{"capability.openshift.io/name":"Storage","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-04T22:05:02Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-04T22:05:02Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-04T22:05:02Z","reason":"AsExpected","message":"DefaultStorageClassControllerAvailable: No default StorageClass for this platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-04T22:05:02Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2025-12-04T22:05:01Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.29"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"","resource":"namespaces","name":"openshift-cluster-csi-drivers"},{"group":"operator.openshift.io","resource":"storages","name":"cluster"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"cluster-storage-operator-role"}],"extension":null}}config/clusteroperator/operator.openshift.io/serviceca/cluster.json0000640000000000000000000000024215114405065024520 0ustar0000000000000000{"apiVersion":"operator.openshift.io/v1","kind":"ServiceCA","name":"cluster","spec":{"logLevel":"Normal","managementState":"Managed","operatorLogLevel":"Normal"}}config/clusteroperator/service-ca.json0000640000000000000000000000340315114405065016657 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"service-ca","uid":"1e175aa9-a804-4d6a-a542-9d84df81dbf2","resourceVersion":"4517","generation":1,"creationTimestamp":"2025-12-04T21:54:31Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-04T22:00:38Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-04T22:00:41Z","reason":"AsExpected","message":"Progressing: All service-ca-operator deployments updated"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-04T22:00:40Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-04T22:00:40Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2025-12-04T22:00:37Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.29"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"servicecas","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-service-ca-operator"},{"group":"","resource":"namespaces","name":"openshift-service-ca"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-packageserver.json0000640000000000000000000000313315114405065024656 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-packageserver","uid":"2acfd7f0-6c4a-4aad-9e8a-aa0fe63d3676","resourceVersion":"12845","generation":1,"creationTimestamp":"2025-12-04T21:54:32Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-04T22:01:34Z"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-04T22:19:10Z","reason":"ClusterServiceVersionSucceeded","message":"ClusterServiceVersion openshift-operator-lifecycle-manager/packageserver observed in phase Succeeded"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-04T22:19:10Z","message":"Deployed version 0.0.1-snapshot"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-04T22:01:34Z","message":"Safe to upgrade"}],"versions":[{"name":"operator","version":"4.18.29"},{"name":"packageserver","version":"0.0.1-snapshot"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"},{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-catalog.json0000640000000000000000000000255515114405065023455 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-catalog","uid":"c5408acd-17b4-45c5-8c6b-02834cf3e7e9","resourceVersion":"9363","generation":1,"creationTimestamp":"2025-12-04T21:54:32Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-04T22:01:34Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-04T22:04:51Z","message":"Deployed 4.18.0-202511181540.p2.g357bb13.assembly.stream.el9-357bb13"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-04T22:01:34Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-04T22:01:34Z"}],"versions":[{"name":"operator","version":"4.18.29"},{"name":"operator-lifecycle-manager","version":"4.18.0-202511181540.p2.g357bb13.assembly.stream.el9-357bb13"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager.json0000640000000000000000000000264115114405065022041 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager","uid":"ea101d07-6740-48a4-b36c-cdb0ead851f6","resourceVersion":"8993","generation":1,"creationTimestamp":"2025-12-04T21:54:31Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-04T22:01:34Z","message":"Deployed 4.18.0-202511181540.p2.g357bb13.assembly.stream.el9-357bb13"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-04T22:01:34Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-04T22:01:34Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-04T22:01:34Z"}],"versions":[{"name":"operator","version":"4.18.29"},{"name":"operator-lifecycle-manager","version":"4.18.0-202511181540.p2.g357bb13.assembly.stream.el9-357bb13"}],"relatedObjects":[{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/samples.operator.openshift.io/config/cluster.json0000640000000000000000000000022215114405065025462 0ustar0000000000000000{"apiVersion":"samples.operator.openshift.io/v1","kind":"Config","name":"cluster","spec":{"architectures":["x86_64"],"managementState":"Managed"}}config/clusteroperator/openshift-samples.json0000640000000000000000000000260515114405065020302 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-samples","uid":"26d92082-9342-4c9b-a871-d9c0f7dcac24","resourceVersion":"14028","generation":1,"creationTimestamp":"2025-12-04T21:54:31Z","annotations":{"capability.openshift.io/name":"openshift-samples","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-04T22:20:48Z"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-04T22:20:57Z","message":"Samples installation successful at 4.18.29"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-04T22:20:48Z","message":"Samples installation successful at 4.18.29"}],"versions":[{"name":"operator","version":"4.18.29"}],"relatedObjects":[{"group":"samples.operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-samples-operator"},{"group":"template.openshift.io","resource":"templates","namespace":"openshift","name":""},{"group":"image.openshift.io","resource":"imagestreams","namespace":"openshift","name":""}],"extension":null}}config/clusteroperator/operator.openshift.io/openshiftcontrollermanager/cluster.json0000640000000000000000000000255315114405065030221 0ustar0000000000000000{"apiVersion":"operator.openshift.io/v1","kind":"OpenShiftControllerManager","name":"cluster","spec":{"logLevel":"Normal","managementState":"Managed","observedConfig":{"build":{"buildDefaults":{"resources":{}},"imageTemplateFormat":{"format":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:31aa3c746438e79d97c5978e8a01d5294af45fd3e331d58d9a50adaee75080a2"}},"controllers":["openshift.io/build","openshift.io/build-config-change","openshift.io/builder-rolebindings","openshift.io/builder-serviceaccount","-openshift.io/default-rolebindings","openshift.io/deployer","openshift.io/deployer-rolebindings","openshift.io/deployer-serviceaccount","openshift.io/deploymentconfig","openshift.io/image-import","-openshift.io/image-puller-rolebindings","openshift.io/image-signature-import","openshift.io/image-trigger","openshift.io/ingress-ip","openshift.io/ingress-to-route","openshift.io/origin-namespace","openshift.io/serviceaccount","-openshift.io/serviceaccount-pull-secrets","openshift.io/templateinstance","openshift.io/templateinstancefinalizer","openshift.io/unidling"],"deployer":{"imageTemplateFormat":{"format":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:42c3f5030dd19d0c34c5bff920f0686a1cf6bf8f5d287109d566fc86d0cbde7f"}},"featureGates":["BuildCSIVolumes=true"],"ingress":{"ingressIPNetworkCIDR":""}},"operatorLogLevel":"Normal","unsupportedConfigOverrides":null}}config/clusteroperator/openshift-controller-manager.json0000640000000000000000000000346215114405065022433 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-controller-manager","uid":"08c1d826-b7d2-49fd-a678-b9fc3e2646c1","resourceVersion":"17240","generation":1,"creationTimestamp":"2025-12-04T21:54:31Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-04T22:00:38Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-04T22:24:28Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-04T22:01:18Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-04T22:00:43Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2025-12-04T22:00:38Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.29"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftcontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-controller-manager-operator"},{"group":"","resource":"namespaces","name":"openshift-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-route-controller-manager"}],"extension":null}}config/clusteroperator/operator.openshift.io/openshiftapiserver/cluster.json0000640000000000000000000000646015114405065026504 0ustar0000000000000000{"apiVersion":"operator.openshift.io/v1","kind":"OpenShiftAPIServer","name":"cluster","spec":{"logLevel":"Normal","managementState":"Managed","observedConfig":{"apiServerArguments":{"feature-gates":["AWSEFSDriverVolumeMetrics=true","AdminNetworkPolicy=true","AlibabaPlatform=true","AzureWorkloadIdentity=true","BareMetalLoadBalancer=true","BuildCSIVolumes=true","ChunkSizeMiB=true","CloudDualStackNodeIPs=true","DisableKubeletCloudCredentialProviders=true","GCPLabelsTags=true","HardwareSpeed=true","IngressControllerLBSubnetsAWS=true","KMSv1=true","ManagedBootImages=true","ManagedBootImagesAWS=true","MultiArchInstallAWS=true","MultiArchInstallGCP=true","NetworkDiagnosticsConfig=true","NetworkLiveMigration=true","NetworkSegmentation=true","NewOLM=true","NodeDisruptionPolicy=true","OnClusterBuild=true","PersistentIPsForVirtualization=true","PrivateHostedZoneAWS=true","SetEIPForNLBIngressController=true","VSphereControlPlaneMachineSet=true","VSphereDriverConfiguration=true","VSphereMultiVCenters=true","VSphereStaticIPs=true","ValidatingAdmissionPolicy=true","AWSClusterHostedDNS=false","AdditionalRoutingCapabilities=false","AutomatedEtcdBackup=false","BootcNodeManagement=false","CSIDriverSharedResource=false","ClusterAPIInstall=false","ClusterAPIInstallIBMCloud=false","ClusterMonitoringConfig=false","ConsolePluginContentSecurityPolicy=false","DNSNameResolver=false","DynamicResourceAllocation=false","EtcdBackendQuota=false","EventedPLEG=false","Example=false","ExternalOIDC=false","ExternalOIDCWithUIDAndExtraClaimMappings=false","GCPClusterHostedDNS=false","GatewayAPI=false","ImageStreamImportMode=false","IngressControllerDynamicConfigurationManager=false","InsightsConfig=false","InsightsConfigAPI=false","InsightsOnDemandDataGather=false","InsightsRuntimeExtractor=false","MachineAPIMigration=false","MachineAPIOperatorDisableMachineHealthCheckController=false","MachineAPIProviderOpenStack=false","MachineConfigNodes=false","MaxUnavailableStatefulSet=false","MetricsCollectionProfiles=false","MinimumKubeletVersion=false","MixedCPUsAllocation=false","MultiArchInstallAzure=false","NodeSwap=false","NutanixMultiSubnets=false","OVNObservability=false","OpenShiftPodSecurityAdmission=false","PinnedImages=false","PlatformOperators=false","ProcMountType=false","RouteAdvertisements=false","RouteExternalCertificate=false","ServiceAccountTokenNodeBinding=false","SignatureStores=false","SigstoreImageVerification=false","StreamingCollectionEncodingToJSON=false","StreamingCollectionEncodingToProtobuf=false","TranslateStreamCloseWebsocketRequests=false","UpgradeStatus=false","UserNamespacesPodSecurityStandards=false","UserNamespacesSupport=false","VSphereMultiNetworks=false","VolumeAttributesClass=false","VolumeGroupSnapshot=false"]},"projectConfig":{"projectRequestMessage":""},"routingConfig":{"subdomain":"apps.sno.openstack.lab"},"servingInfo":{"cipherSuites":["TLS_AES_128_GCM_SHA256","TLS_AES_256_GCM_SHA384","TLS_CHACHA20_POLY1305_SHA256","TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256","TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256","TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384","TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384","TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256","TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"],"minTLSVersion":"VersionTLS12"},"storageConfig":{"urls":["https://192.168.32.10:2379"]}},"operatorLogLevel":"Normal","unsupportedConfigOverrides":null}}config/clusteroperator/openshift-apiserver.json0000640000000000000000000000552415114405065020641 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-apiserver","uid":"b634be14-4edd-4135-9c39-91242ee62e86","resourceVersion":"13335","generation":1,"creationTimestamp":"2025-12-04T21:54:31Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-04T22:00:38Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-04T22:01:23Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-04T22:19:49Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-04T22:00:38Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2025-12-04T22:00:38Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.29"},{"name":"openshift-apiserver","version":"4.18.29"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftapiservers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-apiserver"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"endpoints","namespace":"openshift-etcd","name":"host-etcd-2"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-apiserver","name":""},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.apps.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.authorization.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.build.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.image.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.project.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.quota.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.route.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.security.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.template.openshift.io"}],"extension":null}}config/clusteroperator/operator.openshift.io/olm/cluster.json0000640000000000000000000000023415114405065023344 0ustar0000000000000000{"apiVersion":"operator.openshift.io/v1","kind":"OLM","name":"cluster","spec":{"logLevel":"Normal","managementState":"Managed","operatorLogLevel":"Normal"}}config/clusteroperator/olm.json0000640000000000000000000001420415114405065015426 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"olm","uid":"684b18ee-9096-4b93-95d2-045b046aefc4","resourceVersion":"9516","generation":1,"creationTimestamp":"2025-12-04T21:54:31Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManagerV1","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-04T22:00:46Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-04T22:01:21Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-04T22:01:21Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-04T22:00:46Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2025-12-04T22:00:46Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.29"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-catalogd"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clustercatalogs.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-catalogd","name":"catalogd-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-catalogd","name":"catalogd-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-catalogd","name":"catalogd-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-catalogd","name":"catalogd-service"},{"group":"apps","resource":"deployments","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-certified-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-community-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-marketplace"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-operators"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":"catalogd-mutating-webhook-configuration"},{"group":"","resource":"namespaces","name":"openshift-operator-controller"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusterextensions.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-operator-controller","name":"operator-controller-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager-metrics-service"},{"group":"apps","resource":"deployments","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"operator.openshift.io","resource":"olms","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-olm-operator"}],"extension":null}}config/clusteroperator/node-tuning.json0000640000000000000000000000342115114405065017065 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"node-tuning","uid":"f7b69e4d-dbe8-40a9-adcc-dc818ae26dcc","resourceVersion":"5620","generation":1,"creationTimestamp":"2025-12-04T21:54:31Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2025-12-04T22:00:52Z","reason":"AsExpected","message":"Cluster has deployed 1/1 \"4.18.29\" operands"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-04T22:00:53Z","reason":"AsExpected","message":"Cluster version is \"4.18.29\""},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-04T22:00:51Z","reason":"AsExpected","message":"DaemonSet \"tuned\" available"}],"versions":[{"name":"ocp-tuned","version":"4.18.29"},{"name":"operator","version":"4.18.29"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-node-tuning-operator"},{"group":"tuned.openshift.io","resource":"profiles","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"tuned.openshift.io","resource":"tuneds","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"apps","resource":"daemonsets","namespace":"openshift-cluster-node-tuning-operator","name":"tuned"},{"group":"performance.openshift.io","resource":"performanceprofiles","name":""}],"extension":null}}config/clusteroperator/operator.openshift.io/network/cluster.json0000640000000000000000000000141115114405065024244 0ustar0000000000000000{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","spec":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"defaultNetwork":{"ovnKubernetesConfig":{"egressIPConfig":{},"gatewayConfig":{"ipForwarding":"Global","ipv4":{},"ipv6":{},"routingViaHost":true},"genevePort":6081,"ipsecConfig":{"mode":"Disabled"},"mtu":8900,"policyAuditConfig":{"destination":"null","maxFileSize":50,"maxLogFiles":5,"rateLimit":20,"syslogFacility":"local0"}},"type":"OVNKubernetes"},"deployKubeProxy":false,"disableMultiNetwork":false,"disableNetworkDiagnostics":false,"logLevel":"Normal","managementState":"Managed","observedConfig":null,"operatorLogLevel":"Normal","serviceNetwork":["172.30.0.0/16"],"unsupportedConfigOverrides":null,"useMultiNetworkPolicy":false}}network-node-identity.json0000640000000000000000000000022615114405065037550 0ustar0000000000000000config/clusteroperator/network.operator.openshift.io/operatorpki/openshift-network-node-identity{"apiVersion":"network.operator.openshift.io/v1","kind":"OperatorPKI","name":"network-node-identity","spec":{"targetCert":{"commonName":"127.0.0.1"}}}signer.json0000640000000000000000000000022315114405065033275 0ustar0000000000000000config/clusteroperator/network.operator.openshift.io/operatorpki/openshift-ovn-kubernetes{"apiVersion":"network.operator.openshift.io/v1","kind":"OperatorPKI","name":"signer","spec":{"targetCert":{"commonName":"ovn-kubernetes-signer"}}}config/clusteroperator/network.operator.openshift.io/operatorpki/openshift-ovn-kubernetes/ovn.json0000640000000000000000000000017615114405065032676 0ustar0000000000000000{"apiVersion":"network.operator.openshift.io/v1","kind":"OperatorPKI","name":"ovn","spec":{"targetCert":{"commonName":"ovn"}}}config/clusteroperator/network.json0000640000000000000000000003614415114405065016337 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"network","uid":"79ed5199-fece-4232-88e6-1001ec620570","resourceVersion":"14158","generation":1,"creationTimestamp":"2025-12-04T21:54:31Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","network.operator.openshift.io/last-seen-state":"{\"DaemonsetStates\":[],\"DeploymentStates\":[],\"StatefulsetStates\":[]}","network.operator.openshift.io/relatedClusterObjects":""},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"ManagementStateDegraded","status":"False","lastTransitionTime":"2025-12-04T21:59:16Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-04T22:21:44Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-04T21:59:01Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-04T22:17:33Z"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-04T22:00:37Z"}],"versions":[{"name":"operator","version":"4.18.29"}],"relatedObjects":[{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"applied-cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"network-attachment-definitions.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ippools.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"overlappingrangeipreservations.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"nodeslicepools.whereabouts.cni.cncf.io"},{"group":"","resource":"namespaces","name":"openshift-multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-ancillary-tools"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-transient"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-group"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-cluster-readers"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"net-attach-def-project"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"default-cni-sysctl-allowlist"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"cni-copy-resources"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"whereabouts-config"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"multus-daemon-config"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus-additional-cni-plugins"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"metrics-daemon-sa"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"metrics-daemon-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"metrics-daemon-sa-rolebinding"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"network-metrics-daemon"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-network"},{"group":"","resource":"services","namespace":"openshift-multus","name":"network-metrics-service"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"","resource":"services","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ac"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-admission-controller-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-admission-controller-webhook"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"multus.openshift.io"},{"group":"apps","resource":"deployments","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-multus-admission-controller"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-multus","name":"prometheus-k8s-rules"},{"group":"","resource":"namespaces","name":"openshift-ovn-kubernetes"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressfirewalls.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressips.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressqoses.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminpolicybasedexternalroutes.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressservices.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"baselineadminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ipamclaims.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"userdefinednetworks.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusteruserdefinednetworks.k8s.ovn.org"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-nodes-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-kube-rbac-proxy"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-kube-rbac-proxy"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-config"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"ovn"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"signer"},{"group":"flowcontrol.apiserver.k8s.io","resource":"flowschemas","name":"openshift-ovn-kubernetes"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-cluster-reader"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-script-lib"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-editor"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-viewer"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"master-rules"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"networking-rules"},{"group":"","resource":"configmaps","namespace":"openshift-config-managed","name":"openshift-network-features"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-control-plane-metrics"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-node"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"","resource":"namespaces","name":"openshift-host-network"},{"group":"","resource":"resourcequotas","namespace":"openshift-host-network","name":"host-network-namespace-quotas"},{"group":"apps","resource":"deployments","namespace":"openshift-ovn-kubernetes","name":"ovnkube-control-plane"},{"group":"apps","resource":"daemonsets","namespace":"openshift-ovn-kubernetes","name":"ovnkube-node"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicies","name":"user-defined-networks-namespace-label"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicybindings","name":"user-defined-networks-namespace-label-binding"},{"group":"","resource":"namespaces","name":"openshift-network-diagnostics"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"kube-system","name":"network-diagnostics"},{"group":"apps","resource":"deployments","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config-managed","name":"openshift-network-public-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config-managed","name":"openshift-network-public-role-binding"},{"group":"","resource":"namespaces","name":"openshift-network-node-identity"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"system:openshift:scc:hostnetwork-v2"},{"group":"","resource":"configmaps","namespace":"openshift-network-node-identity","name":"ovnkube-identity-cm"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"network-node-identity.openshift.io"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-network-operator","name":"openshift-network-operator-ipsec-rules"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-iptables-alerter"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-iptables-alerter"},{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"iptables-alerter-script"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"","resource":"namespaces","name":"openshift-network-operator"},{"group":"operator.openshift.io","resource":"networks","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cloud-network-config-controller"}],"extension":null}}config/clusteroperator/monitoring.json0000640000000000000000000000423015114405065017022 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"monitoring","uid":"00cbc63b-8643-4588-8baa-deee0a73de0c","resourceVersion":"16854","generation":1,"creationTimestamp":"2025-12-04T21:54:31Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2025-12-04T22:24:12Z","reason":"RollOutDone","message":"Successfully rolled out the stack."},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-04T22:24:12Z","reason":"PrometheusDataPersistenceNotConfigured","message":"Prometheus is running without persistent storage which can lead to data loss during upgrades and cluster disruptions. Please refer to the official documentation to see how to configure storage for Prometheus: https://docs.openshift.com/container-platform/4.18/observability/monitoring/configuring-the-monitoring-stack.html"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-04T22:24:12Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-04T22:01:08Z"}],"versions":[{"name":"operator","version":"4.18.29"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-monitoring"},{"group":"","resource":"namespaces","name":"openshift-user-workload-monitoring"},{"group":"monitoring.coreos.com","resource":"servicemonitors","name":""},{"group":"monitoring.coreos.com","resource":"podmonitors","name":""},{"group":"monitoring.coreos.com","resource":"prometheusrules","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagers","name":""},{"group":"monitoring.coreos.com","resource":"prometheuses","name":""},{"group":"monitoring.coreos.com","resource":"thanosrulers","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagerconfigs","name":""}],"extension":null}}config/clusteroperator/marketplace.json0000640000000000000000000000313315114405065017126 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"marketplace","uid":"8f5249d6-443e-4b24-812f-64ffe1a2af83","resourceVersion":"6427","generation":1,"creationTimestamp":"2025-12-04T21:54:31Z","annotations":{"capability.openshift.io/name":"marketplace","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-04T22:01:09Z","reason":"OperatorAvailable","message":"Successfully progressed to release version: 4.18.29"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-04T22:01:09Z","reason":"OperatorAvailable","message":"Available release version: 4.18.29"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-04T22:01:09Z","reason":"OperatorAvailable","message":"Marketplace is upgradeable"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-04T22:01:09Z","reason":"OperatorAvailable","message":"Available release version: 4.18.29"}],"versions":[{"name":"operator","version":"4.18.29"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-marketplace"},{"group":"operators.coreos.com","resource":"catalogsources","namespace":"openshift-marketplace","name":""}],"extension":null}}config/clusteroperator/machine-config.json0000640000000000000000000000546315114405065017515 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-config","uid":"9b851d5f-890e-4c4c-bbd1-d00f9668f208","resourceVersion":"10817","generation":1,"creationTimestamp":"2025-12-04T21:54:31Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-04T22:06:11Z","message":"Cluster version is 4.18.29"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-04T22:06:05Z"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-04T22:06:05Z","reason":"AsExpected","message":"Cluster has deployed [{operator 4.18.29} {operator-image quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b472823604757237c2d16bd6f6221f4cf562aa3b05942c7f602e1e8b2e55a7c6}]"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-04T22:06:05Z","reason":"AsExpected"},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2025-12-04T22:06:05Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.29"},{"name":"operator-image","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b472823604757237c2d16bd6f6221f4cf562aa3b05942c7f602e1e8b2e55a7c6"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-config-operator"},{"group":"machineconfiguration.openshift.io","resource":"machineconfigpools","name":""},{"group":"machineconfiguration.openshift.io","resource":"controllerconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"kubeletconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"containerruntimeconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"machineconfigs","name":""},{"group":"operator.openshift.io","resource":"machineconfigurations","name":""},{"group":"","resource":"nodes","name":""},{"group":"","resource":"namespaces","name":"openshift-kni-infra"},{"group":"","resource":"namespaces","name":"openshift-openstack-infra"},{"group":"","resource":"namespaces","name":"openshift-ovirt-infra"},{"group":"","resource":"namespaces","name":"openshift-vsphere-infra"},{"group":"","resource":"namespaces","name":"openshift-nutanix-infra"},{"group":"","resource":"namespaces","name":"openshift-cloud-platform-infra"}],"extension":{"master":"all 1 nodes are at latest configuration rendered-master-67eaf7c4d57499a62a9899ea19c65a40","worker":"all 0 nodes are at latest configuration rendered-worker-c04c3a75b10185e115c02aedea740507"}}}config/clusteroperator/machine-approver.json0000640000000000000000000000253215114405065020100 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-approver","uid":"c0934d11-5771-4cab-87f9-c22b57d11f51","resourceVersion":"8685","generation":1,"creationTimestamp":"2025-12-04T21:54:31Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2025-12-04T22:01:30Z","reason":"AsExpected","message":"Cluster Machine Approver is available at 4.18.29"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-04T22:01:30Z","reason":"AsExpected"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-04T22:01:30Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-04T22:01:30Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.29"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-machine-approver"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""}],"extension":null}}config/clusteroperator/machine-api.json0000640000000000000000000000371315114405065017015 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-api","uid":"c339f9eb-f912-4b21-83f0-735c40c1fa44","resourceVersion":"9795","generation":1,"creationTimestamp":"2025-12-04T21:54:31Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-04T22:05:02Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-04T22:05:01Z","reason":"AsExpected"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-04T22:05:02Z","reason":"AsExpected","message":"Cluster Machine API Operator is in NoOp mode"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-04T22:05:02Z"}],"versions":[{"name":"operator","version":"4.18.29"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"machines","namespace":"openshift-machine-api","name":""},{"group":"machine.openshift.io","resource":"machinesets","namespace":"openshift-machine-api","name":""},{"group":"machine.openshift.io","resource":"machinehealthchecks","namespace":"openshift-machine-api","name":""},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-machine-api","name":""},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-operator"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-controllers"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/operator.openshift.io/kubestorageversionmigrator/cluster.json0000640000000000000000000000026315114405065030245 0ustar0000000000000000{"apiVersion":"operator.openshift.io/v1","kind":"KubeStorageVersionMigrator","name":"cluster","spec":{"logLevel":"Normal","managementState":"Managed","operatorLogLevel":"Normal"}}config/clusteroperator/kube-storage-version-migrator.json0000640000000000000000000000325315114405065022536 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-storage-version-migrator","uid":"8b9ebc78-f521-4783-81b7-29ab99afc88a","resourceVersion":"4504","generation":1,"creationTimestamp":"2025-12-04T21:54:31Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-04T22:00:38Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-04T22:00:41Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-04T22:00:41Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-04T22:00:37Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2025-12-04T22:00:37Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.29"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubestorageversionmigrators","name":"cluster"},{"group":"migration.k8s.io","resource":"storageversionmigrations","name":""},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator"},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator-operator"}],"extension":null}}config/clusteroperator/operator.openshift.io/kubescheduler/cluster.json0000640000000000000000000000115615114405065025406 0ustar0000000000000000{"apiVersion":"operator.openshift.io/v1","kind":"KubeScheduler","name":"cluster","spec":{"logLevel":"Normal","managementState":"Managed","observedConfig":{"servingInfo":{"cipherSuites":["TLS_AES_128_GCM_SHA256","TLS_AES_256_GCM_SHA384","TLS_CHACHA20_POLY1305_SHA256","TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256","TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256","TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384","TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384","TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256","TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"],"minTLSVersion":"VersionTLS12"}},"operatorLogLevel":"Normal","unsupportedConfigOverrides":null}}config/clusteroperator/kube-scheduler.json0000640000000000000000000000414615114405065017545 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-scheduler","uid":"db79f997-1015-4cde-b6cc-b5aba5284552","resourceVersion":"12888","generation":1,"creationTimestamp":"2025-12-04T21:54:31Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-04T22:16:05Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-04T22:18:01Z","reason":"AsExpected","message":"NodeInstallerProgressing: 1 node is at revision 5"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-04T22:18:01Z","reason":"AsExpected","message":"StaticPodsAvailable: 1 nodes are active; 1 node is at revision 5"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-04T22:00:38Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2025-12-04T22:00:38Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.29"},{"name":"kube-scheduler","version":"1.31.13"},{"name":"operator","version":"4.18.29"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeschedulers","name":"cluster"},{"group":"config.openshift.io","resource":"schedulers","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler-operator"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""}],"extension":null}}config/clusteroperator/operator.openshift.io/kubecontrollermanager/cluster.json0000640000000000000000000001362515114405065027152 0ustar0000000000000000{"apiVersion":"operator.openshift.io/v1","kind":"KubeControllerManager","name":"cluster","spec":{"logLevel":"Normal","managementState":"Managed","observedConfig":{"extendedArguments":{"cluster-cidr":["10.128.0.0/16"],"cluster-name":["sno-bhmd6"],"feature-gates":["AWSEFSDriverVolumeMetrics=true","AdminNetworkPolicy=true","AlibabaPlatform=true","AzureWorkloadIdentity=true","BareMetalLoadBalancer=true","BuildCSIVolumes=true","ChunkSizeMiB=true","CloudDualStackNodeIPs=true","DisableKubeletCloudCredentialProviders=true","GCPLabelsTags=true","HardwareSpeed=true","IngressControllerLBSubnetsAWS=true","KMSv1=true","ManagedBootImages=true","ManagedBootImagesAWS=true","MultiArchInstallAWS=true","MultiArchInstallGCP=true","NetworkDiagnosticsConfig=true","NetworkLiveMigration=true","NetworkSegmentation=true","NewOLM=true","NodeDisruptionPolicy=true","OnClusterBuild=true","PersistentIPsForVirtualization=true","PrivateHostedZoneAWS=true","SetEIPForNLBIngressController=true","VSphereControlPlaneMachineSet=true","VSphereDriverConfiguration=true","VSphereMultiVCenters=true","VSphereStaticIPs=true","ValidatingAdmissionPolicy=true","AWSClusterHostedDNS=false","AdditionalRoutingCapabilities=false","AutomatedEtcdBackup=false","BootcNodeManagement=false","CSIDriverSharedResource=false","ClusterAPIInstall=false","ClusterAPIInstallIBMCloud=false","ClusterMonitoringConfig=false","ConsolePluginContentSecurityPolicy=false","DNSNameResolver=false","DynamicResourceAllocation=false","EtcdBackendQuota=false","EventedPLEG=false","Example=false","ExternalOIDC=false","ExternalOIDCWithUIDAndExtraClaimMappings=false","GCPClusterHostedDNS=false","GatewayAPI=false","ImageStreamImportMode=false","IngressControllerDynamicConfigurationManager=false","InsightsConfig=false","InsightsConfigAPI=false","InsightsOnDemandDataGather=false","InsightsRuntimeExtractor=false","MachineAPIMigration=false","MachineAPIOperatorDisableMachineHealthCheckController=false","MachineAPIProviderOpenStack=false","MachineConfigNodes=false","MaxUnavailableStatefulSet=false","MetricsCollectionProfiles=false","MinimumKubeletVersion=false","MixedCPUsAllocation=false","MultiArchInstallAzure=false","NodeSwap=false","NutanixMultiSubnets=false","OVNObservability=false","OpenShiftPodSecurityAdmission=false","PinnedImages=false","PlatformOperators=false","ProcMountType=false","RouteAdvertisements=false","RouteExternalCertificate=false","ServiceAccountTokenNodeBinding=false","SignatureStores=false","SigstoreImageVerification=false","StreamingCollectionEncodingToJSON=false","StreamingCollectionEncodingToProtobuf=false","TranslateStreamCloseWebsocketRequests=false","UpgradeStatus=false","UserNamespacesPodSecurityStandards=false","UserNamespacesSupport=false","VSphereMultiNetworks=false","VolumeAttributesClass=false","VolumeGroupSnapshot=false"],"service-cluster-ip-range":["172.30.0.0/16"]},"featureGates":["AWSEFSDriverVolumeMetrics=true","AdminNetworkPolicy=true","AlibabaPlatform=true","AzureWorkloadIdentity=true","BareMetalLoadBalancer=true","BuildCSIVolumes=true","ChunkSizeMiB=true","CloudDualStackNodeIPs=true","DisableKubeletCloudCredentialProviders=true","GCPLabelsTags=true","HardwareSpeed=true","IngressControllerLBSubnetsAWS=true","KMSv1=true","ManagedBootImages=true","ManagedBootImagesAWS=true","MultiArchInstallAWS=true","MultiArchInstallGCP=true","NetworkDiagnosticsConfig=true","NetworkLiveMigration=true","NetworkSegmentation=true","NewOLM=true","NodeDisruptionPolicy=true","OnClusterBuild=true","PersistentIPsForVirtualization=true","PrivateHostedZoneAWS=true","SetEIPForNLBIngressController=true","VSphereControlPlaneMachineSet=true","VSphereDriverConfiguration=true","VSphereMultiVCenters=true","VSphereStaticIPs=true","ValidatingAdmissionPolicy=true","AWSClusterHostedDNS=false","AdditionalRoutingCapabilities=false","AutomatedEtcdBackup=false","BootcNodeManagement=false","CSIDriverSharedResource=false","ClusterAPIInstall=false","ClusterAPIInstallIBMCloud=false","ClusterMonitoringConfig=false","ConsolePluginContentSecurityPolicy=false","DNSNameResolver=false","DynamicResourceAllocation=false","EtcdBackendQuota=false","EventedPLEG=false","Example=false","ExternalOIDC=false","ExternalOIDCWithUIDAndExtraClaimMappings=false","GCPClusterHostedDNS=false","GatewayAPI=false","ImageStreamImportMode=false","IngressControllerDynamicConfigurationManager=false","InsightsConfig=false","InsightsConfigAPI=false","InsightsOnDemandDataGather=false","InsightsRuntimeExtractor=false","MachineAPIMigration=false","MachineAPIOperatorDisableMachineHealthCheckController=false","MachineAPIProviderOpenStack=false","MachineConfigNodes=false","MaxUnavailableStatefulSet=false","MetricsCollectionProfiles=false","MinimumKubeletVersion=false","MixedCPUsAllocation=false","MultiArchInstallAzure=false","NodeSwap=false","NutanixMultiSubnets=false","OVNObservability=false","OpenShiftPodSecurityAdmission=false","PinnedImages=false","PlatformOperators=false","ProcMountType=false","RouteAdvertisements=false","RouteExternalCertificate=false","ServiceAccountTokenNodeBinding=false","SignatureStores=false","SigstoreImageVerification=false","StreamingCollectionEncodingToJSON=false","StreamingCollectionEncodingToProtobuf=false","TranslateStreamCloseWebsocketRequests=false","UpgradeStatus=false","UserNamespacesPodSecurityStandards=false","UserNamespacesSupport=false","VSphereMultiNetworks=false","VolumeAttributesClass=false","VolumeGroupSnapshot=false"],"serviceServingCert":{"certFile":"/etc/kubernetes/static-pod-resources/configmaps/service-ca/ca-bundle.crt"},"servingInfo":{"cipherSuites":["TLS_AES_128_GCM_SHA256","TLS_AES_256_GCM_SHA384","TLS_CHACHA20_POLY1305_SHA256","TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256","TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256","TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384","TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384","TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256","TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"],"minTLSVersion":"VersionTLS12"}},"operatorLogLevel":"Normal","unsupportedConfigOverrides":null,"useMoreSecureServiceCA":true}}config/clusteroperator/kube-controller-manager.json0000640000000000000000000000430015114405065021352 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-controller-manager","uid":"45d3938b-0b22-4790-982b-3213f9ded21c","resourceVersion":"13338","generation":1,"creationTimestamp":"2025-12-04T21:54:31Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-04T22:00:38Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-04T22:18:06Z","reason":"AsExpected","message":"NodeInstallerProgressing: 1 node is at revision 3"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-04T22:16:51Z","reason":"AsExpected","message":"StaticPodsAvailable: 1 nodes are active; 1 node is at revision 3"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-04T22:00:38Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2025-12-04T22:00:38Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.29"},{"name":"kube-controller-manager","version":"1.31.13"},{"name":"operator","version":"4.18.29"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubecontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager-operator"},{"group":"","resource":"namespaces","name":"kube-system"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""},{"group":"","resource":"nodes","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/operator.openshift.io/kubeapiserver/cluster.json0000640000000000000000000001311215114405065025423 0ustar0000000000000000{"apiVersion":"operator.openshift.io/v1","kind":"KubeAPIServer","name":"cluster","spec":{"logLevel":"Normal","managementState":"Managed","observedConfig":{"admission":{"pluginConfig":{"PodSecurity":{"configuration":{"defaults":{"audit":"restricted","audit-version":"latest","enforce":"privileged","enforce-version":"latest","warn":"restricted","warn-version":"latest"}}},"network.openshift.io/ExternalIPRanger":{"configuration":{"allowIngressIP":false,"apiVersion":"network.openshift.io/v1","kind":"ExternalIPRangerAdmissionConfig"}},"network.openshift.io/RestrictedEndpointsAdmission":{"configuration":{"apiVersion":"network.openshift.io/v1","kind":"RestrictedEndpointsAdmissionConfig","restrictedCIDRs":["10.128.0.0/16","172.30.0.0/16"]}}}},"apiServerArguments":{"api-audiences":["https://kubernetes.default.svc"],"authentication-token-webhook-config-file":["/etc/kubernetes/static-pod-resources/secrets/webhook-authenticator/kubeConfig"],"authentication-token-webhook-version":["v1"],"etcd-servers":["https://192.168.32.10:2379","https://localhost:2379"],"feature-gates":["AWSEFSDriverVolumeMetrics=true","AdminNetworkPolicy=true","AlibabaPlatform=true","AzureWorkloadIdentity=true","BareMetalLoadBalancer=true","BuildCSIVolumes=true","ChunkSizeMiB=true","CloudDualStackNodeIPs=true","DisableKubeletCloudCredentialProviders=true","GCPLabelsTags=true","HardwareSpeed=true","IngressControllerLBSubnetsAWS=true","KMSv1=true","ManagedBootImages=true","ManagedBootImagesAWS=true","MultiArchInstallAWS=true","MultiArchInstallGCP=true","NetworkDiagnosticsConfig=true","NetworkLiveMigration=true","NetworkSegmentation=true","NewOLM=true","NodeDisruptionPolicy=true","OnClusterBuild=true","PersistentIPsForVirtualization=true","PrivateHostedZoneAWS=true","SetEIPForNLBIngressController=true","VSphereControlPlaneMachineSet=true","VSphereDriverConfiguration=true","VSphereMultiVCenters=true","VSphereStaticIPs=true","ValidatingAdmissionPolicy=true","AWSClusterHostedDNS=false","AdditionalRoutingCapabilities=false","AutomatedEtcdBackup=false","BootcNodeManagement=false","CSIDriverSharedResource=false","ClusterAPIInstall=false","ClusterAPIInstallIBMCloud=false","ClusterMonitoringConfig=false","ConsolePluginContentSecurityPolicy=false","DNSNameResolver=false","DynamicResourceAllocation=false","EtcdBackendQuota=false","EventedPLEG=false","Example=false","ExternalOIDC=false","ExternalOIDCWithUIDAndExtraClaimMappings=false","GCPClusterHostedDNS=false","GatewayAPI=false","ImageStreamImportMode=false","IngressControllerDynamicConfigurationManager=false","InsightsConfig=false","InsightsConfigAPI=false","InsightsOnDemandDataGather=false","InsightsRuntimeExtractor=false","MachineAPIMigration=false","MachineAPIOperatorDisableMachineHealthCheckController=false","MachineAPIProviderOpenStack=false","MachineConfigNodes=false","MaxUnavailableStatefulSet=false","MetricsCollectionProfiles=false","MinimumKubeletVersion=false","MixedCPUsAllocation=false","MultiArchInstallAzure=false","NodeSwap=false","NutanixMultiSubnets=false","OVNObservability=false","OpenShiftPodSecurityAdmission=false","PinnedImages=false","PlatformOperators=false","ProcMountType=false","RouteAdvertisements=false","RouteExternalCertificate=false","ServiceAccountTokenNodeBinding=false","SignatureStores=false","SigstoreImageVerification=false","StreamingCollectionEncodingToJSON=false","StreamingCollectionEncodingToProtobuf=false","TranslateStreamCloseWebsocketRequests=false","UpgradeStatus=false","UserNamespacesPodSecurityStandards=false","UserNamespacesSupport=false","VSphereMultiNetworks=false","VolumeAttributesClass=false","VolumeGroupSnapshot=false"],"goaway-chance":["0"],"runtime-config":["admissionregistration.k8s.io/v1beta1=true"],"send-retry-after-while-not-ready-once":["true"],"service-account-issuer":["https://kubernetes.default.svc"],"service-account-jwks-uri":["https://api.sno.openstack.lab:6443/openid/v1/jwks"],"shutdown-delay-duration":["0s"]},"authConfig":{"oauthMetadataFile":"/etc/kubernetes/static-pod-resources/configmaps/oauth-metadata/oauthMetadata"},"corsAllowedOrigins":["//127\\.0\\.0\\.1(:|$)","//localhost(:|$)"],"gracefulTerminationDuration":"15","servicesSubnet":"172.30.0.0/16","servingInfo":{"bindAddress":"0.0.0.0:6443","bindNetwork":"tcp4","cipherSuites":["TLS_AES_128_GCM_SHA256","TLS_AES_256_GCM_SHA384","TLS_CHACHA20_POLY1305_SHA256","TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256","TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256","TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384","TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384","TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256","TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"],"minTLSVersion":"VersionTLS12","namedCertificates":[{"certFile":"/etc/kubernetes/static-pod-certs/secrets/localhost-serving-cert-certkey/tls.crt","keyFile":"/etc/kubernetes/static-pod-certs/secrets/localhost-serving-cert-certkey/tls.key"},{"certFile":"/etc/kubernetes/static-pod-certs/secrets/service-network-serving-certkey/tls.crt","keyFile":"/etc/kubernetes/static-pod-certs/secrets/service-network-serving-certkey/tls.key"},{"certFile":"/etc/kubernetes/static-pod-certs/secrets/external-loadbalancer-serving-certkey/tls.crt","keyFile":"/etc/kubernetes/static-pod-certs/secrets/external-loadbalancer-serving-certkey/tls.key"},{"certFile":"/etc/kubernetes/static-pod-certs/secrets/internal-loadbalancer-serving-certkey/tls.crt","keyFile":"/etc/kubernetes/static-pod-certs/secrets/internal-loadbalancer-serving-certkey/tls.key"},{"certFile":"/etc/kubernetes/static-pod-resources/secrets/localhost-recovery-serving-certkey/tls.crt","keyFile":"/etc/kubernetes/static-pod-resources/secrets/localhost-recovery-serving-certkey/tls.key"}]}},"operatorLogLevel":"Normal","unsupportedConfigOverrides":null}}config/clusteroperator/kube-apiserver.json0000640000000000000000000000516715114405065017573 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-apiserver","uid":"8496f415-0912-4580-b885-62caa60d27eb","resourceVersion":"15271","generation":1,"creationTimestamp":"2025-12-04T21:54:31Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-04T22:00:30Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-04T22:23:06Z","reason":"AsExpected","message":"NodeInstallerProgressing: 1 node is at revision 4"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-04T22:19:50Z","reason":"AsExpected","message":"StaticPodsAvailable: 1 nodes are active; 1 node is at revision 4"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-04T22:00:30Z","reason":"AsExpected","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced."},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2025-12-04T22:00:30Z","reason":"AsExpected","message":"All is well"}],"versions":[{"name":"raw-internal","version":"4.18.29"},{"name":"kube-apiserver","version":"1.31.13"},{"name":"operator","version":"4.18.29"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeapiservers","name":"cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":""},{"group":"security.openshift.io","resource":"securitycontextconstraints","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":""},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":""},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""},{"group":"apiserver.openshift.io","resource":"apirequestcounts","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/operator.openshift.io/insightsoperator/cluster.json0000640000000000000000000000025115114405065026160 0ustar0000000000000000{"apiVersion":"operator.openshift.io/v1","kind":"InsightsOperator","name":"cluster","spec":{"logLevel":"Normal","managementState":"Managed","operatorLogLevel":"Normal"}}config/clusteroperator/insights.json0000640000000000000000000000560315114405065016472 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"insights","uid":"58d20ff3-446d-43ca-b5ef-0e2bc4fde86f","resourceVersion":"11981","generation":1,"creationTimestamp":"2025-12-04T21:54:31Z","annotations":{"capability.openshift.io/name":"Insights","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2025-12-04T22:10:00Z","reason":"AsExpected","message":"Insights works as expected"},{"type":"ClusterTransferAvailable","status":"False","lastTransitionTime":"2025-12-04T22:16:00Z","reason":"NoClusterTransfer","message":"no available cluster transfer"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-04T22:10:00Z","reason":"AsExpected","message":"Insights works as expected"},{"type":"Disabled","status":"False","lastTransitionTime":"2025-12-04T22:10:00Z","reason":"AsExpected"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-04T22:10:00Z","reason":"AsExpected","message":"Monitoring the cluster"},{"type":"RemoteConfigurationAvailable","status":"True","lastTransitionTime":"2025-12-04T22:10:00Z","reason":"AsExpected"},{"type":"RemoteConfigurationValid","status":"True","lastTransitionTime":"2025-12-04T22:10:00Z","reason":"AsExpected"},{"type":"SCAAvailable","status":"True","lastTransitionTime":"2025-12-04T22:16:00Z","reason":"Updated","message":"SCA certs successfully updated in the etc-pki-entitlement secret"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-04T22:10:00Z","reason":"InsightsUpgradeable","message":"Insights operator can be upgraded"}],"versions":[{"name":"operator","version":"4.18.29"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-insights"},{"group":"apps","resource":"deployments","namespace":"openshift-insights","name":"insights-operator"},{"group":"","resource":"secrets","namespace":"openshift-config","name":"pull-secret"},{"group":"","resource":"secrets","namespace":"openshift-config","name":"support"},{"group":"","resource":"serviceaccounts","namespace":"openshift-insights","name":"gather"},{"group":"","resource":"serviceaccounts","namespace":"openshift-insights","name":"operator"},{"group":"","resource":"services","namespace":"openshift-insights","name":"metrics"},{"group":"","resource":"configmaps","namespace":"openshift-insights","name":"service-ca-bundle"},{"group":"operator.openshift.io","resource":"insightsoperators","name":"cluster"}],"extension":{"lastReportTime":null}}}default.json0000640000000000000000000000057615114405065033530 0ustar0000000000000000config/clusteroperator/operator.openshift.io/ingresscontroller/openshift-ingress-operator{"apiVersion":"operator.openshift.io/v1","kind":"IngressController","name":"default","spec":{"clientTLS":{"clientCA":{"name":""},"clientCertificatePolicy":""},"httpCompression":{},"httpEmptyRequestsPolicy":"Respond","httpErrorCodePages":{"name":""},"idleConnectionTerminationPolicy":"Deferred","replicas":1,"tuningOptions":{"reloadInterval":"0s"},"unsupportedConfigOverrides":null}}config/clusteroperator/ingress.json0000640000000000000000000000435115114405065016313 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"ingress","uid":"c7bb7925-90df-4b16-8530-971df4d5d22c","resourceVersion":"13500","generation":1,"creationTimestamp":"2025-12-04T21:54:31Z","annotations":{"capability.openshift.io/name":"Ingress","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2025-12-04T22:01:10Z","reason":"IngressAvailable","message":"The \"default\" ingress controller reports Available=True."},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-04T22:20:15Z","reason":"AsExpected","message":"desired and current number of IngressControllers are equal"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-04T22:01:10Z","reason":"IngressNotDegraded","message":"The \"default\" ingress controller reports Degraded=False."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-04T22:01:09Z","reason":"Upgradeable"},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2025-12-04T22:01:09Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.29"},{"name":"ingress-controller","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2b3d313c599852b3543ee5c3a62691bd2d1bbad12c2e1c610cd71a1dec6eea32"},{"name":"canary-server","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:831f30660844091d6154e2674d3a9da6f34271bf8a2c40b56f7416066318742b"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-ingress-operator"},{"group":"operator.openshift.io","resource":"ingresscontrollers","namespace":"openshift-ingress-operator","name":""},{"group":"ingress.operator.openshift.io","resource":"dnsrecords","namespace":"openshift-ingress-operator","name":""},{"group":"","resource":"namespaces","name":"openshift-ingress"},{"group":"","resource":"namespaces","name":"openshift-ingress-canary"}],"extension":null}}config/clusteroperator/image-registry.json0000640000000000000000000000373215114405065017573 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"image-registry","uid":"e6202220-fd56-40df-b09f-73d09ce36058","resourceVersion":"15035","generation":1,"creationTimestamp":"2025-12-04T21:54:31Z","annotations":{"capability.openshift.io/name":"ImageRegistry","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2025-12-04T22:23:05Z","reason":"Removed","message":"NodeCADaemonAvailable: The daemon set node-ca has available replicas\nAvailable: The registry is removed\nImagePrunerAvailable: Pruner CronJob has been created"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-04T22:23:05Z","reason":"Removed","message":"NodeCADaemonProgressing: The daemon set node-ca is deployed\nProgressing: All registry resources are removed"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-04T22:22:58Z","reason":"Removed","message":"Degraded: The registry is removed"}],"versions":[{"name":"operator","version":"4.18.29"}],"relatedObjects":[{"group":"imageregistry.operator.openshift.io","resource":"configs","name":"cluster"},{"group":"imageregistry.operator.openshift.io","resource":"imagepruners","name":"cluster"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"system:registry"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"registry-registry-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-image-registry-pruner"},{"group":"","resource":"namespaces","name":"openshift-image-registry"}],"extension":null}}config/clusteroperator/operator.openshift.io/etcd/cluster.json0000640000000000000000000000125015114405065023473 0ustar0000000000000000{"apiVersion":"operator.openshift.io/v1","kind":"Etcd","name":"cluster","spec":{"controlPlaneHardwareSpeed":"Slower","logLevel":"Normal","managementState":"Managed","observedConfig":{"controlPlane":{"replicas":1},"servingInfo":{"cipherSuites":["TLS_AES_128_GCM_SHA256","TLS_AES_256_GCM_SHA384","TLS_CHACHA20_POLY1305_SHA256","TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256","TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256","TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384","TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384","TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256","TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"],"minTLSVersion":"VersionTLS12"}},"operatorLogLevel":"Normal","unsupportedConfigOverrides":null}}config/clusteroperator/etcd.json0000640000000000000000000000400215114405065015551 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"etcd","uid":"da4338e1-81a0-464e-a86a-3b6cf36ea41c","resourceVersion":"15380","generation":1,"creationTimestamp":"2025-12-04T21:54:31Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-04T22:23:04Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready\nEtcdMembersDegraded: No unhealthy members found"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-04T22:23:08Z","reason":"AsExpected","message":"NodeInstallerProgressing: 1 node is at revision 2\nEtcdMembersProgressing: No unstarted etcd members found"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-04T22:10:02Z","reason":"AsExpected","message":"StaticPodsAvailable: 1 nodes are active; 1 node is at revision 2\nEtcdMembersAvailable: 1 members are available"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-04T22:00:39Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2025-12-04T22:00:38Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.29"},{"name":"etcd","version":"4.18.29"},{"name":"operator","version":"4.18.29"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"etcds","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"namespaces","name":"openshift-etcd"}],"extension":null}}config/clusteroperator/operator.openshift.io/dns/default.json0000640000000000000000000000051615114405065023307 0ustar0000000000000000{"apiVersion":"operator.openshift.io/v1","kind":"DNS","name":"default","spec":{"cache":{"negativeTTL":"0s","positiveTTL":"0s"},"logLevel":"Normal","nodePlacement":{},"operatorLogLevel":"Normal","upstreamResolvers":{"policy":"Sequential","protocolStrategy":"","transportConfig":{},"upstreams":[{"port":53,"type":"SystemResolvConf"}]}}}config/clusteroperator/dns.json0000640000000000000000000000365615114405065015434 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"dns","uid":"bed0f0e0-78f6-4417-bdac-2bf379d1ca5f","resourceVersion":"13402","generation":1,"creationTimestamp":"2025-12-04T21:54:31Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2025-12-04T22:19:53Z","reason":"AsExpected","message":"DNS \"default\" is available."},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-04T22:19:53Z","reason":"AsExpected","message":"Desired and current number of DNSes are equal"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-04T22:19:53Z","reason":"DNSNotDegraded"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-04T22:01:09Z","reason":"DNSUpgradeable","message":"DNS default is upgradeable: DNS Operator can be upgraded"}],"versions":[{"name":"operator","version":"4.18.29"},{"name":"coredns","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:eb928c13a46d3fb45f4a881892d023a92d610a5430be0ffd916aaf8da8e7d297"},{"name":"openshift-cli","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:79f99fd6cce984287932edf0d009660bb488d663081f3d62ec3b23bc8bfbf6c2"},{"name":"kube-rbac-proxy","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-dns-operator"},{"group":"operator.openshift.io","resource":"dnses","name":"default"},{"group":"","resource":"namespaces","name":"openshift-dns"}],"extension":null}}config/clusteroperator/operator.openshift.io/csisnapshotcontroller/cluster.json0000640000000000000000000000025615114405065027223 0ustar0000000000000000{"apiVersion":"operator.openshift.io/v1","kind":"CSISnapshotController","name":"cluster","spec":{"logLevel":"Normal","managementState":"Managed","operatorLogLevel":"Normal"}}config/clusteroperator/csi-snapshot-controller.json0000640000000000000000000000322015114405065021427 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"csi-snapshot-controller","uid":"9bce9bf0-94c3-4c29-a9e7-a98c253af462","resourceVersion":"13437","generation":1,"creationTimestamp":"2025-12-04T21:54:31Z","annotations":{"capability.openshift.io/name":"CSISnapshot","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-04T22:00:38Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-04T22:16:21Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-04T22:16:21Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-04T22:00:38Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2025-12-04T22:00:38Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.29"},{"name":"csi-snapshot-controller","version":"4.18.29"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"operator.openshift.io","resource":"csisnapshotcontrollers","name":"cluster"}],"extension":null}}config/clusteroperator/control-plane-machine-set.json0000640000000000000000000000263515114405065021614 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"control-plane-machine-set","uid":"4a2cffc9-0139-4a98-8a25-bbb08bd3ee25","resourceVersion":"8582","generation":1,"creationTimestamp":"2025-12-04T21:54:31Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2025-12-04T22:01:28Z","reason":"AsExpected","message":"cluster operator is available"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-04T22:01:28Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-04T22:01:28Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-04T22:01:28Z","reason":"AsExpected","message":"cluster operator is upgradable"}],"versions":[{"name":"operator","version":"4.18.29"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"controlplanemachinesets","name":""},{"group":"machine.openshift.io","resource":"machines","name":""}],"extension":null}}config/clusteroperator/operator.openshift.io/console/cluster.json0000640000000000000000000000124415114405065024221 0ustar0000000000000000{"apiVersion":"operator.openshift.io/v1","kind":"Console","name":"cluster","spec":{"customization":{"addPage":{},"capabilities":[{"name":"LightspeedButton","visibility":{"state":"Enabled"}},{"name":"GettingStartedBanner","visibility":{"state":"Enabled"}}],"customLogoFile":{"name":""},"developerCatalog":{"types":{"state":"Enabled"}},"projectAccess":{},"quickStarts":{}},"ingress":{"clientDownloadsURL":"","consoleURL":""},"logLevel":"Normal","managementState":"Managed","observedConfig":null,"operatorLogLevel":"Normal","plugins":["monitoring-plugin","networking-console-plugin"],"providers":{},"route":{"hostname":"","secret":{"name":""}},"unsupportedConfigOverrides":null}}config/clusteroperator/console.json0000640000000000000000000000435115114405065016303 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"console","uid":"8e7b49cb-886f-48c3-9b28-d7ea00280edb","resourceVersion":"17297","generation":1,"creationTimestamp":"2025-12-04T21:54:31Z","annotations":{"capability.openshift.io/name":"Console","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-04T22:23:05Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"True","lastTransitionTime":"2025-12-04T22:24:44Z","reason":"SyncLoopRefresh_InProgress","message":"SyncLoopRefreshProgressing: working toward version 4.18.29, 1 replicas available"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-04T22:23:22Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-04T22:23:17Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2025-12-04T22:23:05Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.29"}],"relatedObjects":[{"group":"console.openshift.io","resource":"consoleplugins","name":"monitoring-plugin"},{"group":"operator.openshift.io","resource":"consoles","name":"cluster"},{"group":"config.openshift.io","resource":"consoles","name":"cluster"},{"group":"config.openshift.io","resource":"infrastructures","name":"cluster"},{"group":"config.openshift.io","resource":"proxies","name":"cluster"},{"group":"config.openshift.io","resource":"oauths","name":"cluster"},{"group":"oauth.openshift.io","resource":"oauthclients","name":"console"},{"group":"","resource":"namespaces","name":"openshift-console-operator"},{"group":"","resource":"namespaces","name":"openshift-console"},{"group":"","resource":"configmaps","namespace":"openshift-config-managed","name":"console-public"}],"extension":null}}config/clusteroperator/operator.openshift.io/config/cluster.json0000640000000000000000000000023715114405065024025 0ustar0000000000000000{"apiVersion":"operator.openshift.io/v1","kind":"Config","name":"cluster","spec":{"logLevel":"Normal","managementState":"Managed","operatorLogLevel":"Normal"}}config/clusteroperator/config-operator.json0000640000000000000000000000311615114405065017735 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"config-operator","uid":"dfdbd004-0c8f-42e1-8c3e-ef80fc67a7cb","resourceVersion":"9791","generation":1,"creationTimestamp":"2025-12-04T21:54:31Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-04T22:05:01Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-04T22:05:01Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-04T22:05:01Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-04T22:05:01Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2025-12-04T22:05:01Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.29"},{"name":"feature-gates","version":"4.18.29"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-operator"}],"extension":null}}config/clusteroperator/cluster-autoscaler.json0000640000000000000000000000265715114405065020471 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster-autoscaler","uid":"3fc4e82b-0fa1-4069-818a-67dd9bd3a93b","resourceVersion":"9802","generation":1,"creationTimestamp":"2025-12-04T21:54:31Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2025-12-04T22:05:01Z","reason":"AsExpected","message":"at version 4.18.29"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-04T22:05:02Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-04T22:05:02Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-04T22:05:01Z"}],"versions":[{"name":"operator","version":"4.18.29"}],"relatedObjects":[{"group":"autoscaling.openshift.io","resource":"machineautoscalers","namespace":"openshift-machine-api","name":""},{"group":"autoscaling.openshift.io","resource":"clusterautoscalers","namespace":"openshift-machine-api","name":""},{"group":"","resource":"namespaces","name":"openshift-machine-api"}],"extension":null}}config/clusteroperator/operator.openshift.io/cloudcredential/cluster.json0000640000000000000000000000024115114405065025714 0ustar0000000000000000{"apiVersion":"operator.openshift.io/v1","kind":"CloudCredential","name":"cluster","spec":{"credentialsMode":"","logLevel":"Normal","operatorLogLevel":"Normal"}}config/clusteroperator/cloud-credential.json0000640000000000000000000002022315114405065020053 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-credential","uid":"52cca8b6-8f8f-4f7e-aaad-79fb338bd796","resourceVersion":"9950","generation":1,"creationTimestamp":"2025-12-04T21:54:31Z","annotations":{"capability.openshift.io/name":"CloudCredential","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2025-12-04T21:55:00Z","reason":"AsExpected","message":"All is well"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-04T21:55:00Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-04T22:05:06Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-04T21:55:00Z"}],"versions":[{"name":"operator","version":"4.18.29"}],"relatedObjects":[{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"aws-ebs-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"azure-disk-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"azure-file-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"cloud-credential-operator-gcp-ro-creds"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"cloud-credential-operator-iam-ro"},{"group":"operator.openshift.io","resource":"cloudcredentials","name":"cluster"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ibm-powervs-block-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ibm-vpc-block-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"manila-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-azure-cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-credential-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-aws"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cluster-csi-drivers"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-gcp-ccm"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-gcp-pd-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ibm-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-gcs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-ibmcos"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-ibmcos-powervs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-aws"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-ibmcloud"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-nutanix"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-powervs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-vsphere"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-network"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-nutanix-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-openstack-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-powervs-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vmware-vsphere-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vsphere-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vsphere-problem-detector"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ovirt-csi-driver-operator"}],"extension":null}}config/clusteroperator/cloud-controller-manager.json0000640000000000000000000000440115114405065021534 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-controller-manager","uid":"363c7736-4b92-49ae-b4f5-94574548e0ed","resourceVersion":"9856","generation":1,"creationTimestamp":"2025-12-04T21:54:31Z","annotations":{"capability.openshift.io/name":"CloudControllerManager","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"CloudConfigControllerAvailable","status":"True","lastTransitionTime":"2025-12-04T22:05:14Z","reason":"AsExpected","message":"Cloud Config Controller works as expected"},{"type":"CloudConfigControllerDegraded","status":"False","lastTransitionTime":"2025-12-04T22:05:14Z","reason":"AsExpected","message":"Cloud Config Controller works as expected"},{"type":"TrustedCABundleControllerControllerAvailable","status":"True","lastTransitionTime":"2025-12-04T22:05:14Z","reason":"AsExpected","message":"Trusted CA Bundle Controller works as expected"},{"type":"TrustedCABundleControllerControllerDegraded","status":"False","lastTransitionTime":"2025-12-04T22:05:14Z","reason":"AsExpected","message":"Trusted CA Bundle Controller works as expected"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-04T22:05:14Z","reason":"AsExpected","message":"Cluster Cloud Controller Manager Operator is available at 4.18.29"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-04T22:05:14Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-04T22:05:14Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-04T22:05:14Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.29"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager-operator"},{"group":"config.openshift.io","resource":"clusteroperators","name":"cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager"}],"extension":null}}config/clusteroperator/baremetal.json0000640000000000000000000000427015114405065016575 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"baremetal","uid":"0a62d12e-3536-4aee-943d-3939437d5b89","resourceVersion":"9366","generation":1,"creationTimestamp":"2025-12-04T21:54:31Z","annotations":{"capability.openshift.io/name":"baremetal","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-04T22:04:51Z","reason":"WaitingForProvisioningCR"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-04T22:04:51Z"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-04T22:04:53Z","reason":"WaitingForProvisioningCR","message":"Waiting for Provisioning CR on BareMetal Platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-04T22:04:51Z"},{"type":"Disabled","status":"False","lastTransitionTime":"2025-12-04T22:04:51Z"}],"versions":[{"name":"operator","version":"4.18.29"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"provisioning","name":""},{"group":"metal3.io","resource":"hostfirmwaresettings","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"firmwareschemas","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"preprovisioningimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"bmceventsubscriptions","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostfirmwarecomponents","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"dataimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostupdatepolicies","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/operator.openshift.io/authentication/cluster.json0000640000000000000000000000444615114405065025605 0ustar0000000000000000{"apiVersion":"operator.openshift.io/v1","kind":"Authentication","name":"cluster","spec":{"logLevel":"Normal","managementState":"Managed","observedConfig":{"oauthAPIServer":{"apiServerArguments":{"api-audiences":["https://kubernetes.default.svc"],"cors-allowed-origins":["//127\\.0\\.0\\.1(:|$)","//localhost(:|$)"],"etcd-servers":["https://192.168.32.10:2379"],"tls-cipher-suites":["TLS_AES_128_GCM_SHA256","TLS_AES_256_GCM_SHA384","TLS_CHACHA20_POLY1305_SHA256","TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256","TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256","TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384","TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384","TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256","TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"],"tls-min-version":"VersionTLS12"}},"oauthServer":{"corsAllowedOrigins":["//127\\.0\\.0\\.1(:|$)","//localhost(:|$)"],"oauthConfig":{"assetPublicURL":"https://console-openshift-console.apps.sno.openstack.lab","loginURL":"https://api.sno.openstack.lab:6443","templates":{"error":"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/errors.html","login":"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/login.html","providerSelection":"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/providers.html"},"tokenConfig":{"accessTokenMaxAgeSeconds":86400,"authorizeTokenMaxAgeSeconds":300}},"serverArguments":{"audit-log-format":["json"],"audit-log-maxbackup":["10"],"audit-log-maxsize":["100"],"audit-log-path":["/var/log/oauth-server/audit.log"],"audit-policy-file":["/var/run/configmaps/audit/audit.yaml"]},"servingInfo":{"cipherSuites":["TLS_AES_128_GCM_SHA256","TLS_AES_256_GCM_SHA384","TLS_CHACHA20_POLY1305_SHA256","TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256","TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256","TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384","TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384","TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256","TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"],"minTLSVersion":"VersionTLS12","namedCertificates":[{"certFile":"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab","keyFile":"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab","names":["*.apps.sno.openstack.lab"]}]},"volumesToMount":{"identityProviders":"{}"}}},"operatorLogLevel":"Normal","unsupportedConfigOverrides":null}}config/clusteroperator/authentication.json0000640000000000000000000000520515114405065017657 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"authentication","uid":"f9bbb6e2-b02a-4fba-adf4-4f732bc36517","resourceVersion":"17043","generation":1,"creationTimestamp":"2025-12-04T21:54:31Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-04T22:19:53Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"True","lastTransitionTime":"2025-12-04T22:23:29Z","reason":"OAuthServerDeployment_PodsUpdating","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available"},{"type":"Available","status":"False","lastTransitionTime":"2025-12-04T22:23:30Z","reason":"OAuthServerDeployment_NoPod","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-04T22:00:39Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2025-12-04T22:00:38Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.29"},{"name":"oauth-apiserver","version":"4.18.29"},{"name":"oauth-openshift","version":"4.18.29_openshift"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"infrastructures","name":"cluster"},{"group":"config.openshift.io","resource":"oauths","name":"cluster"},{"group":"route.openshift.io","resource":"routes","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"services","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-authentication"},{"group":"","resource":"namespaces","name":"openshift-authentication-operator"},{"group":"","resource":"namespaces","name":"openshift-ingress"},{"group":"","resource":"namespaces","name":"openshift-oauth-apiserver"}],"extension":null}}config/pod/openshift-oauth-apiserver/logs/apiserver-58574fc8d8-gg42x/oauth-apiserver_current.log0000640000000000000000000007637315114405064031231 0ustar00000000000000002025-12-04T22:18:02.084310496Z E1204 22:18:02.084093 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=8578736798887167233, SKID=C1:7D:D3:3B:29:0D:7F:EA:EF:86:6E:DF:72:B1:16:4E:12:F0:20:C2, AKID=7F:31:C4:3B:71:A3:EA:92:76:AB:82:9E:1F:7D:29:E0:95:F3:07:6A failed: x509: certificate signed by unknown authority]" 2025-12-04T22:18:02.084310496Z E1204 22:18:02.084266 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=8578736798887167233, SKID=C1:7D:D3:3B:29:0D:7F:EA:EF:86:6E:DF:72:B1:16:4E:12:F0:20:C2, AKID=7F:31:C4:3B:71:A3:EA:92:76:AB:82:9E:1F:7D:29:E0:95:F3:07:6A failed: x509: certificate signed by unknown authority]" 2025-12-04T22:18:02.112546684Z E1204 22:18:02.112205 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=8578736798887167233, SKID=C1:7D:D3:3B:29:0D:7F:EA:EF:86:6E:DF:72:B1:16:4E:12:F0:20:C2, AKID=7F:31:C4:3B:71:A3:EA:92:76:AB:82:9E:1F:7D:29:E0:95:F3:07:6A failed: x509: certificate signed by unknown authority]" 2025-12-04T22:18:02.119423235Z E1204 22:18:02.119372 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=8578736798887167233, SKID=C1:7D:D3:3B:29:0D:7F:EA:EF:86:6E:DF:72:B1:16:4E:12:F0:20:C2, AKID=7F:31:C4:3B:71:A3:EA:92:76:AB:82:9E:1F:7D:29:E0:95:F3:07:6A failed: x509: certificate signed by unknown authority]" 2025-12-04T22:18:02.153013583Z E1204 22:18:02.146915 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=8578736798887167233, SKID=C1:7D:D3:3B:29:0D:7F:EA:EF:86:6E:DF:72:B1:16:4E:12:F0:20:C2, AKID=7F:31:C4:3B:71:A3:EA:92:76:AB:82:9E:1F:7D:29:E0:95:F3:07:6A failed: x509: certificate signed by unknown authority]" 2025-12-04T22:18:02.154529066Z E1204 22:18:02.153806 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=8578736798887167233, SKID=C1:7D:D3:3B:29:0D:7F:EA:EF:86:6E:DF:72:B1:16:4E:12:F0:20:C2, AKID=7F:31:C4:3B:71:A3:EA:92:76:AB:82:9E:1F:7D:29:E0:95:F3:07:6A failed: x509: certificate signed by unknown authority]" 2025-12-04T22:18:02.188085292Z E1204 22:18:02.188012 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=8578736798887167233, SKID=C1:7D:D3:3B:29:0D:7F:EA:EF:86:6E:DF:72:B1:16:4E:12:F0:20:C2, AKID=7F:31:C4:3B:71:A3:EA:92:76:AB:82:9E:1F:7D:29:E0:95:F3:07:6A failed: x509: certificate signed by unknown authority]" 2025-12-04T22:18:02.195395246Z E1204 22:18:02.194027 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=8578736798887167233, SKID=C1:7D:D3:3B:29:0D:7F:EA:EF:86:6E:DF:72:B1:16:4E:12:F0:20:C2, AKID=7F:31:C4:3B:71:A3:EA:92:76:AB:82:9E:1F:7D:29:E0:95:F3:07:6A failed: x509: certificate signed by unknown authority]" 2025-12-04T22:18:08.544032000Z E1204 22:18:08.543932 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=8578736798887167233, SKID=C1:7D:D3:3B:29:0D:7F:EA:EF:86:6E:DF:72:B1:16:4E:12:F0:20:C2, AKID=7F:31:C4:3B:71:A3:EA:92:76:AB:82:9E:1F:7D:29:E0:95:F3:07:6A failed: x509: certificate signed by unknown authority]" 2025-12-04T22:18:08.544032000Z E1204 22:18:08.544003 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=8578736798887167233, SKID=C1:7D:D3:3B:29:0D:7F:EA:EF:86:6E:DF:72:B1:16:4E:12:F0:20:C2, AKID=7F:31:C4:3B:71:A3:EA:92:76:AB:82:9E:1F:7D:29:E0:95:F3:07:6A failed: x509: certificate signed by unknown authority]" 2025-12-04T22:18:08.544128433Z E1204 22:18:08.544043 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=8578736798887167233, SKID=C1:7D:D3:3B:29:0D:7F:EA:EF:86:6E:DF:72:B1:16:4E:12:F0:20:C2, AKID=7F:31:C4:3B:71:A3:EA:92:76:AB:82:9E:1F:7D:29:E0:95:F3:07:6A failed: x509: certificate signed by unknown authority]" 2025-12-04T22:18:08.544245116Z E1204 22:18:08.544208 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=8578736798887167233, SKID=C1:7D:D3:3B:29:0D:7F:EA:EF:86:6E:DF:72:B1:16:4E:12:F0:20:C2, AKID=7F:31:C4:3B:71:A3:EA:92:76:AB:82:9E:1F:7D:29:E0:95:F3:07:6A failed: x509: certificate signed by unknown authority]" 2025-12-04T22:18:08.544531454Z E1204 22:18:08.544468 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=8578736798887167233, SKID=C1:7D:D3:3B:29:0D:7F:EA:EF:86:6E:DF:72:B1:16:4E:12:F0:20:C2, AKID=7F:31:C4:3B:71:A3:EA:92:76:AB:82:9E:1F:7D:29:E0:95:F3:07:6A failed: x509: certificate signed by unknown authority]" 2025-12-04T22:18:09.548822665Z E1204 22:18:09.548724 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=8578736798887167233, SKID=C1:7D:D3:3B:29:0D:7F:EA:EF:86:6E:DF:72:B1:16:4E:12:F0:20:C2, AKID=7F:31:C4:3B:71:A3:EA:92:76:AB:82:9E:1F:7D:29:E0:95:F3:07:6A failed: x509: certificate signed by unknown authority]" 2025-12-04T22:18:09.549008860Z E1204 22:18:09.548960 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=8578736798887167233, SKID=C1:7D:D3:3B:29:0D:7F:EA:EF:86:6E:DF:72:B1:16:4E:12:F0:20:C2, AKID=7F:31:C4:3B:71:A3:EA:92:76:AB:82:9E:1F:7D:29:E0:95:F3:07:6A failed: x509: certificate signed by unknown authority]" 2025-12-04T22:18:09.549025731Z E1204 22:18:09.548724 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=8578736798887167233, SKID=C1:7D:D3:3B:29:0D:7F:EA:EF:86:6E:DF:72:B1:16:4E:12:F0:20:C2, AKID=7F:31:C4:3B:71:A3:EA:92:76:AB:82:9E:1F:7D:29:E0:95:F3:07:6A failed: x509: certificate signed by unknown authority]" 2025-12-04T22:18:09.549153144Z E1204 22:18:09.548786 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=8578736798887167233, SKID=C1:7D:D3:3B:29:0D:7F:EA:EF:86:6E:DF:72:B1:16:4E:12:F0:20:C2, AKID=7F:31:C4:3B:71:A3:EA:92:76:AB:82:9E:1F:7D:29:E0:95:F3:07:6A failed: x509: certificate signed by unknown authority]" 2025-12-04T22:18:09.549273968Z E1204 22:18:09.548807 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=8578736798887167233, SKID=C1:7D:D3:3B:29:0D:7F:EA:EF:86:6E:DF:72:B1:16:4E:12:F0:20:C2, AKID=7F:31:C4:3B:71:A3:EA:92:76:AB:82:9E:1F:7D:29:E0:95:F3:07:6A failed: x509: certificate signed by unknown authority]" 2025-12-04T22:18:32.065154398Z E1204 22:18:32.065087 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=8578736798887167233, SKID=C1:7D:D3:3B:29:0D:7F:EA:EF:86:6E:DF:72:B1:16:4E:12:F0:20:C2, AKID=7F:31:C4:3B:71:A3:EA:92:76:AB:82:9E:1F:7D:29:E0:95:F3:07:6A failed: x509: certificate signed by unknown authority]" 2025-12-04T22:18:32.065806646Z E1204 22:18:32.065739 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=8578736798887167233, SKID=C1:7D:D3:3B:29:0D:7F:EA:EF:86:6E:DF:72:B1:16:4E:12:F0:20:C2, AKID=7F:31:C4:3B:71:A3:EA:92:76:AB:82:9E:1F:7D:29:E0:95:F3:07:6A failed: x509: certificate signed by unknown authority]" 2025-12-04T22:18:32.065850788Z E1204 22:18:32.065818 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=8578736798887167233, SKID=C1:7D:D3:3B:29:0D:7F:EA:EF:86:6E:DF:72:B1:16:4E:12:F0:20:C2, AKID=7F:31:C4:3B:71:A3:EA:92:76:AB:82:9E:1F:7D:29:E0:95:F3:07:6A failed: x509: certificate signed by unknown authority]" 2025-12-04T22:18:32.066217338Z E1204 22:18:32.065386 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=8578736798887167233, SKID=C1:7D:D3:3B:29:0D:7F:EA:EF:86:6E:DF:72:B1:16:4E:12:F0:20:C2, AKID=7F:31:C4:3B:71:A3:EA:92:76:AB:82:9E:1F:7D:29:E0:95:F3:07:6A failed: x509: certificate signed by unknown authority]" 2025-12-04T22:18:32.066466104Z E1204 22:18:32.065638 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=8578736798887167233, SKID=C1:7D:D3:3B:29:0D:7F:EA:EF:86:6E:DF:72:B1:16:4E:12:F0:20:C2, AKID=7F:31:C4:3B:71:A3:EA:92:76:AB:82:9E:1F:7D:29:E0:95:F3:07:6A failed: x509: certificate signed by unknown authority]" 2025-12-04T22:18:32.081440553Z E1204 22:18:32.080832 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=8578736798887167233, SKID=C1:7D:D3:3B:29:0D:7F:EA:EF:86:6E:DF:72:B1:16:4E:12:F0:20:C2, AKID=7F:31:C4:3B:71:A3:EA:92:76:AB:82:9E:1F:7D:29:E0:95:F3:07:6A failed: x509: certificate signed by unknown authority]" 2025-12-04T22:18:32.081440553Z E1204 22:18:32.081288 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=8578736798887167233, SKID=C1:7D:D3:3B:29:0D:7F:EA:EF:86:6E:DF:72:B1:16:4E:12:F0:20:C2, AKID=7F:31:C4:3B:71:A3:EA:92:76:AB:82:9E:1F:7D:29:E0:95:F3:07:6A failed: x509: certificate signed by unknown authority]" 2025-12-04T22:18:32.084389326Z E1204 22:18:32.081664 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=8578736798887167233, SKID=C1:7D:D3:3B:29:0D:7F:EA:EF:86:6E:DF:72:B1:16:4E:12:F0:20:C2, AKID=7F:31:C4:3B:71:A3:EA:92:76:AB:82:9E:1F:7D:29:E0:95:F3:07:6A failed: x509: certificate signed by unknown authority]" 2025-12-04T22:18:32.084389326Z E1204 22:18:32.082018 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=8578736798887167233, SKID=C1:7D:D3:3B:29:0D:7F:EA:EF:86:6E:DF:72:B1:16:4E:12:F0:20:C2, AKID=7F:31:C4:3B:71:A3:EA:92:76:AB:82:9E:1F:7D:29:E0:95:F3:07:6A failed: x509: certificate signed by unknown authority]" 2025-12-04T22:18:32.084389326Z E1204 22:18:32.082323 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=8578736798887167233, SKID=C1:7D:D3:3B:29:0D:7F:EA:EF:86:6E:DF:72:B1:16:4E:12:F0:20:C2, AKID=7F:31:C4:3B:71:A3:EA:92:76:AB:82:9E:1F:7D:29:E0:95:F3:07:6A failed: x509: certificate signed by unknown authority]" 2025-12-04T22:18:38.547965987Z E1204 22:18:38.547863 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=8578736798887167233, SKID=C1:7D:D3:3B:29:0D:7F:EA:EF:86:6E:DF:72:B1:16:4E:12:F0:20:C2, AKID=7F:31:C4:3B:71:A3:EA:92:76:AB:82:9E:1F:7D:29:E0:95:F3:07:6A failed: x509: certificate signed by unknown authority]" 2025-12-04T22:18:38.548026029Z E1204 22:18:38.547865 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=8578736798887167233, SKID=C1:7D:D3:3B:29:0D:7F:EA:EF:86:6E:DF:72:B1:16:4E:12:F0:20:C2, AKID=7F:31:C4:3B:71:A3:EA:92:76:AB:82:9E:1F:7D:29:E0:95:F3:07:6A failed: x509: certificate signed by unknown authority]" 2025-12-04T22:18:38.548043089Z E1204 22:18:38.548023 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=8578736798887167233, SKID=C1:7D:D3:3B:29:0D:7F:EA:EF:86:6E:DF:72:B1:16:4E:12:F0:20:C2, AKID=7F:31:C4:3B:71:A3:EA:92:76:AB:82:9E:1F:7D:29:E0:95:F3:07:6A failed: x509: certificate signed by unknown authority]" 2025-12-04T22:18:38.548059100Z E1204 22:18:38.548034 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=8578736798887167233, SKID=C1:7D:D3:3B:29:0D:7F:EA:EF:86:6E:DF:72:B1:16:4E:12:F0:20:C2, AKID=7F:31:C4:3B:71:A3:EA:92:76:AB:82:9E:1F:7D:29:E0:95:F3:07:6A failed: x509: certificate signed by unknown authority]" 2025-12-04T22:18:38.548140132Z E1204 22:18:38.548091 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=8578736798887167233, SKID=C1:7D:D3:3B:29:0D:7F:EA:EF:86:6E:DF:72:B1:16:4E:12:F0:20:C2, AKID=7F:31:C4:3B:71:A3:EA:92:76:AB:82:9E:1F:7D:29:E0:95:F3:07:6A failed: x509: certificate signed by unknown authority]" 2025-12-04T22:18:39.558792395Z E1204 22:18:39.558685 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=8578736798887167233, SKID=C1:7D:D3:3B:29:0D:7F:EA:EF:86:6E:DF:72:B1:16:4E:12:F0:20:C2, AKID=7F:31:C4:3B:71:A3:EA:92:76:AB:82:9E:1F:7D:29:E0:95:F3:07:6A failed: x509: certificate signed by unknown authority]" 2025-12-04T22:18:39.558832106Z E1204 22:18:39.558806 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=8578736798887167233, SKID=C1:7D:D3:3B:29:0D:7F:EA:EF:86:6E:DF:72:B1:16:4E:12:F0:20:C2, AKID=7F:31:C4:3B:71:A3:EA:92:76:AB:82:9E:1F:7D:29:E0:95:F3:07:6A failed: x509: certificate signed by unknown authority]" 2025-12-04T22:18:39.558951499Z E1204 22:18:39.558895 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=8578736798887167233, SKID=C1:7D:D3:3B:29:0D:7F:EA:EF:86:6E:DF:72:B1:16:4E:12:F0:20:C2, AKID=7F:31:C4:3B:71:A3:EA:92:76:AB:82:9E:1F:7D:29:E0:95:F3:07:6A failed: x509: certificate signed by unknown authority]" 2025-12-04T22:18:39.558951499Z E1204 22:18:39.558919 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=8578736798887167233, SKID=C1:7D:D3:3B:29:0D:7F:EA:EF:86:6E:DF:72:B1:16:4E:12:F0:20:C2, AKID=7F:31:C4:3B:71:A3:EA:92:76:AB:82:9E:1F:7D:29:E0:95:F3:07:6A failed: x509: certificate signed by unknown authority]" 2025-12-04T22:18:39.559001760Z E1204 22:18:39.558716 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=8578736798887167233, SKID=C1:7D:D3:3B:29:0D:7F:EA:EF:86:6E:DF:72:B1:16:4E:12:F0:20:C2, AKID=7F:31:C4:3B:71:A3:EA:92:76:AB:82:9E:1F:7D:29:E0:95:F3:07:6A failed: x509: certificate signed by unknown authority]" 2025-12-04T22:18:39.562304913Z http2: server: error reading preface from client 10.128.0.2:52384: read tcp 10.128.0.35:8443->10.128.0.2:52384: read: connection reset by peer 2025-12-04T22:18:54.636739350Z E1204 22:18:54.636647 1 webhook.go:269] Failed to make webhook authorizer request: Post "https://172.30.0.1:443/apis/authorization.k8s.io/v1/subjectaccessreviews?timeout=10s": dial tcp 172.30.0.1:443: connect: connection refused 2025-12-04T22:18:54.636811002Z E1204 22:18:54.636786 1 errors.go:77] "Unhandled Error" err="Post \"https://172.30.0.1:443/apis/authorization.k8s.io/v1/subjectaccessreviews?timeout=10s\": dial tcp 172.30.0.1:443: connect: connection refused" 2025-12-04T22:18:54.706396604Z E1204 22:18:54.706321 1 webhook.go:269] Failed to make webhook authorizer request: Post "https://172.30.0.1:443/apis/authorization.k8s.io/v1/subjectaccessreviews?timeout=10s": dial tcp 172.30.0.1:443: connect: connection refused 2025-12-04T22:18:54.706434956Z E1204 22:18:54.706401 1 errors.go:77] "Unhandled Error" err="Post \"https://172.30.0.1:443/apis/authorization.k8s.io/v1/subjectaccessreviews?timeout=10s\": dial tcp 172.30.0.1:443: connect: connection refused" 2025-12-04T22:18:55.568105890Z E1204 22:18:55.567969 1 webhook.go:269] Failed to make webhook authorizer request: Post "https://172.30.0.1:443/apis/authorization.k8s.io/v1/subjectaccessreviews?timeout=10s": dial tcp 172.30.0.1:443: connect: connection refused 2025-12-04T22:18:55.568105890Z E1204 22:18:55.568065 1 errors.go:77] "Unhandled Error" err="Post \"https://172.30.0.1:443/apis/authorization.k8s.io/v1/subjectaccessreviews?timeout=10s\": dial tcp 172.30.0.1:443: connect: connection refused" 2025-12-04T22:18:55.577384008Z E1204 22:18:55.577313 1 webhook.go:269] Failed to make webhook authorizer request: Post "https://172.30.0.1:443/apis/authorization.k8s.io/v1/subjectaccessreviews?timeout=10s": dial tcp 172.30.0.1:443: connect: connection refused 2025-12-04T22:18:55.577431390Z E1204 22:18:55.577399 1 errors.go:77] "Unhandled Error" err="Post \"https://172.30.0.1:443/apis/authorization.k8s.io/v1/subjectaccessreviews?timeout=10s\": dial tcp 172.30.0.1:443: connect: connection refused" 2025-12-04T22:18:55.588238681Z E1204 22:18:55.588161 1 webhook.go:269] Failed to make webhook authorizer request: Post "https://172.30.0.1:443/apis/authorization.k8s.io/v1/subjectaccessreviews?timeout=10s": dial tcp 172.30.0.1:443: connect: connection refused 2025-12-04T22:18:55.588300093Z E1204 22:18:55.588265 1 errors.go:77] "Unhandled Error" err="Post \"https://172.30.0.1:443/apis/authorization.k8s.io/v1/subjectaccessreviews?timeout=10s\": dial tcp 172.30.0.1:443: connect: connection refused" 2025-12-04T22:18:55.590693540Z E1204 22:18:55.590640 1 webhook.go:269] Failed to make webhook authorizer request: Post "https://172.30.0.1:443/apis/authorization.k8s.io/v1/subjectaccessreviews?timeout=10s": dial tcp 172.30.0.1:443: connect: connection refused 2025-12-04T22:18:55.590755602Z E1204 22:18:55.590731 1 errors.go:77] "Unhandled Error" err="Post \"https://172.30.0.1:443/apis/authorization.k8s.io/v1/subjectaccessreviews?timeout=10s\": dial tcp 172.30.0.1:443: connect: connection refused" 2025-12-04T22:19:08.900867768Z I1204 22:19:08.900818 1 reflector.go:368] Caches populated for *v1.ValidatingAdmissionPolicyBinding from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2025-12-04T22:19:09.106971272Z I1204 22:19:09.106906 1 reflector.go:368] Caches populated for config.openshift.io/v1, Resource=infrastructures from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2025-12-04T22:19:10.266174691Z I1204 22:19:10.265912 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2025-12-04T22:19:10.425218771Z I1204 22:19:10.423760 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2025-12-04T22:19:10.529444670Z I1204 22:19:10.529350 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2025-12-04T22:19:10.969737821Z I1204 22:19:10.969687 1 reflector.go:368] Caches populated for *v1.ValidatingAdmissionPolicy from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2025-12-04T22:19:13.224664808Z I1204 22:19:13.224594 1 reflector.go:368] Caches populated for *v1.ValidatingWebhookConfiguration from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2025-12-04T22:19:13.291221566Z I1204 22:19:13.291142 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2025-12-04T22:19:13.291824112Z I1204 22:19:13.291774 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2025-12-04 21:43:42 +0000 UTC to 2035-12-02 21:43:42 +0000 UTC (now=2025-12-04 22:19:13.2917215 +0000 UTC))" 2025-12-04T22:19:13.291838023Z I1204 22:19:13.291827 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2025-12-04 21:50:08 +0000 UTC to 2025-12-05 21:50:08 +0000 UTC (now=2025-12-04 22:19:13.291810622 +0000 UTC))" 2025-12-04T22:19:13.291862103Z I1204 22:19:13.291844 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2025-12-04 21:50:08 +0000 UTC to 2026-12-04 21:50:08 +0000 UTC (now=2025-12-04 22:19:13.291833113 +0000 UTC))" 2025-12-04T22:19:13.291870454Z I1204 22:19:13.291861 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2025-12-04 21:50:08 +0000 UTC to 2026-12-04 21:50:08 +0000 UTC (now=2025-12-04 22:19:13.291853833 +0000 UTC))" 2025-12-04T22:19:13.291878634Z I1204 22:19:13.291872 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2025-12-04 21:50:06 +0000 UTC to 2035-12-02 21:50:06 +0000 UTC (now=2025-12-04 22:19:13.291865413 +0000 UTC))" 2025-12-04T22:19:13.291902215Z I1204 22:19:13.291884 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-csr-signer_@1764885640\" [] issuer=\"kubelet-signer\" (2025-12-04 22:00:40 +0000 UTC to 2025-12-05 21:50:08 +0000 UTC (now=2025-12-04 22:19:13.291877884 +0000 UTC))" 2025-12-04T22:19:13.291910005Z I1204 22:19:13.291901 1 tlsconfig.go:181] "Loaded client CA" index=6 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"openshift-kube-apiserver-operator_node-system-admin-signer@1764885629\" [] issuer=\"\" (2025-12-04 22:00:28 +0000 UTC to 2026-12-04 22:00:29 +0000 UTC (now=2025-12-04 22:19:13.291893304 +0000 UTC))" 2025-12-04T22:19:13.291926615Z I1204 22:19:13.291918 1 tlsconfig.go:181] "Loaded client CA" index=7 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2025-12-04 21:50:06 +0000 UTC to 2025-12-05 21:50:06 +0000 UTC (now=2025-12-04 22:19:13.291909195 +0000 UTC))" 2025-12-04T22:19:13.292132392Z I1204 22:19:13.292105 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"api.openshift-oauth-apiserver.svc\" [serving] validServingFor=[api.openshift-oauth-apiserver.svc,api.openshift-oauth-apiserver.svc.cluster.local] issuer=\"openshift-service-serving-signer@1764885639\" (2025-12-04 22:00:55 +0000 UTC to 2027-12-04 22:00:56 +0000 UTC (now=2025-12-04 22:19:13.29208943 +0000 UTC))" 2025-12-04T22:19:13.292242785Z I1204 22:19:13.292215 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1764885677\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1764885676\" (2025-12-04 21:01:16 +0000 UTC to 2026-12-04 21:01:16 +0000 UTC (now=2025-12-04 22:19:13.292203204 +0000 UTC))" 2025-12-04T22:19:16.011457952Z I1204 22:19:16.011389 1 reflector.go:368] Caches populated for *v1.MutatingWebhookConfiguration from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2025-12-04T22:21:16.325886626Z E1204 22:21:16.325805 1 webhook.go:269] Failed to make webhook authorizer request: Post "https://172.30.0.1:443/apis/authorization.k8s.io/v1/subjectaccessreviews?timeout=10s": dial tcp 172.30.0.1:443: connect: connection refused 2025-12-04T22:21:16.325886626Z E1204 22:21:16.325878 1 errors.go:77] "Unhandled Error" err="Post \"https://172.30.0.1:443/apis/authorization.k8s.io/v1/subjectaccessreviews?timeout=10s\": dial tcp 172.30.0.1:443: connect: connection refused" 2025-12-04T22:21:16.373028740Z E1204 22:21:16.372937 1 webhook.go:269] Failed to make webhook authorizer request: Post "https://172.30.0.1:443/apis/authorization.k8s.io/v1/subjectaccessreviews?timeout=10s": dial tcp 172.30.0.1:443: connect: connection refused 2025-12-04T22:21:16.373028740Z E1204 22:21:16.373005 1 errors.go:77] "Unhandled Error" err="Post \"https://172.30.0.1:443/apis/authorization.k8s.io/v1/subjectaccessreviews?timeout=10s\": dial tcp 172.30.0.1:443: connect: connection refused" 2025-12-04T22:21:17.258289107Z E1204 22:21:17.258183 1 webhook.go:269] Failed to make webhook authorizer request: Post "https://172.30.0.1:443/apis/authorization.k8s.io/v1/subjectaccessreviews?timeout=10s": dial tcp 172.30.0.1:443: connect: connection refused 2025-12-04T22:21:17.258289107Z E1204 22:21:17.258265 1 errors.go:77] "Unhandled Error" err="Post \"https://172.30.0.1:443/apis/authorization.k8s.io/v1/subjectaccessreviews?timeout=10s\": dial tcp 172.30.0.1:443: connect: connection refused" 2025-12-04T22:21:17.271826914Z E1204 22:21:17.271765 1 webhook.go:269] Failed to make webhook authorizer request: Post "https://172.30.0.1:443/apis/authorization.k8s.io/v1/subjectaccessreviews?timeout=10s": dial tcp 172.30.0.1:443: connect: connection refused 2025-12-04T22:21:17.271861335Z E1204 22:21:17.271840 1 errors.go:77] "Unhandled Error" err="Post \"https://172.30.0.1:443/apis/authorization.k8s.io/v1/subjectaccessreviews?timeout=10s\": dial tcp 172.30.0.1:443: connect: connection refused" 2025-12-04T22:21:17.279901369Z E1204 22:21:17.279566 1 webhook.go:269] Failed to make webhook authorizer request: Post "https://172.30.0.1:443/apis/authorization.k8s.io/v1/subjectaccessreviews?timeout=10s": dial tcp 172.30.0.1:443: connect: connection refused 2025-12-04T22:21:17.279901369Z E1204 22:21:17.279631 1 errors.go:77] "Unhandled Error" err="Post \"https://172.30.0.1:443/apis/authorization.k8s.io/v1/subjectaccessreviews?timeout=10s\": dial tcp 172.30.0.1:443: connect: connection refused" 2025-12-04T22:21:17.292545861Z E1204 22:21:17.291632 1 webhook.go:269] Failed to make webhook authorizer request: Post "https://172.30.0.1:443/apis/authorization.k8s.io/v1/subjectaccessreviews?timeout=10s": dial tcp 172.30.0.1:443: connect: connection refused 2025-12-04T22:21:17.292545861Z E1204 22:21:17.291704 1 errors.go:77] "Unhandled Error" err="Post \"https://172.30.0.1:443/apis/authorization.k8s.io/v1/subjectaccessreviews?timeout=10s\": dial tcp 172.30.0.1:443: connect: connection refused" 2025-12-04T22:21:38.560909003Z E1204 22:21:38.560836 1 webhook.go:269] Failed to make webhook authorizer request: Post "https://172.30.0.1:443/apis/authorization.k8s.io/v1/subjectaccessreviews?timeout=10s": dial tcp 172.30.0.1:443: connect: connection refused 2025-12-04T22:21:38.560956084Z E1204 22:21:38.560905 1 errors.go:77] "Unhandled Error" err="Post \"https://172.30.0.1:443/apis/authorization.k8s.io/v1/subjectaccessreviews?timeout=10s\": dial tcp 172.30.0.1:443: connect: connection refused" 2025-12-04T22:21:39.983612610Z E1204 22:21:39.983130 1 webhook.go:269] Failed to make webhook authorizer request: Post "https://172.30.0.1:443/apis/authorization.k8s.io/v1/subjectaccessreviews?timeout=10s": dial tcp 172.30.0.1:443: connect: connection refused 2025-12-04T22:21:39.983612610Z E1204 22:21:39.983238 1 errors.go:77] "Unhandled Error" err="Post \"https://172.30.0.1:443/apis/authorization.k8s.io/v1/subjectaccessreviews?timeout=10s\": dial tcp 172.30.0.1:443: connect: connection refused" 2025-12-04T22:21:42.759559770Z E1204 22:21:42.759418 1 webhook.go:269] Failed to make webhook authorizer request: Post "https://172.30.0.1:443/apis/authorization.k8s.io/v1/subjectaccessreviews?timeout=10s": dial tcp 172.30.0.1:443: connect: connection refused 2025-12-04T22:21:42.759633272Z E1204 22:21:42.759571 1 errors.go:77] "Unhandled Error" err="Post \"https://172.30.0.1:443/apis/authorization.k8s.io/v1/subjectaccessreviews?timeout=10s\": dial tcp 172.30.0.1:443: connect: connection refused" 2025-12-04T22:22:26.137356702Z I1204 22:22:26.137261 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2025-12-04T22:22:32.709291856Z I1204 22:22:32.709192 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2025-12-04T22:22:35.105081249Z I1204 22:22:35.104960 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2025-12-04T22:22:52.832703787Z I1204 22:22:52.832574 1 reflector.go:368] Caches populated for *v1.MutatingWebhookConfiguration from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2025-12-04T22:22:53.200844443Z I1204 22:22:53.200756 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2025-12-04T22:22:55.069042465Z I1204 22:22:55.068932 1 reflector.go:368] Caches populated for *v1.ValidatingAdmissionPolicyBinding from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2025-12-04T22:22:58.358875321Z I1204 22:22:58.358780 1 reflector.go:368] Caches populated for *v1.ValidatingAdmissionPolicy from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2025-12-04T22:23:01.168007392Z I1204 22:23:01.167946 1 reflector.go:368] Caches populated for *v1.ValidatingWebhookConfiguration from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2025-12-04T22:23:03.330200806Z I1204 22:23:03.330045 1 reflector.go:368] Caches populated for config.openshift.io/v1, Resource=infrastructures from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2025-12-04T22:24:10.258112663Z I1204 22:24:10.258014 1 trace.go:236] Trace[1792337921]: "Get" accept:application/vnd.kubernetes.protobuf,application/json,audit-id:a71b99ef-f9c9-4a9e-8760-f823cb08190e,client:10.128.0.94,api-group:oauth.openshift.io,api-version:v1,name:console,subresource:,namespace:,protocol:HTTP/2.0,resource:oauthclients,scope:resource,url:/apis/oauth.openshift.io/v1/oauthclients/console,user-agent:console/v0.0.0 (linux/amd64) kubernetes/$Format,verb:GET (04-Dec-2025 22:24:07.826) (total time: 2431ms): 2025-12-04T22:24:10.258112663Z Trace[1792337921]: ---"About to write a response" 2431ms (22:24:10.257) 2025-12-04T22:24:10.258112663Z Trace[1792337921]: [2.43137123s] [2.43137123s] END config/pod/openshift-ingress/logs/router-default-5465c8b4db-8vm66/router_current.log0000640000000000000000000001335415114405064026713 0ustar00000000000000002025-12-04T22:19:41.477605607Z I1204 22:19:41.476886 1 template.go:560] "msg"="starting router" "logger"="router" "version"="majorFromGit: \nminorFromGit: \ncommitFromGit: d8058949aaf91dcdea050c58e6a34ef5f6670c67\nversionFromGit: 4.0.0-563-gd8058949\ngitTreeState: clean\nbuildDate: 2025-11-18T18:57:30Z\n" 2025-12-04T22:19:41.480522558Z I1204 22:19:41.480451 1 metrics.go:156] "msg"="router health and metrics port listening on HTTP and HTTPS" "address"="0.0.0.0:1936" "logger"="metrics" 2025-12-04T22:19:41.484447537Z I1204 22:19:41.484399 1 router.go:217] "msg"="creating a new template router" "logger"="template" "writeDir"="/var/lib/haproxy" 2025-12-04T22:19:41.484494168Z I1204 22:19:41.484467 1 router.go:302] "msg"="router will coalesce reloads within an interval of each other" "interval"="5s" "logger"="template" 2025-12-04T22:19:41.485168437Z I1204 22:19:41.485127 1 router.go:372] "msg"="watching for changes" "logger"="template" "path"="/etc/pki/tls/private" 2025-12-04T22:19:41.485264550Z I1204 22:19:41.485229 1 router.go:283] "msg"="router is including routes in all namespaces" "logger"="router" 2025-12-04T22:19:41.508976202Z I1204 22:19:41.508899 1 reflector.go:359] Caches populated for *v1.Route from github.com/openshift/router/pkg/router/controller/factory/factory.go:124 2025-12-04T22:19:41.511394930Z I1204 22:19:41.511327 1 reflector.go:359] Caches populated for *v1.Service from github.com/openshift/router/pkg/router/template/service_lookup.go:33 2025-12-04T22:19:41.513201970Z I1204 22:19:41.513117 1 reflector.go:359] Caches populated for *v1.EndpointSlice from github.com/openshift/router/pkg/router/controller/factory/factory.go:124 2025-12-04T22:19:41.595571540Z E1204 22:19:41.595373 1 haproxy.go:418] can't scrape HAProxy: dial unix /var/lib/haproxy/run/haproxy.sock: connect: no such file or directory 2025-12-04T22:19:41.676072327Z I1204 22:19:41.675961 1 router.go:669] "msg"="router reloaded" "logger"="template" "output"=" - Checking http://localhost:80 ...\n - Health check ok : 0 retry attempt(s).\n" 2025-12-04T22:19:46.663015039Z I1204 22:19:46.662332 1 router.go:669] "msg"="router reloaded" "logger"="template" "output"=" - Checking http://localhost:80 ...\n - Health check ok : 0 retry attempt(s).\n" 2025-12-04T22:19:51.666916633Z I1204 22:19:51.666842 1 router.go:669] "msg"="router reloaded" "logger"="template" "output"=" - Checking http://localhost:80 ...\n - Health check ok : 0 retry attempt(s).\n" 2025-12-04T22:21:48.277519985Z I1204 22:21:48.277148 1 reflector.go:359] Caches populated for *v1.EndpointSlice from github.com/openshift/router/pkg/router/controller/factory/factory.go:124 2025-12-04T22:21:48.491577731Z I1204 22:21:48.491054 1 reflector.go:359] Caches populated for *v1.Service from github.com/openshift/router/pkg/router/template/service_lookup.go:33 2025-12-04T22:21:50.785034713Z I1204 22:21:50.784682 1 router.go:669] "msg"="router reloaded" "logger"="template" "output"=" - Checking http://localhost:80 ...\n - Health check ok : 0 retry attempt(s).\n" 2025-12-04T22:21:55.769056633Z I1204 22:21:55.769005 1 router.go:669] "msg"="router reloaded" "logger"="template" "output"=" - Checking http://localhost:80 ...\n - Health check ok : 0 retry attempt(s).\n" 2025-12-04T22:22:03.640458069Z I1204 22:22:03.640359 1 router.go:669] "msg"="router reloaded" "logger"="template" "output"=" - Checking http://localhost:80 ...\n - Health check ok : 0 retry attempt(s).\n" 2025-12-04T22:23:05.355345305Z I1204 22:23:05.355271 1 router.go:669] "msg"="router reloaded" "logger"="template" "output"=" - Checking http://localhost:80 ...\n - Health check ok : 0 retry attempt(s).\n" 2025-12-04T22:23:10.344022372Z I1204 22:23:10.343930 1 router.go:669] "msg"="router reloaded" "logger"="template" "output"=" - Checking http://localhost:80 ...\n - Health check ok : 0 retry attempt(s).\n" 2025-12-04T22:23:19.704116482Z I1204 22:23:19.703996 1 router.go:669] "msg"="router reloaded" "logger"="template" "output"=" - Checking http://localhost:80 ...\n - Health check ok : 0 retry attempt(s).\n" 2025-12-04T22:23:24.701693965Z I1204 22:23:24.701630 1 router.go:669] "msg"="router reloaded" "logger"="template" "output"=" - Checking http://localhost:80 ...\n - Health check ok : 0 retry attempt(s).\n" 2025-12-04T22:23:29.714999054Z I1204 22:23:29.714871 1 router.go:669] "msg"="router reloaded" "logger"="template" "output"=" - Checking http://localhost:80 ...\n - Health check ok : 0 retry attempt(s).\n" 2025-12-04T22:23:58.838878302Z I1204 22:23:58.838754 1 router.go:669] "msg"="router reloaded" "logger"="template" "output"=" - Checking http://localhost:80 ...\n - Health check ok : 0 retry attempt(s).\n" 2025-12-04T22:24:03.837660460Z I1204 22:24:03.837487 1 router.go:669] "msg"="router reloaded" "logger"="template" "output"=" - Checking http://localhost:80 ...\n - Health check ok : 0 retry attempt(s).\n" 2025-12-04T22:24:12.794526742Z I1204 22:24:12.794403 1 router.go:669] "msg"="router reloaded" "logger"="template" "output"=" - Checking http://localhost:80 ...\n - Health check ok : 0 retry attempt(s).\n" 2025-12-04T22:24:17.773079489Z I1204 22:24:17.772972 1 router.go:669] "msg"="router reloaded" "logger"="template" "output"=" - Checking http://localhost:80 ...\n - Health check ok : 0 retry attempt(s).\n" 2025-12-04T22:24:22.784424603Z I1204 22:24:22.784358 1 router.go:669] "msg"="router reloaded" "logger"="template" "output"=" - Checking http://localhost:80 ...\n - Health check ok : 0 retry attempt(s).\n" 2025-12-04T22:24:27.805029054Z I1204 22:24:27.804933 1 router.go:669] "msg"="router reloaded" "logger"="template" "output"=" - Checking http://localhost:80 ...\n - Health check ok : 0 retry attempt(s).\n" config/pod/openshift-ingress/logs/router-default-5465c8b4db-8vm66/router_previous.log0000640000000000000000000002270615114405064027106 0ustar00000000000000002025-12-04T22:18:17.943997571Z [-]backend-http failed: backend reported failure 2025-12-04T22:18:17.943997571Z [-]has-synced failed: Router not synced 2025-12-04T22:18:18.943696375Z I1204 22:18:18.943577 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-04T22:18:18.943696375Z [-]backend-http failed: backend reported failure 2025-12-04T22:18:18.943696375Z [-]has-synced failed: Router not synced 2025-12-04T22:18:19.944276093Z I1204 22:18:19.944168 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-04T22:18:19.944276093Z [-]backend-http failed: backend reported failure 2025-12-04T22:18:19.944276093Z [-]has-synced failed: Router not synced 2025-12-04T22:18:20.944306276Z I1204 22:18:20.944188 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-04T22:18:20.944306276Z [-]backend-http failed: backend reported failure 2025-12-04T22:18:20.944306276Z [-]has-synced failed: Router not synced 2025-12-04T22:18:21.944119843Z I1204 22:18:21.943990 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-04T22:18:21.944119843Z [-]backend-http failed: backend reported failure 2025-12-04T22:18:21.944119843Z [-]has-synced failed: Router not synced 2025-12-04T22:18:22.944623069Z I1204 22:18:22.944456 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-04T22:18:22.944623069Z [-]backend-http failed: backend reported failure 2025-12-04T22:18:22.944623069Z [-]has-synced failed: Router not synced 2025-12-04T22:18:23.943903961Z I1204 22:18:23.943776 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-04T22:18:23.943903961Z [-]backend-http failed: backend reported failure 2025-12-04T22:18:23.943903961Z [-]has-synced failed: Router not synced 2025-12-04T22:18:24.943418512Z I1204 22:18:24.943345 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-04T22:18:24.943418512Z [-]backend-http failed: backend reported failure 2025-12-04T22:18:24.943418512Z [-]has-synced failed: Router not synced 2025-12-04T22:18:25.944961070Z I1204 22:18:25.944843 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-04T22:18:25.944961070Z [-]backend-http failed: backend reported failure 2025-12-04T22:18:25.944961070Z [-]has-synced failed: Router not synced 2025-12-04T22:18:26.944185754Z I1204 22:18:26.944077 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-04T22:18:26.944185754Z [-]backend-http failed: backend reported failure 2025-12-04T22:18:26.944185754Z [-]has-synced failed: Router not synced 2025-12-04T22:18:27.944241641Z I1204 22:18:27.944142 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-04T22:18:27.944241641Z [-]backend-http failed: backend reported failure 2025-12-04T22:18:27.944241641Z [-]has-synced failed: Router not synced 2025-12-04T22:18:28.944129875Z I1204 22:18:28.943818 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-04T22:18:28.944129875Z [-]backend-http failed: backend reported failure 2025-12-04T22:18:28.944129875Z [-]has-synced failed: Router not synced 2025-12-04T22:18:29.943250225Z I1204 22:18:29.943193 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-04T22:18:29.943250225Z [-]backend-http failed: backend reported failure 2025-12-04T22:18:29.943250225Z [-]has-synced failed: Router not synced 2025-12-04T22:18:30.943713144Z I1204 22:18:30.943612 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-04T22:18:30.943713144Z [-]backend-http failed: backend reported failure 2025-12-04T22:18:30.943713144Z [-]has-synced failed: Router not synced 2025-12-04T22:18:31.944467409Z I1204 22:18:31.944392 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-04T22:18:31.944467409Z [-]backend-http failed: backend reported failure 2025-12-04T22:18:31.944467409Z [-]has-synced failed: Router not synced 2025-12-04T22:18:32.944425794Z I1204 22:18:32.944346 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-04T22:18:32.944425794Z [-]backend-http failed: backend reported failure 2025-12-04T22:18:32.944425794Z [-]has-synced failed: Router not synced 2025-12-04T22:18:33.945618362Z I1204 22:18:33.944600 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-04T22:18:33.945618362Z [-]backend-http failed: backend reported failure 2025-12-04T22:18:33.945618362Z [-]has-synced failed: Router not synced 2025-12-04T22:18:34.946303316Z I1204 22:18:34.945824 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-04T22:18:34.946303316Z [-]backend-http failed: backend reported failure 2025-12-04T22:18:34.946303316Z [-]has-synced failed: Router not synced 2025-12-04T22:18:35.943878223Z I1204 22:18:35.943775 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-04T22:18:35.943878223Z [-]backend-http failed: backend reported failure 2025-12-04T22:18:35.943878223Z [-]has-synced failed: Router not synced 2025-12-04T22:18:36.943288332Z I1204 22:18:36.943233 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-04T22:18:36.943288332Z [-]backend-http failed: backend reported failure 2025-12-04T22:18:36.943288332Z [-]has-synced failed: Router not synced 2025-12-04T22:18:37.943119303Z I1204 22:18:37.943001 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-04T22:18:37.943119303Z [-]backend-http failed: backend reported failure 2025-12-04T22:18:37.943119303Z [-]has-synced failed: Router not synced 2025-12-04T22:18:38.944483236Z I1204 22:18:38.944398 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-04T22:18:38.944483236Z [-]backend-http failed: backend reported failure 2025-12-04T22:18:38.944483236Z [-]has-synced failed: Router not synced 2025-12-04T22:18:39.943570805Z I1204 22:18:39.943447 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-04T22:18:39.943570805Z [-]backend-http failed: backend reported failure 2025-12-04T22:18:39.943570805Z [-]has-synced failed: Router not synced 2025-12-04T22:18:40.943867730Z I1204 22:18:40.943798 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-04T22:18:40.943867730Z [-]backend-http failed: backend reported failure 2025-12-04T22:18:40.943867730Z [-]has-synced failed: Router not synced 2025-12-04T22:18:41.943587007Z I1204 22:18:41.943445 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-04T22:18:41.943587007Z [-]backend-http failed: backend reported failure 2025-12-04T22:18:41.943587007Z [-]has-synced failed: Router not synced 2025-12-04T22:18:42.944374764Z I1204 22:18:42.944247 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-04T22:18:42.944374764Z [-]backend-http failed: backend reported failure 2025-12-04T22:18:42.944374764Z [-]has-synced failed: Router not synced 2025-12-04T22:18:43.944328768Z I1204 22:18:43.944252 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-04T22:18:43.944328768Z [-]backend-http failed: backend reported failure 2025-12-04T22:18:43.944328768Z [-]has-synced failed: Router not synced 2025-12-04T22:18:44.944551770Z I1204 22:18:44.944415 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-04T22:18:44.944551770Z [-]backend-http failed: backend reported failure 2025-12-04T22:18:44.944551770Z [-]has-synced failed: Router not synced 2025-12-04T22:18:45.944654928Z I1204 22:18:45.944584 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-04T22:18:45.944654928Z [-]backend-http failed: backend reported failure 2025-12-04T22:18:45.944654928Z [-]has-synced failed: Router not synced 2025-12-04T22:18:46.944460608Z I1204 22:18:46.944366 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-04T22:18:46.944460608Z [-]backend-http failed: backend reported failure 2025-12-04T22:18:46.944460608Z [-]has-synced failed: Router not synced 2025-12-04T22:18:47.944044672Z I1204 22:18:47.943939 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-04T22:18:47.944044672Z [-]backend-http failed: backend reported failure 2025-12-04T22:18:47.944044672Z [-]has-synced failed: Router not synced 2025-12-04T22:18:47.949281748Z E1204 22:18:47.949200 1 factory.go:130] failed to sync cache for *v1.Route shared informer 2025-12-04T22:18:47.951983474Z I1204 22:18:47.951896 1 template.go:844] "msg"="Shutdown requested, waiting 45s for new connections to cease" "logger"="router" 2025-12-04T22:18:47.955435830Z E1204 22:18:47.955379 1 haproxy.go:418] can't scrape HAProxy: dial unix /var/lib/haproxy/run/haproxy.sock: connect: no such file or directory 2025-12-04T22:18:48.028651354Z I1204 22:18:48.028484 1 router.go:669] "msg"="router reloaded" "logger"="template" "output"=" - Checking http://localhost:80 ...\n - Health check ok : 0 retry attempt(s).\n" 2025-12-04T22:19:01.758572387Z I1204 22:19:01.758303 1 reflector.go:359] Caches populated for *v1.Service from github.com/openshift/router/pkg/router/template/service_lookup.go:33 2025-12-04T22:19:32.953272057Z I1204 22:19:32.953146 1 template.go:846] "msg"="Instructing the template router to terminate" "logger"="router" 2025-12-04T22:19:32.972466913Z I1204 22:19:32.972362 1 router.go:669] "msg"="router reloaded" "logger"="template" "output"=" - Shutting down\n" 2025-12-04T22:19:32.972466913Z I1204 22:19:32.972415 1 template.go:850] "msg"="Shutdown complete, exiting" "logger"="router" config/pod/openshift-ingress/router-default-5465c8b4db-8vm66.json0000640000000000000000000002064115114405064023052 0ustar0000000000000000{"metadata":{"name":"router-default-5465c8b4db-8vm66","generateName":"router-default-5465c8b4db-","namespace":"openshift-ingress","uid":"c178afcf-b713-4c74-b22b-6169ba3123f5","resourceVersion":"13216","creationTimestamp":"2025-12-04T22:01:09Z","labels":{"ingresscontroller.operator.openshift.io/deployment-ingresscontroller":"default","ingresscontroller.operator.openshift.io/hash":"85fc95cf79","pod-template-hash":"5465c8b4db"},"annotations":{"openshift.io/required-scc":"hostnetwork","openshift.io/scc":"hostnetwork"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"router-default-5465c8b4db","uid":"fda4a9e5-e9d3-4d31-972f-ba902e695cbf","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"default-certificate","secret":{"secretName":"router-certs-default","defaultMode":420}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"defaultMode":420,"optional":false}},{"name":"stats-auth","secret":{"secretName":"router-stats-default","defaultMode":420}},{"name":"metrics-certs","secret":{"secretName":"router-metrics-certs-default","defaultMode":420}},{"name":"kube-api-access-pctsn","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"router","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2b3d313c599852b3543ee5c3a62691bd2d1bbad12c2e1c610cd71a1dec6eea32","ports":[{"name":"http","hostPort":80,"containerPort":80,"protocol":"TCP"},{"name":"https","hostPort":443,"containerPort":443,"protocol":"TCP"},{"name":"metrics","hostPort":1936,"containerPort":1936,"protocol":"TCP"}],"env":[{"name":"DEFAULT_CERTIFICATE_DIR","value":"/etc/pki/tls/private"},{"name":"DEFAULT_DESTINATION_CA_PATH","value":"/var/run/configmaps/service-ca/service-ca.crt"},{"name":"RELOAD_INTERVAL","value":"5s"},{"name":"ROUTER_ALLOW_WILDCARD_ROUTES","value":"false"},{"name":"ROUTER_CANONICAL_HOSTNAME","value":"router-default.apps.sno.openstack.lab"},{"name":"ROUTER_CIPHERS","value":"ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384"},{"name":"ROUTER_CIPHERSUITES","value":"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256"},{"name":"ROUTER_DISABLE_HTTP2","value":"true"},{"name":"ROUTER_DISABLE_NAMESPACE_OWNERSHIP_CHECK","value":"false"},{"name":"ROUTER_DOMAIN","value":"apps.sno.openstack.lab"},{"name":"ROUTER_IDLE_CLOSE_ON_RESPONSE","value":"true"},{"name":"ROUTER_LOAD_BALANCE_ALGORITHM","value":"random"},{"name":"ROUTER_METRICS_TLS_CERT_FILE","value":"/etc/pki/tls/metrics-certs/tls.crt"},{"name":"ROUTER_METRICS_TLS_KEY_FILE","value":"/etc/pki/tls/metrics-certs/tls.key"},{"name":"ROUTER_METRICS_TYPE","value":"haproxy"},{"name":"ROUTER_SERVICE_HTTPS_PORT","value":"443"},{"name":"ROUTER_SERVICE_HTTP_PORT","value":"80"},{"name":"ROUTER_SERVICE_NAME","value":"default"},{"name":"ROUTER_SERVICE_NAMESPACE","value":"openshift-ingress"},{"name":"ROUTER_SET_FORWARDED_HEADERS","value":"append"},{"name":"ROUTER_TCP_BALANCE_SCHEME","value":"source"},{"name":"ROUTER_THREADS","value":"4"},{"name":"SSL_MIN_VERSION","value":"TLSv1.2"},{"name":"STATS_PASSWORD_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsPassword"},{"name":"STATS_PORT","value":"1936"},{"name":"STATS_USERNAME_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsUsername"}],"resources":{"requests":{"cpu":"100m","memory":"256Mi"}},"volumeMounts":[{"name":"default-certificate","readOnly":true,"mountPath":"/etc/pki/tls/private"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca"},{"name":"stats-auth","readOnly":true,"mountPath":"/var/lib/haproxy/conf/metrics-auth"},{"name":"metrics-certs","readOnly":true,"mountPath":"/etc/pki/tls/metrics-certs"},{"name":"kube-api-access-pctsn","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3,"terminationGracePeriodSeconds":10},"readinessProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":1,"successThreshold":1,"failureThreshold":120},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000660000,"runAsNonRoot":true,"readOnlyRootFilesystem":false,"allowPrivilegeEscalation":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":3600,"dnsPolicy":"ClusterFirstWithHostNet","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"router","serviceAccount":"router","nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c26,c5"},"supplementalGroups":[1000660000],"fsGroup":1000660000},"schedulerName":"default-scheduler","tolerations":[{"key":"kubernetes.io/e2e-evict-taint-key","operator":"Equal","value":"evictTaintVal","effect":"NoExecute"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority","topologySpreadConstraints":[{"maxSkew":1,"topologyKey":"topology.kubernetes.io/zone","whenUnsatisfiable":"ScheduleAnyway","labelSelector":{"matchExpressions":[{"key":"ingresscontroller.operator.openshift.io/hash","operator":"In","values":["85fc95cf79"]}]}}]},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:05:42Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:05:38Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:19:43Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:19:43Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:05:38Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2025-12-04T22:05:38Z","containerStatuses":[{"name":"router","state":{"running":{"startedAt":"2025-12-04T22:19:41Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2025-12-04T22:16:47Z","finishedAt":"2025-12-04T22:19:33Z","containerID":"cri-o://0036ee313e2e8fbc7aa4a79880a6b001a94f998abd62378bddfdf0a04bcdd8e0"}},"ready":true,"restartCount":5,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2b3d313c599852b3543ee5c3a62691bd2d1bbad12c2e1c610cd71a1dec6eea32","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2b3d313c599852b3543ee5c3a62691bd2d1bbad12c2e1c610cd71a1dec6eea32","containerID":"cri-o://702d291fa3743bbafacfa47a60ae14f3d5c999daf25d1da9f2f4ffc4616415ac","started":true,"volumeMounts":[{"name":"default-certificate","mountPath":"/etc/pki/tls/private","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca-bundle","mountPath":"/var/run/configmaps/service-ca","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"stats-auth","mountPath":"/var/lib/haproxy/conf/metrics-auth","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"metrics-certs","mountPath":"/etc/pki/tls/metrics-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-pctsn","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}authentication-operator_current.log0000640000000000000000000014225415114405064037576 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-6c968fdfdf-bm2pk2025-12-04T22:23:29.062931294Z W1204 22:23:29.062875 1 dynamic_operator_client.go:352] .status.conditions["OAuthServerWorkloadDegraded"].reason is missing; this will eventually be fatal 2025-12-04T22:23:29.062931294Z W1204 22:23:29.062880 1 dynamic_operator_client.go:355] .status.conditions["OAuthServerWorkloadDegraded"].message is missing; this will eventually be fatal 2025-12-04T22:23:29.106597454Z I1204 22:23:29.104148 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2025-12-04T22:19:53Z","message":"All is well","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2025-12-04T22:23:29Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: observed generation is 1, desired generation is 2.","reason":"OAuthServerDeployment_NewGeneration","status":"True","type":"Progressing"},{"lastTransitionTime":"2025-12-04T22:22:53Z","message":"All is well","reason":"AsExpected","status":"True","type":"Available"},{"lastTransitionTime":"2025-12-04T22:00:39Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-12-04T22:00:38Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2025-12-04T22:23:29.130710151Z I1204 22:23:29.130624 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Progressing changed from False to True ("OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: observed generation is 1, desired generation is 2.") 2025-12-04T22:23:29.177159358Z E1204 22:23:29.175338 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2025-12-04T22:23:29.184645905Z I1204 22:23:29.184490 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2025-12-04T22:19:53Z","message":"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2025-12-04T22:23:29Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: observed generation is 1, desired generation is 2.","reason":"OAuthServerDeployment_NewGeneration","status":"True","type":"Progressing"},{"lastTransitionTime":"2025-12-04T22:22:53Z","message":"All is well","reason":"AsExpected","status":"True","type":"Available"},{"lastTransitionTime":"2025-12-04T22:00:39Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-12-04T22:00:38Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2025-12-04T22:23:29.184703036Z E1204 22:23:29.184548 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2025-12-04T22:23:29.195632399Z E1204 22:23:29.195552 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2025-12-04T22:23:29.203139057Z I1204 22:23:29.202676 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Degraded message changed from "All is well" to "OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready" 2025-12-04T22:23:29.204668850Z E1204 22:23:29.204597 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2025-12-04T22:23:29.249628805Z E1204 22:23:29.249539 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2025-12-04T22:23:29.334646069Z E1204 22:23:29.334574 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2025-12-04T22:23:29.498236890Z E1204 22:23:29.498100 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2025-12-04T22:23:29.823960232Z E1204 22:23:29.823869 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2025-12-04T22:23:30.124659000Z I1204 22:23:30.124592 1 request.go:700] Waited for 1.021500001s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-config-managed/secrets/router-certs 2025-12-04T22:23:30.470213400Z E1204 22:23:30.470133 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2025-12-04T22:23:30.529996606Z W1204 22:23:30.529941 1 dynamic_operator_client.go:352] .status.conditions["IngressStatePodsDegraded"].reason is missing; this will eventually be fatal 2025-12-04T22:23:30.530053368Z W1204 22:23:30.530040 1 dynamic_operator_client.go:355] .status.conditions["IngressStatePodsDegraded"].message is missing; this will eventually be fatal 2025-12-04T22:23:30.562555437Z I1204 22:23:30.562458 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2025-12-04T22:19:53Z","message":"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2025-12-04T22:23:29Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: observed generation is 1, desired generation is 2.","reason":"OAuthServerDeployment_NewGeneration","status":"True","type":"Progressing"},{"lastTransitionTime":"2025-12-04T22:22:53Z","message":"All is well","reason":"AsExpected","status":"True","type":"Available"},{"lastTransitionTime":"2025-12-04T22:00:39Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-12-04T22:00:38Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2025-12-04T22:23:30.571673761Z E1204 22:23:30.570572 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2025-12-04T22:23:30.579337182Z I1204 22:23:30.579252 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Degraded message changed from "OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready" to "OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server" 2025-12-04T22:23:30.613636723Z I1204 22:23:30.613572 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2025-12-04T22:19:53Z","message":"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2025-12-04T22:23:29Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: observed generation is 1, desired generation is 2.","reason":"OAuthServerDeployment_NewGeneration","status":"True","type":"Progressing"},{"lastTransitionTime":"2025-12-04T22:23:30Z","message":"OAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF","reason":"OAuthServerRouteEndpointAccessibleController_EndpointUnavailable","status":"False","type":"Available"},{"lastTransitionTime":"2025-12-04T22:00:39Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-12-04T22:00:38Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2025-12-04T22:23:30.617104969Z E1204 22:23:30.617047 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2025-12-04T22:23:30.627763864Z I1204 22:23:30.626968 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Available changed from True to False ("OAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF") 2025-12-04T22:23:30.645137755Z E1204 22:23:30.645060 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF" 2025-12-04T22:23:30.654910065Z E1204 22:23:30.654747 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2025-12-04T22:23:30.656977123Z I1204 22:23:30.656900 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2025-12-04T22:19:53Z","message":"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2025-12-04T22:23:29Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: observed generation is 1, desired generation is 2.","reason":"OAuthServerDeployment_NewGeneration","status":"True","type":"Progressing"},{"lastTransitionTime":"2025-12-04T22:23:30Z","message":"OAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF","reason":"OAuthServerRouteEndpointAccessibleController_EndpointUnavailable","status":"False","type":"Available"},{"lastTransitionTime":"2025-12-04T22:00:39Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-12-04T22:00:38Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2025-12-04T22:23:30.669965023Z I1204 22:23:30.666966 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Degraded message changed from "OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server" to "OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF" 2025-12-04T22:23:30.675973159Z E1204 22:23:30.675931 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF" 2025-12-04T22:23:30.688735592Z E1204 22:23:30.688643 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF" 2025-12-04T22:23:30.700831578Z E1204 22:23:30.700748 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF" 2025-12-04T22:23:30.722643001Z E1204 22:23:30.722545 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF" 2025-12-04T22:23:30.813855058Z E1204 22:23:30.813598 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF" 2025-12-04T22:23:30.984536765Z E1204 22:23:30.984436 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF" 2025-12-04T22:23:31.125573651Z I1204 22:23:31.125404 1 request.go:700] Waited for 1.597252318s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-authentication/secrets/v4-0-config-system-session 2025-12-04T22:23:31.343400464Z E1204 22:23:31.343307 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF" 2025-12-04T22:23:31.755039375Z E1204 22:23:31.754945 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2025-12-04T22:23:32.003002282Z E1204 22:23:32.002929 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF" 2025-12-04T22:23:32.324689072Z I1204 22:23:32.324627 1 request.go:700] Waited for 1.594527172s due to client-side throttling, not priority and fairness, request: POST:https://172.30.0.1:443/api/v1/namespaces/openshift-authentication-operator/events 2025-12-04T22:23:33.297330851Z E1204 22:23:33.297252 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF" 2025-12-04T22:23:33.325167891Z I1204 22:23:33.325095 1 request.go:700] Waited for 1.567317548s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-config-managed/secrets/router-certs 2025-12-04T22:23:34.325356432Z I1204 22:23:34.325226 1 request.go:700] Waited for 1.38469947s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-oauth-apiserver 2025-12-04T22:23:35.525402989Z I1204 22:23:35.525307 1 request.go:700] Waited for 1.192630921s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-oauth-apiserver/services/api 2025-12-04T22:23:35.871745402Z E1204 22:23:35.871609 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF" 2025-12-04T22:23:39.553145282Z W1204 22:23:39.550228 1 dynamic_operator_client.go:355] .status.conditions["OAuthServerDeploymentDegraded"].message is missing; this will eventually be fatal 2025-12-04T22:23:39.553145282Z W1204 22:23:39.550256 1 dynamic_operator_client.go:352] .status.conditions["OAuthServerWorkloadDegraded"].reason is missing; this will eventually be fatal 2025-12-04T22:23:39.553145282Z W1204 22:23:39.550260 1 dynamic_operator_client.go:355] .status.conditions["OAuthServerWorkloadDegraded"].message is missing; this will eventually be fatal 2025-12-04T22:23:39.579112871Z I1204 22:23:39.579002 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2025-12-04T22:19:53Z","message":"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2025-12-04T22:23:29Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating","status":"True","type":"Progressing"},{"lastTransitionTime":"2025-12-04T22:23:30Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF","reason":"OAuthServerDeployment_NoPod::OAuthServerRouteEndpointAccessibleController_EndpointUnavailable","status":"False","type":"Available"},{"lastTransitionTime":"2025-12-04T22:00:39Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-12-04T22:00:38Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2025-12-04T22:23:39.585104817Z E1204 22:23:39.585003 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2025-12-04T22:23:39.593291384Z I1204 22:23:39.593131 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Progressing message changed from "OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: observed generation is 1, desired generation is 2." to "OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available",Available message changed from "OAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF" to "OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF" 2025-12-04T22:23:39.606482169Z E1204 22:23:39.606372 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF" 2025-12-04T22:23:40.728740751Z I1204 22:23:40.728664 1 request.go:700] Waited for 1.136543037s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-authentication/configmaps/v4-0-config-system-cliconfig 2025-12-04T22:23:41.009721173Z E1204 22:23:41.009567 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF" 2025-12-04T22:23:52.238728642Z E1204 22:23:52.238633 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2025-12-04T22:24:01.545064375Z E1204 22:24:01.544902 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF" 2025-12-04T22:24:07.869857188Z E1204 22:24:07.869720 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF" 2025-12-04T22:24:12.569607962Z I1204 22:24:12.567880 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2025-12-04T22:19:53Z","message":"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2025-12-04T22:23:29Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating","status":"True","type":"Progressing"},{"lastTransitionTime":"2025-12-04T22:23:30Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.56.77:443/healthz\": dial tcp 172.30.56.77:443: connect: connection refused","reason":"OAuthServerDeployment_NoPod::OAuthServerRouteEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable","status":"False","type":"Available"},{"lastTransitionTime":"2025-12-04T22:00:39Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-12-04T22:00:38Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2025-12-04T22:24:12.624607356Z E1204 22:24:12.622715 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2025-12-04T22:24:12.639250341Z E1204 22:24:12.639169 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.56.77:443/healthz\": dial tcp 172.30.56.77:443: connect: connection refused" 2025-12-04T22:24:12.641821783Z I1204 22:24:12.641329 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Available message changed from "OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF" to "OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.56.77:443/healthz\": dial tcp 172.30.56.77:443: connect: connection refused" 2025-12-04T22:24:12.646552624Z E1204 22:24:12.646467 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2025-12-04T22:24:12.648728954Z I1204 22:24:12.648664 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2025-12-04T22:19:53Z","message":"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.56.77:443/healthz\": dial tcp 172.30.56.77:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2025-12-04T22:23:29Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating","status":"True","type":"Progressing"},{"lastTransitionTime":"2025-12-04T22:23:30Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.56.77:443/healthz\": dial tcp 172.30.56.77:443: connect: connection refused","reason":"OAuthServerDeployment_NoPod::OAuthServerRouteEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable","status":"False","type":"Available"},{"lastTransitionTime":"2025-12-04T22:00:39Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-12-04T22:00:38Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2025-12-04T22:24:12.651874601Z E1204 22:24:12.651825 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2025-12-04T22:24:12.655055639Z W1204 22:24:12.655009 1 dynamic_operator_client.go:352] .status.conditions["IngressStatePodsDegraded"].reason is missing; this will eventually be fatal 2025-12-04T22:24:12.655106321Z W1204 22:24:12.655093 1 dynamic_operator_client.go:355] .status.conditions["IngressStatePodsDegraded"].message is missing; this will eventually be fatal 2025-12-04T22:24:12.688703881Z E1204 22:24:12.688621 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF" 2025-12-04T22:24:12.695132549Z E1204 22:24:12.695064 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.56.77:443/healthz\": dial tcp 172.30.56.77:443: connect: connection refused" 2025-12-04T22:24:12.704967742Z I1204 22:24:12.704871 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Degraded message changed from "OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF" to "OAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.56.77:443/healthz\": dial tcp 172.30.56.77:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF" 2025-12-04T22:24:12.713185150Z E1204 22:24:12.706106 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.56.77:443/healthz\": dial tcp 172.30.56.77:443: connect: connection refused" 2025-12-04T22:24:12.730962682Z E1204 22:24:12.730895 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF" 2025-12-04T22:24:12.746277625Z E1204 22:24:12.744590 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.56.77:443/healthz\": dial tcp 172.30.56.77:443: connect: connection refused" 2025-12-04T22:24:12.765147188Z W1204 22:24:12.762773 1 dynamic_operator_client.go:355] .status.conditions["OAuthServerServiceEndpointAccessibleControllerAvailable"].message is missing; this will eventually be fatal 2025-12-04T22:24:12.778047556Z W1204 22:24:12.774039 1 dynamic_operator_client.go:355] .status.conditions["OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded"].message is missing; this will eventually be fatal 2025-12-04T22:24:12.802879314Z I1204 22:24:12.798580 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2025-12-04T22:19:53Z","message":"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.56.77:443/healthz\": dial tcp 172.30.56.77:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nIngressStateEndpointsDegraded: All 1 endpoints for oauth-server are reporting 'not ready'\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2025-12-04T22:23:29Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating","status":"True","type":"Progressing"},{"lastTransitionTime":"2025-12-04T22:23:30Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.56.77:443/healthz\": dial tcp 172.30.56.77:443: connect: connection refused","reason":"OAuthServerDeployment_NoPod::OAuthServerRouteEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable","status":"False","type":"Available"},{"lastTransitionTime":"2025-12-04T22:00:39Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-12-04T22:00:38Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2025-12-04T22:24:12.833576464Z I1204 22:24:12.832010 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2025-12-04T22:19:53Z","message":"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.56.77:443/healthz\": dial tcp 172.30.56.77:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nIngressStateEndpointsDegraded: All 1 endpoints for oauth-server are reporting 'not ready'\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2025-12-04T22:23:29Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating","status":"True","type":"Progressing"},{"lastTransitionTime":"2025-12-04T22:23:30Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF","reason":"OAuthServerDeployment_NoPod::OAuthServerRouteEndpointAccessibleController_EndpointUnavailable","status":"False","type":"Available"},{"lastTransitionTime":"2025-12-04T22:00:39Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-12-04T22:00:38Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2025-12-04T22:24:12.836609268Z I1204 22:24:12.836520 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Degraded message changed from "OAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.56.77:443/healthz\": dial tcp 172.30.56.77:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF" to "OAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.56.77:443/healthz\": dial tcp 172.30.56.77:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nIngressStateEndpointsDegraded: All 1 endpoints for oauth-server are reporting 'not ready'\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF" 2025-12-04T22:24:12.842311686Z W1204 22:24:12.840591 1 dynamic_operator_client.go:355] .status.conditions["OAuthServerServiceEndpointAccessibleControllerDegraded"].message is missing; this will eventually be fatal 2025-12-04T22:24:12.851847059Z I1204 22:24:12.850036 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Available message changed from "OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.56.77:443/healthz\": dial tcp 172.30.56.77:443: connect: connection refused" to "OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF" 2025-12-04T22:24:12.864672845Z I1204 22:24:12.862019 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2025-12-04T22:19:53Z","message":"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.56.77:443/healthz\": dial tcp 172.30.56.77:443: connect: connection refused\nIngressStateEndpointsDegraded: All 1 endpoints for oauth-server are reporting 'not ready'\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2025-12-04T22:23:29Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating","status":"True","type":"Progressing"},{"lastTransitionTime":"2025-12-04T22:23:30Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF","reason":"OAuthServerDeployment_NoPod::OAuthServerRouteEndpointAccessibleController_EndpointUnavailable","status":"False","type":"Available"},{"lastTransitionTime":"2025-12-04T22:00:39Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-12-04T22:00:38Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2025-12-04T22:24:12.866690760Z W1204 22:24:12.865573 1 dynamic_operator_client.go:355] .status.conditions["OAuthServerRouteEndpointAccessibleControllerAvailable"].message is missing; this will eventually be fatal 2025-12-04T22:24:12.885459850Z I1204 22:24:12.882819 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Degraded message changed from "OAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.56.77:443/healthz\": dial tcp 172.30.56.77:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nIngressStateEndpointsDegraded: All 1 endpoints for oauth-server are reporting 'not ready'\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF" to "OAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.56.77:443/healthz\": dial tcp 172.30.56.77:443: connect: connection refused\nIngressStateEndpointsDegraded: All 1 endpoints for oauth-server are reporting 'not ready'\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF" 2025-12-04T22:24:12.910464153Z W1204 22:24:12.910065 1 dynamic_operator_client.go:355] .status.conditions["OAuthServerRouteEndpointAccessibleControllerDegraded"].message is missing; this will eventually be fatal 2025-12-04T22:24:12.912311934Z I1204 22:24:12.912273 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2025-12-04T22:19:53Z","message":"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.56.77:443/healthz\": dial tcp 172.30.56.77:443: connect: connection refused\nIngressStateEndpointsDegraded: All 1 endpoints for oauth-server are reporting 'not ready'\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2025-12-04T22:23:29Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating","status":"True","type":"Progressing"},{"lastTransitionTime":"2025-12-04T22:23:30Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.","reason":"OAuthServerDeployment_NoPod","status":"False","type":"Available"},{"lastTransitionTime":"2025-12-04T22:00:39Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-12-04T22:00:38Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2025-12-04T22:24:12.944134755Z I1204 22:24:12.944046 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Available message changed from "OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF" to "OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node." 2025-12-04T22:24:12.967298177Z I1204 22:24:12.967227 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2025-12-04T22:19:53Z","message":"IngressStateEndpointsDegraded: All 1 endpoints for oauth-server are reporting 'not ready'\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2025-12-04T22:23:29Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating","status":"True","type":"Progressing"},{"lastTransitionTime":"2025-12-04T22:23:30Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.","reason":"OAuthServerDeployment_NoPod","status":"False","type":"Available"},{"lastTransitionTime":"2025-12-04T22:00:39Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-12-04T22:00:38Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2025-12-04T22:24:12.980828822Z I1204 22:24:12.976743 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Degraded message changed from "OAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.56.77:443/healthz\": dial tcp 172.30.56.77:443: connect: connection refused\nIngressStateEndpointsDegraded: All 1 endpoints for oauth-server are reporting 'not ready'\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF" to "IngressStateEndpointsDegraded: All 1 endpoints for oauth-server are reporting 'not ready'\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF" 2025-12-04T22:24:13.003342185Z I1204 22:24:13.003268 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2025-12-04T22:19:53Z","message":"IngressStateEndpointsDegraded: All 1 endpoints for oauth-server are reporting 'not ready'","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2025-12-04T22:23:29Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating","status":"True","type":"Progressing"},{"lastTransitionTime":"2025-12-04T22:23:30Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.","reason":"OAuthServerDeployment_NoPod","status":"False","type":"Available"},{"lastTransitionTime":"2025-12-04T22:00:39Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-12-04T22:00:38Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2025-12-04T22:24:13.020070569Z I1204 22:24:13.018715 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Degraded message changed from "IngressStateEndpointsDegraded: All 1 endpoints for oauth-server are reporting 'not ready'\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF" to "IngressStateEndpointsDegraded: All 1 endpoints for oauth-server are reporting 'not ready'" 2025-12-04T22:24:13.899132055Z I1204 22:24:13.897998 1 request.go:700] Waited for 1.142634076s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-authentication/endpoints/oauth-openshift 2025-12-04T22:24:15.098241936Z I1204 22:24:15.098127 1 request.go:700] Waited for 1.597817943s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-authentication/secrets/v4-0-config-system-router-certs 2025-12-04T22:24:15.502541913Z W1204 22:24:15.502190 1 dynamic_operator_client.go:352] .status.conditions["IngressStateEndpointsDegraded"].reason is missing; this will eventually be fatal 2025-12-04T22:24:15.502541913Z W1204 22:24:15.502218 1 dynamic_operator_client.go:355] .status.conditions["IngressStateEndpointsDegraded"].message is missing; this will eventually be fatal 2025-12-04T22:24:15.502541913Z W1204 22:24:15.502223 1 dynamic_operator_client.go:352] .status.conditions["IngressStatePodsDegraded"].reason is missing; this will eventually be fatal 2025-12-04T22:24:15.502541913Z W1204 22:24:15.502227 1 dynamic_operator_client.go:355] .status.conditions["IngressStatePodsDegraded"].message is missing; this will eventually be fatal 2025-12-04T22:24:15.538585281Z I1204 22:24:15.538482 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2025-12-04T22:19:53Z","message":"All is well","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2025-12-04T22:23:29Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating","status":"True","type":"Progressing"},{"lastTransitionTime":"2025-12-04T22:23:30Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.","reason":"OAuthServerDeployment_NoPod","status":"False","type":"Available"},{"lastTransitionTime":"2025-12-04T22:00:39Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-12-04T22:00:38Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2025-12-04T22:24:15.553135524Z I1204 22:24:15.553051 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Degraded message changed from "IngressStateEndpointsDegraded: All 1 endpoints for oauth-server are reporting 'not ready'" to "All is well" 2025-12-04T22:24:16.297289255Z I1204 22:24:16.297159 1 request.go:700] Waited for 1.575291139s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-oauth-apiserver 2025-12-04T22:24:17.297778764Z I1204 22:24:17.297689 1 request.go:700] Waited for 1.38832087s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-authentication 2025-12-04T22:24:18.297940945Z I1204 22:24:18.297875 1 request.go:700] Waited for 1.383292042s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-oauth-apiserver/secrets/etcd-client 2025-12-04T22:24:19.497961441Z I1204 22:24:19.497807 1 request.go:700] Waited for 1.197149727s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-oauth-apiserver/configmaps/etcd-serving-ca authentication-operator_previous.log0000640000000000000000000006156115114405064037771 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-6c968fdfdf-bm2pk2025-12-04T22:12:36.248649500Z E1204 22:12:36.248565 1 base_controller.go:279] "Unhandled Error" err="NamespaceFinalizerController_openshift-oauth-apiserver reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-oauth-apiserver)" 2025-12-04T22:12:48.419326287Z E1204 22:12:48.419200 1 base_controller.go:277] "Unhandled Error" err="\"OpenShiftAuthenticatorCertRequester\" controller failed to sync \"system:openshift:openshift-monitoring-d2pbg\", err: unable to get secret \"openshift-oauth-apiserver/openshift-authenticator-certs\": the server was unable to return a response in the time allotted, but may still be processing the request (get secrets openshift-authenticator-certs)" 2025-12-04T22:12:55.025672068Z E1204 22:12:55.025485 1 base_controller.go:279] "Unhandled Error" err="TrustDistributionController reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps oauth-serving-cert)" 2025-12-04T22:12:55.956218000Z W1204 22:12:55.956117 1 dynamic_operator_client.go:352] .status.conditions["APIServicesDegraded"].reason is missing; this will eventually be fatal 2025-12-04T22:12:55.956218000Z W1204 22:12:55.956158 1 dynamic_operator_client.go:355] .status.conditions["APIServicesDegraded"].message is missing; this will eventually be fatal 2025-12-04T22:12:56.292233878Z W1204 22:12:56.292145 1 dynamic_operator_client.go:352] .status.conditions["OAuthServiceDegraded"].reason is missing; this will eventually be fatal 2025-12-04T22:12:56.292233878Z W1204 22:12:56.292193 1 dynamic_operator_client.go:355] .status.conditions["OAuthServiceDegraded"].message is missing; this will eventually be fatal 2025-12-04T22:13:06.359474453Z W1204 22:13:06.359369 1 reflector.go:561] github.com/openshift/client-go/route/informers/externalversions/factory.go:125: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2025-12-04T22:13:06.359474453Z E1204 22:13:06.359437 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/route/informers/externalversions/factory.go:125: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io)" 2025-12-04T22:13:09.757245305Z E1204 22:13:09.757157 1 leaderelection.go:436] error retrieving resource lock openshift-authentication-operator/cluster-authentication-operator-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io cluster-authentication-operator-lock) 2025-12-04T22:13:18.428990134Z E1204 22:13:18.428885 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2025-12-04T22:13:18.496225897Z E1204 22:13:18.496134 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.56.77:443/healthz\": dial tcp 172.30.56.77:443: connect: connection refused" 2025-12-04T22:13:21.954671119Z W1204 22:13:21.954572 1 base_controller.go:242] Updating status of "WebhookAuthenticatorController" failed: unable to ApplyStatus for operator using fieldManager "WebhookAuthenticatorController-reportDegraded": Timeout: request did not complete within requested timeout - context deadline exceeded 2025-12-04T22:13:21.954671119Z E1204 22:13:21.954636 1 base_controller.go:279] "Unhandled Error" err="WebhookAuthenticatorController reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get authentications.config.openshift.io cluster)" 2025-12-04T22:13:29.047564549Z W1204 22:13:29.047458 1 reflector.go:561] github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io) 2025-12-04T22:13:29.047761605Z E1204 22:13:29.047731 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: Failed to watch *v1.OAuthClient: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io)" 2025-12-04T22:13:29.959557805Z E1204 22:13:29.959436 1 base_controller.go:279] "Unhandled Error" err="openshift-apiserver-APIService reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-apiserver-APIService\": Timeout: request did not complete within requested timeout - context deadline exceeded" 2025-12-04T22:13:30.295067981Z E1204 22:13:30.294997 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-ServiceCA reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-authentication-ServiceCA\": Timeout: request did not complete within requested timeout - context deadline exceeded" 2025-12-04T22:13:30.974541995Z E1204 22:13:30.974418 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-IngressState reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get endpoints oauth-openshift)" 2025-12-04T22:13:36.252333982Z E1204 22:13:36.252223 1 base_controller.go:279] "Unhandled Error" err="NamespaceFinalizerController_openshift-oauth-apiserver reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-oauth-apiserver)" 2025-12-04T22:13:43.132118468Z W1204 22:13:43.131988 1 reflector.go:561] github.com/openshift/client-go/route/informers/externalversions/factory.go:125: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2025-12-04T22:13:43.132191200Z E1204 22:13:43.132105 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/route/informers/externalversions/factory.go:125: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io)" 2025-12-04T22:13:48.422324788Z E1204 22:13:48.422239 1 base_controller.go:277] "Unhandled Error" err="\"OpenShiftAuthenticatorCertRequester\" controller failed to sync \"system:openshift:openshift-monitoring-m7v5v\", err: unable to get secret \"openshift-oauth-apiserver/openshift-authenticator-certs\": the server was unable to return a response in the time allotted, but may still be processing the request (get secrets openshift-authenticator-certs)" 2025-12-04T22:13:55.034259723Z E1204 22:13:55.034175 1 base_controller.go:279] "Unhandled Error" err="TrustDistributionController reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps oauth-serving-cert)" 2025-12-04T22:13:56.646130108Z E1204 22:13:56.646062 1 base_controller.go:279] "Unhandled Error" err="OAuthAPIServerController-WorkloadWorkloadController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"OAuthAPIServerController-Workload\": Timeout: request did not complete within requested timeout - context deadline exceeded" 2025-12-04T22:13:59.645446868Z E1204 22:13:59.645328 1 base_controller.go:279] "Unhandled Error" err=< 2025-12-04T22:13:59.645446868Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: 401 2025-12-04T22:13:59.645446868Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/user.openshift.io/v1: 401 2025-12-04T22:13:59.645446868Z > 2025-12-04T22:13:59.658944462Z E1204 22:13:59.658860 1 base_controller.go:279] "Unhandled Error" err=< 2025-12-04T22:13:59.658944462Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: 401 2025-12-04T22:13:59.658944462Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/user.openshift.io/v1: 401 2025-12-04T22:13:59.658944462Z > 2025-12-04T22:14:03.964962786Z E1204 22:14:03.964888 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"oauth-apiserver-AuditPolicy\": Timeout: request did not complete within requested timeout - context deadline exceeded" 2025-12-04T22:14:05.972817041Z E1204 22:14:05.972703 1 base_controller.go:279] "Unhandled Error" err=< 2025-12-04T22:14:05.972817041Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: 401 2025-12-04T22:14:05.972817041Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/user.openshift.io/v1: 401 2025-12-04T22:14:05.972817041Z > 2025-12-04T22:14:07.229911838Z W1204 22:14:07.229761 1 base_controller.go:242] Updating status of "RouterCertsDomainValidationController" failed: unable to ApplyStatus for operator using fieldManager "RouterCertsDomainValidationController-reportDegraded": Timeout: request did not complete within requested timeout - context deadline exceeded 2025-12-04T22:14:07.229911838Z E1204 22:14:07.229819 1 base_controller.go:279] "Unhandled Error" err="RouterCertsDomainValidationController reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get secrets router-certs)" 2025-12-04T22:14:10.931944179Z E1204 22:14:10.931803 1 base_controller.go:279] "Unhandled Error" err=< 2025-12-04T22:14:10.931944179Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: 401 2025-12-04T22:14:10.931944179Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/user.openshift.io/v1: 401 2025-12-04T22:14:10.931944179Z > 2025-12-04T22:14:15.529891685Z E1204 22:14:15.529756 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.56.77:443/healthz\": dial tcp 172.30.56.77:443: connect: connection refused" 2025-12-04T22:14:15.975932701Z E1204 22:14:15.975794 1 base_controller.go:279] "Unhandled Error" err=< 2025-12-04T22:14:15.975932701Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: 401 2025-12-04T22:14:15.975932701Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/user.openshift.io/v1: 401 2025-12-04T22:14:15.975932701Z > 2025-12-04T22:14:16.312775974Z W1204 22:14:16.312665 1 reflector.go:561] github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io) 2025-12-04T22:14:16.312775974Z E1204 22:14:16.312716 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: Failed to watch *v1.OAuthClient: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io)" 2025-12-04T22:14:18.954594269Z W1204 22:14:18.954420 1 reflector.go:561] github.com/openshift/client-go/route/informers/externalversions/factory.go:125: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2025-12-04T22:14:18.954594269Z E1204 22:14:18.954498 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/route/informers/externalversions/factory.go:125: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io)" 2025-12-04T22:14:20.328990570Z E1204 22:14:20.328862 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2025-12-04T22:14:25.977566216Z E1204 22:14:25.977435 1 base_controller.go:279] "Unhandled Error" err=< 2025-12-04T22:14:25.977566216Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: 401 2025-12-04T22:14:25.977566216Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/user.openshift.io/v1: 401 2025-12-04T22:14:25.977566216Z > 2025-12-04T22:14:30.983040250Z E1204 22:14:30.982923 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-IngressState reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get endpoints oauth-openshift)" 2025-12-04T22:14:31.895484113Z E1204 22:14:31.895363 1 base_controller.go:279] "Unhandled Error" err="APIServerStaticResources-StaticResources reconciliation failed: [\"oauth-apiserver/sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts oauth-apiserver-sa), \"oauth-apiserver/RBAC/useroauthaccesstokens_binding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:useroauthaccesstoken-manager), \"oauth-apiserver/RBAC/useroauthaccesstokens_clusterrole.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterroles.rbac.authorization.k8s.io system:openshift:useroauthaccesstoken-manager), unable to ApplyStatus for operator using fieldManager \"APIServerStaticResources-StaticResources\": Timeout: request did not complete within requested timeout - context deadline exceeded]" 2025-12-04T22:14:35.976888867Z E1204 22:14:35.976766 1 base_controller.go:279] "Unhandled Error" err=< 2025-12-04T22:14:35.976888867Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: 401 2025-12-04T22:14:35.976888867Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/user.openshift.io/v1: 401 2025-12-04T22:14:35.976888867Z > 2025-12-04T22:14:43.761911771Z E1204 22:14:43.761779 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2025-12-04T22:14:45.974755461Z E1204 22:14:45.974635 1 base_controller.go:279] "Unhandled Error" err=< 2025-12-04T22:14:45.974755461Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: 401 2025-12-04T22:14:45.974755461Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/user.openshift.io/v1: 401 2025-12-04T22:14:45.974755461Z > 2025-12-04T22:14:55.965945761Z W1204 22:14:55.965821 1 base_controller.go:242] Updating status of "WebhookAuthenticatorController" failed: unable to ApplyStatus for operator using fieldManager "WebhookAuthenticatorController-reportDegraded": Timeout: request did not complete within requested timeout - context deadline exceeded 2025-12-04T22:14:55.965945761Z E1204 22:14:55.965899 1 base_controller.go:279] "Unhandled Error" err="WebhookAuthenticatorController reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get authentications.config.openshift.io cluster)" 2025-12-04T22:14:55.976075430Z E1204 22:14:55.975959 1 base_controller.go:279] "Unhandled Error" err=< 2025-12-04T22:14:55.976075430Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: 401 2025-12-04T22:14:55.976075430Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/user.openshift.io/v1: 401 2025-12-04T22:14:55.976075430Z > 2025-12-04T22:15:05.980193786Z E1204 22:15:05.980084 1 base_controller.go:279] "Unhandled Error" err=< 2025-12-04T22:15:05.980193786Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: 401 2025-12-04T22:15:05.980193786Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/user.openshift.io/v1: 401 2025-12-04T22:15:05.980193786Z > 2025-12-04T22:15:13.369298019Z W1204 22:15:13.369215 1 reflector.go:561] github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io) 2025-12-04T22:15:13.369298019Z E1204 22:15:13.369284 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: Failed to watch *v1.OAuthClient: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io)" 2025-12-04T22:15:15.980300154Z E1204 22:15:15.980212 1 base_controller.go:279] "Unhandled Error" err=< 2025-12-04T22:15:15.980300154Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: 401 2025-12-04T22:15:15.980300154Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/user.openshift.io/v1: 401 2025-12-04T22:15:15.980300154Z > 2025-12-04T22:15:17.013326670Z W1204 22:15:17.013188 1 reflector.go:561] github.com/openshift/client-go/route/informers/externalversions/factory.go:125: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2025-12-04T22:15:17.013326670Z E1204 22:15:17.013270 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/route/informers/externalversions/factory.go:125: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io)" 2025-12-04T22:15:22.829582160Z E1204 22:15:22.829387 1 base_controller.go:279] "Unhandled Error" err="OpenshiftAuthenticationStaticResources-StaticResources reconciliation failed: [\"oauth-openshift/serviceaccount.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts oauth-openshift), \"oauth-openshift/oauth-service.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get services oauth-openshift), \"oauth-openshift/trust_distribution_role.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get roles.rbac.authorization.k8s.io system:openshift:oauth-servercert-trust), \"oauth-openshift/trust_distribution_rolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get rolebindings.rbac.authorization.k8s.io system:openshift:oauth-servercert-trust), unable to ApplyStatus for operator using fieldManager \"OpenshiftAuthenticationStaticResources-StaticResources\": Timeout: request did not complete within requested timeout - context deadline exceeded]" 2025-12-04T22:15:25.988547618Z E1204 22:15:25.988440 1 base_controller.go:279] "Unhandled Error" err=< 2025-12-04T22:15:25.988547618Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: 401 2025-12-04T22:15:25.988547618Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/user.openshift.io/v1: 401 2025-12-04T22:15:25.988547618Z > 2025-12-04T22:15:30.986291500Z E1204 22:15:30.986159 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-IngressState reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get endpoints oauth-openshift)" 2025-12-04T22:15:35.751382948Z E1204 22:15:35.751212 1 leaderelection.go:436] error retrieving resource lock openshift-authentication-operator/cluster-authentication-operator-lock: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-authentication-operator/leases/cluster-authentication-operator-lock?timeout=4m0s": context deadline exceeded 2025-12-04T22:15:35.751382948Z I1204 22:15:35.751342 1 leaderelection.go:297] failed to renew lease openshift-authentication-operator/cluster-authentication-operator-lock: timed out waiting for the condition 2025-12-04T22:15:35.983362622Z E1204 22:15:35.983239 1 base_controller.go:279] "Unhandled Error" err=< 2025-12-04T22:15:35.983362622Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: 401 2025-12-04T22:15:35.983362622Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/user.openshift.io/v1: 401 2025-12-04T22:15:35.983362622Z > 2025-12-04T22:15:45.062104000Z W1204 22:15:45.062024 1 leaderelection.go:84] leader election lost config/pod/openshift-authentication-operator/authentication-operator-6c968fdfdf-bm2pk.json0000640000000000000000000001610415114405064030461 0ustar0000000000000000{"metadata":{"name":"authentication-operator-6c968fdfdf-bm2pk","generateName":"authentication-operator-6c968fdfdf-","namespace":"openshift-authentication-operator","uid":"f893663c-7c1e-4eda-9839-99c1c0440304","resourceVersion":"11933","creationTimestamp":"2025-12-04T21:58:24Z","labels":{"app":"authentication-operator","pod-template-hash":"6c968fdfdf"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.23/23\"],\"mac_address\":\"0a:58:0a:80:00:17\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.23/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.23\"\n ],\n \"mac\": \"0a:58:0a:80:00:17\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"authentication-operator-6c968fdfdf","uid":"e9a84dde-19b0-4efa-9984-74469548f62a","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config","configMap":{"name":"authentication-operator-config","defaultMode":440}},{"name":"trusted-ca-bundle","configMap":{"name":"trusted-ca-bundle","defaultMode":420,"optional":true}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","defaultMode":420,"optional":true}},{"name":"kube-api-access-g8d54","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"authentication-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e85850a4ae1a1e3ec2c590a4936d640882b6550124da22031c85b526afbf52df","command":["/bin/bash","-ec"],"args":["if [ -s /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\nexec authentication-operator operator --config=/var/run/configmaps/config/operator-config.yaml --v=2 --terminate-on-files=/var/run/configmaps/trusted-ca-bundle/ca-bundle.crt --terminate-on-files=/tmp/terminate\n"],"env":[{"name":"IMAGE_OAUTH_SERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8860e00f858d1bca98344f21b5a5c4acc43c9c6eca8216582514021f0ab3cf7b"},{"name":"IMAGE_OAUTH_APISERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:91af633e585621630c40d14f188e37d36b44678d0a59e582d850bf8d593d3a0c"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.29"},{"name":"OPERAND_OAUTH_SERVER_IMAGE_VERSION","value":"4.18.29_openshift"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"20m","memory":"200Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/trusted-ca-bundle"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca-bundle"},{"name":"kube-api-access-g8d54","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]},"runAsUser":0,"readOnlyRootFilesystem":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"authentication-operator","serviceAccount":"authentication-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c14,c9"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:00:36Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:00:26Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:15:47Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:15:47Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:00:26Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.23","podIPs":[{"ip":"10.128.0.23"}],"startTime":"2025-12-04T22:00:26Z","containerStatuses":[{"name":"authentication-operator","state":{"running":{"startedAt":"2025-12-04T22:15:46Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2025-12-04T22:05:01Z","finishedAt":"2025-12-04T22:15:45Z","containerID":"cri-o://4325f17544835c85c6a52e1b1f681caef960ed59819852b48ea3b6353d61e1b5"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e85850a4ae1a1e3ec2c590a4936d640882b6550124da22031c85b526afbf52df","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e85850a4ae1a1e3ec2c590a4936d640882b6550124da22031c85b526afbf52df","containerID":"cri-o://b15cd21f3f4e9fee4d49615520e3cb875b8d92374b9511d0ad4dc25bdd542ba5","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","mountPath":"/var/run/configmaps/trusted-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca-bundle","mountPath":"/var/run/configmaps/service-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-g8d54","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}oauth-openshift_current.log0000640000000000000000000003310315114405064032375 0ustar0000000000000000config/pod/openshift-authentication/logs/oauth-openshift-6cfff4b945-wlg4k2025-12-04T22:24:10.278807437Z Copying system trust bundle 2025-12-04T22:24:10.354358579Z I1204 22:24:10.354139 1 dynamic_serving_content.go:113] "Loaded a new cert/key pair" name="serving-cert::/var/config/system/secrets/v4-0-config-system-serving-cert/tls.crt::/var/config/system/secrets/v4-0-config-system-serving-cert/tls.key" 2025-12-04T22:24:10.354850543Z I1204 22:24:10.354816 1 dynamic_serving_content.go:113] "Loaded a new cert/key pair" name="sni-serving-cert::/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab::/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab" 2025-12-04T22:24:10.847476567Z I1204 22:24:10.847370 1 audit.go:340] Using audit backend: ignoreErrors 2025-12-04T22:24:12.543114089Z I1204 22:24:12.542993 1 requestheader_controller.go:244] Loaded a new request header values for RequestHeaderAuthRequestController 2025-12-04T22:24:12.582576642Z I1204 22:24:12.578749 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2025-12-04T22:24:12.582576642Z I1204 22:24:12.578811 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2025-12-04T22:24:12.582576642Z I1204 22:24:12.578864 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2025-12-04T22:24:12.582576642Z I1204 22:24:12.578881 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2025-12-04T22:24:12.618889978Z I1204 22:24:12.618312 1 secure_serving.go:57] Forcing use of http/1.1 only 2025-12-04T22:24:12.618889978Z I1204 22:24:12.618349 1 genericapiserver.go:528] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2025-12-04T22:24:12.647147990Z I1204 22:24:12.643859 1 tlsconfig.go:200] "Loaded serving cert" certName="serving-cert::/var/config/system/secrets/v4-0-config-system-serving-cert/tls.crt::/var/config/system/secrets/v4-0-config-system-serving-cert/tls.key" certDetail="\"oauth-openshift.openshift-authentication.svc\" [serving] validServingFor=[oauth-openshift.openshift-authentication.svc,oauth-openshift.openshift-authentication.svc.cluster.local] issuer=\"openshift-service-serving-signer@1764885639\" (2025-12-04 22:01:05 +0000 UTC to 2027-12-04 22:01:06 +0000 UTC (now=2025-12-04 22:24:12.643820698 +0000 UTC))" 2025-12-04T22:24:12.647147990Z I1204 22:24:12.644064 1 named_certificates.go:53] "Loaded SNI cert" index=1 certName="sni-serving-cert::/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab::/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab" certDetail="\"*.apps.sno.openstack.lab\" [serving] validServingFor=[*.apps.sno.openstack.lab] issuer=\"ingress-operator@1764885669\" (2025-12-04 22:01:09 +0000 UTC to 2027-12-04 22:01:10 +0000 UTC (now=2025-12-04 22:24:12.644041644 +0000 UTC))" 2025-12-04T22:24:12.647147990Z I1204 22:24:12.644194 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1764887050\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1764887050\" (2025-12-04 21:24:10 +0000 UTC to 2026-12-04 21:24:10 +0000 UTC (now=2025-12-04 22:24:12.644171118 +0000 UTC))" 2025-12-04T22:24:12.647147990Z I1204 22:24:12.644214 1 secure_serving.go:213] Serving securely on [::]:6443 2025-12-04T22:24:12.647147990Z I1204 22:24:12.644237 1 genericapiserver.go:681] [graceful-termination] waiting for shutdown to be initiated 2025-12-04T22:24:12.647147990Z I1204 22:24:12.644263 1 requestheader_controller.go:169] Starting RequestHeaderAuthRequestController 2025-12-04T22:24:12.647147990Z I1204 22:24:12.644270 1 shared_informer.go:311] Waiting for caches to sync for RequestHeaderAuthRequestController 2025-12-04T22:24:12.647147990Z I1204 22:24:12.644321 1 dynamic_serving_content.go:132] "Starting controller" name="serving-cert::/var/config/system/secrets/v4-0-config-system-serving-cert/tls.crt::/var/config/system/secrets/v4-0-config-system-serving-cert/tls.key" 2025-12-04T22:24:12.647147990Z I1204 22:24:12.644420 1 dynamic_serving_content.go:132] "Starting controller" name="sni-serving-cert::/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab::/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab" 2025-12-04T22:24:12.647147990Z I1204 22:24:12.644480 1 tlsconfig.go:240] "Starting DynamicServingCertificateController" 2025-12-04T22:24:12.647147990Z I1204 22:24:12.645366 1 configmap_cafile_content.go:202] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2025-12-04T22:24:12.647147990Z I1204 22:24:12.645382 1 shared_informer.go:311] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2025-12-04T22:24:12.647147990Z I1204 22:24:12.645401 1 configmap_cafile_content.go:202] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2025-12-04T22:24:12.647147990Z I1204 22:24:12.645407 1 shared_informer.go:311] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2025-12-04T22:24:12.650134003Z I1204 22:24:12.649613 1 reflector.go:351] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.29.2/tools/cache/reflector.go:229 2025-12-04T22:24:12.650134003Z I1204 22:24:12.649667 1 reflector.go:351] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.29.2/tools/cache/reflector.go:229 2025-12-04T22:24:12.650134003Z I1204 22:24:12.650040 1 reflector.go:351] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.29.2/tools/cache/reflector.go:229 2025-12-04T22:24:12.654734051Z I1204 22:24:12.654668 1 reflector.go:351] Caches populated for *v1.Group from k8s.io/client-go@v0.29.2/tools/cache/reflector.go:229 2025-12-04T22:24:12.745015931Z I1204 22:24:12.744938 1 shared_informer.go:318] Caches are synced for RequestHeaderAuthRequestController 2025-12-04T22:24:12.746251685Z I1204 22:24:12.746165 1 shared_informer.go:318] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2025-12-04T22:24:12.746271395Z I1204 22:24:12.746255 1 shared_informer.go:318] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2025-12-04T22:24:12.747221892Z I1204 22:24:12.746676 1 tlsconfig.go:178] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2025-12-04 21:50:06 +0000 UTC to 2025-12-05 21:50:06 +0000 UTC (now=2025-12-04 22:24:12.746641656 +0000 UTC))" 2025-12-04T22:24:12.747221892Z I1204 22:24:12.746856 1 tlsconfig.go:200] "Loaded serving cert" certName="serving-cert::/var/config/system/secrets/v4-0-config-system-serving-cert/tls.crt::/var/config/system/secrets/v4-0-config-system-serving-cert/tls.key" certDetail="\"oauth-openshift.openshift-authentication.svc\" [serving] validServingFor=[oauth-openshift.openshift-authentication.svc,oauth-openshift.openshift-authentication.svc.cluster.local] issuer=\"openshift-service-serving-signer@1764885639\" (2025-12-04 22:01:05 +0000 UTC to 2027-12-04 22:01:06 +0000 UTC (now=2025-12-04 22:24:12.746835732 +0000 UTC))" 2025-12-04T22:24:12.747221892Z I1204 22:24:12.747010 1 named_certificates.go:53] "Loaded SNI cert" index=1 certName="sni-serving-cert::/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab::/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab" certDetail="\"*.apps.sno.openstack.lab\" [serving] validServingFor=[*.apps.sno.openstack.lab] issuer=\"ingress-operator@1764885669\" (2025-12-04 22:01:09 +0000 UTC to 2027-12-04 22:01:10 +0000 UTC (now=2025-12-04 22:24:12.746991316 +0000 UTC))" 2025-12-04T22:24:12.747221892Z I1204 22:24:12.747144 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1764887050\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1764887050\" (2025-12-04 21:24:10 +0000 UTC to 2026-12-04 21:24:10 +0000 UTC (now=2025-12-04 22:24:12.74713006 +0000 UTC))" 2025-12-04T22:24:12.747535771Z I1204 22:24:12.747463 1 tlsconfig.go:178] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2025-12-04 21:43:42 +0000 UTC to 2035-12-02 21:43:42 +0000 UTC (now=2025-12-04 22:24:12.747446838 +0000 UTC))" 2025-12-04T22:24:12.747535771Z I1204 22:24:12.747528 1 tlsconfig.go:178] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2025-12-04 21:50:08 +0000 UTC to 2025-12-05 21:50:08 +0000 UTC (now=2025-12-04 22:24:12.747479619 +0000 UTC))" 2025-12-04T22:24:12.747555151Z I1204 22:24:12.747547 1 tlsconfig.go:178] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2025-12-04 21:50:08 +0000 UTC to 2026-12-04 21:50:08 +0000 UTC (now=2025-12-04 22:24:12.747536351 +0000 UTC))" 2025-12-04T22:24:12.749412563Z I1204 22:24:12.747564 1 tlsconfig.go:178] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2025-12-04 21:50:08 +0000 UTC to 2026-12-04 21:50:08 +0000 UTC (now=2025-12-04 22:24:12.747553741 +0000 UTC))" 2025-12-04T22:24:12.749412563Z I1204 22:24:12.747586 1 tlsconfig.go:178] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2025-12-04 21:50:06 +0000 UTC to 2035-12-02 21:50:06 +0000 UTC (now=2025-12-04 22:24:12.747575232 +0000 UTC))" 2025-12-04T22:24:12.749412563Z I1204 22:24:12.747603 1 tlsconfig.go:178] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-csr-signer_@1764885640\" [] issuer=\"kubelet-signer\" (2025-12-04 22:00:40 +0000 UTC to 2025-12-05 21:50:08 +0000 UTC (now=2025-12-04 22:24:12.747592472 +0000 UTC))" 2025-12-04T22:24:12.749412563Z I1204 22:24:12.747622 1 tlsconfig.go:178] "Loaded client CA" index=6 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"openshift-kube-apiserver-operator_node-system-admin-signer@1764885629\" [] issuer=\"\" (2025-12-04 22:00:28 +0000 UTC to 2026-12-04 22:00:29 +0000 UTC (now=2025-12-04 22:24:12.747608453 +0000 UTC))" 2025-12-04T22:24:12.749412563Z I1204 22:24:12.747638 1 tlsconfig.go:178] "Loaded client CA" index=7 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2025-12-04 21:50:06 +0000 UTC to 2025-12-05 21:50:06 +0000 UTC (now=2025-12-04 22:24:12.747628023 +0000 UTC))" 2025-12-04T22:24:12.749412563Z I1204 22:24:12.747804 1 tlsconfig.go:200] "Loaded serving cert" certName="serving-cert::/var/config/system/secrets/v4-0-config-system-serving-cert/tls.crt::/var/config/system/secrets/v4-0-config-system-serving-cert/tls.key" certDetail="\"oauth-openshift.openshift-authentication.svc\" [serving] validServingFor=[oauth-openshift.openshift-authentication.svc,oauth-openshift.openshift-authentication.svc.cluster.local] issuer=\"openshift-service-serving-signer@1764885639\" (2025-12-04 22:01:05 +0000 UTC to 2027-12-04 22:01:06 +0000 UTC (now=2025-12-04 22:24:12.747785978 +0000 UTC))" 2025-12-04T22:24:12.749412563Z I1204 22:24:12.747955 1 named_certificates.go:53] "Loaded SNI cert" index=1 certName="sni-serving-cert::/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab::/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab" certDetail="\"*.apps.sno.openstack.lab\" [serving] validServingFor=[*.apps.sno.openstack.lab] issuer=\"ingress-operator@1764885669\" (2025-12-04 22:01:09 +0000 UTC to 2027-12-04 22:01:10 +0000 UTC (now=2025-12-04 22:24:12.747938862 +0000 UTC))" 2025-12-04T22:24:12.749412563Z I1204 22:24:12.748093 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1764887050\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1764887050\" (2025-12-04 21:24:10 +0000 UTC to 2026-12-04 21:24:10 +0000 UTC (now=2025-12-04 22:24:12.748078236 +0000 UTC))" events/openshift-oauth-apiserver.json0000640000000000000000000000410615114405064016553 0ustar0000000000000000{"items":[{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-04T22:01:06Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-58574fc8d8-gg42x","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-04T22:01:06Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-58574fc8d8 to 1","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-04T22:01:08Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.35/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-04T22:01:09Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:91af633e585621630c40d14f188e37d36b44678d0a59e582d850bf8d593d3a0c\"","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-04T22:01:14Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:91af633e585621630c40d14f188e37d36b44678d0a59e582d850bf8d593d3a0c\" in 5.517s (5.517s including waiting). Image size: 499798563 bytes.","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-04T22:01:14Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-04T22:01:14Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-04T22:01:16Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:91af633e585621630c40d14f188e37d36b44678d0a59e582d850bf8d593d3a0c\" already present on machine","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-04T22:01:16Z","reason":"Created","message":"Created container: oauth-apiserver","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-04T22:01:16Z","reason":"Started","message":"Started container oauth-apiserver","type":"Normal"}]}events/openshift-ingress.json0000640000000000000000000000443015114405064015107 0ustar0000000000000000{"items":[{"namespace":"openshift-ingress","lastTimestamp":"2025-12-04T22:01:09Z","reason":"SuccessfulCreate","message":"Created pod: router-default-5465c8b4db-8vm66","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2025-12-04T22:01:09Z","reason":"ScalingReplicaSet","message":"Scaled up replica set router-default-5465c8b4db to 1","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2025-12-04T22:05:39Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2b3d313c599852b3543ee5c3a62691bd2d1bbad12c2e1c610cd71a1dec6eea32\"","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2025-12-04T22:05:41Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2b3d313c599852b3543ee5c3a62691bd2d1bbad12c2e1c610cd71a1dec6eea32\" in 2.62s (2.62s including waiting). Image size: 481499222 bytes.","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2025-12-04T22:05:41Z","reason":"Created","message":"Created container: router","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2025-12-04T22:05:41Z","reason":"Started","message":"Started container router","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2025-12-04T22:05:51Z","reason":"Unhealthy","message":"Startup probe failed: HTTP probe failed with statuscode: 500","type":"Warning"},{"namespace":"openshift-ingress","lastTimestamp":"2025-12-04T22:15:39Z","reason":"ProbeError","message":"Startup probe error: HTTP probe failed with statuscode: 500\nbody: [-]backend-http failed: reason withheld\n[-]has-synced failed: reason withheld\n[+]process-running ok\nhealthz check failed\n\n","type":"Warning"},{"namespace":"openshift-ingress","lastTimestamp":"2025-12-04T22:19:41Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2b3d313c599852b3543ee5c3a62691bd2d1bbad12c2e1c610cd71a1dec6eea32\" already present on machine","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2025-12-04T22:19:41Z","reason":"Created","message":"Created container: router","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2025-12-04T22:19:41Z","reason":"Started","message":"Started container router","type":"Normal"}]}events/openshift-authentication-operator.json0000640000000000000000000047513215114405064020320 0ustar0000000000000000{"items":[{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T21:54:49Z","reason":"ScalingReplicaSet","message":"Scaled up replica set authentication-operator-6c968fdfdf to 1","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T21:54:59Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-6c968fdfdf-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T21:58:22Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-6c968fdfdf-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T21:58:24Z","reason":"SuccessfulCreate","message":"Created pod: authentication-operator-6c968fdfdf-bm2pk","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:27Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.23/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:27Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e85850a4ae1a1e3ec2c590a4936d640882b6550124da22031c85b526afbf52df\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:38Z","reason":"LeaderElection","message":"authentication-operator-6c968fdfdf-bm2pk_049b217e-ace9-41fc-8146-0a96603debe2 became leader","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:38Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"operator\" changed from \"\" to \"4.18.29\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"operator\" \"4.18.29\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded changed from Unknown to False (\"All is well\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"All is well\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available changed from Unknown to False (\"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:41Z","reason":"ObserveAPIServerURL","message":"loginURL changed from to https://api.sno.openstack.lab:6443","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:41Z","reason":"ObserveTokenConfig","message":"accessTokenMaxAgeSeconds changed from %!d(float64=0) to %!d(float64=86400)","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:41Z","reason":"ObserveTemplates","message":"templates changed to map[\"error\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/errors.html\" \"login\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/login.html\" \"providerSelection\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/providers.html\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:41Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:41Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:41Z","reason":"ObserveAuditProfile","message":"AuditProfile changed from '%!s(\u003cnil\u003e)' to 'map[audit-log-format:[json] audit-log-maxbackup:[10] audit-log-maxsize:[100] audit-log-path:[/var/log/oauth-server/audit.log] audit-policy-file:[/var/run/configmaps/audit/audit.yaml]]'","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:41Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \"\\u00a0\\u00a0map[string]any(\\n-\\u00a0\\tnil,\\n+\\u00a0\\t{\\n+\\u00a0\\t\\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+\\u00a0\\t\\t\\\"oauthConfig\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"assetPublicURL\\\": string(\\\"\\\"),\\n+\\u00a0\\t\\t\\t\\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"),\\n+\\u00a0\\t\\t\\t\\\"templates\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\t\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t\\t\\\"tokenConfig\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\t\\\"accessTokenMaxAgeSeconds\\\": float64(86400),\\n+\\u00a0\\t\\t\\t\\t\\\"authorizeTokenMaxAgeSeconds\\\": float64(300),\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t\\t\\\"serverArguments\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"audit-log-format\\\": []any{string(\\\"json\\\")},\\n+\\u00a0\\t\\t\\t\\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")},\\n+\\u00a0\\t\\t\\t\\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")},\\n+\\u00a0\\t\\t\\t\\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")},\\n+\\u00a0\\t\\t\\t\\\"audit-policy-file\\\": []any{string(\\\"/var/run/configmaps/audit/audit.\\\"...)},\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t\\t\\\"servingInfo\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"cipherSuites\\\": []any{\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t\\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n+\\u00a0\\t},\\n\\u00a0\\u00a0)\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:42Z","reason":"ObserveAPIAudiences","message":"service account issuer changed from to https://kubernetes.default.svc","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:42Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:42Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:42Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:42Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthAPIServer\") of observed config: \"\\u00a0\\u00a0map[string]any(\\n-\\u00a0\\tnil,\\n+\\u00a0\\t{\\n+\\u00a0\\t\\t\\\"apiServerArguments\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"api-audiences\\\": []any{string(\\\"https://kubernetes.default.svc\\\")},\\n+\\u00a0\\t\\t\\t\\\"cors-allowed-origins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+\\u00a0\\t\\t\\t\\\"etcd-servers\\\": []any{string(\\\"https://192.168.32.10:2379\\\")},\\n+\\u00a0\\t\\t\\t\\\"tls-cipher-suites\\\": []any{\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t\\t\\\"tls-min-version\\\": string(\\\"VersionTLS12\\\"),\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t},\\n\\u00a0\\u00a0)\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:42Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:43Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:43Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/audit -n openshift-authentication: namespaces \"openshift-authentication\" not found","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:44Z","reason":"NoValidCertificateFound","message":"No valid client certificate for OpenShiftAuthenticatorCertRequester is found: unable to parse certificate: data does not contain any valid RSA or ECDSA certificates","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:44Z","reason":"CSRApproval","message":"The CSR \"system:openshift:openshift-authenticator-spbc5\" has been approved","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:44Z","reason":"CSRCreated","message":"A csr \"system:openshift:openshift-authenticator-spbc5\" is created for OpenShiftAuthenticatorCertRequester","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:45Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:45Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:47Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:48Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:48Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:49Z","reason":"ClientCertificateCreated","message":"A new client certificate for OpenShiftAuthenticatorCertRequester is available","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:49Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:51Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"All is well\" to \"AuthenticatorCertKeyProgressing: All is well\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:51Z","reason":"ConfigMapCreated","message":"Created ConfigMap/v4-0-config-system-trusted-ca-bundle -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:53Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:54Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-ocp-branding-template -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:56Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-apiserver-sa -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:56Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:56Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:57Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:00:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:01:00Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:01:06Z","reason":"ServiceCreated","message":"Created Service/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:01:06Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:01:06Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:01:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:01:06Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:01:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:01:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"SystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:01:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"SystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"SystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:01:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:01:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"SystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"SystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:01:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"SystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"SystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \",Progressing changed from False to True (\"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\"),Available message changed from \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:01:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"SystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:01:08Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:01:12Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-oauth-apiserver because it changed","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:01:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:01:13Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:01:14Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \"\\u00a0\\u00a0map[string]any{\\n\\u00a0\\u00a0\\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n\\u00a0\\u00a0\\t\\\"oauthConfig\\\": map[string]any{\\\"assetPublicURL\\\": string(\\\"\\\"), \\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"), \\\"templates\\\": map[string]any{\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...)}, \\\"tokenConfig\\\": map[string]any{\\\"accessTokenMaxAgeSeconds\\\": float64(86400), \\\"authorizeTokenMaxAgeSeconds\\\": float64(300)}},\\n\\u00a0\\u00a0\\t\\\"serverArguments\\\": map[string]any{\\\"audit-log-format\\\": []any{string(\\\"json\\\")}, \\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")}, \\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")}, \\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")}, ...},\\n\\u00a0\\u00a0\\t\\\"servingInfo\\\": map[string]any{\\n\\u00a0\\u00a0\\t\\t\\\"cipherSuites\\\": []any{string(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"), string(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"), string(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\\\"), ...},\\n\\u00a0\\u00a0\\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+\\u00a0\\t\\t\\\"namedCertificates\\\": []any{\\n+\\u00a0\\t\\t\\tmap[string]any{\\n+\\u00a0\\t\\t\\t\\t\\\"certFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"keyFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"names\\\": []any{string(\\\"*.apps.sno.openstack.lab\\\")},\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t},\\n\\u00a0\\u00a0\\t},\\n\\u00a0\\u00a0\\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n\\u00a0\\u00a0}\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:01:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:01:14Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-router-certs -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:01:14Z","reason":"ObserveRouterSecret","message":"namedCertificates changed to []interface {}{map[string]interface {}{\"certFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"keyFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"names\":[]interface {}{\"*.apps.sno.openstack.lab\"}}}","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:01:17Z","reason":"OpenShiftAPICheckFailed","message":"\"oauth.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:01:17Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:01:17Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.oauth.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:01:17Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.user.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:01:17Z","reason":"OpenShiftAPICheckFailed","message":"\"user.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:01:17Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:01:17Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:01:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/oauth-serving-cert -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:01:22Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: status.versions changed from [{\"operator\" \"4.18.29\"}] to [{\"operator\" \"4.18.29\"} {\"oauth-apiserver\" \"4.18.29\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:01:22Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"oauth-apiserver\" changed from \"\" to \"4.18.29\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:01:22Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing changed from True to False (\"AuthenticatorCertKeyProgressing: All is well\"),Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:02:29Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.23:8443/healthz\": dial tcp 10.128.0.23:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:02:29Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.23:8443/healthz\": dial tcp 10.128.0.23:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:05:00Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.23:8443/healthz\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)\nbody: \n","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:05:00Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.23:8443/healthz\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:05:00Z","reason":"Killing","message":"Container authentication-operator failed liveness probe, will be restarted","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:10:35Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:10:35Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:10:35Z","reason":"LeaderElection","message":"authentication-operator-6c968fdfdf-bm2pk_756e45e7-d6e5-4647-b167-96fa72ffc9da became leader","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:10:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded changed from False to True (\"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:10:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:10:44Z","reason":"SecretCreated","message":"Created Secret/webhook-authentication-integrated-oauth -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:10:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:15:46Z","reason":"Started","message":"Started container authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:15:46Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e85850a4ae1a1e3ec2c590a4936d640882b6550124da22031c85b526afbf52df\" already present on machine","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:15:46Z","reason":"Created","message":"Created container: authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:15:59Z","reason":"LeaderElection","message":"authentication-operator-6c968fdfdf-bm2pk_0a3d3603-fa0b-48a1-bfe9-afc1b14bc3e2 became leader","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:16:02Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:16:03Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:19:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\" to \"APIServerStaticResourcesDegraded: \\\"oauth-apiserver/ns.yaml\\\" (string): Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-oauth-apiserver\\\": dial tcp 172.30.0.1:443: connect: connection refused\\nAPIServerStaticResourcesDegraded: \\\"oauth-apiserver/apiserver-clusterrolebinding.yaml\\\" (string): Get \\\"https://172.30.0.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:oauth-apiserver\\\": dial tcp 172.30.0.1:443: connect: connection refused\\nAPIServerStaticResourcesDegraded: \\\"oauth-apiserver/svc.yaml\\\" (string): Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-oauth-apiserver/services/api\\\": dial tcp 172.30.0.1:443: connect: connection refused\\nAPIServerStaticResourcesDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\",Available message changed from \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:19:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerStaticResourcesDegraded: \\\"oauth-apiserver/ns.yaml\\\" (string): Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-oauth-apiserver\\\": dial tcp 172.30.0.1:443: connect: connection refused\\nAPIServerStaticResourcesDegraded: \\\"oauth-apiserver/apiserver-clusterrolebinding.yaml\\\" (string): Get \\\"https://172.30.0.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:oauth-apiserver\\\": dial tcp 172.30.0.1:443: connect: connection refused\\nAPIServerStaticResourcesDegraded: \\\"oauth-apiserver/svc.yaml\\\" (string): Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-oauth-apiserver/services/api\\\": dial tcp 172.30.0.1:443: connect: connection refused\\nAPIServerStaticResourcesDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:19:25Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"CustomRouteControllerDegraded: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerDeploymentDegraded: waiting for the oauth-openshift route to appear: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerDeploymentDegraded: \\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerWorkloadDegraded: waiting for the oauth-openshift route to appear: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerWorkloadDegraded: \\nWellKnownReadyControllerDegraded: route.route.openshift.io \\\"oauth-openshift\\\" not found\" to \"CustomRouteControllerDegraded: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthClientsControllerDegraded: no ingress for host oauth-openshift.apps.sno.openstack.lab in route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: waiting for the oauth-openshift route to appear: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerDeploymentDegraded: \\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerWorkloadDegraded: waiting for the oauth-openshift route to appear: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerWorkloadDegraded: \\nWellKnownReadyControllerDegraded: route.route.openshift.io \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:19:25Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWellKnownReadyControllerDegraded: route.route.openshift.io \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:19:25Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"CustomRouteControllerDegraded: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWellKnownReadyControllerDegraded: route.route.openshift.io \\\"oauth-openshift\\\" not found\" to \"CustomRouteControllerDegraded: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerDeploymentDegraded: waiting for the oauth-openshift route to appear: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerDeploymentDegraded: \\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerWorkloadDegraded: waiting for the oauth-openshift route to appear: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerWorkloadDegraded: \\nWellKnownReadyControllerDegraded: route.route.openshift.io \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:19:25Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWellKnownReadyControllerDegraded: route.route.openshift.io \\\"oauth-openshift\\\" not found\" to \"CustomRouteControllerDegraded: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWellKnownReadyControllerDegraded: route.route.openshift.io \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:19:25Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerRouteEndpointAccessibleControllerAvailable: failed to retrieve route from cache: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nWellKnownAvailable: route.route.openshift.io \\\"oauth-openshift\\\" not found\" to \"OAuthServerRouteEndpointAccessibleControllerAvailable: failed to retrieve route from cache: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get oauth metadata from openshift-config-managed/oauth-openshift ConfigMap: configmap \\\"oauth-openshift\\\" not found (check authentication operator, it is supposed to create this)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:19:25Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing changed from False to True (\"\"),Available message changed from \"OAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nWellKnownAvailable: route.route.openshift.io \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:19:25Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:19:25Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nWellKnownAvailable: route.route.openshift.io \\\"oauth-openshift\\\" not found\" to \"OAuthServerRouteEndpointAccessibleControllerAvailable: failed to retrieve route from cache: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nWellKnownAvailable: route.route.openshift.io \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:19:26Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthClientsControllerDegraded: no ingress for host oauth-openshift.apps.sno.openstack.lab in route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: \\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerWorkloadDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerWorkloadDegraded: \\nWellKnownReadyControllerDegraded: route.route.openshift.io \\\"oauth-openshift\\\" not found\" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthClientsControllerDegraded: no ingress for host oauth-openshift.apps.sno.openstack.lab in route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: \\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerWorkloadDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerWorkloadDegraded: \\nWellKnownReadyControllerDegraded: failed to get oauth metadata from openshift-config-managed/oauth-openshift ConfigMap: configmap \\\"oauth-openshift\\\" not found (check authentication operator, it is supposed to create this)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:19:26Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthClientsControllerDegraded: no ingress for host oauth-openshift.apps.sno.openstack.lab in route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: waiting for the oauth-openshift route to appear: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerDeploymentDegraded: \\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerWorkloadDegraded: waiting for the oauth-openshift route to appear: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerWorkloadDegraded: \\nWellKnownReadyControllerDegraded: route.route.openshift.io \\\"oauth-openshift\\\" not found\" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthClientsControllerDegraded: no ingress for host oauth-openshift.apps.sno.openstack.lab in route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: \\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerWorkloadDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerWorkloadDegraded: \\nWellKnownReadyControllerDegraded: route.route.openshift.io \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:19:26Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"CustomRouteControllerDegraded: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthClientsControllerDegraded: no ingress for host oauth-openshift.apps.sno.openstack.lab in route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: waiting for the oauth-openshift route to appear: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerDeploymentDegraded: \\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerWorkloadDegraded: waiting for the oauth-openshift route to appear: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerWorkloadDegraded: \\nWellKnownReadyControllerDegraded: route.route.openshift.io \\\"oauth-openshift\\\" not found\" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthClientsControllerDegraded: no ingress for host oauth-openshift.apps.sno.openstack.lab in route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: waiting for the oauth-openshift route to appear: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerDeploymentDegraded: \\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerWorkloadDegraded: waiting for the oauth-openshift route to appear: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerWorkloadDegraded: \\nWellKnownReadyControllerDegraded: route.route.openshift.io \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:19:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthClientsControllerDegraded: no ingress for host oauth-openshift.apps.sno.openstack.lab in route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: \\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerWorkloadDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerWorkloadDegraded: \\nWellKnownReadyControllerDegraded: failed to get oauth metadata from openshift-config-managed/oauth-openshift ConfigMap: configmap \\\"oauth-openshift\\\" not found (check authentication operator, it is supposed to create this)\" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthClientsControllerDegraded: no ingress for host oauth-openshift.apps.sno.openstack.lab in route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: \\nOAuthServerRouteEndpointAccessibleControllerDegraded: route \\\"openshift-authentication/oauth-openshift\\\": status does not have a valid host address\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerWorkloadDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerWorkloadDegraded: \\nWellKnownReadyControllerDegraded: failed to get oauth metadata from openshift-config-managed/oauth-openshift ConfigMap: configmap \\\"oauth-openshift\\\" not found (check authentication operator, it is supposed to create this)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:19:30Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-session -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:19:33Z","reason":"ConfigMapCreated","message":"Created ConfigMap/v4-0-config-system-cliconfig -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:19:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerDeploymentDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: \\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": dial tcp 192.168.32.10:443: connect: connection refused\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerWorkloadDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerWorkloadDegraded: \\nWellKnownReadyControllerDegraded: failed to get oauth metadata from openshift-config-managed/oauth-openshift ConfigMap: configmap \\\"oauth-openshift\\\" not found (check authentication operator, it is supposed to create this)\" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerDeploymentDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: \\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerWorkloadDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerWorkloadDegraded: \\nWellKnownReadyControllerDegraded: failed to get oauth metadata from openshift-config-managed/oauth-openshift ConfigMap: configmap \\\"oauth-openshift\\\" not found (check authentication operator, it is supposed to create this)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:19:41Z","reason":"ConfigMapCreated","message":"Created ConfigMap/v4-0-config-system-metadata -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:19:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthClientsControllerDegraded: no ingress for host oauth-openshift.apps.sno.openstack.lab in route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: \\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": dial tcp 192.168.32.10:443: connect: connection refused\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerWorkloadDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerWorkloadDegraded: \\nWellKnownReadyControllerDegraded: failed to get oauth metadata from openshift-config-managed/oauth-openshift ConfigMap: configmap \\\"oauth-openshift\\\" not found (check authentication operator, it is supposed to create this)\" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerDeploymentDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: \\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": dial tcp 192.168.32.10:443: connect: connection refused\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerWorkloadDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerWorkloadDegraded: \\nWellKnownReadyControllerDegraded: failed to get oauth metadata from openshift-config-managed/oauth-openshift ConfigMap: configmap \\\"oauth-openshift\\\" not found (check authentication operator, it is supposed to create this)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:19:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthClientsControllerDegraded: no ingress for host oauth-openshift.apps.sno.openstack.lab in route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: \\nOAuthServerRouteEndpointAccessibleControllerDegraded: route \\\"openshift-authentication/oauth-openshift\\\": status does not have a valid host address\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerWorkloadDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerWorkloadDegraded: \\nWellKnownReadyControllerDegraded: failed to get oauth metadata from openshift-config-managed/oauth-openshift ConfigMap: configmap \\\"oauth-openshift\\\" not found (check authentication operator, it is supposed to create this)\" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthClientsControllerDegraded: no ingress for host oauth-openshift.apps.sno.openstack.lab in route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: \\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": dial tcp 192.168.32.10:443: connect: connection refused\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerWorkloadDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerWorkloadDegraded: \\nWellKnownReadyControllerDegraded: failed to get oauth metadata from openshift-config-managed/oauth-openshift ConfigMap: configmap \\\"oauth-openshift\\\" not found (check authentication operator, it is supposed to create this)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:19:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": dial tcp 192.168.32.10:443: connect: connection refused\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get oauth metadata from openshift-config-managed/oauth-openshift ConfigMap: configmap \\\"oauth-openshift\\\" not found (check authentication operator, it is supposed to create this)\" to \"OAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get oauth metadata from openshift-config-managed/oauth-openshift ConfigMap: configmap \\\"oauth-openshift\\\" not found (check authentication operator, it is supposed to create this)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:19:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerRouteEndpointAccessibleControllerAvailable: failed to retrieve route from cache: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get oauth metadata from openshift-config-managed/oauth-openshift ConfigMap: configmap \\\"oauth-openshift\\\" not found (check authentication operator, it is supposed to create this)\" to \"OAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": dial tcp 192.168.32.10:443: connect: connection refused\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get oauth metadata from openshift-config-managed/oauth-openshift ConfigMap: configmap \\\"oauth-openshift\\\" not found (check authentication operator, it is supposed to create this)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:19:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/oauth-openshift -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:19:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"\" to \"WellKnownReadyControllerProgressing: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\",Available message changed from \"OAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get oauth metadata from openshift-config-managed/oauth-openshift ConfigMap: configmap \\\"oauth-openshift\\\" not found (check authentication operator, it is supposed to create this)\" to \"OAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:19:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerDeploymentDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: \\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerWorkloadDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerWorkloadDegraded: \\nWellKnownReadyControllerDegraded: failed to get oauth metadata from openshift-config-managed/oauth-openshift ConfigMap: configmap \\\"oauth-openshift\\\" not found (check authentication operator, it is supposed to create this)\" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerDeploymentDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: \\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerWorkloadDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerWorkloadDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:19:45Z","reason":"DeploymentCreated","message":"Created Deployment.apps/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:19:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\" to \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:19:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: endpoints for service/api in \\\"openshift-oauth-apiserver\\\" have no addresses with port name \\\"https\\\"\\nOAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\" to \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:19:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: endpoints for service/api in \\\"openshift-oauth-apiserver\\\" have no addresses with port name \\\"https\\\"\\nOAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:19:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerDeploymentDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: \\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerWorkloadDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerWorkloadDegraded: \" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\",Progressing message changed from \"WellKnownReadyControllerProgressing: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\" to \"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: observed generation is 0, desired generation is 1.\\nWellKnownReadyControllerProgressing: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\",Available message changed from \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\" to \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:19:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\" to \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:19:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\" to \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:19:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:19:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:19:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: observed generation is 0, desired generation is 1.\\nWellKnownReadyControllerProgressing: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\" to \"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available\\nWellKnownReadyControllerProgressing: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:19:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\" to \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:19:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:19:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded changed from True to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:20:00Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"oauth-openshift\" changed from \"\" to \"4.18.29_openshift\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:20:00Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: status.versions changed from [{\"operator\" \"4.18.29\"} {\"oauth-apiserver\" \"4.18.29\"}] to [{\"operator\" \"4.18.29\"} {\"oauth-apiserver\" \"4.18.29\"} {\"oauth-openshift\" \"4.18.29_openshift\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:20:00Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available\\nWellKnownReadyControllerProgressing: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\" to \"WellKnownReadyControllerProgressing: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\",Available message changed from \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\" to \"WellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:21:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"WellKnownReadyControllerProgressing: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\" to \"\",Available message changed from \"WellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\" to \"WellKnownAvailable: The well-known endpoint is not yet available: failed to get API server IPs: unable to find kube api server endpointLister port: \u0026v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\\\"\\\", APIVersion:\\\"\\\"}, ObjectMeta:v1.ObjectMeta{Name:\\\"kubernetes\\\", GenerateName:\\\"\\\", Namespace:\\\"default\\\", SelfLink:\\\"\\\", UID:\\\"5310cf1a-c8b7-4233-90c0-bcf5fe4fbad6\\\", ResourceVersion:\\\"14076\\\", Generation:0, CreationTimestamp:time.Date(2025, time.December, 4, 21, 53, 24, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\\\"endpointslice.kubernetes.io/skip-mirror\\\":\\\"true\\\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\\\"kube-apiserver\\\", Operation:\\\"Update\\\", APIVersion:\\\"v1\\\", Time:time.Date(2025, time.December, 4, 22, 18, 55, 0, time.Local), FieldsType:\\\"FieldsV1\\\", FieldsV1:(*v1.FieldsV1)(0xc001022648), Subresource:\\\"\\\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:22:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"All is well\" to \"WellKnownReadyControllerDegraded: failed to get API server IPs: unable to find kube api server endpointLister port: \u0026v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\\\"\\\", APIVersion:\\\"\\\"}, ObjectMeta:v1.ObjectMeta{Name:\\\"kubernetes\\\", GenerateName:\\\"\\\", Namespace:\\\"default\\\", SelfLink:\\\"\\\", UID:\\\"5310cf1a-c8b7-4233-90c0-bcf5fe4fbad6\\\", ResourceVersion:\\\"14076\\\", Generation:0, CreationTimestamp:time.Date(2025, time.December, 4, 21, 53, 24, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\\\"endpointslice.kubernetes.io/skip-mirror\\\":\\\"true\\\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\\\"kube-apiserver\\\", Operation:\\\"Update\\\", APIVersion:\\\"v1\\\", Time:time.Date(2025, time.December, 4, 22, 18, 55, 0, time.Local), FieldsType:\\\"FieldsV1\\\", FieldsV1:(*v1.FieldsV1)(0xc001022648), Subresource:\\\"\\\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:22:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WellKnownReadyControllerDegraded: failed to get API server IPs: unable to find kube api server endpointLister port: \u0026v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\\\"\\\", APIVersion:\\\"\\\"}, ObjectMeta:v1.ObjectMeta{Name:\\\"kubernetes\\\", GenerateName:\\\"\\\", Namespace:\\\"default\\\", SelfLink:\\\"\\\", UID:\\\"5310cf1a-c8b7-4233-90c0-bcf5fe4fbad6\\\", ResourceVersion:\\\"14076\\\", Generation:0, CreationTimestamp:time.Date(2025, time.December, 4, 21, 53, 24, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\\\"endpointslice.kubernetes.io/skip-mirror\\\":\\\"true\\\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\\\"kube-apiserver\\\", Operation:\\\"Update\\\", APIVersion:\\\"v1\\\", Time:time.Date(2025, time.December, 4, 22, 18, 55, 0, time.Local), FieldsType:\\\"FieldsV1\\\", FieldsV1:(*v1.FieldsV1)(0xc001022648), Subresource:\\\"\\\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)\" to \"All is well\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:22:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing changed from True to False (\"AuthenticatorCertKeyProgressing: All is well\"),Available changed from False to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:23:09Z","reason":"ObserveConsoleURL","message":"assetPublicURL changed from to https://console-openshift-console.apps.sno.openstack.lab","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:23:09Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \" map[string]any{\\n \\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n \\t\\\"oauthConfig\\\": map[string]any{\\n- \\t\\t\\\"assetPublicURL\\\": string(\\\"\\\"),\\n+ \\t\\t\\\"assetPublicURL\\\": string(\\\"https://console-openshift-console.apps.sno.openstack.lab\\\"),\\n \\t\\t\\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"),\\n \\t\\t\\\"templates\\\": map[string]any{\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...)},\\n \\t\\t\\\"tokenConfig\\\": map[string]any{\\\"accessTokenMaxAgeSeconds\\\": float64(86400), \\\"authorizeTokenMaxAgeSeconds\\\": float64(300)},\\n \\t},\\n \\t\\\"serverArguments\\\": map[string]any{\\\"audit-log-format\\\": []any{string(\\\"json\\\")}, \\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")}, \\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")}, \\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")}, ...},\\n \\t\\\"servingInfo\\\": map[string]any{\\\"cipherSuites\\\": []any{string(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"), string(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"), string(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\\\"), ...}, \\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"), \\\"namedCertificates\\\": []any{map[string]any{\\\"certFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...), \\\"keyFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...), \\\"names\\\": []any{string(\\\"*.apps.sno.openstack.lab\\\")}}}},\\n \\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n }\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:23:14Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/v4-0-config-system-cliconfig -n openshift-authentication:\ncause by changes in data.v4-0-config-system-cliconfig","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:23:29Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing changed from False to True (\"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: observed generation is 1, desired generation is 2.\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:23:29Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"All is well\" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:23:29Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/oauth-openshift -n openshift-authentication because it changed","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:23:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:23:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:23:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available changed from True to False (\"OAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:23:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: observed generation is 1, desired generation is 2.\" to \"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available\",Available message changed from \"OAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\" to \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:24:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\" to \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:24:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: All 1 endpoints for oauth-server are reporting 'not ready'\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nIngressStateEndpointsDegraded: All 1 endpoints for oauth-server are reporting 'not ready'\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:24:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\" to \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:24:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nIngressStateEndpointsDegraded: All 1 endpoints for oauth-server are reporting 'not ready'\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\" to \"IngressStateEndpointsDegraded: All 1 endpoints for oauth-server are reporting 'not ready'\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:24:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\" to \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:24:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: All 1 endpoints for oauth-server are reporting 'not ready'\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:24:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.56.77:443/healthz\\\": dial tcp 172.30.56.77:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:24:13Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: All 1 endpoints for oauth-server are reporting 'not ready'\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\" to \"IngressStateEndpointsDegraded: All 1 endpoints for oauth-server are reporting 'not ready'\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-04T22:24:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: All 1 endpoints for oauth-server are reporting 'not ready'\" to \"All is well\"","type":"Normal"}]}events/openshift-authentication.json0000640000000000000000000000721415114405064016457 0ustar0000000000000000{"items":[{"namespace":"openshift-authentication","lastTimestamp":"2025-12-04T22:19:45Z","reason":"ScalingReplicaSet","message":"Scaled up replica set oauth-openshift-5dd7b479dd to 1","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-04T22:19:45Z","reason":"SuccessfulCreate","message":"Created pod: oauth-openshift-5dd7b479dd-5z246","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-04T22:19:46Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.87/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-04T22:19:46Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8860e00f858d1bca98344f21b5a5c4acc43c9c6eca8216582514021f0ab3cf7b\"","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-04T22:19:49Z","reason":"Started","message":"Started container oauth-openshift","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-04T22:19:49Z","reason":"Created","message":"Created container: oauth-openshift","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-04T22:19:49Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8860e00f858d1bca98344f21b5a5c4acc43c9c6eca8216582514021f0ab3cf7b\" in 2.454s (2.454s including waiting). Image size: 475921340 bytes.","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-04T22:23:29Z","reason":"SuccessfulCreate","message":"Created pod: oauth-openshift-6cfff4b945-wlg4k","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-04T22:23:29Z","reason":"SuccessfulDelete","message":"Deleted pod: oauth-openshift-5dd7b479dd-5z246","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-04T22:23:29Z","reason":"Killing","message":"Stopping container oauth-openshift","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-04T22:23:29Z","reason":"ScalingReplicaSet","message":"Scaled down replica set oauth-openshift-5dd7b479dd to 0 from 1","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-04T22:23:29Z","reason":"ScalingReplicaSet","message":"Scaled up replica set oauth-openshift-6cfff4b945 to 1 from 0","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-04T22:23:56Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"https://10.128.0.87:6443/healthz\": dial tcp 10.128.0.87:6443: connect: connection refused","type":"Warning"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-04T22:23:56Z","reason":"ProbeError","message":"Readiness probe error: Get \"https://10.128.0.87:6443/healthz\": dial tcp 10.128.0.87:6443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-04T22:24:05Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.99/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-04T22:24:08Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8860e00f858d1bca98344f21b5a5c4acc43c9c6eca8216582514021f0ab3cf7b\" already present on machine","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-04T22:24:10Z","reason":"Created","message":"Created container: oauth-openshift","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-04T22:24:11Z","reason":"Started","message":"Started container oauth-openshift","type":"Normal"}]}events/openshift-config-managed.json0000640000000000000000000000061015114405064016270 0ustar0000000000000000{"items":[{"namespace":"openshift-config-managed","lastTimestamp":"2025-12-04T22:01:10Z","reason":"PublishedRouterCA","message":"Published \"default-ingress-cert\" in \"openshift-config-managed\"","type":"Normal"},{"namespace":"openshift-config-managed","lastTimestamp":"2025-12-04T22:01:10Z","reason":"PublishedRouterCertificates","message":"Published router certificates","type":"Normal"}]}config/alerts.json0000640000000000000000000000000215114405063012661 0ustar0000000000000000[]config/silenced_alerts.json0000640000000000000000000000000315114405063014530 0ustar0000000000000000[] config/node/logs/master-0.log0000640000000000000000000004154715114405062014542 0ustar0000000000000000Dec 04 22:23:43.852150 master-0 kubenswrapper[33572]: I1204 22:23:43.851541 33572 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-console/downloads-69cd4c69bf-b4qng" podUID="4c1b60d6-ca5c-40b5-a567-a48ef956163b" containerName="download-server" probeResult="failure" output="Get \"http://10.128.0.96:8080/\": dial tcp 10.128.0.96:8080: connect: connection refused" Dec 04 22:23:44.869777 master-0 kubenswrapper[33572]: I1204 22:23:44.869691 33572 patch_prober.go:28] interesting pod/downloads-69cd4c69bf-b4qng container/download-server namespace/openshift-console: Readiness probe status=failure output="Get \"http://10.128.0.96:8080/\": dial tcp 10.128.0.96:8080: connect: connection refused" start-of-body= Dec 04 22:23:44.870450 master-0 kubenswrapper[33572]: I1204 22:23:44.869797 33572 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-console/downloads-69cd4c69bf-b4qng" podUID="4c1b60d6-ca5c-40b5-a567-a48ef956163b" containerName="download-server" probeResult="failure" output="Get \"http://10.128.0.96:8080/\": dial tcp 10.128.0.96:8080: connect: connection refused" Dec 04 22:23:45.673263 master-0 kubenswrapper[33572]: I1204 22:23:45.673183 33572 patch_prober.go:28] interesting pod/downloads-69cd4c69bf-b4qng container/download-server namespace/openshift-console: Readiness probe status=failure output="Get \"http://10.128.0.96:8080/\": dial tcp 10.128.0.96:8080: connect: connection refused" start-of-body= Dec 04 22:23:45.673263 master-0 kubenswrapper[33572]: I1204 22:23:45.673234 33572 patch_prober.go:28] interesting pod/downloads-69cd4c69bf-b4qng container/download-server namespace/openshift-console: Liveness probe status=failure output="Get \"http://10.128.0.96:8080/\": dial tcp 10.128.0.96:8080: connect: connection refused" start-of-body= Dec 04 22:23:45.673616 master-0 kubenswrapper[33572]: I1204 22:23:45.673270 33572 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-console/downloads-69cd4c69bf-b4qng" podUID="4c1b60d6-ca5c-40b5-a567-a48ef956163b" containerName="download-server" probeResult="failure" output="Get \"http://10.128.0.96:8080/\": dial tcp 10.128.0.96:8080: connect: connection refused" Dec 04 22:23:45.673616 master-0 kubenswrapper[33572]: I1204 22:23:45.673316 33572 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-console/downloads-69cd4c69bf-b4qng" podUID="4c1b60d6-ca5c-40b5-a567-a48ef956163b" containerName="download-server" probeResult="failure" output="Get \"http://10.128.0.96:8080/\": dial tcp 10.128.0.96:8080: connect: connection refused" Dec 04 22:23:49.284630 master-0 kubenswrapper[33572]: I1204 22:23:49.284490 33572 patch_prober.go:28] interesting pod/console-66cdb6df67-9rjf8 container/console namespace/openshift-console: Readiness probe status=failure output="Get \"https://10.128.0.97:8443/health\": dial tcp 10.128.0.97:8443: connect: connection refused" start-of-body= Dec 04 22:23:49.284973 master-0 kubenswrapper[33572]: I1204 22:23:49.284664 33572 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-console/console-66cdb6df67-9rjf8" podUID="68c8931a-5d8a-4aec-b2e2-2bc109a2a506" containerName="console" probeResult="failure" output="Get \"https://10.128.0.97:8443/health\": dial tcp 10.128.0.97:8443: connect: connection refused" Dec 04 22:23:56.379360 master-0 kubenswrapper[33572]: I1204 22:23:56.379216 33572 patch_prober.go:28] interesting pod/oauth-openshift-5dd7b479dd-5z246 container/oauth-openshift namespace/openshift-authentication: Readiness probe status=failure output="Get \"https://10.128.0.87:6443/healthz\": dial tcp 10.128.0.87:6443: connect: connection refused" start-of-body= Dec 04 22:23:56.379657 master-0 kubenswrapper[33572]: I1204 22:23:56.379371 33572 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-authentication/oauth-openshift-5dd7b479dd-5z246" podUID="d685460a-9a74-411d-983a-79af235b2cc0" containerName="oauth-openshift" probeResult="failure" output="Get \"https://10.128.0.87:6443/healthz\": dial tcp 10.128.0.87:6443: connect: connection refused" Dec 04 22:23:58.818482 master-0 kubenswrapper[33572]: E1204 22:23:58.818418 33572 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="d685460a-9a74-411d-983a-79af235b2cc0" containerName="oauth-openshift" Dec 04 22:23:58.818740 master-0 kubenswrapper[33572]: E1204 22:23:58.818494 33572 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="68c8931a-5d8a-4aec-b2e2-2bc109a2a506" containerName="console" Dec 04 22:24:13.394561 master-0 kubenswrapper[33572]: E1204 22:24:13.394007 33572 pod_workers.go:1301] "Error syncing pod, skipping" err="unmounted volumes=[console-config console-oauth-config console-serving-cert kube-api-access-g8d4f oauth-serving-cert service-ca trusted-ca-bundle], unattached volumes=[], failed to process volumes=[]: context canceled" pod="openshift-console/console-55894b577f-c58wv" podUID="2f72f4a3-a913-4cc5-91bf-2296201cbc2d" Dec 04 22:24:14.082552 master-0 kubenswrapper[33572]: E1204 22:24:14.081786 33572 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="b86ff0e8-2c72-4dc6-ac55-3c21940d044f" containerName="route-controller-manager" Dec 04 22:24:14.082552 master-0 kubenswrapper[33572]: E1204 22:24:14.081850 33572 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="c3863c74-8f22-4c67-bef5-2d0d39df4abd" containerName="controller-manager" Dec 04 22:24:14.082552 master-0 kubenswrapper[33572]: E1204 22:24:14.081892 33572 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="c3863c74-8f22-4c67-bef5-2d0d39df4abd" containerName="controller-manager" Dec 04 22:24:14.094282 master-0 kubenswrapper[33572]: E1204 22:24:14.094244 33572 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="b86ff0e8-2c72-4dc6-ac55-3c21940d044f" containerName="route-controller-manager" Dec 04 22:24:15.260648 master-0 kubenswrapper[33572]: I1204 22:24:15.260597 33572 patch_prober.go:28] interesting pod/route-controller-manager-5795987f7c-w2z9k container/route-controller-manager namespace/openshift-route-controller-manager: Readiness probe status=failure output="Get \"https://10.128.0.103:8443/healthz\": dial tcp 10.128.0.103:8443: connect: connection refused" start-of-body= Dec 04 22:24:15.260736 master-0 kubenswrapper[33572]: I1204 22:24:15.260660 33572 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-route-controller-manager/route-controller-manager-5795987f7c-w2z9k" podUID="784ceb13-af8d-4311-9b69-89fca18ae083" containerName="route-controller-manager" probeResult="failure" output="Get \"https://10.128.0.103:8443/healthz\": dial tcp 10.128.0.103:8443: connect: connection refused" Dec 04 22:24:19.520867 master-0 kubenswrapper[33572]: E1204 22:24:19.520754 33572 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"969d9203226bd5984801b92b8a69b52e7bfa98a060c3a32af519510346f59d9f\": container with ID starting with 969d9203226bd5984801b92b8a69b52e7bfa98a060c3a32af519510346f59d9f not found: ID does not exist" containerID="969d9203226bd5984801b92b8a69b52e7bfa98a060c3a32af519510346f59d9f" Dec 04 22:24:19.521535 master-0 kubenswrapper[33572]: E1204 22:24:19.521382 33572 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"d243f8075d17a7763ba15eacaf99b7d85a4369307e009439b8117263eb8ff180\": container with ID starting with d243f8075d17a7763ba15eacaf99b7d85a4369307e009439b8117263eb8ff180 not found: ID does not exist" containerID="d243f8075d17a7763ba15eacaf99b7d85a4369307e009439b8117263eb8ff180" Dec 04 22:24:19.522118 master-0 kubenswrapper[33572]: E1204 22:24:19.522056 33572 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"324aa92ce5c6dab4097c61d25b4a20aa50d9114558ad41db92624b64a8a9c3ce\": container with ID starting with 324aa92ce5c6dab4097c61d25b4a20aa50d9114558ad41db92624b64a8a9c3ce not found: ID does not exist" containerID="324aa92ce5c6dab4097c61d25b4a20aa50d9114558ad41db92624b64a8a9c3ce" Dec 04 22:24:19.522790 master-0 kubenswrapper[33572]: E1204 22:24:19.522755 33572 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"fd4b2ab8da3339b63acc157e462eaf3560c5afeb7156ce17bf041b3d282271ac\": container with ID starting with fd4b2ab8da3339b63acc157e462eaf3560c5afeb7156ce17bf041b3d282271ac not found: ID does not exist" containerID="fd4b2ab8da3339b63acc157e462eaf3560c5afeb7156ce17bf041b3d282271ac" Dec 04 22:24:19.523148 master-0 kubenswrapper[33572]: E1204 22:24:19.523105 33572 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"2540dc3a983a2ffa531fb829037086bf24662ae62f5410325234e39d7c422edd\": container with ID starting with 2540dc3a983a2ffa531fb829037086bf24662ae62f5410325234e39d7c422edd not found: ID does not exist" containerID="2540dc3a983a2ffa531fb829037086bf24662ae62f5410325234e39d7c422edd" Dec 04 22:24:19.523656 master-0 kubenswrapper[33572]: E1204 22:24:19.523545 33572 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"56e17c4cc394ce0b135cdb8354cd1d78c7bc1ea22b43ef0f36814938a41307b2\": container with ID starting with 56e17c4cc394ce0b135cdb8354cd1d78c7bc1ea22b43ef0f36814938a41307b2 not found: ID does not exist" containerID="56e17c4cc394ce0b135cdb8354cd1d78c7bc1ea22b43ef0f36814938a41307b2" Dec 04 22:24:19.523992 master-0 kubenswrapper[33572]: E1204 22:24:19.523962 33572 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"374b98f5c581bdbc5a9ef5f86fbad7cf2c3d42b470f8b7de1d75cdfca20afccf\": container with ID starting with 374b98f5c581bdbc5a9ef5f86fbad7cf2c3d42b470f8b7de1d75cdfca20afccf not found: ID does not exist" containerID="374b98f5c581bdbc5a9ef5f86fbad7cf2c3d42b470f8b7de1d75cdfca20afccf" Dec 04 22:24:20.176925 master-0 kubenswrapper[33572]: E1204 22:24:20.176792 33572 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="2221d215-2187-4dd6-a2de-f0fc6ec54027" containerName="kube-rbac-proxy-metric" Dec 04 22:24:20.176925 master-0 kubenswrapper[33572]: E1204 22:24:20.176828 33572 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="2221d215-2187-4dd6-a2de-f0fc6ec54027" containerName="kube-rbac-proxy" Dec 04 22:24:20.176925 master-0 kubenswrapper[33572]: E1204 22:24:20.176858 33572 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="2221d215-2187-4dd6-a2de-f0fc6ec54027" containerName="kube-rbac-proxy-web" Dec 04 22:24:20.176925 master-0 kubenswrapper[33572]: E1204 22:24:20.176880 33572 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="2221d215-2187-4dd6-a2de-f0fc6ec54027" containerName="prom-label-proxy" Dec 04 22:24:20.176925 master-0 kubenswrapper[33572]: E1204 22:24:20.176905 33572 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="2221d215-2187-4dd6-a2de-f0fc6ec54027" containerName="config-reloader" Dec 04 22:24:20.176925 master-0 kubenswrapper[33572]: E1204 22:24:20.176929 33572 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="2221d215-2187-4dd6-a2de-f0fc6ec54027" containerName="init-config-reloader" Dec 04 22:24:20.177244 master-0 kubenswrapper[33572]: E1204 22:24:20.176957 33572 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="2221d215-2187-4dd6-a2de-f0fc6ec54027" containerName="alertmanager" Dec 04 22:24:23.487431 master-0 kubenswrapper[33572]: E1204 22:24:23.487405 33572 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="c1b7c3b1-3850-4a37-9a36-e84537557071" containerName="init-config-reloader" Dec 04 22:24:23.487473 master-0 kubenswrapper[33572]: E1204 22:24:23.487464 33572 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="c1b7c3b1-3850-4a37-9a36-e84537557071" containerName="kube-rbac-proxy" Dec 04 22:24:23.487604 master-0 kubenswrapper[33572]: E1204 22:24:23.487494 33572 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="c1b7c3b1-3850-4a37-9a36-e84537557071" containerName="kube-rbac-proxy-thanos" Dec 04 22:24:23.487604 master-0 kubenswrapper[33572]: E1204 22:24:23.487543 33572 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="c1b7c3b1-3850-4a37-9a36-e84537557071" containerName="kube-rbac-proxy-web" Dec 04 22:24:23.487604 master-0 kubenswrapper[33572]: E1204 22:24:23.487562 33572 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="c1b7c3b1-3850-4a37-9a36-e84537557071" containerName="prometheus" Dec 04 22:24:23.488754 master-0 kubenswrapper[33572]: E1204 22:24:23.488646 33572 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="c1b7c3b1-3850-4a37-9a36-e84537557071" containerName="thanos-sidecar" Dec 04 22:24:23.488837 master-0 kubenswrapper[33572]: E1204 22:24:23.488763 33572 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="c1b7c3b1-3850-4a37-9a36-e84537557071" containerName="config-reloader" Dec 04 22:24:23.603914 master-0 kubenswrapper[33572]: E1204 22:24:23.603877 33572 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"c905bcb39fb43d82649405c460735d040cfd8f98b92922b9bdde6c34b49617a4\": container with ID starting with c905bcb39fb43d82649405c460735d040cfd8f98b92922b9bdde6c34b49617a4 not found: ID does not exist" containerID="c905bcb39fb43d82649405c460735d040cfd8f98b92922b9bdde6c34b49617a4" Dec 04 22:24:23.604265 master-0 kubenswrapper[33572]: E1204 22:24:23.604231 33572 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"ba15d55d72a8c9eb9e5ddaefbf7e51d2ac20c8d0d9bb5842137a1830cb0c781e\": container with ID starting with ba15d55d72a8c9eb9e5ddaefbf7e51d2ac20c8d0d9bb5842137a1830cb0c781e not found: ID does not exist" containerID="ba15d55d72a8c9eb9e5ddaefbf7e51d2ac20c8d0d9bb5842137a1830cb0c781e" Dec 04 22:24:23.604658 master-0 kubenswrapper[33572]: E1204 22:24:23.604604 33572 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"d63d55de206903c98d0e7bc7531c9bc70a72b892ef1307a6adcbb583b3ddaa48\": container with ID starting with d63d55de206903c98d0e7bc7531c9bc70a72b892ef1307a6adcbb583b3ddaa48 not found: ID does not exist" containerID="d63d55de206903c98d0e7bc7531c9bc70a72b892ef1307a6adcbb583b3ddaa48" Dec 04 22:24:23.604977 master-0 kubenswrapper[33572]: E1204 22:24:23.604944 33572 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"07972316c6687db6220a8a1f7e5dcfe61f43310f787cd444e2ab783522b0ea9f\": container with ID starting with 07972316c6687db6220a8a1f7e5dcfe61f43310f787cd444e2ab783522b0ea9f not found: ID does not exist" containerID="07972316c6687db6220a8a1f7e5dcfe61f43310f787cd444e2ab783522b0ea9f" Dec 04 22:24:23.605275 master-0 kubenswrapper[33572]: E1204 22:24:23.605239 33572 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"00a6653fc9eb307af8bead59770e92974a7d28da54b724a34cde7d1c72acb724\": container with ID starting with 00a6653fc9eb307af8bead59770e92974a7d28da54b724a34cde7d1c72acb724 not found: ID does not exist" containerID="00a6653fc9eb307af8bead59770e92974a7d28da54b724a34cde7d1c72acb724" Dec 04 22:24:23.605570 master-0 kubenswrapper[33572]: E1204 22:24:23.605545 33572 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"49181c383f32ce02423c29509c5b3d1ec978b1a85d513502f992f2ba9485f426\": container with ID starting with 49181c383f32ce02423c29509c5b3d1ec978b1a85d513502f992f2ba9485f426 not found: ID does not exist" containerID="49181c383f32ce02423c29509c5b3d1ec978b1a85d513502f992f2ba9485f426" Dec 04 22:24:23.605897 master-0 kubenswrapper[33572]: E1204 22:24:23.605854 33572 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"a77d43b618b372dda8199b9337a17b551291a253337b2047f62b9c57068b83b8\": container with ID starting with a77d43b618b372dda8199b9337a17b551291a253337b2047f62b9c57068b83b8 not found: ID does not exist" containerID="a77d43b618b372dda8199b9337a17b551291a253337b2047f62b9c57068b83b8" Dec 04 22:24:26.503736 master-0 kubenswrapper[33572]: E1204 22:24:26.503674 33572 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"8b77d62e5f0868c5194ca5becac825b8747fa3012bd686856746667bdd18a36c\": container with ID starting with 8b77d62e5f0868c5194ca5becac825b8747fa3012bd686856746667bdd18a36c not found: ID does not exist" containerID="8b77d62e5f0868c5194ca5becac825b8747fa3012bd686856746667bdd18a36c" Dec 04 22:24:44.970047 master-0 kubenswrapper[33572]: E1204 22:24:44.968600 33572 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="72679051-6a4b-4991-85c4-e5d2cbbc6ed7" containerName="metrics-server"aggregated/unused_machine_configs_count.json0000640000000000000000000000004215114405062020126 0ustar0000000000000000{"unused_machineconfigs_count":21}config/machineconfigs/rendered-worker-c04c3a75b10185e115c02aedea740507.json0000640000000000000000000004054015114405062023715 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","metadata":{"annotations":{"machineconfiguration.openshift.io/generated-by-controller-version":"bb2aa85171d93b2df952ed802a8cb200164e666f","machineconfiguration.openshift.io/release-image-version":"4.18.29"},"creationTimestamp":"2025-12-04T22:05:43Z","generation":1,"name":"rendered-worker-c04c3a75b10185e115c02aedea740507","ownerReferences":[{"apiVersion":"machineconfiguration.openshift.io/v1","blockOwnerDeletion":true,"controller":true,"kind":"MachineConfigPool","name":"worker","uid":"b4e1a1e3-55dc-44dd-8616-404c92b33b18"}],"resourceVersion":"10387","uid":"601fdc6a-a81c-41fc-a839-6ae58e95ac7c"},"spec":{"baseOSExtensionsContainerImage":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:73196dfff57f86946d1ad24874872984a674fbda24f20d01689a3d4162d06833","config":{"ignition":{"version":"3.4.0"},"passwd":{"users":null},"storage":{"files":null},"systemd":{"units":[{"contents":"[Unit]\nDescription=Cleans NetworkManager state generated by dracut\n# Removal of this file signals firstboot completion\nConditionPathExists=!/etc/ignition-machine-config-encapsulated.json\n# This is opt-in for some deployment types, and opt-out for others.\nConditionPathExists=/var/lib/mco/nm-clean-initrd-state\nWants=network-pre.target\nBefore=network-pre.target\n\n[Service]\nType=oneshot\n# Remove any existing state possibly generated NM run by dracut. We want NM to\n# consider all profiles autoconnect priority when it starts instead of\n# remembering which profile was a device activated with when NM is run by\n# dracut.\nExecStart=/usr/local/bin/nm-clean-initrd-state.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"NetworkManager-clean-initrd-state.service"},{"dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"ENABLE_PROFILE_UNIX_SOCKET=true\"\n","name":"10-mco-profile-unix-socket.conf"},{"contents":"[Unit]\nAfter=kubelet-dependencies.target\nRequires=kubelet-dependencies.target\n","name":"05-mco-ordering.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"name":"crio.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"docker.socket"},{"contents":"[Unit]\nDescription=The firstboot OS update has completed\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target\n\n[Install]\nWantedBy=default.target\n","enabled":true,"name":"firstboot-osupdate.target"},{"dropins":[{"contents":"[Unit]\nAfter=ovs-configuration.service\nBefore=crio.service\n","name":"01-after-configure-ovs.conf"}],"name":"ipsec.service"},{"contents":"[Unit]\nDescription=Dynamically sets the system reserved for the kubelet\nWants=network-online.target\nAfter=network-online.target firstboot-osupdate.target\nBefore=kubelet-dependencies.target\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nRemainAfterExit=yes\nEnvironmentFile=/etc/node-sizing-enabled.env\nExecStart=/bin/bash /usr/local/sbin/dynamic-system-reserved-calc.sh ${NODE_SIZING_ENABLED} ${SYSTEM_RESERVED_MEMORY} ${SYSTEM_RESERVED_CPU} ${SYSTEM_RESERVED_ES}\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"kubelet-auto-node-size.service"},{"contents":"[Unit]\nDescription=Dependencies necessary to run kubelet\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target network-online.target\nWants=NetworkManager-wait-online.service crio-wipe.service\nWants=rpc-statd.service chrony-wait.service\n","name":"kubelet-dependencies.target"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet\nRequires=crio.service kubelet-dependencies.target\nAfter=kubelet-dependencies.target\nAfter=ostree-finalize-staged.service\n\n[Service]\nType=notify\nExecStartPre=/bin/mkdir --parents /etc/kubernetes/manifests\nExecStartPre=-/usr/sbin/restorecon -ri /var/lib/kubelet/pod-resources /usr/local/bin/kubenswrapper /usr/bin/kubensenter\nEnvironment=\"KUBELET_NODE_IP=0.0.0.0\"\nEnvironmentFile=/etc/os-release\nEnvironmentFile=-/etc/kubernetes/kubelet-workaround\nEnvironmentFile=-/etc/kubernetes/kubelet-env\nEnvironmentFile=/etc/node-sizing.env\n\nExecStart=/usr/local/bin/kubenswrapper \\\n /usr/bin/kubelet \\\n --config=/etc/kubernetes/kubelet.conf \\\n --bootstrap-kubeconfig=/etc/kubernetes/kubeconfig \\\n --kubeconfig=/var/lib/kubelet/kubeconfig \\\n --container-runtime-endpoint=/var/run/crio/crio.sock \\\n --runtime-cgroups=/system.slice/crio.service \\\n --node-labels=node-role.kubernetes.io/worker,node.openshift.io/os_id=${ID} \\\n --node-ip=${KUBELET_NODE_IP} \\\n --minimum-container-ttl-duration=6m0s \\\n --volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec \\\n --cloud-provider= \\\n \\\n --hostname-override=${KUBELET_NODE_NAME} \\\n --provider-id=${KUBELET_PROVIDERID} \\\n --pod-infra-container-image=quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a70b2a95140d1e90978f36cc9889013ae34bd232662c5424002274385669ed9 \\\n --system-reserved=cpu=${SYSTEM_RESERVED_CPU},memory=${SYSTEM_RESERVED_MEMORY},ephemeral-storage=${SYSTEM_RESERVED_ES} \\\n --v=${KUBELET_LOG_LEVEL}\n\nRestart=always\nRestartSec=10\n\n[Install]\nWantedBy=multi-user.target\n","dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"enabled":true,"name":"kubelet.service"},{"contents":"[Unit]\nDescription=Manages a mount namespace for kubernetes-specific mounts\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nRuntimeDirectory=kubens\nEnvironment=RUNTIME_DIRECTORY=%t/kubens\nEnvironment=BIND_POINT=%t/kubens/mnt\nEnvironment=ENVFILE=%t/kubens/env\n\n# Set up the runtime directory as an unbindable mountpoint\nExecStartPre=bash -c \"findmnt ${RUNTIME_DIRECTORY} || mount --make-unbindable --bind ${RUNTIME_DIRECTORY} ${RUNTIME_DIRECTORY}\"\n# Ensure the bind point exists\nExecStartPre=touch ${BIND_POINT}\n# Use 'unshare' to create the new mountpoint, then 'mount --make-rshared' so it cascades internally\nExecStart=unshare --mount=${BIND_POINT} --propagation slave mount --make-rshared /\n# Finally, set an env pointer for ease-of-use\nExecStartPost=bash -c 'echo \"KUBENSMNT=${BIND_POINT}\" \u003e \"${ENVFILE}\"'\n\n# On stop, a recursive unmount cleans up the namespace and bind-mounted unbindable parent directory\nExecStop=umount -R ${RUNTIME_DIRECTORY}\n\n[Install]\nWantedBy=multi-user.target\n","enabled":false,"name":"kubens.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Firstboot\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# Removal of this file signals firstboot completion\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\nAfter=machine-config-daemon-pull.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\n# Disable existing repos (if any) so that OS extensions would use embedded RPMs only\nExecStartPre=-/usr/bin/sh -c \"sed -i 's/enabled=1/enabled=0/' /etc/yum.repos.d/*.repo\"\n# Run this via podman because we want to use the nmstatectl binary in our container\nExecStart=/usr/bin/podman run --rm --privileged --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b472823604757237c2d16bd6f6221f4cf562aa3b05942c7f602e1e8b2e55a7c6' firstboot-complete-machineconfig --persist-nics\nExecStart=/usr/bin/podman run --rm --privileged --pid=host --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b472823604757237c2d16bd6f6221f4cf562aa3b05942c7f602e1e8b2e55a7c6' firstboot-complete-machineconfig\n[Install]\nRequiredBy=firstboot-osupdate.target\n","enabled":true,"name":"machine-config-daemon-firstboot.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Pull\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# This \"stamp file\" is unlinked when we complete\n# machine-config-daemon-firstboot.service\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\n# Run after crio-wipe so the pulled MCD image is protected against a corrupted storage from a forced shutdown\nWants=crio-wipe.service NetworkManager-wait-online.service\nAfter=crio-wipe.service NetworkManager-wait-online.service network.service\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nExecStartPre=/etc/machine-config-daemon/generate_podman_policy_args.sh\nExecStart=/bin/sh -c \"while ! /usr/bin/podman pull $(cat /tmp/podman_policy_args) --authfile=/var/lib/kubelet/config.json 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b472823604757237c2d16bd6f6221f4cf562aa3b05942c7f602e1e8b2e55a7c6'; do sleep 1; done\"\n\n[Install]\nRequiredBy=machine-config-daemon-firstboot.service\n","enabled":true,"name":"machine-config-daemon-pull.service"},{"contents":"[Unit]\nDescription=Applies per-node NMState network configuration\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service\nBefore=nmstate.service kubelet-dependencies.target ovs-configuration.service node-valid-hostname.service\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/usr/local/bin/nmstate-configuration.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"nmstate-configuration.service"},{"contents":"[Unit]\nDescription=Apply nmstate on-disk state\nDocumentation=man:nmstate.service(8) https://www.nmstate.io\nAfter=NetworkManager-wait-online.service\nBefore=network-online.target\nWants=NetworkManager-wait-online.service\nRequires=NetworkManager.service\n\n[Service]\nType=oneshot\nExecStart=/usr/bin/nmstatectl service\nRemainAfterExit=yes\n\n[Install]\nWantedBy=NetworkManager.service\n","enabled":true,"name":"nmstate.service"},{"contents":"[Unit]\nDescription=Wait for a non-localhost hostname\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nUser=root\nExecStart=/usr/local/bin/mco-hostname --wait\n\n# Wait up to 5min for the node to get a non-localhost name\nTimeoutSec=300\n\n[Install]\n# TODO: Change this to RequiredBy after we fix https://github.com/openshift/machine-config-operator/pull/3865#issuecomment-1746963115\nWantedBy=kubelet-dependencies.target\n","enabled":true,"name":"node-valid-hostname.service"},{"contents":"[Unit]\nDescription=Writes IP address configuration so that kubelet and crio services select a valid node IP\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service firstboot-osupdate.target\nBefore=kubelet-dependencies.target ovs-configuration.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/bin/podman run --rm \\\n --authfile /var/lib/kubelet/config.json \\\n --env 'ENABLE_NODEIP_DEBUG=true' \\\n --net=host \\\n --security-opt label=disable \\\n --volume /etc/systemd/system:/etc/systemd/system \\\n --volume /run/nodeip-configuration:/run/nodeip-configuration \\\n quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b12f830c3316aa4dc061c2d00c74126282b3e2bcccc301eab00d57fff3c4c7c \\\n node-ip \\\n set \\\n --retry-on-failure \\\n --network-type OVNKubernetes \\\n ${NODEIP_HINT:-${KUBELET_NODEIP_HINT:-}}; \\\n do \\\n sleep 5; \\\n done\"\nExecStart=/bin/systemctl daemon-reload\nExecStartPre=/bin/mkdir -p /run/nodeip-configuration\nStandardOutput=journal+console\nStandardError=journal+console\n\nEnvironmentFile=-/etc/default/nodeip-configuration\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"nodeip-configuration.service"},{"enabled":true,"name":"openvswitch.service"},{"contents":"[Unit]\n# Kdump will generate it's initramfs based on the running state when kdump.service run\n# If OVS has already run, the kdump fails to gather a working network config,\n# which prevent network log exports, sush as SSH.\n# See https://issues.redhat.com/browse/OCPBUGS-28239\nAfter=kdump.service\nDescription=Configures OVS with proper host networking configuration\n# This service is used to move a physical NIC into OVS and reconfigure OVS to use the host IP\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=firstboot-osupdate.target\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service nmstate.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nExecStart=/usr/local/bin/configure-ovs.sh OVNKubernetes\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"ovs-configuration.service"},{"dropins":[{"contents":"[Service]\nRestart=always\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /var/lib/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /etc/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /run/openvswitch'\nExecStartPost=-/usr/bin/ovs-appctl vlog/set syslog:info\nExecReload=-/usr/bin/ovs-appctl vlog/set syslog:info\n","name":"10-ovs-vswitchd-restart.conf"}],"name":"ovs-vswitchd.service"},{"dropins":[{"contents":"[Service]\nRestart=always\n","name":"10-ovsdb-restart.conf"}],"enabled":true,"name":"ovsdb-server.service"},{"dropins":[{"contents":"","name":"10-mco-default-env.conf"}],"name":"rpm-ostreed.service"},{"contents":"[Unit]\nDescription=Ensure IKE SA established for existing IPsec connections.\nAfter=ipsec.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\nType=oneshot\nExecStart=/usr/local/bin/ipsec-connect-wait.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=ipsec.service\n","enabled":true,"name":"wait-for-ipsec-connect.service"},{"contents":"[Unit]\nDescription=Ensure primary IP is assigned and usable\nRequires=nmstate.service\nAfter=nmstate.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/local/bin/wait-for-primary-ip.sh; \\\n do \\\n sleep 10; \\\n done\"\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"wait-for-primary-ip.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"zincati.service"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet After Reboot Cleanup\nBefore=kubelet.service\n\n[Service]\nType=oneshot\nExecStart=/bin/rm -f /var/lib/kubelet/cpu_manager_state\nExecStart=/bin/rm -f /var/lib/kubelet/memory_manager_state\nExecStart=-/bin/rm -f /var/lib/kubelet/dra_manager_state\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"kubelet-cleanup.service"}]}},"extensions":[],"fips":false,"kernelArguments":["systemd.unified_cgroup_hierarchy=1","cgroup_no_v1=\"all\"","psi=0"],"kernelType":"default","osImageURL":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bacca9583660340dd9e15ce647bdd062ca1af24ac4345962d2420d3ab87a2c89"}}config/machineconfigs/rendered-master-67eaf7c4d57499a62a9899ea19c65a40.json0000640000000000000000000004333015114405062023771 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","metadata":{"annotations":{"machineconfiguration.openshift.io/generated-by-controller-version":"bb2aa85171d93b2df952ed802a8cb200164e666f","machineconfiguration.openshift.io/release-image-version":"4.18.29"},"creationTimestamp":"2025-12-04T22:05:43Z","generation":1,"name":"rendered-master-67eaf7c4d57499a62a9899ea19c65a40","ownerReferences":[{"apiVersion":"machineconfiguration.openshift.io/v1","blockOwnerDeletion":true,"controller":true,"kind":"MachineConfigPool","name":"master","uid":"208a2ed1-c7ee-47d4-b120-5d4531767d64"}],"resourceVersion":"10386","uid":"9ab5f01f-3ea3-4572-a6b7-1f50ef90a88e"},"spec":{"baseOSExtensionsContainerImage":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:73196dfff57f86946d1ad24874872984a674fbda24f20d01689a3d4162d06833","config":{"ignition":{"version":"3.4.0"},"passwd":{"users":null},"storage":{"disks":[{"device":"/dev/vdc","wipeTable":true},{"device":"/dev/vdd","wipeTable":true},{"device":"/dev/vde","wipeTable":true}],"files":null},"systemd":{"units":[{"contents":"[Unit]\nDescription=Cleans NetworkManager state generated by dracut\n# Removal of this file signals firstboot completion\nConditionPathExists=!/etc/ignition-machine-config-encapsulated.json\n# This is opt-in for some deployment types, and opt-out for others.\nConditionPathExists=/var/lib/mco/nm-clean-initrd-state\nWants=network-pre.target\nBefore=network-pre.target\n\n[Service]\nType=oneshot\n# Remove any existing state possibly generated NM run by dracut. We want NM to\n# consider all profiles autoconnect priority when it starts instead of\n# remembering which profile was a device activated with when NM is run by\n# dracut.\nExecStart=/usr/local/bin/nm-clean-initrd-state.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"NetworkManager-clean-initrd-state.service"},{"dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"ENABLE_PROFILE_UNIX_SOCKET=true\"\n","name":"10-mco-profile-unix-socket.conf"},{"contents":"[Unit]\nAfter=kubelet-dependencies.target\nRequires=kubelet-dependencies.target\n","name":"05-mco-ordering.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"name":"crio.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"docker.socket"},{"contents":"[Unit]\nDescription=The firstboot OS update has completed\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target\n\n[Install]\nWantedBy=default.target\n","enabled":true,"name":"firstboot-osupdate.target"},{"dropins":[{"contents":"[Unit]\nAfter=ovs-configuration.service\nBefore=crio.service\n","name":"01-after-configure-ovs.conf"}],"name":"ipsec.service"},{"contents":"[Unit]\nDescription=Dynamically sets the system reserved for the kubelet\nWants=network-online.target\nAfter=network-online.target firstboot-osupdate.target\nBefore=kubelet-dependencies.target\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nRemainAfterExit=yes\nEnvironmentFile=/etc/node-sizing-enabled.env\nExecStart=/bin/bash /usr/local/sbin/dynamic-system-reserved-calc.sh ${NODE_SIZING_ENABLED} ${SYSTEM_RESERVED_MEMORY} ${SYSTEM_RESERVED_CPU} ${SYSTEM_RESERVED_ES}\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"kubelet-auto-node-size.service"},{"contents":"[Unit]\nDescription=Dependencies necessary to run kubelet\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target network-online.target\nWants=NetworkManager-wait-online.service crio-wipe.service\nWants=rpc-statd.service chrony-wait.service\n","name":"kubelet-dependencies.target"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet\nRequires=crio.service kubelet-dependencies.target\nAfter=kubelet-dependencies.target\nAfter=ostree-finalize-staged.service\n\n[Service]\nType=notify\nExecStartPre=/bin/mkdir --parents /etc/kubernetes/manifests\nExecStartPre=-/usr/sbin/restorecon -ri /var/lib/kubelet/pod-resources /usr/local/bin/kubenswrapper /usr/bin/kubensenter\nEnvironment=\"KUBELET_NODE_IP=0.0.0.0\"\nEnvironmentFile=/etc/os-release\nEnvironmentFile=-/etc/kubernetes/kubelet-workaround\nEnvironmentFile=-/etc/kubernetes/kubelet-env\nEnvironmentFile=/etc/node-sizing.env\n\nExecStart=/usr/local/bin/kubenswrapper \\\n /usr/bin/kubelet \\\n --config=/etc/kubernetes/kubelet.conf \\\n --bootstrap-kubeconfig=/etc/kubernetes/kubeconfig \\\n --kubeconfig=/var/lib/kubelet/kubeconfig \\\n --container-runtime-endpoint=/var/run/crio/crio.sock \\\n --runtime-cgroups=/system.slice/crio.service \\\n --node-labels=node-role.kubernetes.io/control-plane,node-role.kubernetes.io/master,node.openshift.io/os_id=${ID} \\\n --node-ip=${KUBELET_NODE_IP} \\\n --minimum-container-ttl-duration=6m0s \\\n --cloud-provider= \\\n --volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec \\\n \\\n --hostname-override=${KUBELET_NODE_NAME} \\\n --provider-id=${KUBELET_PROVIDERID} \\\n --register-with-taints=node-role.kubernetes.io/master=:NoSchedule \\\n --pod-infra-container-image=quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a70b2a95140d1e90978f36cc9889013ae34bd232662c5424002274385669ed9 \\\n --system-reserved=cpu=${SYSTEM_RESERVED_CPU},memory=${SYSTEM_RESERVED_MEMORY},ephemeral-storage=${SYSTEM_RESERVED_ES} \\\n --v=${KUBELET_LOG_LEVEL}\n\nRestart=always\nRestartSec=10\n\n[Install]\nWantedBy=multi-user.target\n","dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"enabled":true,"name":"kubelet.service"},{"contents":"[Unit]\nDescription=Manages a mount namespace for kubernetes-specific mounts\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nRuntimeDirectory=kubens\nEnvironment=RUNTIME_DIRECTORY=%t/kubens\nEnvironment=BIND_POINT=%t/kubens/mnt\nEnvironment=ENVFILE=%t/kubens/env\n\n# Set up the runtime directory as an unbindable mountpoint\nExecStartPre=bash -c \"findmnt ${RUNTIME_DIRECTORY} || mount --make-unbindable --bind ${RUNTIME_DIRECTORY} ${RUNTIME_DIRECTORY}\"\n# Ensure the bind point exists\nExecStartPre=touch ${BIND_POINT}\n# Use 'unshare' to create the new mountpoint, then 'mount --make-rshared' so it cascades internally\nExecStart=unshare --mount=${BIND_POINT} --propagation slave mount --make-rshared /\n# Finally, set an env pointer for ease-of-use\nExecStartPost=bash -c 'echo \"KUBENSMNT=${BIND_POINT}\" \u003e \"${ENVFILE}\"'\n\n# On stop, a recursive unmount cleans up the namespace and bind-mounted unbindable parent directory\nExecStop=umount -R ${RUNTIME_DIRECTORY}\n\n[Install]\nWantedBy=multi-user.target\n","enabled":false,"name":"kubens.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Firstboot\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# Removal of this file signals firstboot completion\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\nAfter=machine-config-daemon-pull.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\n# Disable existing repos (if any) so that OS extensions would use embedded RPMs only\nExecStartPre=-/usr/bin/sh -c \"sed -i 's/enabled=1/enabled=0/' /etc/yum.repos.d/*.repo\"\n# Run this via podman because we want to use the nmstatectl binary in our container\nExecStart=/usr/bin/podman run --rm --privileged --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b472823604757237c2d16bd6f6221f4cf562aa3b05942c7f602e1e8b2e55a7c6' firstboot-complete-machineconfig --persist-nics\nExecStart=/usr/bin/podman run --rm --privileged --pid=host --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b472823604757237c2d16bd6f6221f4cf562aa3b05942c7f602e1e8b2e55a7c6' firstboot-complete-machineconfig\n[Install]\nRequiredBy=firstboot-osupdate.target\n","enabled":true,"name":"machine-config-daemon-firstboot.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Pull\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# This \"stamp file\" is unlinked when we complete\n# machine-config-daemon-firstboot.service\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\n# Run after crio-wipe so the pulled MCD image is protected against a corrupted storage from a forced shutdown\nWants=crio-wipe.service NetworkManager-wait-online.service\nAfter=crio-wipe.service NetworkManager-wait-online.service network.service\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nExecStartPre=/etc/machine-config-daemon/generate_podman_policy_args.sh\nExecStart=/bin/sh -c \"while ! /usr/bin/podman pull $(cat /tmp/podman_policy_args) --authfile=/var/lib/kubelet/config.json 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b472823604757237c2d16bd6f6221f4cf562aa3b05942c7f602e1e8b2e55a7c6'; do sleep 1; done\"\n\n[Install]\nRequiredBy=machine-config-daemon-firstboot.service\n","enabled":true,"name":"machine-config-daemon-pull.service"},{"contents":"[Unit]\nDescription=Applies per-node NMState network configuration\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service\nBefore=nmstate.service kubelet-dependencies.target ovs-configuration.service node-valid-hostname.service\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/usr/local/bin/nmstate-configuration.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"nmstate-configuration.service"},{"contents":"[Unit]\nDescription=Apply nmstate on-disk state\nDocumentation=man:nmstate.service(8) https://www.nmstate.io\nAfter=NetworkManager-wait-online.service\nBefore=network-online.target\nWants=NetworkManager-wait-online.service\nRequires=NetworkManager.service\n\n[Service]\nType=oneshot\nExecStart=/usr/bin/nmstatectl service\nRemainAfterExit=yes\n\n[Install]\nWantedBy=NetworkManager.service\n","enabled":true,"name":"nmstate.service"},{"contents":"[Unit]\nDescription=Wait for a non-localhost hostname\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nUser=root\nExecStart=/usr/local/bin/mco-hostname --wait\n\n# Wait up to 5min for the node to get a non-localhost name\nTimeoutSec=300\n\n[Install]\n# TODO: Change this to RequiredBy after we fix https://github.com/openshift/machine-config-operator/pull/3865#issuecomment-1746963115\nWantedBy=kubelet-dependencies.target\n","enabled":true,"name":"node-valid-hostname.service"},{"contents":"[Unit]\nDescription=Writes IP address configuration so that kubelet and crio services select a valid node IP\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service firstboot-osupdate.target\nBefore=kubelet-dependencies.target ovs-configuration.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/bin/podman run --rm \\\n --authfile /var/lib/kubelet/config.json \\\n --env 'ENABLE_NODEIP_DEBUG=true' \\\n --net=host \\\n --security-opt label=disable \\\n --volume /etc/systemd/system:/etc/systemd/system \\\n --volume /run/nodeip-configuration:/run/nodeip-configuration \\\n quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b12f830c3316aa4dc061c2d00c74126282b3e2bcccc301eab00d57fff3c4c7c \\\n node-ip \\\n set \\\n --retry-on-failure \\\n --network-type OVNKubernetes \\\n ${NODEIP_HINT:-${KUBELET_NODEIP_HINT:-}}; \\\n do \\\n sleep 5; \\\n done\"\nExecStart=/bin/systemctl daemon-reload\nExecStartPre=/bin/mkdir -p /run/nodeip-configuration\nStandardOutput=journal+console\nStandardError=journal+console\n\nEnvironmentFile=-/etc/default/nodeip-configuration\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"nodeip-configuration.service"},{"enabled":true,"name":"openvswitch.service"},{"contents":"[Unit]\n# Kdump will generate it's initramfs based on the running state when kdump.service run\n# If OVS has already run, the kdump fails to gather a working network config,\n# which prevent network log exports, sush as SSH.\n# See https://issues.redhat.com/browse/OCPBUGS-28239\nAfter=kdump.service\nDescription=Configures OVS with proper host networking configuration\n# This service is used to move a physical NIC into OVS and reconfigure OVS to use the host IP\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=firstboot-osupdate.target\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service nmstate.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nExecStart=/usr/local/bin/configure-ovs.sh OVNKubernetes\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"ovs-configuration.service"},{"dropins":[{"contents":"[Service]\nRestart=always\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /var/lib/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /etc/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /run/openvswitch'\nExecStartPost=-/usr/bin/ovs-appctl vlog/set syslog:info\nExecReload=-/usr/bin/ovs-appctl vlog/set syslog:info\n","name":"10-ovs-vswitchd-restart.conf"}],"name":"ovs-vswitchd.service"},{"dropins":[{"contents":"[Service]\nRestart=always\n","name":"10-ovsdb-restart.conf"}],"enabled":true,"name":"ovsdb-server.service"},{"dropins":[{"contents":"","name":"10-mco-default-env.conf"},{"contents":"# See https://github.com/openshift/machine-config-operator/issues/1897\n[Service]\nNice=10\nIOSchedulingClass=best-effort\nIOSchedulingPriority=6\n","name":"mco-controlplane-nice.conf"}],"name":"rpm-ostreed.service"},{"contents":"[Unit]\nDescription=Ensure IKE SA established for existing IPsec connections.\nAfter=ipsec.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\nType=oneshot\nExecStart=/usr/local/bin/ipsec-connect-wait.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=ipsec.service\n","enabled":true,"name":"wait-for-ipsec-connect.service"},{"contents":"[Unit]\nDescription=Ensure primary IP is assigned and usable\nRequires=nmstate.service\nAfter=nmstate.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/local/bin/wait-for-primary-ip.sh; \\\n do \\\n sleep 10; \\\n done\"\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"wait-for-primary-ip.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"zincati.service"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet After Reboot Cleanup\nBefore=kubelet.service\n\n[Service]\nType=oneshot\nExecStart=/bin/rm -f /var/lib/kubelet/cpu_manager_state\nExecStart=/bin/rm -f /var/lib/kubelet/memory_manager_state\nExecStart=-/bin/rm -f /var/lib/kubelet/dra_manager_state\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"kubelet-cleanup.service"},{"contents":"[Unit]\nDescription=Run dnsmasq to provide local dns for Single Node OpenShift\nBefore=kubelet.service crio.service\nAfter=network.target ovs-configuration.service\n\n[Service]\nTimeoutStartSec=30\nExecStartPre=/usr/local/bin/dnsmasq_config.sh\nExecStart=/usr/sbin/dnsmasq -k\nRestart=always\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"dnsmasq.service"},{"enabled":true,"name":"iscsid.service"},{"contents":"[Unit]\nDescription=Create logical volume with name cinder-volumes.\nAfter=var.mount systemd-udev-settle.service\n\n[Service]\nType=oneshot\nExecCondition=/bin/bash -c '! /usr/sbin/vgdisplay cinder-volumes'\nExecStartPre=/usr/sbin/pvcreate /dev/vdc /dev/vdd /dev/vde\nExecStart=/usr/sbin/vgcreate cinder-volumes /dev/vdc /dev/vdd /dev/vde\nRemainAfterExit=yes\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"lv-cinder-volumes.service"},{"enabled":true,"name":"multipathd.service"}]}},"extensions":[],"fips":false,"kernelArguments":["net.ifnames=0","systemd.unified_cgroup_hierarchy=1","cgroup_no_v1=\"all\"","psi=0"],"kernelType":"default","osImageURL":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bacca9583660340dd9e15ce647bdd062ca1af24ac4345962d2420d3ab87a2c89"}}config/running_containers.json0000640000000000000000000001365715114405062015317 0ustar0000000000000000{"images":{"0":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","1":"sha256:e3e65409fc2b27ad0aaeb500a39e264663d2980821f099b830b551785ce4ce8b","10":"sha256:e27a636083db9043e3e4bbdc336b5e7fb5693422246e443fd1d913e157f01d46","11":"sha256:f4d4282cb53325e737ad68abbfcb70687ae04fb50353f4f0ba0ba5703b15009a","12":"sha256:631a3798b749fecc041a99929eb946618df723e15055e805ff752a1a1273481c","13":"sha256:df4cf41b98aaa1978e682187fd6d8e934d70cea9b500033fec197ffcb5c75ab6","14":"sha256:7c84b5ebe858246af77fb40b85b6ea917fa2a4a651b740cd3320d461164d0ef8","15":"sha256:df606f3b71d4376d1a2108c09f0d3dab455fc30bcb67c60e91590c105e9025bf","16":"sha256:79f99fd6cce984287932edf0d009660bb488d663081f3d62ec3b23bc8bfbf6c2","17":"sha256:91af633e585621630c40d14f188e37d36b44678d0a59e582d850bf8d593d3a0c","18":"sha256:9724d2036305cbd729e1f484c5bad89971de977fff8a6723fef1873858dd1123","19":"sha256:a9a6271d3a19d3ceff897d9d414271723a984d7c45b94aa521b2c8aa20e95983","2":"sha256:f1ca78c423f43f89a0411e40393642f64e4f8df9e5f61c25e31047c4cce170f9","20":"sha256:8139ed65c0a0a4b0f253b715c11cc52be027efe8a4774da9ccce35c78ef439da","21":"sha256:9014f384de5f9a0b7418d5869ad349abb9588d16bd09ed650a163c045315dbff","22":"sha256:7e438b814f8e16f00b3fc4b69991af80eee79ae111d2a707f34aa64b2ccbb6eb","23":"sha256:1386b0fcb731d843f15fb64532f8b676c927821d69dd3d4503c973c3e2a04216","24":"sha256:50e368e01772dd0dc9c4f9a6cdd5a9693a224968f75dc19eafe2a416f583bdab","25":"sha256:916566bb9d0143352324233d460ad94697719c11c8c9158e3aea8f475941751f","26":"sha256:1f952cec1e5332b84bdffa249cd426f39087058d6544ddcec650a414c15a9b68","27":"sha256:831f30660844091d6154e2674d3a9da6f34271bf8a2c40b56f7416066318742b","28":"sha256:b00c658332d6c6786bd969b26097c20a78c79c045f1692a8809234f5fb586c22","29":"registry.redhat.io/redhat/community-operator-index:v4.18","3":"sha256:0f43c31aa3359159d4557dad3cfaf812d8ce44db9cb9ae970e06d3479070b660","30":"sha256:3f0aa9cd04713acc5c6fea721bd849e1500da8ae945e0b32000887f34d786e0b","31":"sha256:33a20002692769235e95271ab071783c57ff50681088fa1035b86af31e73cf20","32":"sha256:4ecc5bac651ff1942865baee5159582e9602c89b47eeab18400a32abcba8f690","33":"sha256:9432c13d76bd4ba4eb9197c050cf88c0d701fa2055eeb59257e2e23901f9fdff","34":"sha256:2632d7f05d5a992e91038ded81c715898f3fe803420a9b67a0201e9fd8075213","35":"sha256:ee8240dce6c308012c91feac525db3c5df2d91c631d071881b61f0528929e904","36":"registry.redhat.io/redhat/redhat-operator-index:v4.18","37":"sha256:eddedae7578d79b5a3f748000ae5c00b9f14a04710f9f9ec7b52fc569be5dfb8","38":"sha256:3c1edf52f70bf9b1d1457e0c4111bc79cdaa1edd659ddbdb9d8176eff8b46956","39":"sha256:61664aa69b33349cc6de45e44ae6033e7f483c034ea01c0d9a8ca08a12d88e3a","4":"sha256:188637a52cafee61ec461e92fb0c605e28be325b9ac1f2ac8a37d68e97654718","40":"sha256:2f41e33fa119d569ba903ae6b18ec7cf1626d8c24da6f8acf9bcbafef2f043ae","41":"sha256:e85850a4ae1a1e3ec2c590a4936d640882b6550124da22031c85b526afbf52df","42":"sha256:c416b201d480bddb5a4960ec42f4740761a1335001cf84ba5ae19ad6857771b1","43":"sha256:86af77350cfe6fd69280157e4162aa0147873d9431c641ae4ad3e881ff768a73","44":"sha256:97d26892192b552c16527bf2771e1b86528ab581a02dd9279cdf71c194830e3e","45":"sha256:8c885ea0b3c5124989f0a9b93eba98eb9fca6bbd0262772d85d90bf713a4d572","46":"registry.redhat.io/redhat/certified-operator-index:v4.18","47":"sha256:03d91f263cf6eef98d53e83e218e32a55576ebdd31daa8f6abd33b8866c3d5c4","48":"sha256:c3a77aa4d03b89ea284e3467a268e5989a77a2ef63e685eb1d5c5ea5b3922b7a","49":"sha256:8a3d37aa7a22c68afa963ecfb4b43c52cccf152580cd66e4d5382fb69e4037cc","5":"sha256:01d2e67fd74086da701c39dac5b821822351cb0151f9afe72821c05df19953ad","50":"sha256:b0c3d16a01c2d60f9b536ca815ed8dc6abdca2b78e392551dc3fb79be537a354","51":"sha256:3b8d91a25eeb9f02041e947adb3487da3e7ab8449d3d2ad015827e7954df7b34","52":"sha256:8860e00f858d1bca98344f21b5a5c4acc43c9c6eca8216582514021f0ab3cf7b","53":"sha256:f228d55f3812fdc1e6b37262baea72b19443d64142aaf5ac748ff875b15a1c9a","54":"sha256:a824e468cf8dd61d347e35b2ee5bc2f815666957647098e21a1bb56ff613e5b9","55":"sha256:8375671da86aa527ee7e291d86971b0baa823ffc7663b5a983084456e76c0f59","56":"sha256:5451aa441e5b8d8689c032405d410c8049a849ef2edf77e5b6a5ce2838c6569b","57":"sha256:8eabac819f289e29d75c7ab172d8124554849a47f0b00770928c3eb19a5a31c4","58":"sha256:3ebe19b23694155a15d0968968fdee3dcf200ab9718ae1fcbd05f4d24960b827","59":"sha256:ca1daf0b5b8e7f3f14effdd82b3ff227ad2706feb90490aa43f37fbbaa5903a0","6":"sha256:7d0b49cba33162ab0c486a96c5767cf5ed237a065cf6a4e2fc01d60a13f418bf","60":"sha256:d2d169850894a59fb18012f5b1cde98a7e30fa5b86967c9d16e4cba5e88d9a8d","61":"sha256:91795c7ae050c24ea79ae91b18a4e39a1a527b046deecf7fc795c22caf0b3f59","62":"registry.redhat.io/redhat/redhat-marketplace-index:v4.18","63":"sha256:0824d9b793abc22c69ad35697e1bd3e725f07be0485f504d710ea1e8632d06ad","64":"sha256:75d996f6147edb88c09fd1a052099de66638590d7d03a735006244bc9e19f898","65":"sha256:10e57ca7611f79710f05777dc6a8f31c7e04eb09da4d8d793a5acfbf0e4692d7","66":"sha256:aa24edce3d740f84c40018e94cdbf2bc7375268d13d57c2d664e43a46ccea3fc","67":"sha256:7664a2d4cb10e82ed32abbf95799f43fc3d10135d7dd94799730de504a89680a","68":"sha256:eb928c13a46d3fb45f4a881892d023a92d610a5430be0ffd916aaf8da8e7d297","69":"sha256:2b3d313c599852b3543ee5c3a62691bd2d1bbad12c2e1c610cd71a1dec6eea32","7":"sha256:b472823604757237c2d16bd6f6221f4cf562aa3b05942c7f602e1e8b2e55a7c6","70":"sha256:cfde59e48cd5dee3721f34d249cb119cc3259fd857965d34f9c7ed83b0c363a1","8":"sha256:6d5891cdd7dcf7c9081de8b364b4c96446b7f946f7880fbae291a4592a198264","9":"sha256:f042fa25014f3d37f3ea967d21f361d2a11833ae18f2c750318101b25d2497ce"},"containers":{"2025-12":{"0":27,"1":8,"10":3,"11":3,"12":2,"13":2,"14":2,"15":2,"16":2,"17":2,"18":2,"19":2,"2":7,"20":2,"21":2,"22":2,"23":2,"24":1,"25":1,"26":1,"27":1,"28":1,"29":1,"3":6,"30":1,"31":1,"32":1,"33":1,"34":1,"35":1,"36":1,"37":1,"38":1,"39":1,"4":6,"40":1,"41":1,"42":1,"43":1,"44":1,"45":1,"46":1,"47":1,"48":1,"49":1,"5":4,"50":1,"51":1,"52":1,"53":1,"54":1,"55":1,"56":1,"57":1,"58":1,"59":1,"6":4,"60":1,"61":1,"62":1,"63":1,"64":1,"65":1,"66":1,"67":1,"68":1,"69":1,"7":4,"70":1,"8":4,"9":3}}}config/pod/openshift-operator-lifecycle-manager/package-server-manager-67477646d4-bslb5.json0000640000000000000000000002336615114405062030067 0ustar0000000000000000{"metadata":{"name":"package-server-manager-67477646d4-bslb5","generateName":"package-server-manager-67477646d4-","namespace":"openshift-operator-lifecycle-manager","uid":"813f3ee7-35b5-4ee8-b453-00d16d910eae","resourceVersion":"13140","creationTimestamp":"2025-12-04T21:58:24Z","labels":{"app":"package-server-manager","pod-template-hash":"67477646d4"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.8/23\"],\"mac_address\":\"0a:58:0a:80:00:08\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.8/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.8\"\n ],\n \"mac\": \"0a:58:0a:80:00:08\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"package-server-manager-67477646d4","uid":"e1b57413-9cbb-4b34-8010-9e5e4450ca3d","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"package-server-manager-serving-cert","secret":{"secretName":"package-server-manager-serving-cert","defaultMode":420}},{"name":"kube-api-access-8w592","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","args":["--secure-listen-address=0.0.0.0:8443","--upstream=http://127.0.0.1:9090/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key","--logtostderr=true"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"package-server-manager-serving-cert","mountPath":"/etc/tls/private"},{"name":"kube-api-access-8w592","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000400000,"allowPrivilegeEscalation":false}},{"name":"package-server-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f1ca78c423f43f89a0411e40393642f64e4f8df9e5f61c25e31047c4cce170f9","command":["/bin/psm","start"],"args":["--name","$(PACKAGESERVER_NAME)","--namespace","$(PACKAGESERVER_NAMESPACE)","--metrics=:9090"],"env":[{"name":"PACKAGESERVER_NAME","value":"packageserver"},{"name":"PACKAGESERVER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f1ca78c423f43f89a0411e40393642f64e4f8df9e5f61c25e31047c4cce170f9"},{"name":"PACKAGESERVER_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"RELEASE_VERSION","value":"4.18.29"},{"name":"GOMEMLIMIT","value":"5MiB"}],"resources":{"requests":{"cpu":"10m","memory":"10Mi"}},"volumeMounts":[{"name":"kube-api-access-8w592","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8080,"scheme":"HTTP"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/healthz","port":8080,"scheme":"HTTP"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000400000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"olm-operator-serviceaccount","serviceAccount":"olm-operator-serviceaccount","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c20,c10"},"runAsNonRoot":true,"fsGroup":1000400000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:01:21Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:00:26Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:19:42Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:19:42Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:00:26Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.8","podIPs":[{"ip":"10.128.0.8"}],"startTime":"2025-12-04T22:00:26Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2025-12-04T22:01:09Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","containerID":"cri-o://0744bc69885cb8b27025aac2761602ed1dd53a9e628a283b5e3ef1e171da58fa","started":true,"volumeMounts":[{"name":"package-server-manager-serving-cert","mountPath":"/etc/tls/private"},{"name":"kube-api-access-8w592","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"package-server-manager","state":{"running":{"startedAt":"2025-12-04T22:15:37Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"ock\": context deadline exceeded\nI1204 22:15:02.022323 1 leaderelection.go:297] failed to renew lease openshift-operator-lifecycle-manager/packageserver-controller-lock: timed out waiting for the condition\nE1204 22:15:36.030327 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded\n2025-12-04T22:15:36Z\tINFO\tStopping and waiting for non leader election runnables\n2025-12-04T22:15:36Z\tINFO\tStopping and waiting for leader election runnables\n2025-12-04T22:15:36Z\tINFO\tStopping and waiting for caches\n2025-12-04T22:15:36Z\tINFO\tStopping and waiting for webhooks\n2025-12-04T22:15:36Z\tINFO\tStopping and waiting for HTTP servers\n2025-12-04T22:15:36Z\tINFO\tWait completed, proceeding to shutdown the manager\n2025-12-04T22:15:36Z\tDEBUG\tevents\tpackage-server-manager-67477646d4-bslb5_132e2923-045c-417a-aeae-1d429fc40a12 stopped leading\t{\"type\": \"Normal\", \"object\": {\"kind\":\"Lease\",\"namespace\":\"openshift-operator-lifecycle-manager\",\"name\":\"packageserver-controller-lock\",\"uid\":\"7e409965-44b6-4295-bc9b-e41499cb1e3b\",\"apiVersion\":\"coordination.k8s.io/v1\",\"resourceVersion\":\"11421\"}, \"reason\": \"LeaderElection\"}\n2025-12-04T22:15:36Z\tINFO\tShutdown signal received, waiting for all workers to finish\t{\"controller\": \"clusterserviceversion\", \"controllerGroup\": \"operators.coreos.com\", \"controllerKind\": \"ClusterServiceVersion\"}\n2025-12-04T22:15:36Z\tERROR\tsetup\tproblem running manager\t{\"error\": \"leader election lost\"}\nmain.run\n\t/build/cmd/package-server-manager/main.go:150\ngithub.com/spf13/cobra.(*Command).execute\n\t/build/vendor/github.com/spf13/cobra/command.go:985\ngithub.com/spf13/cobra.(*Command).ExecuteC\n\t/build/vendor/github.com/spf13/cobra/command.go:1117\ngithub.com/spf13/cobra.(*Command).Execute\n\t/build/vendor/github.com/spf13/cobra/command.go:1041\nmain.main\n\t/build/cmd/package-server-manager/main.go:43\nruntime.main\n\t/usr/lib/golang/src/runtime/proc.go:271\nError: leader election lost\nencountered an error while executing the binary: leader election lost\n","startedAt":"2025-12-04T22:01:21Z","finishedAt":"2025-12-04T22:15:36Z","containerID":"cri-o://f11072c38e40de60dafeffc2c5ef9e1780820ca0ce672700aba155fa414fe72c"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f1ca78c423f43f89a0411e40393642f64e4f8df9e5f61c25e31047c4cce170f9","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f1ca78c423f43f89a0411e40393642f64e4f8df9e5f61c25e31047c4cce170f9","containerID":"cri-o://34e81e1de548a0f7a7581ef26a98220c98e277cec852a516b3aef35984f983d0","started":true,"volumeMounts":[{"name":"kube-api-access-8w592","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}operator-controller-controller-manager-7cbd59c7f8-nxbjw.json0000640000000000000000000002474515114405062032544 0ustar0000000000000000config/pod/openshift-operator-controller{"metadata":{"name":"operator-controller-controller-manager-7cbd59c7f8-nxbjw","generateName":"operator-controller-controller-manager-7cbd59c7f8-","namespace":"openshift-operator-controller","uid":"ce6b5a46-172b-4575-ba22-ff3c6ea4207f","resourceVersion":"13189","creationTimestamp":"2025-12-04T22:01:06Z","labels":{"control-plane":"operator-controller-controller-manager","pod-template-hash":"7cbd59c7f8"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.36/23\"],\"mac_address\":\"0a:58:0a:80:00:24\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.36/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.36\"\n ],\n \"mac\": \"0a:58:0a:80:00:24\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"manager","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"operator-controller-controller-manager-7cbd59c7f8","uid":"93ece35e-dd5c-4a16-8556-cd6f3b30c70b","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cache","emptyDir":{}},{"name":"ca-certs","projected":{"sources":[{"configMap":{"name":"operator-controller-trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"ca-bundle.crt"}],"optional":false}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"optional":false}}],"defaultMode":420}},{"name":"etc-containers","hostPath":{"path":"/etc/containers","type":"Directory"}},{"name":"etc-docker","hostPath":{"path":"/etc/docker","type":"Directory"}},{"name":"kube-api-access-2cfhv","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f952cec1e5332b84bdffa249cd426f39087058d6544ddcec650a414c15a9b68","command":["/manager"],"args":["--health-probe-bind-address=:8081","--metrics-bind-address=127.0.0.1:8080","--leader-elect","--catalogd-cas-dir=/var/ca-certs","--v=2","--global-pull-secret=openshift-config/pull-secret"],"env":[{"name":"SSL_CERT_DIR","value":"/var/ca-certs"}],"resources":{"requests":{"cpu":"10m","memory":"64Mi"}},"volumeMounts":[{"name":"cache","mountPath":"/var/cache"},{"name":"ca-certs","readOnly":true,"mountPath":"/var/ca-certs"},{"name":"etc-containers","readOnly":true,"mountPath":"/etc/containers"},{"name":"etc-docker","readOnly":true,"mountPath":"/etc/docker"},{"name":"kube-api-access-2cfhv","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":15,"timeoutSeconds":1,"periodSeconds":20,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":5,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","args":["--secure-listen-address=0.0.0.0:8443","--http2-disable","--upstream=http://127.0.0.1:8080/","--logtostderr=true","--v=2"],"ports":[{"name":"https","containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"5m","memory":"64Mi"}},"volumeMounts":[{"name":"kube-api-access-2cfhv","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":10,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"operator-controller-controller-manager","serviceAccount":"operator-controller-controller-manager","nodeName":"master-0","securityContext":{"seLinuxOptions":{"type":"spc_t"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchExpressions":[{"key":"kubernetes.io/arch","operator":"In","values":["amd64","arm64","ppc64le","s390x"]},{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:01:10Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:01:06Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:19:42Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:19:42Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:01:06Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.36","podIPs":[{"ip":"10.128.0.36"}],"startTime":"2025-12-04T22:01:06Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2025-12-04T22:01:09Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","containerID":"cri-o://66b2e3479fe940e234e57684065e0fce7888af45d6710422bc86d256ccfc2307","started":true,"volumeMounts":[{"name":"kube-api-access-2cfhv","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"manager","state":{"running":{"startedAt":"2025-12-04T22:13:20Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"ork.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"a17ff2bb-e033-43e1-a3f8-f33f1f392902\"\nI1204 22:08:42.457480 1 clustercatalog_controller.go:90] \"reconcile ending\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"a17ff2bb-e033-43e1-a3f8-f33f1f392902\"\nI1204 22:08:42.457631 1 clustercatalog_controller.go:54] \"reconcile starting\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"03ae2ec6-4e77-4c7f-b42f-882d9d4fe963\"\nI1204 22:08:46.863423 1 clustercatalog_controller.go:90] \"reconcile ending\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"03ae2ec6-4e77-4c7f-b42f-882d9d4fe963\"\nE1204 22:11:48.263476 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE1204 22:12:48.265161 1 leaderelection.go:436] error retrieving resource lock openshift-operator-controller/9c4404e7.operatorframework.io: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io 9c4404e7.operatorframework.io)\nI1204 22:13:01.257918 1 leaderelection.go:297] failed to renew lease openshift-operator-controller/9c4404e7.operatorframework.io: timed out waiting for the condition\nE1204 22:13:01.258073 1 main.go:362] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\n","startedAt":"2025-12-04T22:03:56Z","finishedAt":"2025-12-04T22:13:01Z","containerID":"cri-o://fe4d171382cafc8367d04ba38562e53607a288ace82dafd0c07ed366d2a1ef56"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f952cec1e5332b84bdffa249cd426f39087058d6544ddcec650a414c15a9b68","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f952cec1e5332b84bdffa249cd426f39087058d6544ddcec650a414c15a9b68","containerID":"cri-o://9bd36bdfa3dbe917fb415f401e0843138d225eb2cdd038a07c1fc4862acaf2a9","started":true,"volumeMounts":[{"name":"cache","mountPath":"/var/cache"},{"name":"ca-certs","mountPath":"/var/ca-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-containers","mountPath":"/etc/containers","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-docker","mountPath":"/etc/docker","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-2cfhv","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-network-operator/network-operator-79767b7ff9-8lq7w.json0000640000000000000000000002514515114405062025347 0ustar0000000000000000{"metadata":{"name":"network-operator-79767b7ff9-8lq7w","generateName":"network-operator-79767b7ff9-","namespace":"openshift-network-operator","uid":"871cb002-67f4-43aa-a41d-7a5b2f340059","resourceVersion":"9316","creationTimestamp":"2025-12-04T21:58:24Z","labels":{"name":"network-operator","pod-template-hash":"79767b7ff9"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"network-operator-79767b7ff9","uid":"d5f9cfab-58ae-4e5c-9932-12555a8f6b0c","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"host-etc-kube","hostPath":{"path":"/etc/kubernetes","type":"Directory"}},{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420,"optional":true}},{"name":"kube-api-access-lclkg","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"network-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9724d2036305cbd729e1f484c5bad89971de977fff8a6723fef1873858dd1123","command":["/bin/bash","-c","#!/bin/bash\nset -o allexport\nif [[ -f /etc/kubernetes/apiserver-url.env ]]; then\n source /etc/kubernetes/apiserver-url.env\nelse\n echo \"Error: /etc/kubernetes/apiserver-url.env is missing\"\n exit 1\nfi\nexec /usr/bin/cluster-network-operator start --listen=0.0.0.0:9104\n"],"ports":[{"name":"cno","hostPort":9104,"containerPort":9104,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.29"},{"name":"KUBE_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8b692483c302828daf4a1c5fd5ac89f8ead3fd3d3014740cd95e80d9ec14cb9"},{"name":"KUBE_RBAC_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843"},{"name":"MULTUS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9014f384de5f9a0b7418d5869ad349abb9588d16bd09ed650a163c045315dbff"},{"name":"MULTUS_ADMISSION_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4ecc5bac651ff1942865baee5159582e9602c89b47eeab18400a32abcba8f690"},{"name":"CNI_PLUGINS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:916566bb9d0143352324233d460ad94697719c11c8c9158e3aea8f475941751f"},{"name":"BOND_CNI_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8a3d37aa7a22c68afa963ecfb4b43c52cccf152580cd66e4d5382fb69e4037cc"},{"name":"WHEREABOUTS_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:631a3798b749fecc041a99929eb946618df723e15055e805ff752a1a1273481c"},{"name":"ROUTE_OVERRRIDE_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9432c13d76bd4ba4eb9197c050cf88c0d701fa2055eeb59257e2e23901f9fdff"},{"name":"MULTUS_NETWORKPOLICY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3ca8354f22e89b73f169cb2a51d47f6cc20903844a57240bdb5f5471a55a0c9"},{"name":"OVN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3e65409fc2b27ad0aaeb500a39e264663d2980821f099b830b551785ce4ce8b"},{"name":"OVN_NB_RAFT_ELECTION_TIMER","value":"10"},{"name":"OVN_SB_RAFT_ELECTION_TIMER","value":"16"},{"name":"OVN_NORTHD_PROBE_INTERVAL","value":"10000"},{"name":"OVN_CONTROLLER_INACTIVITY_PROBE","value":"180000"},{"name":"OVN_NB_INACTIVITY_PROBE","value":"60000"},{"name":"EGRESS_ROUTER_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cfde59e48cd5dee3721f34d249cb119cc3259fd857965d34f9c7ed83b0c363a1"},{"name":"NETWORK_METRICS_DAEMON_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2632d7f05d5a992e91038ded81c715898f3fe803420a9b67a0201e9fd8075213"},{"name":"NETWORK_CHECK_SOURCE_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9724d2036305cbd729e1f484c5bad89971de977fff8a6723fef1873858dd1123"},{"name":"NETWORK_CHECK_TARGET_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9724d2036305cbd729e1f484c5bad89971de977fff8a6723fef1873858dd1123"},{"name":"NETWORK_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9724d2036305cbd729e1f484c5bad89971de977fff8a6723fef1873858dd1123"},{"name":"CLOUD_NETWORK_CONFIG_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:18b14f0ccad06d93593440c0702d4d62f209ed80cdc899e0bc2dc0ebf54b006e"},{"name":"CLI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:79f99fd6cce984287932edf0d009660bb488d663081f3d62ec3b23bc8bfbf6c2"},{"name":"FRR_K8S_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11d83fb97d5191861531c5463f84d0852f4383c00e851c32378f35ec3b242f94"},{"name":"NETWORKING_CONSOLE_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2faf0b5a0c3da0538257e1bb8c87f26619b75fd3219fb673a9e5d1ef6ff2feb"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"host-etc-kube","readOnly":true,"mountPath":"/etc/kubernetes"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-lclkg","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-network-operator","serviceAccount":"cluster-network-operator","nodeName":"master-0","hostNetwork":true,"securityContext":{"runAsUser":65534,"runAsNonRoot":true},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"name":"network-operator"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T21:59:01Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T21:58:53Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:04:34Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:04:34Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T21:58:24Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2025-12-04T21:58:53Z","containerStatuses":[{"name":"network-operator","state":{"running":{"startedAt":"2025-12-04T22:03:55Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"eled\nI1204 22:01:46.041461 1 log.go:245] reconciling (/v1, Kind=ServiceAccount) openshift-network-operator/iptables-alerter\nI1204 22:01:46.041631 1 log.go:245] could not apply (/v1, Kind=ServiceAccount) openshift-network-operator/iptables-alerter: failed to apply / update (/v1, Kind=ServiceAccount) openshift-network-operator/iptables-alerter: client rate limiter Wait returned an error: context canceled\nI1204 22:01:46.041680 1 log.go:245] reconciling (rbac.authorization.k8s.io/v1, Kind=ClusterRoleBinding) /openshift-iptables-alerter\nI1204 22:01:46.041847 1 log.go:245] could not apply (rbac.authorization.k8s.io/v1, Kind=ClusterRoleBinding) /openshift-iptables-alerter: failed to apply / update (rbac.authorization.k8s.io/v1, Kind=ClusterRoleBinding) /openshift-iptables-alerter: client rate limiter Wait returned an error: context canceled\nI1204 22:01:46.041899 1 log.go:245] reconciling (/v1, Kind=ConfigMap) openshift-network-operator/iptables-alerter-script\nI1204 22:01:46.042082 1 log.go:245] could not apply (/v1, Kind=ConfigMap) openshift-network-operator/iptables-alerter-script: failed to apply / update (/v1, Kind=ConfigMap) openshift-network-operator/iptables-alerter-script: client rate limiter Wait returned an error: context canceled\nI1204 22:01:46.042138 1 log.go:245] reconciling (apps/v1, Kind=DaemonSet) openshift-network-operator/iptables-alerter\nI1204 22:01:46.042385 1 log.go:245] could not apply (apps/v1, Kind=DaemonSet) openshift-network-operator/iptables-alerter: failed to apply / update (apps/v1, Kind=DaemonSet) openshift-network-operator/iptables-alerter: client rate limiter Wait returned an error: context canceled\nI1204 22:01:51.033840 1 observer_polling.go:162] Shutting down file observer\nF1204 22:02:16.034998 1 operator.go:133] Failed to start controller-runtime manager: failed waiting for all runnables to end within grace period of 30s: context deadline exceeded\nI1204 22:02:16.035041 1 internal.go:550] \"Stopping and waiting for caches\"\n","startedAt":"2025-12-04T21:59:00Z","finishedAt":"2025-12-04T22:02:16Z","containerID":"cri-o://9d7fd4b64c7f9d10b43359385a6360e49aa71c5085c781ef53642cd82a85d004"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9724d2036305cbd729e1f484c5bad89971de977fff8a6723fef1873858dd1123","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9724d2036305cbd729e1f484c5bad89971de977fff8a6723fef1873858dd1123","containerID":"cri-o://59c9203f641c765d2eee366e0bf083a83f8954539e6ae9b99846d431ed362e41","started":true,"volumeMounts":[{"name":"host-etc-kube","mountPath":"/etc/kubernetes","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-lclkg","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-network-node-identity/network-node-identity-nk92d.json0000640000000000000000000002463415114405062025621 0ustar0000000000000000{"metadata":{"name":"network-node-identity-nk92d","generateName":"network-node-identity-","namespace":"openshift-network-node-identity","uid":"634c1df6-de4d-4e26-8c71-d39311cae0ce","resourceVersion":"11648","creationTimestamp":"2025-12-04T21:59:34Z","labels":{"app":"network-node-identity","component":"network","controller-revision-hash":"656c887c88","kubernetes.io/os":"linux","openshift.io/component":"network","pod-template-generation":"1","type":"infra"},"annotations":{"openshift.io/required-scc":"hostnetwork-v2","openshift.io/scc":"hostnetwork-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"DaemonSet","name":"network-node-identity","uid":"1207db9c-de2c-432c-abc9-293e1d31cba4","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"webhook-cert","secret":{"secretName":"network-node-identity-cert","defaultMode":420}},{"name":"env-overrides","configMap":{"name":"env-overrides","defaultMode":420,"optional":true}},{"name":"ovnkube-identity-cm","configMap":{"name":"ovnkube-identity-cm","items":[{"key":"additional-cert-acceptance-cond.json","path":"additional-cert-acceptance-cond.json"},{"key":"additional-pod-admission-cond.json","path":"additional-pod-admission-cond.json"}],"defaultMode":420}},{"name":"kube-api-access-xgt75","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"webhook","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3e65409fc2b27ad0aaeb500a39e264663d2980821f099b830b551785ce4ce8b","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n# OVN-K will try to remove hybrid overlay node annotations even when the hybrid overlay is not enabled.\n# https://github.com/ovn-org/ovn-kubernetes/blob/ac6820df0b338a246f10f412cd5ec903bd234694/go-controller/pkg/ovn/master.go#L791\nho_enable=\"--enable-hybrid-overlay\"\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start webhook\"\n# extra-allowed-user: service account `ovn-kubernetes-control-plane`\n# sets pod annotations in multi-homing layer3 network controller (cluster-manager)\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --webhook-cert-dir=\"/etc/webhook-cert\" \\\n --webhook-host=127.0.0.1 \\\n --webhook-port=9743 \\\n ${ho_enable} \\\n --enable-interconnect \\\n --disable-approver \\\n --extra-allowed-user=\"system:serviceaccount:openshift-ovn-kubernetes:ovn-kubernetes-control-plane\" \\\n --wait-for-kubernetes-api=200s \\\n --pod-admission-conditions=\"/var/run/ovnkube-identity-config/additional-pod-admission-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"2"},{"name":"KUBERNETES_NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-xgt75","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}},{"name":"approver","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3e65409fc2b27ad0aaeb500a39e264663d2980821f099b830b551785ce4ce8b","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start approver\"\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --disable-webhook \\\n --csr-acceptance-conditions=\"/var/run/ovnkube-identity-config/additional-cert-acceptance-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"4"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-xgt75","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":200,"dnsPolicy":"Default","nodeSelector":{"beta.kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"network-node-identity","serviceAccount":"network-node-identity","nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c23,c22"},"supplementalGroups":[1000550000],"fsGroup":1000550000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchFields":[{"key":"metadata.name","operator":"In","values":["master-0"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T21:59:57Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T21:59:34Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:11:50Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:11:50Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T21:59:34Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2025-12-04T21:59:34Z","containerStatuses":[{"name":"approver","state":{"running":{"startedAt":"2025-12-04T22:11:49Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"ontroller-runtime/pkg/cache/internal/informers.go:114\"\nI1204 22:06:12.587375 1 reflector.go:430] \"Caches populated\" logger=\"controller-runtime.cache\" type=\"*v1.CertificateSigningRequest\" reflector=\"sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114\"\nI1204 22:06:12.685563 1 controller.go:186] \"Starting Controller\" controller=\"certificatesigningrequest\" controllerGroup=\"certificates.k8s.io\" controllerKind=\"CertificateSigningRequest\"\nI1204 22:06:12.685626 1 controller.go:195] \"Starting workers\" controller=\"certificatesigningrequest\" controllerGroup=\"certificates.k8s.io\" controllerKind=\"CertificateSigningRequest\" worker count=1\nI1204 22:06:12.686372 1 approver.go:230] Finished syncing CSR csr-wltdj for unknown node in 99.983µs\nI1204 22:06:12.686497 1 approver.go:230] Finished syncing CSR csr-xnmjc for unknown node in 36.971µs\nE1204 22:11:07.703427 1 leaderelection.go:429] Failed to update lock optimistically: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded, falling back to slow path\nE1204 22:11:22.703149 1 leaderelection.go:436] error retrieving resource lock openshift-network-node-identity/ovnkube-identity: Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded\nI1204 22:11:22.703222 1 leaderelection.go:297] failed to renew lease openshift-network-node-identity/ovnkube-identity: context deadline exceeded\nE1204 22:11:37.703607 1 leaderelection.go:322] Failed to release lock: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nF1204 22:11:37.703707 1 ovnkubeidentity.go:309] error running approver: leader election lost\n","startedAt":"2025-12-04T22:03:55Z","finishedAt":"2025-12-04T22:11:37Z","containerID":"cri-o://a1cf3561aceffd368c0ca4d9cb40d000ada9182cc1eeba5246056ae555e8f11e"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3e65409fc2b27ad0aaeb500a39e264663d2980821f099b830b551785ce4ce8b","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3e65409fc2b27ad0aaeb500a39e264663d2980821f099b830b551785ce4ce8b","containerID":"cri-o://2b90cccc4060f63e3151c04577b704a9e40c2c1995c15db065507afb9359b261","started":true,"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-xgt75","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"webhook","state":{"running":{"startedAt":"2025-12-04T21:59:57Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3e65409fc2b27ad0aaeb500a39e264663d2980821f099b830b551785ce4ce8b","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3e65409fc2b27ad0aaeb500a39e264663d2980821f099b830b551785ce4ce8b","containerID":"cri-o://b255dc2ba6c02f78e7fa3f3206067dc5c657701a0d9a3acc7e7566b70c0f286c","started":true,"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-xgt75","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-monitoring/telemeter-client-79f5646748-zd47k.json0000640000000000000000000006313615114405062023751 0ustar0000000000000000{"metadata":{"name":"telemeter-client-79f5646748-zd47k","generateName":"telemeter-client-79f5646748-","namespace":"openshift-monitoring","uid":"0153e881-4d2d-4ff6-9e70-d6163a62970c","resourceVersion":"15213","creationTimestamp":"2025-12-04T22:21:56Z","labels":{"app.kubernetes.io/component":"telemetry-metrics-collector","app.kubernetes.io/managed-by":"cluster-monitoring-operator","app.kubernetes.io/name":"telemeter-client","app.kubernetes.io/part-of":"openshift-monitoring","pod-template-hash":"79f5646748"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.91/23\"],\"mac_address\":\"0a:58:0a:80:00:5b\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.91/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.91\"\n ],\n \"mac\": \"0a:58:0a:80:00:5b\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default","telemeter-token-hash":"d3d3dceeabnr7"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"telemeter-client-79f5646748","uid":"904a231c-ad2d-4754-8b98-fd430d78abc0","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-certs-ca-bundle","configMap":{"name":"telemeter-client-serving-certs-ca-bundle","defaultMode":420}},{"name":"secret-telemeter-client","secret":{"secretName":"telemeter-client","defaultMode":420}},{"name":"telemeter-client-tls","secret":{"secretName":"telemeter-client-tls","defaultMode":420}},{"name":"federate-client-tls","secret":{"secretName":"federate-client-certs","defaultMode":420}},{"name":"secret-telemeter-client-kube-rbac-proxy-config","secret":{"secretName":"telemeter-client-kube-rbac-proxy-config","defaultMode":420}},{"name":"metrics-client-ca","configMap":{"name":"metrics-client-ca","defaultMode":420}},{"name":"telemeter-trusted-ca-bundle","configMap":{"name":"telemeter-trusted-ca-bundle-56c9b9fa8d9gs","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420,"optional":true}},{"name":"kube-api-access-d8sh7","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"telemeter-client","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:445efcbc0255b904e1584fe9be9a513c1a9784088e35dd0abbdff5cae0961861","command":["/usr/bin/telemeter-client","--id=$(ID)","--from=$(FROM)","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key","--from-ca-file=/etc/serving-certs-ca-bundle/service-ca.crt","--from-token-file=/var/run/secrets/kubernetes.io/serviceaccount/token","--to=$(TO)","--to-token-file=/etc/telemeter/token","--listen=localhost:8080","--anonymize-salt-file=/etc/telemeter/salt","--anonymize-labels=$(ANONYMIZE_LABELS)","--match={__name__=~\"cluster:usage:.*\"}","--match={__name__=\"count:up0\"}","--match={__name__=\"count:up1\"}","--match={__name__=\"cluster_version\"}","--match={__name__=\"cluster_version_available_updates\"}","--match={__name__=\"cluster_version_capability\"}","--match={__name__=\"cluster_operator_up\"}","--match={__name__=\"cluster_operator_conditions\"}","--match={__name__=\"cluster_version_payload\"}","--match={__name__=\"cluster_installer\"}","--match={__name__=\"cluster_infrastructure_provider\"}","--match={__name__=\"cluster_feature_set\"}","--match={__name__=\"instance:etcd_object_counts:sum\"}","--match={__name__=\"ALERTS\",alertstate=\"firing\",severity=~\"critical|warning|info|none\"}","--match={__name__=\"code:apiserver_request_total:rate:sum\"}","--match={__name__=\"cluster:capacity_cpu_cores:sum\"}","--match={__name__=\"cluster:capacity_memory_bytes:sum\"}","--match={__name__=\"cluster:cpu_usage_cores:sum\"}","--match={__name__=\"cluster:memory_usage_bytes:sum\"}","--match={__name__=\"openshift:cpu_usage_cores:sum\"}","--match={__name__=\"openshift:memory_usage_bytes:sum\"}","--match={__name__=\"workload:cpu_usage_cores:sum\"}","--match={__name__=\"workload:memory_usage_bytes:sum\"}","--match={__name__=\"cluster:virt_platform_nodes:sum\"}","--match={__name__=\"cluster:node_instance_type_count:sum\"}","--match={__name__=\"cnv:vmi_status_running:count\"}","--match={__name__=\"cnv_abnormal\", reason=~\"memory_working_set_delta_from_request|memory_rss_delta_from_request\"}","--match={__name__=\"cluster:vmi_request_cpu_cores:sum\"}","--match={__name__=\"node_role_os_version_machine:cpu_capacity_cores:sum\"}","--match={__name__=\"node_role_os_version_machine:cpu_capacity_sockets:sum\"}","--match={__name__=\"subscription_sync_total\"}","--match={__name__=\"olm_resolution_duration_seconds\"}","--match={__name__=\"csv_succeeded\"}","--match={__name__=\"csv_abnormal\"}","--match={__name__=\"cluster:kube_persistentvolumeclaim_resource_requests_storage_bytes:provisioner:sum\"}","--match={__name__=\"cluster:kubelet_volume_stats_used_bytes:provisioner:sum\"}","--match={__name__=\"ceph_cluster_total_bytes\"}","--match={__name__=\"ceph_cluster_total_used_raw_bytes\"}","--match={__name__=\"ceph_health_status\"}","--match={__name__=\"odf_system_raw_capacity_total_bytes\"}","--match={__name__=\"odf_system_raw_capacity_used_bytes\"}","--match={__name__=\"odf_system_health_status\"}","--match={__name__=\"job:ceph_osd_metadata:count\"}","--match={__name__=\"job:kube_pv:count\"}","--match={__name__=\"job:odf_system_pvs:count\"}","--match={__name__=\"job:ceph_pools_iops:total\"}","--match={__name__=\"job:ceph_pools_iops_bytes:total\"}","--match={__name__=\"job:ceph_versions_running:count\"}","--match={__name__=\"job:noobaa_total_unhealthy_buckets:sum\"}","--match={__name__=\"job:noobaa_bucket_count:sum\"}","--match={__name__=\"job:noobaa_total_object_count:sum\"}","--match={__name__=\"odf_system_bucket_count\", system_type=\"OCS\", system_vendor=\"Red Hat\"}","--match={__name__=\"odf_system_objects_total\", system_type=\"OCS\", system_vendor=\"Red Hat\"}","--match={__name__=\"noobaa_accounts_num\"}","--match={__name__=\"noobaa_total_usage\"}","--match={__name__=\"console_url\"}","--match={__name__=\"cluster:console_auth_login_requests_total:sum\"}","--match={__name__=\"cluster:console_auth_login_successes_total:sum\"}","--match={__name__=\"cluster:console_auth_login_failures_total:sum\"}","--match={__name__=\"cluster:console_auth_logout_requests_total:sum\"}","--match={__name__=\"cluster:console_usage_users:max\"}","--match={__name__=\"cluster:console_plugins_info:max\"}","--match={__name__=\"cluster:console_customization_perspectives_info:max\"}","--match={__name__=\"cluster:ovnkube_controller_egress_routing_via_host:max\"}","--match={__name__=\"cluster:ovnkube_controller_admin_network_policies_db_objects:max\",table_name=~\"ACL|Address_Set\"}","--match={__name__=\"cluster:ovnkube_controller_baseline_admin_network_policies_db_objects:max\",table_name=~\"ACL|Address_Set\"}","--match={__name__=\"cluster:ovnkube_controller_admin_network_policies_rules:max\",direction=~\"Ingress|Egress\",action=~\"Pass|Allow|Deny\"}","--match={__name__=\"cluster:ovnkube_controller_baseline_admin_network_policies_rules:max\",direction=~\"Ingress|Egress\",action=~\"Allow|Deny\"}","--match={__name__=\"cluster:network_attachment_definition_instances:max\"}","--match={__name__=\"cluster:network_attachment_definition_enabled_instance_up:max\"}","--match={__name__=\"cluster:ingress_controller_aws_nlb_active:sum\"}","--match={__name__=\"cluster:route_metrics_controller_routes_per_shard:min\"}","--match={__name__=\"cluster:route_metrics_controller_routes_per_shard:max\"}","--match={__name__=\"cluster:route_metrics_controller_routes_per_shard:avg\"}","--match={__name__=\"cluster:route_metrics_controller_routes_per_shard:median\"}","--match={__name__=\"cluster:openshift_route_info:tls_termination:sum\"}","--match={__name__=\"insightsclient_request_send_total\"}","--match={__name__=\"cam_app_workload_migrations\"}","--match={__name__=\"cluster:apiserver_current_inflight_requests:sum:max_over_time:2m\"}","--match={__name__=\"cluster:alertmanager_integrations:max\"}","--match={__name__=\"cluster:telemetry_selected_series:count\"}","--match={__name__=\"openshift:prometheus_tsdb_head_series:sum\"}","--match={__name__=\"openshift:prometheus_tsdb_head_samples_appended_total:sum\"}","--match={__name__=\"monitoring:container_memory_working_set_bytes:sum\"}","--match={__name__=\"namespace_job:scrape_series_added:topk3_sum1h\"}","--match={__name__=\"namespace_job:scrape_samples_post_metric_relabeling:topk3\"}","--match={__name__=\"monitoring:haproxy_server_http_responses_total:sum\"}","--match={__name__=\"profile:cluster_monitoring_operator_collection_profile:max\"}","--match={__name__=\"vendor_model:node_accelerator_cards:sum\",vendor=~\"NVIDIA|AMD|GAUDI|INTEL|QUALCOMM\"}","--match={__name__=\"rhmi_status\"}","--match={__name__=\"status:upgrading:version:rhoam_state:max\"}","--match={__name__=\"state:rhoam_critical_alerts:max\"}","--match={__name__=\"state:rhoam_warning_alerts:max\"}","--match={__name__=\"rhoam_7d_slo_percentile:max\"}","--match={__name__=\"rhoam_7d_slo_remaining_error_budget:max\"}","--match={__name__=\"cluster_legacy_scheduler_policy\"}","--match={__name__=\"cluster_master_schedulable\"}","--match={__name__=\"che_workspace_status\"}","--match={__name__=\"che_workspace_started_total\"}","--match={__name__=\"che_workspace_failure_total\"}","--match={__name__=\"che_workspace_start_time_seconds_sum\"}","--match={__name__=\"che_workspace_start_time_seconds_count\"}","--match={__name__=\"cco_credentials_mode\"}","--match={__name__=\"cluster:kube_persistentvolume_plugin_type_counts:sum\"}","--match={__name__=\"acm_managed_cluster_info\"}","--match={__name__=\"acm_managed_cluster_worker_cores:max\"}","--match={__name__=\"acm_console_page_count:sum\", page=~\"overview-classic|overview-fleet|search|search-details|clusters|application|governance\"}","--match={__name__=\"cluster:vsphere_vcenter_info:sum\"}","--match={__name__=\"cluster:vsphere_esxi_version_total:sum\"}","--match={__name__=\"cluster:vsphere_node_hw_version_total:sum\"}","--match={__name__=\"openshift:build_by_strategy:sum\"}","--match={__name__=\"rhods_aggregate_availability\"}","--match={__name__=\"rhods_total_users\"}","--match={__name__=\"instance:etcd_disk_wal_fsync_duration_seconds:histogram_quantile\",quantile=\"0.99\"}","--match={__name__=\"instance:etcd_mvcc_db_total_size_in_bytes:sum\"}","--match={__name__=\"instance:etcd_network_peer_round_trip_time_seconds:histogram_quantile\",quantile=\"0.99\"}","--match={__name__=\"instance:etcd_mvcc_db_total_size_in_use_in_bytes:sum\"}","--match={__name__=\"instance:etcd_disk_backend_commit_duration_seconds:histogram_quantile\",quantile=\"0.99\"}","--match={__name__=\"jaeger_operator_instances_storage_types\"}","--match={__name__=\"jaeger_operator_instances_strategies\"}","--match={__name__=\"jaeger_operator_instances_agent_strategies\"}","--match={__name__=\"type:tempo_operator_tempostack_storage_backend:sum\",type=~\"azure|gcs|s3\"}","--match={__name__=\"state:tempo_operator_tempostack_managed:sum\",state=~\"Managed|Unmanaged\"}","--match={__name__=\"type:tempo_operator_tempostack_multi_tenancy:sum\",type=~\"enabled|disabled\"}","--match={__name__=\"enabled:tempo_operator_tempostack_jaeger_ui:sum\",enabled=~\"true|false\"}","--match={__name__=\"type:opentelemetry_collector_receivers:sum\",type=~\"jaegerreceiver|hostmetricsreceiver|opencensusreceiver|prometheusreceiver|zipkinreceiver|kafkareceiver|filelogreceiver|journaldreceiver|k8seventsreceiver|kubeletstatsreceiver|k8sclusterreceiver|k8sobjectsreceiver\"}","--match={__name__=\"type:opentelemetry_collector_exporters:sum\",type=~\"debugexporter|loggingexporter|otlpexporter|otlphttpexporter|prometheusexporter|lokiexporter|kafkaexporter|awscloudwatchlogsexporter|loadbalancingexporter\"}","--match={__name__=\"type:opentelemetry_collector_processors:sum\",type=~\"batchprocessor|memorylimiterprocessor|attributesprocessor|resourceprocessor|spanprocessor|k8sattributesprocessor|resourcedetectionprocessor|filterprocessor|routingprocessor|cumulativetodeltaprocessor|groupbyattrsprocessor\"}","--match={__name__=\"type:opentelemetry_collector_extensions:sum\",type=~\"zpagesextension|ballastextension|memorylimiterextension|jaegerremotesampling|healthcheckextension|pprofextension|oauth2clientauthextension|oidcauthextension|bearertokenauthextension|filestorage\"}","--match={__name__=\"type:opentelemetry_collector_connectors:sum\",type=~\"spanmetricsconnector|forwardconnector\"}","--match={__name__=\"type:opentelemetry_collector_info:sum\",type=~\"deployment|daemonset|sidecar|statefulset\"}","--match={__name__=\"appsvcs:cores_by_product:sum\"}","--match={__name__=\"nto_custom_profiles:count\"}","--match={__name__=\"openshift_csi_share_configmap\"}","--match={__name__=\"openshift_csi_share_secret\"}","--match={__name__=\"openshift_csi_share_mount_failures_total\"}","--match={__name__=\"openshift_csi_share_mount_requests_total\"}","--match={__name__=\"eo_es_storage_info\"}","--match={__name__=\"eo_es_redundancy_policy_info\"}","--match={__name__=\"eo_es_defined_delete_namespaces_total\"}","--match={__name__=\"eo_es_misconfigured_memory_resources_info\"}","--match={__name__=\"cluster:eo_es_data_nodes_total:max\"}","--match={__name__=\"cluster:eo_es_documents_created_total:sum\"}","--match={__name__=\"cluster:eo_es_documents_deleted_total:sum\"}","--match={__name__=\"pod:eo_es_shards_total:max\"}","--match={__name__=\"eo_es_cluster_management_state_info\"}","--match={__name__=\"imageregistry:imagestreamtags_count:sum\"}","--match={__name__=\"imageregistry:operations_count:sum\"}","--match={__name__=\"log_logging_info\"}","--match={__name__=\"log_collector_error_count_total\"}","--match={__name__=\"log_forwarder_pipeline_info\"}","--match={__name__=\"log_forwarder_input_info\"}","--match={__name__=\"log_forwarder_output_info\"}","--match={__name__=\"cluster:log_collected_bytes_total:sum\"}","--match={__name__=\"cluster:log_logged_bytes_total:sum\"}","--match={__name__=\"openshift_logging:log_forwarder_pipelines:sum\"}","--match={__name__=\"openshift_logging:log_forwarders:sum\"}","--match={__name__=\"openshift_logging:log_forwarder_input_type:sum\"}","--match={__name__=\"openshift_logging:log_forwarder_output_type:sum\"}","--match={__name__=\"openshift_logging:vector_component_received_bytes_total:rate5m\"}","--match={__name__=\"cluster:kata_monitor_running_shim_count:sum\"}","--match={__name__=\"platform:hypershift_hostedclusters:max\"}","--match={__name__=\"platform:hypershift_nodepools:max\"}","--match={__name__=\"cluster_name:hypershift_nodepools_size:sum\"}","--match={__name__=\"cluster_name:hypershift_nodepools_available_replicas:sum\"}","--match={__name__=\"namespace:noobaa_unhealthy_bucket_claims:max\"}","--match={__name__=\"namespace:noobaa_buckets_claims:max\"}","--match={__name__=\"namespace:noobaa_unhealthy_namespace_resources:max\"}","--match={__name__=\"namespace:noobaa_namespace_resources:max\"}","--match={__name__=\"namespace:noobaa_unhealthy_namespace_buckets:max\"}","--match={__name__=\"namespace:noobaa_namespace_buckets:max\"}","--match={__name__=\"namespace:noobaa_accounts:max\"}","--match={__name__=\"namespace:noobaa_usage:max\"}","--match={__name__=\"namespace:noobaa_system_health_status:max\"}","--match={__name__=\"ocs_advanced_feature_usage\"}","--match={__name__=\"os_image_url_override:sum\"}","--match={__name__=\"cluster:mcd_nodes_with_unsupported_packages:count\"}","--match={__name__=\"cluster:mcd_total_unsupported_packages:sum\"}","--match={__name__=\"cluster:vsphere_topology_tags:max\"}","--match={__name__=\"cluster:vsphere_infrastructure_failure_domains:max\"}","--match={__name__=\"apiserver_list_watch_request_success_total:rate:sum\", verb=~\"LIST|WATCH\"}","--match={__name__=\"rhacs:telemetry:rox_central_info\"}","--match={__name__=\"rhacs:telemetry:rox_central_secured_clusters\"}","--match={__name__=\"rhacs:telemetry:rox_central_secured_nodes\"}","--match={__name__=\"rhacs:telemetry:rox_central_secured_vcpus\"}","--match={__name__=\"rhacs:telemetry:rox_sensor_info\"}","--match={__name__=\"cluster:volume_manager_selinux_pod_context_mismatch_total\"}","--match={__name__=\"cluster:volume_manager_selinux_volume_context_mismatch_warnings_total\"}","--match={__name__=\"cluster:volume_manager_selinux_volume_context_mismatch_errors_total\"}","--match={__name__=\"cluster:volume_manager_selinux_volumes_admitted_total\"}","--match={__name__=\"ols:provider_model_configuration\"}","--match={__name__=\"ols:rest_api_query_calls_total:2xx\"}","--match={__name__=\"ols:rest_api_query_calls_total:4xx\"}","--match={__name__=\"ols:rest_api_query_calls_total:5xx\"}","--match={__name__=\"openshift:openshift_network_operator_ipsec_state:info\"}","--match={__name__=\"cluster:health:group_severity:count\", severity=~\"critical|warning|info|none\"}","--limit-bytes=5242880"],"ports":[{"name":"http","containerPort":8080,"protocol":"TCP"}],"env":[{"name":"ANONYMIZE_LABELS"},{"name":"FROM","value":"https://prometheus-k8s.openshift-monitoring.svc:9091"},{"name":"ID","value":"e71be598-5536-4e25-8847-07e0c01660c4"},{"name":"TO","value":"https://infogw.api.openshift.com/"},{"name":"HTTP_PROXY"},{"name":"HTTPS_PROXY"},{"name":"NO_PROXY"}],"resources":{"requests":{"cpu":"1m","memory":"40Mi"}},"volumeMounts":[{"name":"serving-certs-ca-bundle","mountPath":"/etc/serving-certs-ca-bundle"},{"name":"secret-telemeter-client","mountPath":"/etc/telemeter"},{"name":"federate-client-tls","mountPath":"/etc/tls/private"},{"name":"telemeter-trusted-ca-bundle","readOnly":true,"mountPath":"/etc/pki/ca-trust/extracted/pem/"},{"name":"kube-api-access-d8sh7","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000460000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}},{"name":"reload","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7d0b49cba33162ab0c486a96c5767cf5ed237a065cf6a4e2fc01d60a13f418bf","args":["--reload-url=http://localhost:8080/-/reload","--watched-dir=/etc/serving-certs-ca-bundle"],"resources":{"requests":{"cpu":"1m","memory":"10Mi"}},"volumeMounts":[{"name":"serving-certs-ca-bundle","mountPath":"/etc/serving-certs-ca-bundle"},{"name":"kube-api-access-d8sh7","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000460000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","args":["--secure-listen-address=:8443","--upstream=http://127.0.0.1:8080/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--config-file=/etc/kube-rbac-policy/config.yaml","--client-ca-file=/etc/tls/client/client-ca.crt","--tls-min-version=VersionTLS12"],"ports":[{"name":"https","containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"1m","memory":"20Mi"}},"volumeMounts":[{"name":"telemeter-client-tls","mountPath":"/etc/tls/private"},{"name":"secret-telemeter-client-kube-rbac-proxy-config","readOnly":true,"mountPath":"/etc/kube-rbac-policy"},{"name":"metrics-client-ca","readOnly":true,"mountPath":"/etc/tls/client"},{"name":"kube-api-access-d8sh7","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000460000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux"},"serviceAccountName":"telemeter-client","serviceAccount":"telemeter-client","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c21,c20"},"fsGroup":1000460000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:23:05Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:21:56Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:23:06Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:23:06Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:21:56Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.91","podIPs":[{"ip":"10.128.0.91"}],"startTime":"2025-12-04T22:21:56Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2025-12-04T22:23:04Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","containerID":"cri-o://d72b55e9ea78ffbcf8282934c892e2c916012a7e67b0f1a49e01e690cdc6ad9e","started":true,"volumeMounts":[{"name":"telemeter-client-tls","mountPath":"/etc/tls/private"},{"name":"secret-telemeter-client-kube-rbac-proxy-config","mountPath":"/etc/kube-rbac-policy","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"metrics-client-ca","mountPath":"/etc/tls/client","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-d8sh7","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"reload","state":{"running":{"startedAt":"2025-12-04T22:23:04Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7d0b49cba33162ab0c486a96c5767cf5ed237a065cf6a4e2fc01d60a13f418bf","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7d0b49cba33162ab0c486a96c5767cf5ed237a065cf6a4e2fc01d60a13f418bf","containerID":"cri-o://17da0ab850254a2a063d8712b7f6bf1daeb7320e69b76aa8d6aa2533dd59d636","started":true,"volumeMounts":[{"name":"serving-certs-ca-bundle","mountPath":"/etc/serving-certs-ca-bundle"},{"name":"kube-api-access-d8sh7","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"telemeter-client","state":{"running":{"startedAt":"2025-12-04T22:23:05Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"level=info caller=main.go:102 ts=2025-12-04T22:23:04.513401187Z msg=\"telemeter client initialized\"\nlevel=warn caller=forwarder.go:139 ts=2025-12-04T22:23:04.513640603Z component=forwarder msg=\"not anonymizing any labels\"\nlevel=debug caller=forwarder.go:156 ts=2025-12-04T22:23:04.513651434Z component=forwarder msg=\"TLS configuration\" ca_file=/etc/serving-certs-ca-bundle/service-ca.crt cert_file=/etc/tls/private/tls.crt key_file=/etc/tls/private/tls.key\nlevel=error caller=main.go:105 ts=2025-12-04T22:23:04.540935079Z err=\"failed to configure Telemeter client: failed to read from-ca-file: open /etc/serving-certs-ca-bundle/service-ca.crt: no such file or directory\"\n","startedAt":"2025-12-04T22:23:04Z","finishedAt":"2025-12-04T22:23:04Z","containerID":"cri-o://e2a63d079e5ee11958ec39f8f4a8f847c989ad7e18e50f889fb7e7fc75f4ff71"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:445efcbc0255b904e1584fe9be9a513c1a9784088e35dd0abbdff5cae0961861","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:445efcbc0255b904e1584fe9be9a513c1a9784088e35dd0abbdff5cae0961861","containerID":"cri-o://cc4a2835a4e8f84e9bb0ba6a8f75fdbdd29ec77815f9371e8d44d23d85695393","started":true,"volumeMounts":[{"name":"serving-certs-ca-bundle","mountPath":"/etc/serving-certs-ca-bundle"},{"name":"secret-telemeter-client","mountPath":"/etc/telemeter"},{"name":"federate-client-tls","mountPath":"/etc/tls/private"},{"name":"telemeter-trusted-ca-bundle","mountPath":"/etc/pki/ca-trust/extracted/pem/","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-d8sh7","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-machine-config-operator/kube-rbac-proxy-crio-master-0.json0000640000000000000000000001513715114405062026256 0ustar0000000000000000{"metadata":{"name":"kube-rbac-proxy-crio-master-0","namespace":"openshift-machine-config-operator","uid":"5ef247a2-889f-446d-baf6-78279adc2ccc","resourceVersion":"13127","creationTimestamp":"2025-12-04T21:59:45Z","annotations":{"kubernetes.io/config.hash":"3169f44496ed8a28c6d6a15511ab0eec","kubernetes.io/config.mirror":"3169f44496ed8a28c6d6a15511ab0eec","kubernetes.io/config.seen":"2025-12-04T21:57:49.959413624Z","kubernetes.io/config.source":"file","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"730d6115-08f3-4ffe-b3c5-a4e6fa7e6675","controller":true}]},"spec":{"volumes":[{"name":"etc-kube","hostPath":{"path":"/etc/kubernetes","type":""}},{"name":"var-lib-kubelet","hostPath":{"path":"/var/lib/kubelet","type":""}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","command":["/bin/bash","-ec"],"args":["echo -n \"Waiting for kubelet key and certificate to be available\"\nwhile [ -n \"$(test -e /var/lib/kubelet/pki/kubelet-server-current.pem)\" ] ; do\n echo -n \".\"\n sleep 1\n (( tries += 1 ))\n if [[ \"${tries}\" -gt 10 ]]; then\n echo \"Timed out waiting for kubelet key and cert.\"\n exit 1\n fi\ndone\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"var-lib-kubelet","mountPath":"/var","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"kube-rbac-proxy-crio","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","args":["--secure-listen-address=:9637","--config-file=/etc/kubernetes/crio-metrics-proxy.cfg","--client-ca-file=/etc/kubernetes/kubelet-ca.crt","--logtostderr=true","--kubeconfig=/var/lib/kubelet/kubeconfig","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12","--upstream=http://127.0.0.1:9537","--tls-cert-file=/var/lib/kubelet/pki/kubelet-server-current.pem","--tls-private-key-file=/var/lib/kubelet/pki/kubelet-server-current.pem"],"ports":[{"hostPort":9637,"containerPort":9637,"protocol":"TCP"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-kube","readOnly":true,"mountPath":"/etc/kubernetes","mountPropagation":"HostToContainer"},{"name":"var-lib-kubelet","readOnly":true,"mountPath":"/var/lib/kubelet","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:19:37Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:19:37Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:19:37Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:19:37Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:19:37Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2025-12-04T22:19:37Z","initContainerStatuses":[{"name":"setup","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2025-12-04T21:57:54Z","finishedAt":"2025-12-04T21:57:54Z","containerID":"cri-o://7ab8b346978ad6f1cf331a2cd2e464eb81897737f06c530111b331aae07ed9d5"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","containerID":"cri-o://7ab8b346978ad6f1cf331a2cd2e464eb81897737f06c530111b331aae07ed9d5","started":false}],"containerStatuses":[{"name":"kube-rbac-proxy-crio","state":{"running":{"startedAt":"2025-12-04T21:58:39Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"W1204 21:58:13.487613 1 deprecated.go:66] \n==== Removed Flag Warning ======================\n\nlogtostderr is removed in the k8s upstream and has no effect any more.\n\n===============================================\n\t\t\nI1204 21:58:13.488105 1 kube-rbac-proxy.go:530] Reading config file: /etc/kubernetes/crio-metrics-proxy.cfg\nE1204 21:58:13.490203 1 run.go:72] \"command failed\" err=\"failed to load kubeconfig: unable to build rest config based on provided path to kubeconfig file: invalid configuration: [unable to read client-cert /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory, unable to read client-key /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory]\"\n","startedAt":"2025-12-04T21:58:13Z","finishedAt":"2025-12-04T21:58:13Z","containerID":"cri-o://b6f9e5d170c5c01abcc938a01683f90fda3ae8ba34521ff9d208045fb85cbe9d"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","containerID":"cri-o://587901d613877303166a73aefe83b729a828ee57d294468839ecb48ee62967aa","started":true}],"qosClass":"Burstable"}}config/pod/openshift-machine-api/machine-api-operator-88d48b57d-pp4fd.json0000640000000000000000000002376215114405062024620 0ustar0000000000000000{"metadata":{"name":"machine-api-operator-88d48b57d-pp4fd","generateName":"machine-api-operator-88d48b57d-","namespace":"openshift-machine-api","uid":"74b6acf7-78a4-449e-82e2-f1ed8d7ed1b9","resourceVersion":"11657","creationTimestamp":"2025-12-04T22:01:34Z","labels":{"k8s-app":"machine-api-operator","pod-template-hash":"88d48b57d"},"annotations":{"capability.openshift.io/name":"MachineAPI","k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.58/23\"],\"mac_address\":\"0a:58:0a:80:00:3a\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.58/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.58\"\n ],\n \"mac\": \"0a:58:0a:80:00:3a\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"machine-api-operator","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"machine-api-operator-88d48b57d","uid":"748bfae3-7799-4fb1-945b-6caeb3a87bd5","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config","configMap":{"name":"kube-rbac-proxy","defaultMode":420}},{"name":"images","configMap":{"name":"machine-api-operator-images","defaultMode":420}},{"name":"machine-api-operator-tls","secret":{"secretName":"machine-api-operator-tls","defaultMode":420}},{"name":"kube-api-access-4g7n9","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","args":["--secure-listen-address=0.0.0.0:8443","--upstream=http://localhost:8080/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key","--config-file=/etc/kube-rbac-proxy/config-file.yaml","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305","--logtostderr=true","--v=3"],"ports":[{"name":"https","containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"config","mountPath":"/etc/kube-rbac-proxy"},{"name":"machine-api-operator-tls","mountPath":"/etc/tls/private"},{"name":"kube-api-access-4g7n9","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000500000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}},{"name":"machine-api-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7c2431a990bcddde98829abda81950247021a2ebbabc964b1516ea046b5f1d4e","command":["/machine-api-operator"],"args":["start","--images-json=/etc/machine-api-operator-config/images/images.json","--alsologtostderr","--v=3"],"env":[{"name":"RELEASE_VERSION","value":"4.18.29"},{"name":"COMPONENT_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"METRICS_PORT","value":"8080"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"images","mountPath":"/etc/machine-api-operator-config/images"},{"name":"kube-api-access-4g7n9","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000500000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"machine-api-operator","serviceAccount":"machine-api-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c22,c19"},"fsGroup":1000500000,"seccompProfile":{"type":"RuntimeDefault"}},"imagePullSecrets":[{"name":"machine-api-operator-dockercfg-mw665"}],"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:01:56Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:01:34Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:13:28Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:13:28Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:01:34Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.58","podIPs":[{"ip":"10.128.0.58"}],"startTime":"2025-12-04T22:01:34Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2025-12-04T22:01:43Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","containerID":"cri-o://7031d386f42300ef917c16f433aec3d9b72a6769b546f2943379602f68aa4683","started":true,"volumeMounts":[{"name":"config","mountPath":"/etc/kube-rbac-proxy"},{"name":"machine-api-operator-tls","mountPath":"/etc/tls/private"},{"name":"kube-api-access-4g7n9","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"machine-api-operator","state":{"running":{"startedAt":"2025-12-04T22:13:27Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"1:443/apis/config.openshift.io/v1/proxies/cluster\nI1204 22:05:03.588624 1 request.go:632] Waited for 196.504018ms due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/apis/config.openshift.io/v1/clusteroperators/machine-api\nI1204 22:05:03.931291 1 status.go:69] Syncing status: re-syncing\nI1204 22:05:03.988768 1 request.go:632] Waited for 57.274529ms due to client-side throttling, not priority and fairness, request: PUT:https://172.30.0.1:443/apis/config.openshift.io/v1/clusteroperators/machine-api/status\nI1204 22:05:03.999217 1 sync.go:77] Provider is NoOp, skipping synchronisation\nI1204 22:05:04.187876 1 request.go:632] Waited for 188.536275ms due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/apis/config.openshift.io/v1/clusteroperators/machine-api\nI1204 22:05:04.192122 1 status.go:99] Syncing status: available\nI1204 22:05:04.388799 1 request.go:632] Waited for 196.494728ms due to client-side throttling, not priority and fairness, request: PUT:https://172.30.0.1:443/apis/config.openshift.io/v1/clusteroperators/machine-api/status\nE1204 22:11:39.812184 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE1204 22:12:39.813691 1 leaderelection.go:436] error retrieving resource lock openshift-machine-api/machine-api-operator: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io machine-api-operator)\nI1204 22:12:52.809703 1 leaderelection.go:297] failed to renew lease openshift-machine-api/machine-api-operator: timed out waiting for the condition\nE1204 22:13:26.819529 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded\nF1204 22:13:26.819597 1 start.go:104] Leader election lost\n","startedAt":"2025-12-04T22:01:55Z","finishedAt":"2025-12-04T22:13:26Z","containerID":"cri-o://6d31ad2a1f5237b4355ed2f39e4e13656076c4a85f80a08d5d712a1a6ab75238"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7c2431a990bcddde98829abda81950247021a2ebbabc964b1516ea046b5f1d4e","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7c2431a990bcddde98829abda81950247021a2ebbabc964b1516ea046b5f1d4e","containerID":"cri-o://1bc5ab124190b2c59d84b58250cc263ddcafcb9537dd2db02384165b00676c7f","started":true,"volumeMounts":[{"name":"images","mountPath":"/etc/machine-api-operator-config/images"},{"name":"kube-api-access-4g7n9","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-machine-api/control-plane-machine-set-operator-7df95c79b5-nznvn.json0000640000000000000000000001763215114405062027717 0ustar0000000000000000{"metadata":{"name":"control-plane-machine-set-operator-7df95c79b5-nznvn","generateName":"control-plane-machine-set-operator-7df95c79b5-","namespace":"openshift-machine-api","uid":"f1534e25-7add-46a1-8f4e-0065c232aa4e","resourceVersion":"11640","creationTimestamp":"2025-12-04T22:01:22Z","labels":{"k8s-app":"control-plane-machine-set-operator","pod-template-hash":"7df95c79b5"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.45/23\"],\"mac_address\":\"0a:58:0a:80:00:2d\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.45/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.45\"\n ],\n \"mac\": \"0a:58:0a:80:00:2d\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"control-plane-machine-set-operator-7df95c79b5","uid":"53b12d2d-6fb8-4bee-94fc-e1a2dfa54fc1","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"control-plane-machine-set-operator-tls","secret":{"secretName":"control-plane-machine-set-operator-tls","defaultMode":420}},{"name":"kube-api-access-4d7pj","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"control-plane-machine-set-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fd3e9f8f00a59bda7483ec7dc8a0ed602f9ca30e3d72b22072dbdf2819da3f61","command":["/manager"],"args":["-v=2","--leader-elect=true","--leader-elect-lease-duration=137s","--leader-elect-renew-deadline=107s","--leader-elect-retry-period=26s","--leader-elect-resource-namespace=openshift-machine-api"],"ports":[{"name":"https","containerPort":9443,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.29"},{"name":"COMPONENT_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"control-plane-machine-set-operator-tls","mountPath":"/tmp/k8s-webhook-server/serving-certs"},{"name":"kube-api-access-4d7pj","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000500000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"control-plane-machine-set-operator","serviceAccount":"control-plane-machine-set-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c22,c19"},"fsGroup":1000500000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:01:28Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:01:22Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:13:48Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:13:48Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:01:22Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.45","podIPs":[{"ip":"10.128.0.45"}],"startTime":"2025-12-04T22:01:22Z","containerStatuses":[{"name":"control-plane-machine-set-operator","state":{"running":{"startedAt":"2025-12-04T22:13:47Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"\"adbb9f40-f767-41b0-9b86-b630a63cb7a1\",\"apiVersion\":\"coordination.k8s.io/v1\",\"resourceVersion\":\"11033\"} reason=\"LeaderElection\"\nI1204 22:07:19.689477 1 controller.go:217] \"Starting workers\" controller=\"controlplanemachineset\" worker count=1\nI1204 22:07:19.689634 1 controller.go:170] \"Reconciling control plane machine set\" controller=\"controlplanemachineset\" reconcileID=\"a02cb707-4f08-4c38-88c1-188f28bc0e4a\" namespace=\"openshift-machine-api\" name=\"cluster\"\nI1204 22:07:19.689752 1 controller.go:178] \"No control plane machine set found, setting operator status available\" controller=\"controlplanemachineset\" reconcileID=\"a02cb707-4f08-4c38-88c1-188f28bc0e4a\" namespace=\"openshift-machine-api\" name=\"cluster\"\nI1204 22:07:19.689820 1 controller.go:184] \"Finished reconciling control plane machine set\" controller=\"controlplanemachineset\" reconcileID=\"a02cb707-4f08-4c38-88c1-188f28bc0e4a\" namespace=\"openshift-machine-api\" name=\"cluster\"\nI1204 22:07:19.691651 1 controller.go:217] \"Starting workers\" controller=\"controlplanemachinesetgenerator\" worker count=1\nE1204 22:11:47.674369 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE1204 22:12:47.675675 1 leaderelection.go:436] error retrieving resource lock openshift-machine-api/control-plane-machine-set-leader: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io control-plane-machine-set-leader)\nI1204 22:13:00.668192 1 leaderelection.go:297] failed to renew lease openshift-machine-api/control-plane-machine-set-leader: timed out waiting for the condition\nE1204 22:13:34.674712 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded\nE1204 22:13:34.674878 1 main.go:233] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\n","startedAt":"2025-12-04T22:04:34Z","finishedAt":"2025-12-04T22:13:34Z","containerID":"cri-o://893b1713daa62af184411a3e5a2cfc2bd5735ca25c31751314839bd533678913"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fd3e9f8f00a59bda7483ec7dc8a0ed602f9ca30e3d72b22072dbdf2819da3f61","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fd3e9f8f00a59bda7483ec7dc8a0ed602f9ca30e3d72b22072dbdf2819da3f61","containerID":"cri-o://a2b5c7a83b5284024cd6037f9bc3ab61da8f64f7c1155c2976623ada6236de54","started":true,"volumeMounts":[{"name":"control-plane-machine-set-operator-tls","mountPath":"/tmp/k8s-webhook-server/serving-certs"},{"name":"kube-api-access-4d7pj","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-machine-api/cluster-baremetal-operator-78f758c7b9-44srj.json0000640000000000000000000002073615114405062026103 0ustar0000000000000000{"metadata":{"name":"cluster-baremetal-operator-78f758c7b9-44srj","generateName":"cluster-baremetal-operator-78f758c7b9-","namespace":"openshift-machine-api","uid":"a3899a38-39b8-4b48-81e5-4d8854ecc8ab","resourceVersion":"11659","creationTimestamp":"2025-12-04T22:01:31Z","labels":{"k8s-app":"cluster-baremetal-operator","pod-template-hash":"78f758c7b9"},"annotations":{"capability.openshift.io/name":"baremetal","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.51/23\"],\"mac_address\":\"0a:58:0a:80:00:33\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.51/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.51\"\n ],\n \"mac\": \"0a:58:0a:80:00:33\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-baremetal-operator-78f758c7b9","uid":"731d40c4-7c7f-4ad9-a199-a88b1181a36e","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cert","secret":{"secretName":"cluster-baremetal-webhook-server-cert","defaultMode":420}},{"name":"config","configMap":{"name":"baremetal-kube-rbac-proxy","defaultMode":420}},{"name":"cluster-baremetal-operator-tls","secret":{"secretName":"cluster-baremetal-operator-tls","defaultMode":420}},{"name":"images","configMap":{"name":"cluster-baremetal-operator-images","defaultMode":420}},{"name":"kube-api-access-pt2jq","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-baremetal-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a92c310ce30dcb3de85d6aac868e0d80919670fa29ef83d55edd96b0cae35563","command":["/usr/bin/cluster-baremetal-operator"],"args":["--enable-leader-election"],"ports":[{"name":"webhook-server","containerPort":9443,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.29"},{"name":"COMPONENT_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"METRICS_PORT","value":"8080"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"cert","readOnly":true,"mountPath":"/etc/cluster-baremetal-operator/tls"},{"name":"images","readOnly":true,"mountPath":"/etc/cluster-baremetal-operator/images"},{"name":"kube-api-access-pt2jq","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]}}},{"name":"baremetal-kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","args":["--secure-listen-address=0.0.0.0:8443","--upstream=http://localhost:8080/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305","--config-file=/etc/baremetal-kube-rbac-proxy/config-file.yaml","--logtostderr=true","--v=10"],"ports":[{"name":"https","containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"config","mountPath":"/etc/baremetal-kube-rbac-proxy"},{"name":"cluster-baremetal-operator-tls","mountPath":"/etc/tls/private"},{"name":"kube-api-access-pt2jq","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]}}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-baremetal-operator","serviceAccount":"cluster-baremetal-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c22,c19"},"runAsUser":65534,"runAsNonRoot":true},"imagePullSecrets":[{"name":"cluster-baremetal-operator-dockercfg-zpcfd"}],"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:01:44Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:01:31Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:15:06Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:15:06Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:01:31Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.51","podIPs":[{"ip":"10.128.0.51"}],"startTime":"2025-12-04T22:01:31Z","containerStatuses":[{"name":"baremetal-kube-rbac-proxy","state":{"running":{"startedAt":"2025-12-04T22:01:43Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","containerID":"cri-o://4187b1d7d08b53bf4814dc4dfbd0a6ff2e8881049bae7dd2ea8c02223e861224","started":true,"volumeMounts":[{"name":"config","mountPath":"/etc/baremetal-kube-rbac-proxy"},{"name":"cluster-baremetal-operator-tls","mountPath":"/etc/tls/private"},{"name":"kube-api-access-pt2jq","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"cluster-baremetal-operator","state":{"running":{"startedAt":"2025-12-04T22:15:05Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"E1204 22:14:38.658842 1 main.go:144] \"unable to get enabled features\" err=\"unable to determine Platform: the server was unable to return a response in the time allotted, but may still be processing the request (get infrastructures.config.openshift.io cluster)\"\n","startedAt":"2025-12-04T22:13:38Z","finishedAt":"2025-12-04T22:14:38Z","containerID":"cri-o://45f93308614301d84cb0176bf1dabc3de4bbaffff580b91a3cb5db6707e27be7"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a92c310ce30dcb3de85d6aac868e0d80919670fa29ef83d55edd96b0cae35563","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a92c310ce30dcb3de85d6aac868e0d80919670fa29ef83d55edd96b0cae35563","containerID":"cri-o://464365c5b542ffa135ae1b7b53dc0c8855618211c6ebb6a47be42bdf1f3e9e4e","started":true,"volumeMounts":[{"name":"cert","mountPath":"/etc/cluster-baremetal-operator/tls","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"images","mountPath":"/etc/cluster-baremetal-operator/images","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-pt2jq","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-machine-api/cluster-autoscaler-operator-5f49d774cd-5m4l9.json0000640000000000000000000002511215114405062026255 0ustar0000000000000000{"metadata":{"name":"cluster-autoscaler-operator-5f49d774cd-5m4l9","generateName":"cluster-autoscaler-operator-5f49d774cd-","namespace":"openshift-machine-api","uid":"5598683a-cd32-486d-8839-205829d55cc2","resourceVersion":"11642","creationTimestamp":"2025-12-04T22:01:31Z","labels":{"k8s-app":"cluster-autoscaler-operator","pod-template-hash":"5f49d774cd"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.50/23\"],\"mac_address\":\"0a:58:0a:80:00:32\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.50/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.50\"\n ],\n \"mac\": \"0a:58:0a:80:00:32\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"cluster-autoscaler-operator","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-autoscaler-operator-5f49d774cd","uid":"b8acc534-bab4-4c60-903a-b8179d972b8f","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cert","secret":{"secretName":"cluster-autoscaler-operator-cert","items":[{"key":"tls.crt","path":"tls.crt"},{"key":"tls.key","path":"tls.key"}],"defaultMode":420}},{"name":"auth-proxy-config","configMap":{"name":"kube-rbac-proxy-cluster-autoscaler-operator","defaultMode":420}},{"name":"kube-api-access-s2lwr","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","args":["--secure-listen-address=0.0.0.0:9192","--upstream=http://127.0.0.1:9191/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key","--config-file=/etc/kube-rbac-proxy/config-file.yaml","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305","--logtostderr=true","--v=3"],"ports":[{"name":"metrics","containerPort":9192,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"auth-proxy-config","readOnly":true,"mountPath":"/etc/kube-rbac-proxy"},{"name":"cert","readOnly":true,"mountPath":"/etc/tls/private"},{"name":"kube-api-access-s2lwr","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000500000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}},{"name":"cluster-autoscaler-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:72bbe2c638872937108f647950ab8ad35c0428ca8ecc6a39a8314aace7d95078","command":["cluster-autoscaler-operator"],"args":["-alsologtostderr"],"ports":[{"containerPort":8443,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.29"},{"name":"WATCH_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"CLUSTER_AUTOSCALER_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"LEADER_ELECTION_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"CLUSTER_AUTOSCALER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6127d09ff17b35440f5116598731952167eab9b30ad2218efd25fbb3fd0d7586"},{"name":"WEBHOOKS_CERT_DIR","value":"/etc/cluster-autoscaler-operator/tls"},{"name":"WEBHOOKS_PORT","value":"8443"},{"name":"METRICS_PORT","value":"9191"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"cert","readOnly":true,"mountPath":"/etc/cluster-autoscaler-operator/tls"},{"name":"kube-api-access-s2lwr","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000500000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-autoscaler-operator","serviceAccount":"cluster-autoscaler-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c22,c19"},"fsGroup":1000500000,"seccompProfile":{"type":"RuntimeDefault"}},"imagePullSecrets":[{"name":"cluster-autoscaler-operator-dockercfg-n25ns"}],"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:01:43Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:01:31Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:13:28Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:13:28Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:01:31Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.50","podIPs":[{"ip":"10.128.0.50"}],"startTime":"2025-12-04T22:01:31Z","containerStatuses":[{"name":"cluster-autoscaler-operator","state":{"running":{"startedAt":"2025-12-04T22:13:27Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"4 22:10:44.705156 1 status.go:450] No ClusterAutoscaler. Reporting available.\nI1204 22:10:44.705189 1 status.go:244] Operator status available: at version 4.18.29\nI1204 22:10:46.730362 1 status.go:450] No ClusterAutoscaler. Reporting available.\nI1204 22:10:46.730541 1 status.go:244] Operator status available: at version 4.18.29\nE1204 22:11:39.810491 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE1204 22:12:01.727279 1 status.go:426] failed to get dependency machine-api status: the server was unable to return a response in the time allotted, but may still be processing the request (get clusteroperators.config.openshift.io machine-api)\nW1204 22:12:01.727327 1 status.go:271] Operator status degraded: error checking machine-api status: the server was unable to return a response in the time allotted, but may still be processing the request (get clusteroperators.config.openshift.io machine-api)\nE1204 22:12:39.814904 1 leaderelection.go:436] error retrieving resource lock openshift-machine-api/cluster-autoscaler-operator-leader: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io cluster-autoscaler-operator-leader)\nI1204 22:12:52.807722 1 leaderelection.go:297] failed to renew lease openshift-machine-api/cluster-autoscaler-operator-leader: timed out waiting for the condition\nE1204 22:13:01.729407 1 status.go:311] status reporting failed: the server was unable to return a response in the time allotted, but may still be processing the request (get clusteroperators.config.openshift.io cluster-autoscaler)\nE1204 22:13:26.816414 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded\nF1204 22:13:26.816550 1 main.go:43] Failed to start operator: leader election lost\n","startedAt":"2025-12-04T22:01:43Z","finishedAt":"2025-12-04T22:13:26Z","containerID":"cri-o://922ec5ad22c0f758ca0c6af6881b85724b616bc9bf1514cfd7b12d47fc0ff553"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:72bbe2c638872937108f647950ab8ad35c0428ca8ecc6a39a8314aace7d95078","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:72bbe2c638872937108f647950ab8ad35c0428ca8ecc6a39a8314aace7d95078","containerID":"cri-o://92528b95e13ec8f264bec256aad90296e21be58deea24ba77dc8ff80b36c0304","started":true,"volumeMounts":[{"name":"cert","mountPath":"/etc/cluster-autoscaler-operator/tls","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-s2lwr","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2025-12-04T22:01:32Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","containerID":"cri-o://9cd533ead3cae5dfe671d9ed582ce0c4fe3846e3703c3c3ebeec9d68db23459a","started":true,"volumeMounts":[{"name":"auth-proxy-config","mountPath":"/etc/kube-rbac-proxy","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"cert","mountPath":"/etc/tls/private","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-s2lwr","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-controller-manager/kube-controller-manager-master-0.json0000640000000000000000000004414015114405062027044 0ustar0000000000000000{"metadata":{"name":"kube-controller-manager-master-0","namespace":"openshift-kube-controller-manager","uid":"2b8e54e3-34e7-42cf-9a30-a7539664c894","resourceVersion":"14133","creationTimestamp":"2025-12-04T22:17:53Z","labels":{"app":"kube-controller-manager","kube-controller-manager":"true","revision":"3"},"annotations":{"kubectl.kubernetes.io/default-container":"kube-controller-manager","kubernetes.io/config.hash":"5859424d8ea4459c5b854f1ae5fd942c","kubernetes.io/config.mirror":"5859424d8ea4459c5b854f1ae5fd942c","kubernetes.io/config.seen":"2025-12-04T22:17:40.784914463Z","kubernetes.io/config.source":"file","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"730d6115-08f3-4ffe-b3c5-a4e6fa7e6675","controller":true}]},"spec":{"volumes":[{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-3","type":""}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs","type":""}}],"containers":[{"name":"kube-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6d5891cdd7dcf7c9081de8b364b4c96446b7f946f7880fbae291a4592a198264","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 10257 \\))\" ]; do sleep 1; done'\n\nif [ -f /etc/kubernetes/static-pod-certs/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /etc/kubernetes/static-pod-certs/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\n\nif [ -f /etc/kubernetes/static-pod-resources/configmaps/cloud-config/ca-bundle.pem ]; then\n echo \"Setting custom CA bundle for cloud provider\"\n export AWS_CA_BUNDLE=/etc/kubernetes/static-pod-resources/configmaps/cloud-config/ca-bundle.pem\nfi\n\nexec hyperkube kube-controller-manager --openshift-config=/etc/kubernetes/static-pod-resources/configmaps/config/config.yaml \\\n --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --authentication-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --authorization-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --client-ca-file=/etc/kubernetes/static-pod-certs/configmaps/client-ca/ca-bundle.crt \\\n --requestheader-client-ca-file=/etc/kubernetes/static-pod-certs/configmaps/aggregator-client-ca/ca-bundle.crt -v=2 --tls-cert-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.crt --tls-private-key-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.key --allocate-node-cidrs=false --cert-dir=/var/run/kubernetes --cloud-provider=external --cluster-cidr=10.128.0.0/16 --cluster-name=sno-bhmd6 --cluster-signing-cert-file=/etc/kubernetes/static-pod-certs/secrets/csr-signer/tls.crt --cluster-signing-duration=720h --cluster-signing-key-file=/etc/kubernetes/static-pod-certs/secrets/csr-signer/tls.key --controllers=* --controllers=-bootstrapsigner --controllers=-tokencleaner --controllers=-ttl --enable-dynamic-provisioning=true --feature-gates=AWSClusterHostedDNS=false --feature-gates=AWSEFSDriverVolumeMetrics=true --feature-gates=AdditionalRoutingCapabilities=false --feature-gates=AdminNetworkPolicy=true --feature-gates=AlibabaPlatform=true --feature-gates=AutomatedEtcdBackup=false --feature-gates=AzureWorkloadIdentity=true --feature-gates=BareMetalLoadBalancer=true --feature-gates=BootcNodeManagement=false --feature-gates=BuildCSIVolumes=true --feature-gates=CSIDriverSharedResource=false --feature-gates=ChunkSizeMiB=true --feature-gates=CloudDualStackNodeIPs=true --feature-gates=ClusterAPIInstall=false --feature-gates=ClusterAPIInstallIBMCloud=false --feature-gates=ClusterMonitoringConfig=false --feature-gates=ConsolePluginContentSecurityPolicy=false --feature-gates=DNSNameResolver=false --feature-gates=DisableKubeletCloudCredentialProviders=true --feature-gates=DynamicResourceAllocation=false --feature-gates=EtcdBackendQuota=false --feature-gates=EventedPLEG=false --feature-gates=Example=false --feature-gates=ExternalOIDC=false --feature-gates=ExternalOIDCWithUIDAndExtraClaimMappings=false --feature-gates=GCPClusterHostedDNS=false --feature-gates=GCPLabelsTags=true --feature-gates=GatewayAPI=false --feature-gates=HardwareSpeed=true --feature-gates=ImageStreamImportMode=false --feature-gates=IngressControllerDynamicConfigurationManager=false --feature-gates=IngressControllerLBSubnetsAWS=true --feature-gates=InsightsConfig=false --feature-gates=InsightsConfigAPI=false --feature-gates=InsightsOnDemandDataGather=false --feature-gates=InsightsRuntimeExtractor=false --feature-gates=KMSv1=true --feature-gates=MachineAPIMigration=false --feature-gates=MachineAPIOperatorDisableMachineHealthCheckController=false --feature-gates=MachineAPIProviderOpenStack=false --feature-gates=MachineConfigNodes=false --feature-gates=ManagedBootImages=true --feature-gates=ManagedBootImagesAWS=true --feature-gates=MaxUnavailableStatefulSet=false --feature-gates=MetricsCollectionProfiles=false --feature-gates=MinimumKubeletVersion=false --feature-gates=MixedCPUsAllocation=false --feature-gates=MultiArchInstallAWS=true --feature-gates=MultiArchInstallAzure=false --feature-gates=MultiArchInstallGCP=true --feature-gates=NetworkDiagnosticsConfig=true --feature-gates=NetworkLiveMigration=true --feature-gates=NetworkSegmentation=true --feature-gates=NewOLM=true --feature-gates=NodeDisruptionPolicy=true --feature-gates=NodeSwap=false --feature-gates=NutanixMultiSubnets=false --feature-gates=OVNObservability=false --feature-gates=OnClusterBuild=true --feature-gates=OpenShiftPodSecurityAdmission=false --feature-gates=PersistentIPsForVirtualization=true --feature-gates=PinnedImages=false --feature-gates=PlatformOperators=false --feature-gates=PrivateHostedZoneAWS=true --feature-gates=ProcMountType=false --feature-gates=RouteAdvertisements=false --feature-gates=RouteExternalCertificate=false --feature-gates=ServiceAccountTokenNodeBinding=false --feature-gates=SetEIPForNLBIngressController=true --feature-gates=SignatureStores=false --feature-gates=SigstoreImageVerification=false --feature-gates=StreamingCollectionEncodingToJSON=false --feature-gates=StreamingCollectionEncodingToProtobuf=false --feature-gates=TranslateStreamCloseWebsocketRequests=false --feature-gates=UpgradeStatus=false --feature-gates=UserNamespacesPodSecurityStandards=false --feature-gates=UserNamespacesSupport=false --feature-gates=VSphereControlPlaneMachineSet=true --feature-gates=VSphereDriverConfiguration=true --feature-gates=VSphereMultiNetworks=false --feature-gates=VSphereMultiVCenters=true --feature-gates=VSphereStaticIPs=true --feature-gates=ValidatingAdmissionPolicy=true --feature-gates=VolumeAttributesClass=false --feature-gates=VolumeGroupSnapshot=false --flex-volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec --kube-api-burst=300 --kube-api-qps=150 --leader-elect-renew-deadline=12s --leader-elect-resource-lock=leases --leader-elect-retry-period=3s --leader-elect=true --pv-recycler-pod-template-filepath-hostpath=/etc/kubernetes/static-pod-resources/configmaps/recycler-config/recycler-pod.yaml --pv-recycler-pod-template-filepath-nfs=/etc/kubernetes/static-pod-resources/configmaps/recycler-config/recycler-pod.yaml --root-ca-file=/etc/kubernetes/static-pod-resources/configmaps/serviceaccount-ca/ca-bundle.crt --secure-port=10257 --service-account-private-key-file=/etc/kubernetes/static-pod-resources/secrets/service-account-private-key/service-account.key --service-cluster-ip-range=172.30.0.0/16 --use-service-account-credentials=true --tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 --tls-min-version=VersionTLS12"],"ports":[{"hostPort":10257,"containerPort":10257,"protocol":"TCP"}],"resources":{"requests":{"cpu":"60m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"timeoutSeconds":3,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"cluster-policy-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d64c13fe7663a0b4ae61d103b1b7598adcf317a01826f296bcb66b1a2de83c96","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 10357 \\))\" ]; do sleep 1; done'\n\nexec cluster-policy-controller start --config=/etc/kubernetes/static-pod-resources/configmaps/cluster-policy-controller-config/config.yaml \\\n --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --namespace=${POD_NAMESPACE} -v=2"],"ports":[{"hostPort":10357,"containerPort":10357,"protocol":"TCP"}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"timeoutSeconds":3,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-controller-manager-cert-syncer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a824e468cf8dd61d347e35b2ee5bc2f815666957647098e21a1bb56ff613e5b9","command":["cluster-kube-controller-manager-operator","cert-syncer"],"args":["--kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig","--namespace=$(POD_NAMESPACE)","--destination-dir=/etc/kubernetes/static-pod-certs"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-controller-manager-recovery-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a824e468cf8dd61d347e35b2ee5bc2f815666957647098e21a1bb56ff613e5b9","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 9443 \\))\" ]; do sleep 1; done'\n\nexec cluster-kube-controller-manager-operator cert-recovery-controller --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig --namespace=${POD_NAMESPACE} --listen=0.0.0.0:9443 -v=2"],"env":[{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:19:37Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:19:37Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:21:28Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:21:28Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:19:37Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2025-12-04T22:19:37Z","containerStatuses":[{"name":"cluster-policy-controller","state":{"running":{"startedAt":"2025-12-04T22:17:54Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d64c13fe7663a0b4ae61d103b1b7598adcf317a01826f296bcb66b1a2de83c96","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d64c13fe7663a0b4ae61d103b1b7598adcf317a01826f296bcb66b1a2de83c96","containerID":"cri-o://51dfa6423a699c653fb4188616f00305edb215a14ee4fd1dcde5706013f4ee8d","started":true},{"name":"kube-controller-manager","state":{"running":{"startedAt":"2025-12-04T22:21:12Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-controller-manager?timeout=6s\": dial tcp 192.168.32.10:6443: connect: connection refused, falling back to slow path\nE1204 22:21:06.034944 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-controller-manager: Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-controller-manager?timeout=6s\": dial tcp 192.168.32.10:6443: connect: connection refused\nE1204 22:21:09.033403 1 leaderelection.go:429] Failed to update lock optimitically: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-controller-manager?timeout=6s\": dial tcp 192.168.32.10:6443: connect: connection refused, falling back to slow path\nE1204 22:21:09.034116 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-controller-manager: Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-controller-manager?timeout=6s\": dial tcp 192.168.32.10:6443: connect: connection refused\nE1204 22:21:10.044687 1 resource_quota_controller.go:446] \"Unhandled Error\" err=\"failed to discover resources: Get \\\"https://api-int.sno.openstack.lab:6443/api\\\": dial tcp 192.168.32.10:6443: connect: connection refused\" logger=\"UnhandledError\"\nI1204 22:21:10.147535 1 garbagecollector.go:828] \"failed to discover preferred resources\" logger=\"garbage-collector-controller\" error=\"Get \\\"https://api-int.sno.openstack.lab:6443/api\\\": dial tcp 192.168.32.10:6443: connect: connection refused\"\nI1204 22:21:10.147578 1 garbagecollector.go:184] \"no resources reported by discovery, skipping garbage collector sync\" logger=\"garbage-collector-controller\"\nI1204 22:21:12.029983 1 leaderelection.go:297] failed to renew lease kube-system/kube-controller-manager: timed out waiting for the condition\nE1204 22:21:12.030231 1 controllermanager.go:373] \"leaderelection lost\"\n","startedAt":"2025-12-04T22:17:53Z","finishedAt":"2025-12-04T22:21:12Z","containerID":"cri-o://669f49b80171e40aea73e838597bed75920e67751d5f839f6934dbce1fedc710"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6d5891cdd7dcf7c9081de8b364b4c96446b7f946f7880fbae291a4592a198264","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6d5891cdd7dcf7c9081de8b364b4c96446b7f946f7880fbae291a4592a198264","containerID":"cri-o://39aacc773fddb0383604f8a27ba1b199b302e4f4ede41fa8f08e464ed1607b81","started":true},{"name":"kube-controller-manager-cert-syncer","state":{"running":{"startedAt":"2025-12-04T22:17:54Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a824e468cf8dd61d347e35b2ee5bc2f815666957647098e21a1bb56ff613e5b9","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a824e468cf8dd61d347e35b2ee5bc2f815666957647098e21a1bb56ff613e5b9","containerID":"cri-o://aab39ce7c056462df6f1a5933a3a5e925b99a0bd484dd0b16b296ab5327006ba","started":true},{"name":"kube-controller-manager-recovery-controller","state":{"running":{"startedAt":"2025-12-04T22:17:54Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a824e468cf8dd61d347e35b2ee5bc2f815666957647098e21a1bb56ff613e5b9","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a824e468cf8dd61d347e35b2ee5bc2f815666957647098e21a1bb56ff613e5b9","containerID":"cri-o://f07a7e680c95366ba4f1d333748a37d99d6fcd0c588c7658749adf9e44cb7229","started":true}],"qosClass":"Burstable"}}config/pod/openshift-ingress-operator/ingress-operator-8649c48786-qlkgh.json0000640000000000000000000002436115114405062025271 0ustar0000000000000000{"metadata":{"name":"ingress-operator-8649c48786-qlkgh","generateName":"ingress-operator-8649c48786-","namespace":"openshift-ingress-operator","uid":"addddaac-a31a-4dbf-b78f-87225b11b463","resourceVersion":"13149","creationTimestamp":"2025-12-04T21:58:25Z","labels":{"name":"ingress-operator","pod-template-hash":"8649c48786"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.16/23\"],\"mac_address\":\"0a:58:0a:80:00:10\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.16/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.16\"\n ],\n \"mac\": \"0a:58:0a:80:00:10\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"ingress-operator-8649c48786","uid":"0896f0ee-bfa8-42f9-8655-4039757b7871","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420}},{"name":"trusted-ca","configMap":{"name":"trusted-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420}},{"name":"bound-sa-token","projected":{"sources":[{"serviceAccountToken":{"audience":"openshift","expirationSeconds":3600,"path":"token"}}],"defaultMode":420}},{"name":"kube-api-access-lr65l","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"ingress-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:831f30660844091d6154e2674d3a9da6f34271bf8a2c40b56f7416066318742b","command":["ingress-operator","start","--namespace","$(WATCH_NAMESPACE)","--image","$(IMAGE)","--canary-image","$(CANARY_IMAGE)","--release-version","$(RELEASE_VERSION)"],"env":[{"name":"RELEASE_VERSION","value":"4.18.29"},{"name":"WATCH_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2b3d313c599852b3543ee5c3a62691bd2d1bbad12c2e1c610cd71a1dec6eea32"},{"name":"CANARY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:831f30660844091d6154e2674d3a9da6f34271bf8a2c40b56f7416066318742b"}],"resources":{"requests":{"cpu":"10m","memory":"56Mi"}},"volumeMounts":[{"name":"trusted-ca","readOnly":true,"mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"bound-sa-token","readOnly":true,"mountPath":"/var/run/secrets/openshift/serviceaccount"},{"name":"kube-api-access-lr65l","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","args":["--logtostderr","--secure-listen-address=:9393","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256","--upstream=http://127.0.0.1:60000/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key"],"ports":[{"name":"metrics","containerPort":9393,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"40Mi"}},"volumeMounts":[{"name":"metrics-tls","readOnly":true,"mountPath":"/etc/tls/private"},{"name":"kube-api-access-lr65l","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"ingress-operator","serviceAccount":"ingress-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c12,c4"},"runAsNonRoot":true,"fsGroup":1000140000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:01:09Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:00:26Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:19:42Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:19:42Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:00:26Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.16","podIPs":[{"ip":"10.128.0.16"}],"startTime":"2025-12-04T22:00:26Z","containerStatuses":[{"name":"ingress-operator","state":{"running":{"startedAt":"2025-12-04T22:19:41Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"d_controller\"}\n2025-12-04T22:18:00.293Z\tINFO\toperator.init\tmanager/runnable_group.go:226\tAll workers finished\t{\"controller\": \"crl\"}\n2025-12-04T22:18:00.293Z\tINFO\toperator.init\tmanager/runnable_group.go:226\tAll workers finished\t{\"controller\": \"ingressclass_controller\"}\n2025-12-04T22:18:00.293Z\tINFO\toperator.init\tmanager/runnable_group.go:226\tAll workers finished\t{\"controller\": \"gatewayapi_controller\"}\n2025-12-04T22:18:00.293Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tStopping and waiting for caches\n2025-12-04T22:18:00.294Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tStopping and waiting for webhooks\n2025-12-04T22:18:00.294Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tStopping and waiting for HTTP servers\nW1204 22:18:00.294470 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.Role ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\n2025-12-04T22:18:00.294Z\tINFO\toperator.init.controller-runtime.metrics\truntime/asm_amd64.s:1695\tShutting down metrics server with timeout of 1 minute\nW1204 22:18:00.294778 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.Pod ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW1204 22:18:00.294874 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.RoleBinding ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\n2025-12-04T22:18:00.297Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tWait completed, proceeding to shutdown the manager\n2025-12-04T22:18:00.301Z\tERROR\toperator.main\tcobra/command.go:989\terror starting\t{\"error\": \"failed to wait for route_metrics_controller caches to sync: timed out waiting for cache to be synced for Kind *v1.Route\"}\n","startedAt":"2025-12-04T22:15:34Z","finishedAt":"2025-12-04T22:18:00Z","containerID":"cri-o://35d6e2cec5a3a5b68cca4476358af1f1f50efd04a9c16f1130f8dd88a077a41e"}},"ready":true,"restartCount":6,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:831f30660844091d6154e2674d3a9da6f34271bf8a2c40b56f7416066318742b","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:831f30660844091d6154e2674d3a9da6f34271bf8a2c40b56f7416066318742b","containerID":"cri-o://c913d2bd0998c498cae1649fcb2279986482eef15d34831152206fdcf37b9b66","started":true,"volumeMounts":[{"name":"trusted-ca","mountPath":"/etc/pki/ca-trust/extracted/pem","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"bound-sa-token","mountPath":"/var/run/secrets/openshift/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-lr65l","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2025-12-04T22:01:08Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","containerID":"cri-o://7d50a2402c9a263e61e9e85f0a1f6b2e94c325a730cd34ce03c35d10609073b3","started":true,"volumeMounts":[{"name":"metrics-tls","mountPath":"/etc/tls/private","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-lr65l","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-storage-operator/csi-snapshot-controller-6b958b6f94-w7hnc.json0000640000000000000000000001403615114405062030303 0ustar0000000000000000{"metadata":{"name":"csi-snapshot-controller-6b958b6f94-w7hnc","generateName":"csi-snapshot-controller-6b958b6f94-","namespace":"openshift-cluster-storage-operator","uid":"4f22eee4-a42d-4d2b-bffa-6c3f29f1f026","resourceVersion":"12210","creationTimestamp":"2025-12-04T22:00:38Z","labels":{"app":"csi-snapshot-controller","pod-template-hash":"6b958b6f94"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.25/23\"],\"mac_address\":\"0a:58:0a:80:00:19\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.25/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.25\"\n ],\n \"mac\": \"0a:58:0a:80:00:19\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"csi-snapshot-controller-6b958b6f94","uid":"55e7393c-eed0-4f3b-8851-6ffc19bbd895","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"kube-api-access-vd6d8","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"snapshot-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d3ce2cbf1032ad0f24f204db73687002fcf302e86ebde3945801c74351b64576","args":["--v=2","--leader-election=true","--leader-election-lease-duration=137s","--leader-election-renew-deadline=107s","--leader-election-retry-period=26s","--leader-election-namespace=openshift-cluster-storage-operator"],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"kube-api-access-vd6d8","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000170000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"csi-snapshot-controller","serviceAccount":"csi-snapshot-controller","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c13,c7"},"runAsNonRoot":true,"fsGroup":1000170000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"app":"csi-snapshot-controller"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:00:43Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:00:38Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:16:21Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:16:21Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:00:38Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.25","podIPs":[{"ip":"10.128.0.25"}],"startTime":"2025-12-04T22:00:38Z","containerStatuses":[{"name":"snapshot-controller","state":{"running":{"startedAt":"2025-12-04T22:16:21Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"I1204 22:14:30.622072 1 feature_gate.go:387] feature gates: {map[]}\nI1204 22:14:30.622307 1 main.go:169] Version: 28bdee88181a0d0c59b906003ceb29f73dc8562b\nI1204 22:14:30.623908 1 main.go:220] Start NewCSISnapshotController with kubeconfig [] resyncPeriod [15m0s]\nE1204 22:15:00.632356 1 main.go:104] Failed to list v1 volumesnapshotclasses with error=Get \"https://172.30.0.1:443/apis/snapshot.storage.k8s.io/v1/volumesnapshotclasses?limit=1\": context deadline exceeded\nE1204 22:15:00.632428 1 main.go:246] Exiting due to failure to ensure CRDs exist during startup: context deadline exceeded\n","startedAt":"2025-12-04T22:14:30Z","finishedAt":"2025-12-04T22:15:00Z","containerID":"cri-o://27f9dcb8a2a3043d50959f9bd25f4a8719c19a0127b6e4e0dd3d41cad4c9e780"}},"ready":true,"restartCount":5,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d3ce2cbf1032ad0f24f204db73687002fcf302e86ebde3945801c74351b64576","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d3ce2cbf1032ad0f24f204db73687002fcf302e86ebde3945801c74351b64576","containerID":"cri-o://c21b1f28f2ecd3a6f853caa962c1e919058a4a8d42a7386884dd5b88c192ad87","started":true,"volumeMounts":[{"name":"kube-api-access-vd6d8","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-85cff47f46-4dv2b.json0000640000000000000000000002056015114405062032001 0ustar0000000000000000{"metadata":{"name":"cluster-node-tuning-operator-85cff47f46-4dv2b","generateName":"cluster-node-tuning-operator-85cff47f46-","namespace":"openshift-cluster-node-tuning-operator","uid":"0beb871c-3bf1-471c-a028-746a650267bf","resourceVersion":"11830","creationTimestamp":"2025-12-04T21:58:24Z","labels":{"name":"cluster-node-tuning-operator","pod-template-hash":"85cff47f46"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.11/23\"],\"mac_address\":\"0a:58:0a:80:00:0b\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.11/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.11\"\n ],\n \"mac\": \"0a:58:0a:80:00:0b\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-node-tuning-operator-85cff47f46","uid":"986edc3e-0570-4273-ae5f-6b6afe399331","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"node-tuning-operator-tls","secret":{"secretName":"node-tuning-operator-tls","defaultMode":420}},{"name":"apiservice-cert","secret":{"secretName":"performance-addon-operator-webhook-cert","items":[{"key":"tls.crt","path":"apiserver.crt"},{"key":"tls.key","path":"apiserver.key"}],"defaultMode":420}},{"name":"trusted-ca","configMap":{"name":"trusted-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420,"optional":true}},{"name":"kube-api-access-dvrr5","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-node-tuning-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5451aa441e5b8d8689c032405d410c8049a849ef2edf77e5b6a5ce2838c6569b","command":["cluster-node-tuning-operator"],"args":["-v=0"],"ports":[{"name":"metrics","containerPort":60000,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.29"},{"name":"WATCH_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"RESYNC_PERIOD","value":"600"},{"name":"CLUSTER_NODE_TUNED_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5451aa441e5b8d8689c032405d410c8049a849ef2edf77e5b6a5ce2838c6569b"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"node-tuning-operator-tls","mountPath":"/etc/secrets"},{"name":"trusted-ca","mountPath":"/var/run/configmaps/trusted-ca/"},{"name":"apiservice-cert","mountPath":"/apiserver.local.config/certificates"},{"name":"kube-api-access-dvrr5","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]},"readOnlyRootFilesystem":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-node-tuning-operator","serviceAccount":"cluster-node-tuning-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c13,c12"},"runAsUser":499,"runAsNonRoot":true},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:00:51Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:00:26Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:15:38Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:15:38Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:00:26Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.11","podIPs":[{"ip":"10.128.0.11"}],"startTime":"2025-12-04T22:00:26Z","containerStatuses":[{"name":"cluster-node-tuning-operator","state":{"running":{"startedAt":"2025-12-04T22:15:37Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":" request (get leases.coordination.k8s.io node-tuning-operator-lock)\nE1204 22:04:59.531801 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE1204 22:11:36.019429 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE1204 22:12:36.021381 1 leaderelection.go:436] error retrieving resource lock openshift-cluster-node-tuning-operator/node-tuning-operator-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io node-tuning-operator-lock)\nE1204 22:14:10.026435 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE1204 22:15:02.013723 1 leaderelection.go:436] error retrieving resource lock openshift-cluster-node-tuning-operator/node-tuning-operator-lock: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-cluster-node-tuning-operator/leases/node-tuning-operator-lock\": context deadline exceeded\nI1204 22:15:02.013777 1 leaderelection.go:297] failed to renew lease openshift-cluster-node-tuning-operator/node-tuning-operator-lock: timed out waiting for the condition\nE1204 22:15:36.017759 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded\nF1204 22:15:36.018001 1 main.go:242] manager exited with non-zero code: leader election lost\n{\"level\":\"info\",\"ts\":\"2025-12-04T22:15:36Z\",\"msg\":\"Stopping and waiting for non leader election runnables\"}\n{\"level\":\"info\",\"ts\":\"2025-12-04T22:15:36Z\",\"msg\":\"Stopping and waiting for leader election runnables\"}\n{\"level\":\"info\",\"ts\":\"2025-12-04T22:15:36Z\",\"msg\":\"Stopping and waiting for caches\"}\n","startedAt":"2025-12-04T22:00:51Z","finishedAt":"2025-12-04T22:15:36Z","containerID":"cri-o://3319d82050d7163f2a7f96d02081f2908fac76018c64e251ebfd0f4e73ccabfd"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5451aa441e5b8d8689c032405d410c8049a849ef2edf77e5b6a5ce2838c6569b","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5451aa441e5b8d8689c032405d410c8049a849ef2edf77e5b6a5ce2838c6569b","containerID":"cri-o://ca5799c309b09795ff95214f2ec9158f268801b85d2051e30751956963a75745","started":true,"volumeMounts":[{"name":"node-tuning-operator-tls","mountPath":"/etc/secrets"},{"name":"trusted-ca","mountPath":"/var/run/configmaps/trusted-ca/"},{"name":"apiservice-cert","mountPath":"/apiserver.local.config/certificates"},{"name":"kube-api-access-dvrr5","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-machine-approver/machine-approver-74d9cbffbc-nzqgx.json0000640000000000000000000002143515114405062027321 0ustar0000000000000000{"metadata":{"name":"machine-approver-74d9cbffbc-nzqgx","generateName":"machine-approver-74d9cbffbc-","namespace":"openshift-cluster-machine-approver","uid":"5dac8e25-0f51-4c04-929c-060479689a9d","resourceVersion":"11652","creationTimestamp":"2025-12-04T22:05:35Z","labels":{"app":"machine-approver","pod-template-hash":"74d9cbffbc"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"machine-approver-74d9cbffbc","uid":"f5095a64-65ee-45c7-b1d6-cb200893e84c","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"auth-proxy-config","configMap":{"name":"kube-rbac-proxy","defaultMode":420}},{"name":"machine-approver-tls","secret":{"secretName":"machine-approver-tls","defaultMode":420}},{"name":"config","configMap":{"name":"machine-approver-config","defaultMode":440,"optional":true}},{"name":"kube-api-access-ch6s4","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","args":["--secure-listen-address=0.0.0.0:9192","--upstream=http://127.0.0.1:9191/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key","--config-file=/etc/kube-rbac-proxy/config-file.yaml","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305","--logtostderr=true","--v=3"],"ports":[{"name":"https","hostPort":9192,"containerPort":9192,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"auth-proxy-config","mountPath":"/etc/kube-rbac-proxy"},{"name":"machine-approver-tls","mountPath":"/etc/tls/private"},{"name":"kube-api-access-ch6s4","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"machine-approver-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8cc27777e72233024fe84ee1faa168aec715a0b24912a3ce70715ddccba328df","command":["/usr/bin/machine-approver"],"args":["--config=/var/run/configmaps/config/config.yaml","-v=2","--logtostderr","--leader-elect=true","--leader-elect-lease-duration=137s","--leader-elect-renew-deadline=107s","--leader-elect-retry-period=26s","--leader-elect-resource-namespace=openshift-cluster-machine-approver","--api-group-version=machine.openshift.io/v1beta1","--max-concurrent-reconciles=10"],"env":[{"name":"RELEASE_VERSION","value":"4.18.29"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"kube-api-access-ch6s4","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"machine-approver-sa","serviceAccount":"machine-approver-sa","nodeName":"master-0","hostNetwork":true,"securityContext":{},"imagePullSecrets":[{"name":"machine-approver-sa-dockercfg-shf98"}],"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:05:37Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:05:35Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:13:24Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:13:24Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:05:35Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2025-12-04T22:05:35Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2025-12-04T22:05:35Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","containerID":"cri-o://82f29b76b48da3d841d1256de9fef86cdb6553d971418660ee7c3b3bf00fff6f","started":true,"volumeMounts":[{"name":"auth-proxy-config","mountPath":"/etc/kube-rbac-proxy"},{"name":"machine-approver-tls","mountPath":"/etc/tls/private"},{"name":"kube-api-access-ch6s4","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"machine-approver-controller","state":{"running":{"startedAt":"2025-12-04T22:13:23Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"tificatesigningrequest\" controllerGroup=\"certificates.k8s.io\" controllerKind=\"CertificateSigningRequest\" source=\"kind source: *v1.CertificateSigningRequest\"\nI1204 22:07:59.556213 1 controller.go:175] \"Starting EventSource\" controller=\"certificatesigningrequest\" controllerGroup=\"certificates.k8s.io\" controllerKind=\"CertificateSigningRequest\" source=\"kind source: *v1.ConfigMap\"\nI1204 22:07:59.556277 1 controller.go:183] \"Starting Controller\" controller=\"certificatesigningrequest\" controllerGroup=\"certificates.k8s.io\" controllerKind=\"CertificateSigningRequest\"\nI1204 22:07:59.560416 1 reflector.go:368] Caches populated for *v1.ClusterOperator from github.com/openshift/cluster-machine-approver/status.go:99\nI1204 22:07:59.789818 1 reflector.go:368] Caches populated for *v1.ConfigMap from sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106\nI1204 22:07:59.862970 1 controller.go:217] \"Starting workers\" controller=\"certificatesigningrequest\" controllerGroup=\"certificates.k8s.io\" controllerKind=\"CertificateSigningRequest\" worker count=10\nE1204 22:11:35.626836 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE1204 22:12:35.628126 1 leaderelection.go:436] error retrieving resource lock openshift-cluster-machine-approver/cluster-machine-approver-leader: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io cluster-machine-approver-leader)\nI1204 22:12:48.623607 1 leaderelection.go:297] failed to renew lease openshift-cluster-machine-approver/cluster-machine-approver-leader: timed out waiting for the condition\nE1204 22:13:22.629345 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded\nF1204 22:13:22.629480 1 main.go:244] unable to run the manager: leader election lost\n","startedAt":"2025-12-04T22:05:36Z","finishedAt":"2025-12-04T22:13:22Z","containerID":"cri-o://028e28ae583843cf573a020510b23f29bb89888d81cbcae42e7af0446b2d3e61"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8cc27777e72233024fe84ee1faa168aec715a0b24912a3ce70715ddccba328df","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8cc27777e72233024fe84ee1faa168aec715a0b24912a3ce70715ddccba328df","containerID":"cri-o://5d2fefeec2561a7c75cacf5399d1c0370782912b0bc1f1c8faf916fa302e41f1","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"kube-api-access-ch6s4","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}cluster-cloud-controller-manager-operator-758cf9d97b-mwxf4.json0000640000000000000000000003407415114405062035521 0ustar0000000000000000config/pod/openshift-cloud-controller-manager-operator{"metadata":{"name":"cluster-cloud-controller-manager-operator-758cf9d97b-mwxf4","generateName":"cluster-cloud-controller-manager-operator-758cf9d97b-","namespace":"openshift-cloud-controller-manager-operator","uid":"74197c50-9a41-40e8-9289-c7e6afbd3737","resourceVersion":"11650","creationTimestamp":"2025-12-04T22:05:35Z","labels":{"k8s-app":"cloud-manager-operator","pod-template-hash":"758cf9d97b"},"annotations":{"kubectl.kubernetes.io/default-container":"cluster-cloud-controller-manager"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-cloud-controller-manager-operator-758cf9d97b","uid":"d5ded074-90ae-4b4f-94a0-e9c270047311","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"images","configMap":{"name":"cloud-controller-manager-images","defaultMode":420}},{"name":"host-etc-kube","hostPath":{"path":"/etc/kubernetes","type":"Directory"}},{"name":"auth-proxy-config","configMap":{"name":"kube-rbac-proxy","defaultMode":420}},{"name":"cloud-controller-manager-operator-tls","secret":{"secretName":"cloud-controller-manager-operator-tls","defaultMode":420,"optional":true}},{"name":"kube-api-access-hq44d","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-cloud-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:dd38b8be3af889b0f97e2df41517c89a11260901432a9a1ee943195bb3a22737","command":["/bin/bash","-c","#!/bin/bash\nset -o allexport\nif [[ -f /etc/kubernetes/apiserver-url.env ]]; then\n source /etc/kubernetes/apiserver-url.env\nelse\n URL_ONLY_KUBECONFIG=/etc/kubernetes/kubeconfig\nfi\nexec /cluster-controller-manager-operator \\\n--leader-elect=true \\\n--leader-elect-lease-duration=137s \\\n--leader-elect-renew-deadline=107s \\\n--leader-elect-retry-period=26s \\\n--leader-elect-resource-namespace=openshift-cloud-controller-manager-operator \\\n\"--images-json=/etc/cloud-controller-manager-config/images.json\" \\\n--metrics-bind-address=127.0.0.1:9257 \\\n--health-addr=127.0.0.1:9259\n"],"ports":[{"name":"metrics","hostPort":9257,"containerPort":9257,"protocol":"TCP"},{"name":"healthz","hostPort":9259,"containerPort":9259,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.29"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"images","mountPath":"/etc/cloud-controller-manager-config/"},{"name":"host-etc-kube","readOnly":true,"mountPath":"/etc/kubernetes"},{"name":"kube-api-access-hq44d","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"config-sync-controllers","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:dd38b8be3af889b0f97e2df41517c89a11260901432a9a1ee943195bb3a22737","command":["/bin/bash","-c","#!/bin/bash\nset -o allexport\nif [[ -f /etc/kubernetes/apiserver-url.env ]]; then\n source /etc/kubernetes/apiserver-url.env\nelse\n URL_ONLY_KUBECONFIG=/etc/kubernetes/kubeconfig\nfi\nexec /config-sync-controllers \\\n--leader-elect=true \\\n--leader-elect-lease-duration=137s \\\n--leader-elect-renew-deadline=107s \\\n--leader-elect-retry-period=26s \\\n--leader-elect-resource-namespace=openshift-cloud-controller-manager-operator \\\n--health-addr=127.0.0.1:9260\n"],"ports":[{"name":"healthz","hostPort":9260,"containerPort":9260,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.29"}],"resources":{"requests":{"cpu":"10m","memory":"25Mi"}},"volumeMounts":[{"name":"host-etc-kube","readOnly":true,"mountPath":"/etc/kubernetes"},{"name":"kube-api-access-hq44d","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","args":["--secure-listen-address=0.0.0.0:9258","--upstream=http://127.0.0.1:9257/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key","--config-file=/etc/kube-rbac-proxy/config-file.yaml","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305","--logtostderr=true","--v=3"],"ports":[{"name":"https","hostPort":9258,"containerPort":9258,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"auth-proxy-config","mountPath":"/etc/kube-rbac-proxy"},{"name":"cloud-controller-manager-operator-tls","mountPath":"/etc/tls/private"},{"name":"kube-api-access-hq44d","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-cloud-controller-manager","serviceAccount":"cluster-cloud-controller-manager","nodeName":"master-0","hostNetwork":true,"securityContext":{},"imagePullSecrets":[{"name":"cluster-cloud-controller-manager-dockercfg-sf4xn"}],"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.cloudprovider.kubernetes.io/uninitialized","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:05:37Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:05:35Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:12:58Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:12:58Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:05:35Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2025-12-04T22:05:35Z","containerStatuses":[{"name":"cluster-cloud-controller-manager","state":{"running":{"startedAt":"2025-12-04T22:12:57Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"oller.go:175] \"Starting EventSource\" logger=\"CCMOperator\" controller=\"clusteroperator\" controllerGroup=\"config.openshift.io\" controllerKind=\"ClusterOperator\" source=\"kind source: *v1.ConfigMap\"\nI1204 22:08:33.322350 1 controller.go:175] \"Starting EventSource\" logger=\"CCMOperator\" controller=\"clusteroperator\" controllerGroup=\"config.openshift.io\" controllerKind=\"ClusterOperator\" source=\"kind source: *v1.Secret\"\nI1204 22:08:33.322377 1 controller.go:175] \"Starting EventSource\" logger=\"CCMOperator\" controller=\"clusteroperator\" controllerGroup=\"config.openshift.io\" controllerKind=\"ClusterOperator\" source=\"channel source: 0xc0002ccbd0\"\nI1204 22:08:33.322437 1 controller.go:183] \"Starting Controller\" logger=\"CCMOperator\" controller=\"clusteroperator\" controllerGroup=\"config.openshift.io\" controllerKind=\"ClusterOperator\"\nI1204 22:08:33.438159 1 controller.go:217] \"Starting workers\" logger=\"CCMOperator\" controller=\"clusteroperator\" controllerGroup=\"config.openshift.io\" controllerKind=\"ClusterOperator\" worker count=1\nI1204 22:08:33.438320 1 clusteroperator_controller.go:252] Platform does not require an external cloud provider. Skipping...\nE1204 22:11:43.372839 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE1204 22:12:43.374374 1 leaderelection.go:436] error retrieving resource lock openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-leader: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io cluster-cloud-controller-manager-leader)\nI1204 22:12:56.370059 1 leaderelection.go:297] failed to renew lease openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-leader: timed out waiting for the condition\nE1204 22:12:56.370229 1 main.go:227] \"problem running manager\" err=\"leader election lost\" logger=\"CCMOperator.setup\"\n","startedAt":"2025-12-04T22:05:35Z","finishedAt":"2025-12-04T22:12:56Z","containerID":"cri-o://d7411bec11d115b15a691f3d3010646ecd1f289830d7539f76d0467f6cd83226"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:dd38b8be3af889b0f97e2df41517c89a11260901432a9a1ee943195bb3a22737","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:dd38b8be3af889b0f97e2df41517c89a11260901432a9a1ee943195bb3a22737","containerID":"cri-o://a43528b1d37a8cf8c729e8c6970f63fadaafd2a2a5d053a62faf1bb166b17472","started":true,"volumeMounts":[{"name":"images","mountPath":"/etc/cloud-controller-manager-config/"},{"name":"host-etc-kube","mountPath":"/etc/kubernetes","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-hq44d","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"config-sync-controllers","state":{"running":{"startedAt":"2025-12-04T22:12:56Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"loud-conf\" not found\nI1204 22:08:07.033020 1 cloud_config_sync_controller.go:69] cloud-config sync is not needed, returning early\nI1204 22:08:07.040167 1 cloud_config_sync_controller.go:69] cloud-config sync is not needed, returning early\nI1204 22:08:07.046119 1 cloud_config_sync_controller.go:69] cloud-config sync is not needed, returning early\nI1204 22:08:07.046753 1 trusted_ca_bundle_controller.go:156] cloud-config was not found: ConfigMap \"cloud-conf\" not found\nI1204 22:08:07.055116 1 cloud_config_sync_controller.go:69] cloud-config sync is not needed, returning early\nI1204 22:08:07.065164 1 cloud_config_sync_controller.go:69] cloud-config sync is not needed, returning early\nI1204 22:08:07.072213 1 cloud_config_sync_controller.go:69] cloud-config sync is not needed, returning early\nI1204 22:08:07.080869 1 cloud_config_sync_controller.go:69] cloud-config sync is not needed, returning early\nI1204 22:08:07.087081 1 cloud_config_sync_controller.go:69] cloud-config sync is not needed, returning early\nI1204 22:08:07.094014 1 cloud_config_sync_controller.go:69] cloud-config sync is not needed, returning early\nE1204 22:11:42.809673 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE1204 22:12:42.811933 1 leaderelection.go:436] error retrieving resource lock openshift-cloud-controller-manager-operator/cluster-cloud-config-sync-leader: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io cluster-cloud-config-sync-leader)\nI1204 22:12:55.804664 1 leaderelection.go:297] failed to renew lease openshift-cloud-controller-manager-operator/cluster-cloud-config-sync-leader: timed out waiting for the condition\nE1204 22:12:55.804831 1 main.go:172] \"problem running manager\" err=\"leader election lost\" logger=\"CCCMOConfigSyncControllers.setup\"\n","startedAt":"2025-12-04T22:05:36Z","finishedAt":"2025-12-04T22:12:55Z","containerID":"cri-o://d4cd669f8e4bd3008a9642035eec139a13bd3a586fb003b3adb4d948956c28f6"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:dd38b8be3af889b0f97e2df41517c89a11260901432a9a1ee943195bb3a22737","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:dd38b8be3af889b0f97e2df41517c89a11260901432a9a1ee943195bb3a22737","containerID":"cri-o://21c5db260fc9c003b5979ff05e774d8d4b66aafbdc7ee070b9faa8bb51459bea","started":true,"volumeMounts":[{"name":"host-etc-kube","mountPath":"/etc/kubernetes","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-hq44d","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2025-12-04T22:05:36Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","containerID":"cri-o://b1f6fb04eb6c1c9d551e263a6b6af6d08c8b7f2c8d5ec4566af25c8704b19d39","started":true,"volumeMounts":[{"name":"auth-proxy-config","mountPath":"/etc/kube-rbac-proxy"},{"name":"cloud-controller-manager-operator-tls","mountPath":"/etc/tls/private"},{"name":"kube-api-access-hq44d","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-catalogd/catalogd-controller-manager-7cc89f4c4c-v7zfw.json0000640000000000000000000002540015114405062026043 0ustar0000000000000000{"metadata":{"name":"catalogd-controller-manager-7cc89f4c4c-v7zfw","generateName":"catalogd-controller-manager-7cc89f4c4c-","namespace":"openshift-catalogd","uid":"fb0274dc-fac1-41f9-b3e5-77253d851fdf","resourceVersion":"13146","creationTimestamp":"2025-12-04T22:01:06Z","labels":{"control-plane":"catalogd-controller-manager","pod-template-hash":"7cc89f4c4c"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.34/23\"],\"mac_address\":\"0a:58:0a:80:00:22\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.34/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.34\"\n ],\n \"mac\": \"0a:58:0a:80:00:22\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"manager","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"catalogd-controller-manager-7cc89f4c4c","uid":"6fbcf4d3-7c5f-4bda-a8be-e3611966bbfd","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cache","emptyDir":{}},{"name":"catalogserver-certs","secret":{"secretName":"catalogserver-cert","items":[{"key":"tls.crt","path":"tls.crt"},{"key":"tls.key","path":"tls.key"}],"defaultMode":420,"optional":false}},{"name":"ca-certs","projected":{"sources":[{"configMap":{"name":"catalogd-trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"ca-bundle.crt"}],"optional":false}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"optional":false}}],"defaultMode":420}},{"name":"etc-containers","hostPath":{"path":"/etc/containers","type":"Directory"}},{"name":"etc-docker","hostPath":{"path":"/etc/docker","type":"Directory"}},{"name":"kube-api-access-r4czl","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","args":["--secure-listen-address=0.0.0.0:7443","--http2-disable","--upstream=http://127.0.0.1:8080/","--logtostderr=true","--v=2"],"ports":[{"name":"https","containerPort":7443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"5m","memory":"64Mi"}},"volumeMounts":[{"name":"kube-api-access-r4czl","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}},{"name":"manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3f0aa9cd04713acc5c6fea721bd849e1500da8ae945e0b32000887f34d786e0b","command":["./manager"],"args":["--leader-elect","--metrics-bind-address=127.0.0.1:8080","--external-address=catalogd-service.openshift-catalogd.svc","--tls-cert=/var/certs/tls.crt","--tls-key=/var/certs/tls.key","--v=2","--global-pull-secret=openshift-config/pull-secret"],"env":[{"name":"SSL_CERT_DIR","value":"/var/ca-certs"}],"resources":{"requests":{"cpu":"100m","memory":"200Mi"}},"volumeMounts":[{"name":"cache","mountPath":"/var/cache/"},{"name":"catalogserver-certs","mountPath":"/var/certs"},{"name":"ca-certs","readOnly":true,"mountPath":"/var/ca-certs"},{"name":"etc-containers","readOnly":true,"mountPath":"/etc/containers"},{"name":"etc-docker","readOnly":true,"mountPath":"/etc/docker"},{"name":"kube-api-access-r4czl","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":15,"timeoutSeconds":1,"periodSeconds":20,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":5,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":10,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"catalogd-controller-manager","serviceAccount":"catalogd-controller-manager","nodeName":"master-0","securityContext":{"seLinuxOptions":{"type":"spc_t"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchExpressions":[{"key":"kubernetes.io/arch","operator":"In","values":["amd64","arm64","ppc64le","s390x"]},{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:01:10Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:01:06Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:19:42Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:19:42Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:01:06Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.34","podIPs":[{"ip":"10.128.0.34"}],"startTime":"2025-12-04T22:01:06Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2025-12-04T22:01:09Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","containerID":"cri-o://6944a3b8b194a602e8e8da3a2a8db2470b7b88d403a9cce77f1224cd0d653cf1","started":true,"volumeMounts":[{"name":"kube-api-access-r4czl","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"manager","state":{"running":{"startedAt":"2025-12-04T22:13:07Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"catalog_controller.go:134] \"reconcile ending\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-community-operators\" namespace=\"\" name=\"openshift-community-operators\" reconcileID=\"d7d3a9da-5c4b-4b6d-a4ca-eb7fe55b3a69\"\nI1204 22:08:39.162677 1 serverutil.go:96] \"handled request\" logger=\"catalogd-http-server\" host=\"10.128.0.36\" username=\"-\" method=\"GET\" uri=\"/catalogs/openshift-certified-operators/api/v1/all\" protocol=\"HTTP/1.1\" status=200 size=7225159\nI1204 22:08:40.767128 1 serverutil.go:96] \"handled request\" logger=\"catalogd-http-server\" host=\"10.128.0.36\" username=\"-\" method=\"GET\" uri=\"/catalogs/openshift-community-operators/api/v1/all\" protocol=\"HTTP/1.1\" status=200 size=7840207\nI1204 22:08:42.123084 1 serverutil.go:96] \"handled request\" logger=\"catalogd-http-server\" host=\"10.128.0.36\" username=\"-\" method=\"GET\" uri=\"/catalogs/openshift-redhat-marketplace/api/v1/all\" protocol=\"HTTP/1.1\" status=200 size=2541836\nI1204 22:08:46.169398 1 serverutil.go:96] \"handled request\" logger=\"catalogd-http-server\" host=\"10.128.0.36\" username=\"-\" method=\"GET\" uri=\"/catalogs/openshift-redhat-operators/api/v1/all\" protocol=\"HTTP/1.1\" status=200 size=13084089\nE1204 22:11:40.320876 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE1204 22:12:40.322982 1 leaderelection.go:436] error retrieving resource lock openshift-catalogd/catalogd-operator-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io catalogd-operator-lock)\nI1204 22:12:53.313538 1 leaderelection.go:297] failed to renew lease openshift-catalogd/catalogd-operator-lock: timed out waiting for the condition\nE1204 22:12:53.313680 1 main.go:351] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\n","startedAt":"2025-12-04T22:03:56Z","finishedAt":"2025-12-04T22:12:53Z","containerID":"cri-o://818c6aaeff094c3713e384dec4d55a28c1f228a4e98ba130afd94743d45d288f"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3f0aa9cd04713acc5c6fea721bd849e1500da8ae945e0b32000887f34d786e0b","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3f0aa9cd04713acc5c6fea721bd849e1500da8ae945e0b32000887f34d786e0b","containerID":"cri-o://c8721bb45eb3cc953ffc024aeb4fb1727d1b4358f45d475db67be3cd695e49da","started":true,"volumeMounts":[{"name":"cache","mountPath":"/var/cache/"},{"name":"catalogserver-certs","mountPath":"/var/certs"},{"name":"ca-certs","mountPath":"/var/ca-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-containers","mountPath":"/etc/containers","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-docker","mountPath":"/etc/docker","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-r4czl","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/configmaps/kube-system/cluster-config-v1/install-config0000640000000000000000000000155515114405062023213 0ustar0000000000000000apiVersion: v1 baseDomain: xxxxxxxxxxxxx compute: - hyperthreading: Enabled name: worker platform: {} replicas: 0 controlPlane: hyperthreading: Enabled name: master platform: {} replicas: 1 metadata: creationTimestamp: null name: sno networking: clusterNetwork: - cidr: 10.128.0.0/16 hostPrefix: 23 machineNetwork: - cidr: 192.168.32.0/24 networkType: OVNKubernetes serviceNetwork: - 172.30.0.0/16 platform: none: {} publish: External pullSecret: "" sshKey: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt0000640000000000000000000000010115114405062025423 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/openshift-install-manifests/version0000640000000000000000000000000715114405062025132 0ustar0000000000000000v4.18.0config/configmaps/openshift-config/openshift-install-manifests/invoker0000640000000000000000000000001715114405062025123 0ustar0000000000000000agent-installerconfig/configmaps/openshift-config/kube-root-ca.crt/ca.crt0000640000000000000000000000060615114405062022251 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/initial-kube-apiserver-server-ca/ca-bundle.crt0000640000000000000000000000050515114405062026677 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt0000640000000000000000000000010115114405062023402 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt0000640000000000000000000000010115114405062023176 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt0000640000000000000000000000010115114405062025466 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/crd/volumesnapshotcontents.snapshot.storage.k8s.io.json0000640000000000000000000005444315114405062023440 0ustar0000000000000000{"metadata":{"name":"volumesnapshotcontents.snapshot.storage.k8s.io","uid":"634f1746-ca0a-4a49-aa58-0f8535520136","resourceVersion":"4072","generation":1,"creationTimestamp":"2025-12-04T22:00:38Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/955","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"scope":"Cluster","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the\nunderlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system.\nRequired.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on\nthe underlying storage system should be deleted when its bound VolumeSnapshot is deleted.\nSupported values are \"Retain\" and \"Delete\".\n\"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept.\n\"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted.\nFor dynamically provisioned snapshots, this field will automatically be filled in by the\nCSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding\nVolumeSnapshotClass.\nFor pre-existing snapshots, users MUST specify this field when creating the\n VolumeSnapshotContent object.\nRequired.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on\nthe underlying storage system.\nThis MUST be the same as the name returned by the CSI GetPluginName() call for\nthat driver.\nRequired.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned\nor already exists, and just requires a Kubernetes object representation.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on\nthe underlying storage system for which a Kubernetes object representation\nwas (or should be) created.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"snapshotHandle is immutable"}]},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot\nshould be dynamically taken from.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeHandle is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.volumeHandle) || has(self.volumeHandle)","message":"volumeHandle is required once set"},{"rule":"!has(oldSelf.snapshotHandle) || has(self.snapshotHandle)","message":"snapshotHandle is required once set"},{"rule":"(has(self.volumeHandle) \u0026\u0026 !has(self.snapshotHandle)) || (!has(self.volumeHandle) \u0026\u0026 has(self.snapshotHandle))","message":"exactly one of volumeHandle and snapshotHandle must be set"}]},"sourceVolumeMode":{"description":"SourceVolumeMode is the mode of the volume whose snapshot is taken.\nCan be either “Filesystem” or “Block”.\nIf not specified, it indicates the source volume's mode is unknown.\nThis field is immutable.\nThis field is an alpha field.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"sourceVolumeMode is immutable"}]},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be)\ncreated.\nNote that after provisioning, the VolumeSnapshotClass may be deleted or\nrecreated with different set of values, and as such, should not be referenced\npost-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this\nVolumeSnapshotContent object is bound.\nVolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to\nthis VolumeSnapshotContent's name for the bidirectional binding to be valid.\nFor a pre-existing VolumeSnapshotContent object, name and namespace of the\nVolumeSnapshot object MUST be provided for binding to happen.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string\nshould contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2].\nFor example, if the object reference is to a container within a pod, this would take on a value like:\n\"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered\nthe event) or if no container name is specified \"spec.containers[2]\" (container with\nindex 2 in this pod). This syntax is chosen only to have some well-defined way of\nreferencing a part of an object.\nTODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}},"x-kubernetes-map-type":"atomic","x-kubernetes-validations":[{"rule":"has(self.name) \u0026\u0026 has(self.__namespace__)","message":"both spec.volumeSnapshotRef.name and spec.volumeSnapshotRef.namespace must be set"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.sourceVolumeMode) || has(self.sourceVolumeMode)","message":"sourceVolumeMode is required once set"}]},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it indicates the creation time is unknown.\nThe format of this field is a Unix nanoseconds time encoded as an int64.\nOn Unix, the command `date +%s%N` returns the current time in nanoseconds\nsince 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nUpon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system.\nIf not specified, it indicates that dynamic snapshot creation has either failed\nor it is still in progress.","type":"string"},"volumeGroupSnapshotHandle":{"description":"VolumeGroupSnapshotHandle is the CSI \"group_snapshot_id\" of a group snapshot\non the underlying storage system.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshotContent is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshotContent","schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the underlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system. Required.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted. Supported values are \"Retain\" and \"Delete\". \"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept. \"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted. For dynamically provisioned snapshots, this field will automatically be filled in by the CSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding VolumeSnapshotClass. For pre-existing snapshots, users MUST specify this field when creating the VolumeSnapshotContent object. Required.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on the underlying storage system. This MUST be the same as the name returned by the CSI GetPluginName() call for that driver. Required.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned or already exists, and just requires a Kubernetes object representation. This field is immutable after creation. Required.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on the underlying storage system for which a Kubernetes object representation was (or should be) created. This field is immutable.","type":"string"},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot should be dynamically taken from. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be) created. Note that after provisioning, the VolumeSnapshotClass may be deleted or recreated with different set of values, and as such, should not be referenced post-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this VolumeSnapshotContent object is bound. VolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to this VolumeSnapshotContent's name for the bidirectional binding to be valid. For a pre-existing VolumeSnapshotContent object, name and namespace of the VolumeSnapshot object MUST be provided for binding to happen. This field is immutable after creation. Required.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string should contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2]. For example, if the object reference is to a container within a pod, this would take on a value like: \"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered the event) or if no container name is specified \"spec.containers[2]\" (container with index 2 in this pod). This syntax is chosen only to have some well-defined way of referencing a part of an object. TODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}}}}},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it indicates the creation time is unknown. The format of this field is a Unix nanoseconds time encoded as an int64. On Unix, the command `date +%s%N` returns the current time in nanoseconds since 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any. Upon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system. If not specified, it indicates that dynamic snapshot creation has either failed or it is still in progress.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"NamesAccepted","status":"True","lastTransitionTime":"2025-12-04T22:00:38Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2025-12-04T22:00:38Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"},{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2025-12-04T22:00:38Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/955"}],"acceptedNames":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"storedVersions":["v1"]}}config/crd/volumesnapshots.snapshot.storage.k8s.io.json0000640000000000000000000004563015114405062022043 0ustar0000000000000000{"metadata":{"name":"volumesnapshots.snapshot.storage.k8s.io","uid":"01e5b523-325a-4ab3-92a3-740ae0a0eb24","resourceVersion":"4020","generation":1,"creationTimestamp":"2025-12-04T22:00:38Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/814","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"scope":"Namespaced","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time\nsnapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user.\nMore info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots\nRequired.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim\nobject representing the volume from which a snapshot should be created.\nThis PVC is assumed to be in the same namespace as the VolumeSnapshot\nobject.\nThis field should be set if the snapshot does not exists, and needs to be\ncreated.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"persistentVolumeClaimName is immutable"}]},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent\nobject representing an existing volume snapshot.\nThis field should be set if the snapshot already exists and only needs a representation in Kubernetes.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeSnapshotContentName is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.persistentVolumeClaimName) || has(self.persistentVolumeClaimName)","message":"persistentVolumeClaimName is required once set"},{"rule":"!has(oldSelf.volumeSnapshotContentName) || has(self.volumeSnapshotContentName)","message":"volumeSnapshotContentName is required once set"},{"rule":"(has(self.volumeSnapshotContentName) \u0026\u0026 !has(self.persistentVolumeClaimName)) || (!has(self.volumeSnapshotContentName) \u0026\u0026 has(self.persistentVolumeClaimName))","message":"exactly one of volumeSnapshotContentName and persistentVolumeClaimName must be set"}]},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass\nrequested by the VolumeSnapshot.\nVolumeSnapshotClassName may be left nil to indicate that the default\nSnapshotClass should be used.\nA given cluster may have multiple default Volume SnapshotClasses: one\ndefault per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass,\nVolumeSnapshotSource will be checked to figure out what the associated\nCSI Driver is, and the default VolumeSnapshotClass associated with that\nCSI Driver will be used. If more than one VolumeSnapshotClass exist for\na given CSI Driver and more than one have been marked as default,\nCreateSnapshot will fail and generate an event.\nEmpty string is not allowed for this field.","type":"string","x-kubernetes-validations":[{"rule":"size(self) \u003e 0","message":"volumeSnapshotClassName must not be the empty string when set"}]}}},"status":{"description":"status represents the current information of a snapshot.\nConsumers must verify binding between VolumeSnapshot and\nVolumeSnapshotContent objects is successful (by validating that both\nVolumeSnapshot and VolumeSnapshotContent point at each other) before\nusing this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent\nobject to which this VolumeSnapshot object intends to bind to.\nIf not specified, it indicates that the VolumeSnapshot object has not been\nsuccessfully bound to a VolumeSnapshotContent object yet.\nNOTE: To avoid possible security issues, consumers must verify binding between\nVolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that\nboth VolumeSnapshot and VolumeSnapshotContent point at each other) before using\nthis object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nThis field could be helpful to upper level controllers(i.e., application controller)\nto decide whether they should continue on waiting for the snapshot to be created\nbased on the type of error reported.\nThe snapshot controller will keep retrying when an error occurs during the\nsnapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume\nfrom this snapshot.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"volumeGroupSnapshotName":{"description":"VolumeGroupSnapshotName is the name of the VolumeGroupSnapshot of which this\nVolumeSnapshot is a part of.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshot is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshot","schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time snapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user. More info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots Required.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from. This field is immutable after creation. Required.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim object representing the volume from which a snapshot should be created. This PVC is assumed to be in the same namespace as the VolumeSnapshot object. This field should be set if the snapshot does not exists, and needs to be created. This field is immutable.","type":"string"},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent object representing an existing volume snapshot. This field should be set if the snapshot already exists and only needs a representation in Kubernetes. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass requested by the VolumeSnapshot. VolumeSnapshotClassName may be left nil to indicate that the default SnapshotClass should be used. A given cluster may have multiple default Volume SnapshotClasses: one default per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass, VolumeSnapshotSource will be checked to figure out what the associated CSI Driver is, and the default VolumeSnapshotClass associated with that CSI Driver will be used. If more than one VolumeSnapshotClass exist for a given CSI Driver and more than one have been marked as default, CreateSnapshot will fail and generate an event. Empty string is not allowed for this field.","type":"string"}}},"status":{"description":"status represents the current information of a snapshot. Consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent object to which this VolumeSnapshot object intends to bind to. If not specified, it indicates that the VolumeSnapshot object has not been successfully bound to a VolumeSnapshotContent object yet. NOTE: To avoid possible security issues, consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any. This field could be helpful to upper level controllers(i.e., application controller) to decide whether they should continue on waiting for the snapshot to be created based on the type of error reported. The snapshot controller will keep retrying when an error occurs during the snapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume from this snapshot. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2025-12-04T22:00:38Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/814"},{"type":"NamesAccepted","status":"True","lastTransitionTime":"2025-12-04T22:00:38Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2025-12-04T22:00:38Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"}],"acceptedNames":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"storedVersions":["v1"]}}aggregated/ingress_controllers_certs.json0000640000000000000000000000045715114405062017531 0ustar0000000000000000[{"name":"router-ca","namespace":"openshift-ingress-operator","not_before":"2025-12-04T22:01:08Z","not_after":"2027-12-04T22:01:09Z","controllers":[]},{"name":"router-certs-default","namespace":"openshift-ingress","not_before":"2025-12-04T22:01:09Z","not_after":"2027-12-04T22:01:10Z","controllers":[]}]events/openshift-cluster-version.json0000640000000000000000000002207115114405062016600 0ustar0000000000000000{"items":[{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-04T21:54:09Z","reason":"LeaderElection","message":"master-0_0eeb87c6-1a18-475b-b488-484b8506f8cd became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-04T21:54:13Z","reason":"LeaderElection","message":"master-0_1107bdee-2119-4520-9c9b-3e6c560e59dc became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-04T21:54:15Z","reason":"ScalingReplicaSet","message":"Scaled up replica set cluster-version-operator-77dfcc565f to 1","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-04T21:54:27Z","reason":"LeaderElection","message":"master-0_8474d748-29fb-439e-9bd5-771d335185f3 became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-04T21:54:29Z","reason":"RetrievePayload","message":"Retrieving and verifying payload version=\"4.18.29\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:8c885ea0b3c5124989f0a9b93eba98eb9fca6bbd0262772d85d90bf713a4d572\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-04T21:54:29Z","reason":"LoadPayload","message":"Loading payload version=\"4.18.29\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:8c885ea0b3c5124989f0a9b93eba98eb9fca6bbd0262772d85d90bf713a4d572\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-04T21:54:31Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.29\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:8c885ea0b3c5124989f0a9b93eba98eb9fca6bbd0262772d85d90bf713a4d572\" architecture=\"amd64\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-04T21:54:56Z","reason":"FailedCreate","message":"Error creating: pods \"cluster-version-operator-77dfcc565f-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-04T21:58:23Z","reason":"FailedCreate","message":"Error creating: pods \"cluster-version-operator-77dfcc565f-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-04T21:58:25Z","reason":"SuccessfulCreate","message":"Created pod: cluster-version-operator-77dfcc565f-2smgj","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-04T21:59:57Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"cluster-version-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-04T22:00:40Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"cluster-version-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-04T22:00:44Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-release@sha256:8c885ea0b3c5124989f0a9b93eba98eb9fca6bbd0262772d85d90bf713a4d572\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-04T22:00:47Z","reason":"Started","message":"Started container cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-04T22:00:47Z","reason":"Created","message":"Created container: cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-04T22:00:47Z","reason":"LeaderElection","message":"master-0_32c3d32e-94c5-4799-88d8-d559e0193bdb became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-04T22:00:47Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-release@sha256:8c885ea0b3c5124989f0a9b93eba98eb9fca6bbd0262772d85d90bf713a4d572\" in 3.059s (3.059s including waiting). Image size: 512452153 bytes.","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-04T22:00:49Z","reason":"LoadPayload","message":"Loading payload version=\"4.18.29\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:8c885ea0b3c5124989f0a9b93eba98eb9fca6bbd0262772d85d90bf713a4d572\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-04T22:00:49Z","reason":"RetrievePayload","message":"Retrieving and verifying payload version=\"4.18.29\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:8c885ea0b3c5124989f0a9b93eba98eb9fca6bbd0262772d85d90bf713a4d572\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-04T22:00:50Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.29\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:8c885ea0b3c5124989f0a9b93eba98eb9fca6bbd0262772d85d90bf713a4d572\" architecture=\"amd64\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-04T22:01:06Z","reason":"ScalingReplicaSet","message":"Scaled down replica set cluster-version-operator-77dfcc565f to 0 from 1","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-04T22:01:06Z","reason":"Killing","message":"Stopping container cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-04T22:01:06Z","reason":"SuccessfulDelete","message":"Deleted pod: cluster-version-operator-77dfcc565f-2smgj","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-04T22:01:06Z","reason":"LeaderElection","message":"master-0_32c3d32e-94c5-4799-88d8-d559e0193bdb stopped leading","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-04T22:01:09Z","reason":"ScalingReplicaSet","message":"Scaled up replica set cluster-version-operator-6d5d5dcc89 to 1","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-04T22:01:09Z","reason":"SuccessfulCreate","message":"Created pod: cluster-version-operator-6d5d5dcc89-t7cc5","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-04T22:01:10Z","reason":"LeaderElection","message":"master-0_5dc5e26b-e5fe-49f9-a6b6-0a94213e43a4 became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-04T22:01:11Z","reason":"RetrievePayload","message":"Retrieving and verifying payload version=\"4.18.29\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:8c885ea0b3c5124989f0a9b93eba98eb9fca6bbd0262772d85d90bf713a4d572\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-04T22:01:11Z","reason":"LoadPayload","message":"Loading payload version=\"4.18.29\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:8c885ea0b3c5124989f0a9b93eba98eb9fca6bbd0262772d85d90bf713a4d572\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-04T22:01:13Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.29\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:8c885ea0b3c5124989f0a9b93eba98eb9fca6bbd0262772d85d90bf713a4d572\" architecture=\"amd64\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-04T22:15:36Z","reason":"LeaderElection","message":"master-0_5dc5e26b-e5fe-49f9-a6b6-0a94213e43a4 stopped leading","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-04T22:15:36Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-release@sha256:8c885ea0b3c5124989f0a9b93eba98eb9fca6bbd0262772d85d90bf713a4d572\" already present on machine","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-04T22:15:37Z","reason":"Created","message":"Created container: cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-04T22:15:37Z","reason":"Started","message":"Started container cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-04T22:22:34Z","reason":"LeaderElection","message":"master-0_4b01fb41-7d4d-4d1e-95f2-a95f420a7fe7 became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-04T22:22:36Z","reason":"RetrievePayload","message":"Retrieving and verifying payload version=\"4.18.29\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:8c885ea0b3c5124989f0a9b93eba98eb9fca6bbd0262772d85d90bf713a4d572\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-04T22:22:36Z","reason":"LoadPayload","message":"Loading payload version=\"4.18.29\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:8c885ea0b3c5124989f0a9b93eba98eb9fca6bbd0262772d85d90bf713a4d572\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-04T22:22:38Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.29\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:8c885ea0b3c5124989f0a9b93eba98eb9fca6bbd0262772d85d90bf713a4d572\" architecture=\"amd64\"","type":"Normal"}]}config/pod/openshift-cluster-version/cluster-version-operator-6d5d5dcc89-t7cc5.json0000640000000000000000000001374115114405062026727 0ustar0000000000000000{"metadata":{"name":"cluster-version-operator-6d5d5dcc89-t7cc5","generateName":"cluster-version-operator-6d5d5dcc89-","namespace":"openshift-cluster-version","uid":"a8636bd7-fa9e-44b9-82df-9d37b398736d","resourceVersion":"11835","creationTimestamp":"2025-12-04T22:01:09Z","labels":{"k8s-app":"cluster-version-operator","pod-template-hash":"6d5d5dcc89"},"annotations":{"openshift.io/required-scc":"hostaccess","openshift.io/scc":"hostaccess"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-version-operator-6d5d5dcc89","uid":"00f20b97-5d64-44d0-80a9-2e92643e6edd","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"etc-ssl-certs","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"etc-cvo-updatepayloads","hostPath":{"path":"/etc/cvo/updatepayloads","type":""}},{"name":"serving-cert","secret":{"secretName":"cluster-version-operator-serving-cert","defaultMode":420}},{"name":"service-ca","configMap":{"name":"openshift-service-ca.crt","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-version-operator","image":"quay.io/openshift-release-dev/ocp-release@sha256:8c885ea0b3c5124989f0a9b93eba98eb9fca6bbd0262772d85d90bf713a4d572","args":["start","--release-image=quay.io/openshift-release-dev/ocp-release@sha256:8c885ea0b3c5124989f0a9b93eba98eb9fca6bbd0262772d85d90bf713a4d572","--enable-auto-update=false","--listen=0.0.0.0:9099","--serving-cert-file=/etc/tls/serving-cert/tls.crt","--serving-key-file=/etc/tls/serving-cert/tls.key","--v=2","--always-enable-capabilities=Ingress"],"env":[{"name":"OPERATOR_IMAGE_VERSION","value":"0.0.1-snapshot"},{"name":"KUBERNETES_SERVICE_PORT","value":"6443"},{"name":"KUBERNETES_SERVICE_HOST","value":"api-int.sno.openstack.lab"},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}},{"name":"CLUSTER_PROFILE","value":"self-managed-high-availability"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-ssl-certs","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"etc-cvo-updatepayloads","readOnly":true,"mountPath":"/etc/cvo/updatepayloads"},{"name":"serving-cert","readOnly":true,"mountPath":"/etc/tls/serving-cert"},{"name":"service-ca","readOnly":true,"mountPath":"/etc/tls/service-ca"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000040000,"runAsNonRoot":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":130,"dnsPolicy":"Default","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"default","serviceAccount":"default","automountServiceAccountToken":false,"nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c6,c5"},"fsGroup":1000040000},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:01:10Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:01:09Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:15:38Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:15:38Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-04T22:01:09Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2025-12-04T22:01:09Z","containerStatuses":[{"name":"cluster-version-operator","state":{"running":{"startedAt":"2025-12-04T22:15:37Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2025-12-04T22:01:09Z","finishedAt":"2025-12-04T22:15:36Z","containerID":"cri-o://74597696ddcec56d10e68ca1d29cef5d1bfa40762646f7e9dc8729a8c66636fd"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-release@sha256:8c885ea0b3c5124989f0a9b93eba98eb9fca6bbd0262772d85d90bf713a4d572","imageID":"quay.io/openshift-release-dev/ocp-release@sha256:8c885ea0b3c5124989f0a9b93eba98eb9fca6bbd0262772d85d90bf713a4d572","containerID":"cri-o://ecb995ffd687db0f9c53116cb470abf630b360b0cf85e7d21f6f2cc7513d1f11","started":true,"volumeMounts":[{"name":"etc-ssl-certs","mountPath":"/etc/ssl/certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-cvo-updatepayloads","mountPath":"/etc/cvo/updatepayloads","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"serving-cert","mountPath":"/etc/tls/serving-cert","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca","mountPath":"/etc/tls/service-ca","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/id0000640000000000000000000000004415114405062011020 0ustar0000000000000000e71be598-5536-4e25-8847-07e0c01660c4config/version.json0000640000000000000000000000556015114405062013071 0ustar0000000000000000{"metadata":{"name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a","resourceVersion":"17262","generation":2,"creationTimestamp":"2025-12-04T21:54:02Z"},"spec":{"clusterID":"e71be598-5536-4e25-8847-07e0c01660c4","channel":"stable-4.18","signatureStores":null},"status":{"desired":{"version":"4.18.29","image":"quay.io/openshift-release-dev/ocp-release@sha256:8c885ea0b3c5124989f0a9b93eba98eb9fca6bbd0262772d85d90bf713a4d572","url":"https://access.redhat.com/errata/RHBA-2025:21797","channels":["candidate-4.18","candidate-4.19","candidate-4.20","eus-4.18","fast-4.18","fast-4.19","fast-4.20","stable-4.18"]},"history":[{"state":"Partial","startedTime":"2025-12-04T21:54:31Z","completionTime":null,"version":"4.18.29","image":"quay.io/openshift-release-dev/ocp-release@sha256:8c885ea0b3c5124989f0a9b93eba98eb9fca6bbd0262772d85d90bf713a4d572","verified":false}],"observedGeneration":2,"versionHash":"PLBD6Tt9bD0=","capabilities":{"enabledCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"],"knownCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"]},"conditions":[{"type":"RetrievedUpdates","status":"True","lastTransitionTime":"2025-12-04T21:54:31Z"},{"type":"Upgradeable","status":"False","lastTransitionTime":"2025-12-04T21:54:31Z","reason":"AdminAckRequired","message":"Kubernetes 1.32 and therefore OpenShift 4.19 remove several APIs which require admin consideration. Please see the knowledge article https://access.redhat.com/articles/7112216 for details and instructions."},{"type":"ImplicitlyEnabledCapabilities","status":"False","lastTransitionTime":"2025-12-04T21:54:31Z","reason":"AsExpected","message":"Capabilities match configured spec"},{"type":"ReleaseAccepted","status":"True","lastTransitionTime":"2025-12-04T21:54:31Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.29\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:8c885ea0b3c5124989f0a9b93eba98eb9fca6bbd0262772d85d90bf713a4d572\" architecture=\"amd64\""},{"type":"Available","status":"False","lastTransitionTime":"2025-12-04T21:54:31Z"},{"type":"Failing","status":"True","lastTransitionTime":"2025-12-04T22:24:23Z","reason":"ClusterOperatorNotAvailable","message":"Cluster operator authentication is not available"},{"type":"Progressing","status":"True","lastTransitionTime":"2025-12-04T21:54:31Z","reason":"ClusterOperatorNotAvailable","message":"Unable to apply 4.18.29: the cluster operator authentication is not available"}],"availableUpdates":null}}config/network.json0000640000000000000000000000117015114405062013066 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"398aeeb2-7a19-4cb9-9193-f7662688d176","resourceVersion":"3147","generation":2,"creationTimestamp":"2025-12-04T21:53:58Z"},"spec":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","externalIP":{"policy":{}},"networkDiagnostics":{"mode":"","sourcePlacement":{"nodeSelector":null,"tolerations":null},"targetPlacement":{"nodeSelector":null,"tolerations":null}}},"status":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","clusterNetworkMTU":8900}}config/schedulers/cluster.json0000640000000000000000000000052415114405062015221 0ustar0000000000000000{"kind":"Scheduler","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster","uid":"80f67c48-8185-471c-bbbf-db8a774c7fc1","resourceVersion":"555","generation":1,"creationTimestamp":"2025-12-04T21:54:00Z"},"spec":{"policy":{"name":""},"profileCustomizations":{"dynamicResourceAllocation":""},"mastersSchedulable":true},"status":{}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/edit.json0000640000000000000000000002311515114405062025472 0ustar0000000000000000{"metadata":{"name":"edit","uid":"c7fffd99-f6b2-482a-86bb-171a788b62f2","resourceVersion":"14701","creationTimestamp":"2025-12-04T21:53:03Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults","rbac.authorization.k8s.io/aggregate-to-admin":"true"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","update","patch","delete"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests"]},{"verbs":["get","list","update","create","watch","patch","delete"],"apiGroups":["helm.openshift.io"],"resources":["projecthelmchartrepositories"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["get","list","watch"],"apiGroups":["metrics.k8s.io"],"resources":["pods","nodes"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-edit":"true"}}]}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/admin.json0000640000000000000000000002614115114405062025637 0ustar0000000000000000{"metadata":{"name":"admin","uid":"92319b0b-6504-42af-bce5-528b9fa46d9a","resourceVersion":"14703","creationTimestamp":"2025-12-04T21:53:03Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","update","patch","delete"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests"]},{"verbs":["get","list","update","create","watch","patch","delete"],"apiGroups":["helm.openshift.io"],"resources":["projecthelmchartrepositories"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["get","list","watch"],"apiGroups":["metrics.k8s.io"],"resources":["pods","nodes"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["watch","list","get"],"apiGroups":["k8s.cni.cncf.io"],"resources":["network-attachment-definitions"]},{"verbs":["*"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindings","roles"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["rbac.authorization.k8s.io"],"resources":["rolebindings","roles"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["localresourceaccessreviews","localsubjectaccessreviews","subjectrulesreviews"]},{"verbs":["create"],"apiGroups":["authorization.k8s.io"],"resources":["localsubjectaccessreviews"]},{"verbs":["delete","get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["resourceaccessreviews","subjectaccessreviews"]},{"verbs":["create"],"apiGroups":["","security.openshift.io"],"resources":["podsecuritypolicyreviews","podsecuritypolicyselfsubjectreviews","podsecuritypolicysubjectreviews"]},{"verbs":["get","list","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindingrestrictions"]},{"verbs":["admin","edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["delete","get","patch","update"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["update"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-admin":"true"}}]}}config/oauth.json0000640000000000000000000000114415114405062012516 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"90a4f93b-e04f-489f-af83-976b4efd0a54","resourceVersion":"1703","generation":1,"creationTimestamp":"2025-12-04T21:54:51Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a"}]},"spec":{"tokenConfig":{},"templates":{"login":{"name":""},"providerSelection":{"name":""},"error":{"name":""}}},"status":{}}config/node/master-0.json0000640000000000000000000000703115114405062013754 0ustar0000000000000000{"metadata":{"name":"master-0","uid":"730d6115-08f3-4ffe-b3c5-a4e6fa7e6675","resourceVersion":"16811","creationTimestamp":"2025-12-04T21:58:23Z","labels":{"beta.kubernetes.io/arch":"amd64","beta.kubernetes.io/os":"linux","kubernetes.io/arch":"amd64","kubernetes.io/hostname":"master-0","kubernetes.io/os":"linux","node-role.kubernetes.io/control-plane":"","node-role.kubernetes.io/master":"","node-role.kubernetes.io/worker":"","node.openshift.io/os_id":"rhcos"},"annotations":{"k8s.ovn.org/host-cidrs":"","k8s.ovn.org/l3-gateway-config":"","k8s.ovn.org/node-chassis-id":"","k8s.ovn.org/node-encap-ips":"","k8s.ovn.org/node-id":"","k8s.ovn.org/node-masquerade-subnet":"","k8s.ovn.org/node-primary-ifaddr":"","k8s.ovn.org/node-subnets":"","k8s.ovn.org/node-transit-switch-port-ifaddr":"","k8s.ovn.org/remote-zone-migrated":"","k8s.ovn.org/zone-name":"","machineconfiguration.openshift.io/controlPlaneTopology":"SingleReplica","machineconfiguration.openshift.io/currentConfig":"rendered-master-67eaf7c4d57499a62a9899ea19c65a40","machineconfiguration.openshift.io/desiredConfig":"rendered-master-67eaf7c4d57499a62a9899ea19c65a40","machineconfiguration.openshift.io/desiredDrain":"uncordon-rendered-master-67eaf7c4d57499a62a9899ea19c65a40","machineconfiguration.openshift.io/lastAppliedDrain":"uncordon-rendered-master-67eaf7c4d57499a62a9899ea19c65a40","machineconfiguration.openshift.io/lastObservedServerCAAnnotation":"false","machineconfiguration.openshift.io/lastSyncedControllerConfigResourceVersion":"10497","machineconfiguration.openshift.io/reason":"","machineconfiguration.openshift.io/state":"Done","volumes.kubernetes.io/controller-managed-attach-detach":"true"}},"spec":{},"status":{"capacity":{"cpu":"16","ephemeral-storage":"209124332Ki","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"49330228Ki","pods":"250"},"allocatable":{"cpu":"15500m","ephemeral-storage":"191655242229","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"48179252Ki","pods":"250"},"conditions":[{"type":"MemoryPressure","status":"False","lastHeartbeatTime":"2025-12-04T22:24:01Z","lastTransitionTime":"2025-12-04T21:58:23Z","reason":"KubeletHasSufficientMemory","message":"kubelet has sufficient memory available"},{"type":"DiskPressure","status":"False","lastHeartbeatTime":"2025-12-04T22:24:01Z","lastTransitionTime":"2025-12-04T21:58:23Z","reason":"KubeletHasNoDiskPressure","message":"kubelet has no disk pressure"},{"type":"PIDPressure","status":"False","lastHeartbeatTime":"2025-12-04T22:24:01Z","lastTransitionTime":"2025-12-04T21:58:23Z","reason":"KubeletHasSufficientPID","message":"kubelet has sufficient PID available"},{"type":"Ready","status":"True","lastHeartbeatTime":"2025-12-04T22:24:01Z","lastTransitionTime":"2025-12-04T22:00:26Z","reason":"KubeletReady","message":"kubelet is posting ready status"}],"addresses":[{"type":"InternalIP","address":"192.168.32.10"},{"type":"Hostname","address":"master-0"}],"daemonEndpoints":{"kubeletEndpoint":{"Port":10250}},"nodeInfo":{"machineID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","systemUUID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","bootID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","kernelVersion":"5.14.0-427.100.1.el9_4.x86_64","osImage":"Red Hat Enterprise Linux CoreOS 418.94.202511170715-0","containerRuntimeVersion":"cri-o://1.31.13-2.rhaos4.18.git15789b8.el9","kubeletVersion":"v1.31.13","kubeProxyVersion":"v1.31.13","operatingSystem":"linux","architecture":"amd64"},"runtimeHandlers":[{"name":"crun","features":{"recursiveReadOnlyMounts":true}},{"name":"","features":{"recursiveReadOnlyMounts":true}},{"name":"runc","features":{"recursiveReadOnlyMounts":true}}]}}events/openshift-machine-api.json0000640000000000000000000000612115114405062015605 0ustar0000000000000000{"items":[{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-04T22:13:35Z","reason":"BackOff","message":"Back-off restarting failed container control-plane-machine-set-operator in pod control-plane-machine-set-operator-7df95c79b5-nznvn_openshift-machine-api(f1534e25-7add-46a1-8f4e-0065c232aa4e)","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-04T22:14:51Z","reason":"BackOff","message":"Back-off restarting failed container cluster-baremetal-operator in pod cluster-baremetal-operator-78f758c7b9-44srj_openshift-machine-api(a3899a38-39b8-4b48-81e5-4d8854ecc8ab)","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-04T22:19:38Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cert\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-04T22:19:38Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cluster-baremetal-operator-tls\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-04T22:19:38Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-04T22:19:38Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"images\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-04T22:19:38Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"images\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-04T22:19:38Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-04T22:19:39Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"auth-proxy-config\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-04T22:19:39Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cert\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-04T22:19:39Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"control-plane-machine-set-operator-tls\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-04T22:19:39Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"machine-api-operator-tls\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"}]}config/apiserver.json0000640000000000000000000000121615114405062013376 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"c60c64d8-ef7c-4551-9c32-ed507b3b063c","resourceVersion":"948","generation":1,"creationTimestamp":"2025-12-04T21:54:34Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","oauth-apiserver.openshift.io/secure-token-storage":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a"}]},"spec":{"servingCerts":{},"clientCA":{"name":""},"encryption":{},"audit":{"profile":"Default"}},"status":{}}config/image.json0000640000000000000000000000111715114405062012460 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"d1afbe57-ca70-4638-89f9-e9244f8f1c03","resourceVersion":"1602","generation":1,"creationTimestamp":"2025-12-04T21:54:49Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a"}]},"spec":{"additionalTrustedCA":{"name":""},"registrySources":{},"imageStreamImportMode":""},"status":{}}config/namespaces_with_overlapping_uids.json0000640000000000000000000000000215114405062020172 0ustar0000000000000000[]config/infrastructure.json0000640000000000000000000000106515114405062014460 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"5aa4e71c-608d-4ed6-9739-f85a2a7b8fa5","resourceVersion":"533","generation":1,"creationTimestamp":"2025-12-04T21:53:57Z"},"spec":{"cloudConfig":{"name":""},"platformSpec":{"type":"None"}},"status":{"infrastructureName":"xxx-xxxxx","platform":"None","platformStatus":{"type":"None"},"etcdDiscoveryDomain":"","apiServerURL":"https://api.sno.openstack.lab:6443","apiServerInternalURI":"https://api-int.sno.openstack.lab:6443","controlPlaneTopology":"SingleReplica","infrastructureTopology":"SingleReplica","cpuPartitioning":"None"}}config/clusteroperator/imageregistry.operator.openshift.io/imagepruner/cluster.json0000640000000000000000000000163115114405062027744 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"0a81890f-4f4b-4e17-a732-b7f59feca794","resourceVersion":"6410","generation":1,"creationTimestamp":"2025-12-04T22:01:08Z"},"spec":{"schedule":"","suspend":false,"keepTagRevisions":3,"successfulJobsHistoryLimit":3,"failedJobsHistoryLimit":3,"ignoreInvalidImageReferences":true,"logLevel":"Normal"},"status":{"observedGeneration":1,"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2025-12-04T22:01:09Z","reason":"AsExpected","message":"Pruner CronJob has been created"},{"type":"Failed","status":"False","lastTransitionTime":"2025-12-04T22:01:09Z","reason":"Complete","message":"Pruner completed successfully"},{"type":"Scheduled","status":"True","lastTransitionTime":"2025-12-04T22:01:09Z","reason":"Scheduled","message":"The pruner job has been scheduled"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-04T22:01:09Z","reason":"AsExpected"}]}}config/pdbs/openshift-operator-lifecycle-manager/packageserver-pdb.json0000640000000000000000000000173515114405062025116 0ustar0000000000000000{"metadata":{"name":"packageserver-pdb","namespace":"openshift-operator-lifecycle-manager","uid":"2bc3e10d-978d-4e66-b892-dde058a192e9","resourceVersion":"9990","generation":1,"creationTimestamp":"2025-12-04T21:54:49Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a","controller":true}]},"spec":{"selector":{"matchLabels":{"app":"packageserver"}},"maxUnavailable":1},"status":{"observedGeneration":1,"disruptionsAllowed":1,"currentHealthy":1,"desiredHealthy":0,"expectedPods":1,"conditions":[{"type":"DisruptionAllowed","status":"True","observedGeneration":1,"lastTransitionTime":"2025-12-04T22:05:34Z","reason":"SufficientPods","message":""}]}}config/pdbs/openshift-console/downloads.json0000640000000000000000000000107115114405062017756 0ustar0000000000000000{"metadata":{"name":"downloads","namespace":"openshift-console","uid":"e783b97a-aa4b-457e-993f-8bdc861d5257","resourceVersion":"16785","generation":1,"creationTimestamp":"2025-12-04T22:23:05Z"},"spec":{"selector":{"matchLabels":{"app":"console","component":"downloads"}},"maxUnavailable":1},"status":{"observedGeneration":1,"disruptionsAllowed":1,"currentHealthy":1,"desiredHealthy":0,"expectedPods":1,"conditions":[{"type":"DisruptionAllowed","status":"True","observedGeneration":1,"lastTransitionTime":"2025-12-04T22:23:58Z","reason":"SufficientPods","message":""}]}}config/pdbs/openshift-console/console.json0000640000000000000000000000106015114405062017424 0ustar0000000000000000{"metadata":{"name":"console","namespace":"openshift-console","uid":"025668d6-61d2-4cb1-97f7-1c92071be9cc","resourceVersion":"17188","generation":1,"creationTimestamp":"2025-12-04T22:23:05Z"},"spec":{"selector":{"matchLabels":{"app":"console","component":"ui"}},"maxUnavailable":1},"status":{"observedGeneration":1,"disruptionsAllowed":1,"currentHealthy":1,"desiredHealthy":0,"expectedPods":1,"conditions":[{"type":"DisruptionAllowed","status":"True","observedGeneration":1,"lastTransitionTime":"2025-12-04T22:23:19Z","reason":"SufficientPods","message":""}]}}config/featuregate.json0000640000000000000000000000613615114405062013700 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"36611d78-9f0d-4ff0-964e-d78e11dac397","resourceVersion":"639","generation":1,"creationTimestamp":"2025-12-04T21:54:19Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true"}},"spec":{},"status":{"featureGates":[{"version":"4.18.29","enabled":[{"name":"AWSEFSDriverVolumeMetrics"},{"name":"AdminNetworkPolicy"},{"name":"AlibabaPlatform"},{"name":"AzureWorkloadIdentity"},{"name":"BareMetalLoadBalancer"},{"name":"BuildCSIVolumes"},{"name":"ChunkSizeMiB"},{"name":"CloudDualStackNodeIPs"},{"name":"DisableKubeletCloudCredentialProviders"},{"name":"GCPLabelsTags"},{"name":"HardwareSpeed"},{"name":"IngressControllerLBSubnetsAWS"},{"name":"KMSv1"},{"name":"ManagedBootImages"},{"name":"ManagedBootImagesAWS"},{"name":"MultiArchInstallAWS"},{"name":"MultiArchInstallGCP"},{"name":"NetworkDiagnosticsConfig"},{"name":"NetworkLiveMigration"},{"name":"NetworkSegmentation"},{"name":"NewOLM"},{"name":"NodeDisruptionPolicy"},{"name":"OnClusterBuild"},{"name":"PersistentIPsForVirtualization"},{"name":"PrivateHostedZoneAWS"},{"name":"SetEIPForNLBIngressController"},{"name":"VSphereControlPlaneMachineSet"},{"name":"VSphereDriverConfiguration"},{"name":"VSphereMultiVCenters"},{"name":"VSphereStaticIPs"},{"name":"ValidatingAdmissionPolicy"}],"disabled":[{"name":"AWSClusterHostedDNS"},{"name":"AdditionalRoutingCapabilities"},{"name":"AutomatedEtcdBackup"},{"name":"BootcNodeManagement"},{"name":"CSIDriverSharedResource"},{"name":"ClusterAPIInstall"},{"name":"ClusterAPIInstallIBMCloud"},{"name":"ClusterMonitoringConfig"},{"name":"ConsolePluginContentSecurityPolicy"},{"name":"DNSNameResolver"},{"name":"DynamicResourceAllocation"},{"name":"EtcdBackendQuota"},{"name":"EventedPLEG"},{"name":"Example"},{"name":"ExternalOIDC"},{"name":"ExternalOIDCWithUIDAndExtraClaimMappings"},{"name":"GCPClusterHostedDNS"},{"name":"GatewayAPI"},{"name":"ImageStreamImportMode"},{"name":"IngressControllerDynamicConfigurationManager"},{"name":"InsightsConfig"},{"name":"InsightsConfigAPI"},{"name":"InsightsOnDemandDataGather"},{"name":"InsightsRuntimeExtractor"},{"name":"MachineAPIMigration"},{"name":"MachineAPIOperatorDisableMachineHealthCheckController"},{"name":"MachineAPIProviderOpenStack"},{"name":"MachineConfigNodes"},{"name":"MaxUnavailableStatefulSet"},{"name":"MetricsCollectionProfiles"},{"name":"MinimumKubeletVersion"},{"name":"MixedCPUsAllocation"},{"name":"MultiArchInstallAzure"},{"name":"NodeSwap"},{"name":"NutanixMultiSubnets"},{"name":"OVNObservability"},{"name":"OpenShiftPodSecurityAdmission"},{"name":"PinnedImages"},{"name":"PlatformOperators"},{"name":"ProcMountType"},{"name":"RouteAdvertisements"},{"name":"RouteExternalCertificate"},{"name":"ServiceAccountTokenNodeBinding"},{"name":"SignatureStores"},{"name":"SigstoreImageVerification"},{"name":"StreamingCollectionEncodingToJSON"},{"name":"StreamingCollectionEncodingToProtobuf"},{"name":"TranslateStreamCloseWebsocketRequests"},{"name":"UpgradeStatus"},{"name":"UserNamespacesPodSecurityStandards"},{"name":"UserNamespacesSupport"},{"name":"VSphereMultiNetworks"},{"name":"VolumeAttributesClass"},{"name":"VolumeGroupSnapshot"}]}]}}config/machinehealthchecks/openshift-machine-api/machine-api-termination-handler.json0000640000000000000000000000163215114405062027640 0ustar0000000000000000{"apiVersion":"machine.openshift.io/v1beta1","kind":"MachineHealthCheck","metadata":{"annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"creationTimestamp":"2025-12-04T22:05:14Z","generation":1,"labels":{"api":"clusterapi","k8s-app":"termination-handler"},"name":"machine-api-termination-handler","namespace":"openshift-machine-api","ownerReferences":[{"apiVersion":"config.openshift.io/v1","controller":true,"kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a"}],"resourceVersion":"9870","uid":"b6e78492-14ce-43ee-b588-f976d0c75cb6"},"spec":{"maxUnhealthy":"100%","nodeStartupTimeout":"0","selector":{"matchLabels":{"machine.openshift.io/interruptible-instance":""}},"unhealthyConditions":[{"status":"True","timeout":"0s","type":"Terminating"}]}}config/ingress.json0000640000000000000000000000213215114405062013046 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"6912e1ba-b57f-44ab-940c-668a9567e6a6","resourceVersion":"16819","generation":1,"creationTimestamp":"2025-12-04T21:53:57Z"},"spec":{"domain":"apps.sno.openstack.lab","loadBalancer":{"platform":{"type":""}}},"status":{"componentRoutes":[{"namespace":"openshift-authentication","name":"oauth-openshift","defaultHostname":"oauth-openshift.apps.sno.openstack.lab","consumingUsers":["system:serviceaccount:oauth-openshift:authentication-operator"],"currentHostnames":["oauth-openshift.apps.sno.openstack.lab"],"conditions":[{"type":"Progressing","status":"True","lastTransitionTime":"2025-12-04T22:24:04Z","reason":"ErrorReachingOutToService","message":"unexpected error at oauth-openshift.apps.sno.openstack.lab: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-04T22:19:25Z","reason":"AsExpected","message":"All is well"}],"relatedObjects":[{"group":"route.openshift.io","resource":"routes","namespace":"openshift-authentication","name":"oauth-openshift"}]}],"defaultPlacement":"ControlPlane"}}config/mutatingwebhookconfigurations/catalogd-mutating-webhook-configuration.json0000640000000000000000000000533615114405062027474 0ustar0000000000000000{"metadata":{"name":"catalogd-mutating-webhook-configuration","uid":"6d5c3435-3233-4695-8724-ed70e0ac9bf6","resourceVersion":"5674","generation":2,"creationTimestamp":"2025-12-04T22:00:54Z","annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"inject-metadata-name.olm.operatorframework.io","clientConfig":{"service":{"namespace":"openshift-catalogd","name":"catalogd-service","path":"/mutate-olm-operatorframework-io-v1-clustercatalog","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["olm.operatorframework.io"],"apiVersions":["v1"],"resources":["clustercatalogs"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"],"reinvocationPolicy":"Never","matchConditions":[{"name":"MissingOrIncorrectMetadataNameLabel","expression":"'name' in object.metadata \u0026\u0026 (!has(object.metadata.labels) || !('olm.operatorframework.io/metadata.name' in object.metadata.labels) || object.metadata.labels['olm.operatorframework.io/metadata.name'] != object.metadata.name)"}]}]}config/clusteroperator/imageregistry.operator.openshift.io/config/cluster.json0000640000000000000000000000416515114405062026700 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"171e7e1d-ee0c-4298-a690-b1ac960ff30b","resourceVersion":"16865","generation":1,"creationTimestamp":"2025-12-04T22:22:58Z","finalizers":["imageregistry.operator.openshift.io/finalizer"]},"spec":{"managementState":"Removed","logLevel":"Normal","operatorLogLevel":"Normal","unsupportedConfigOverrides":null,"observedConfig":null,"proxy":{},"storage":{},"requests":{"read":{"maxWaitInQueue":"0s"},"write":{"maxWaitInQueue":"0s"}},"replicas":1,"rolloutStrategy":"RollingUpdate"},"status":{"observedGeneration":1,"conditions":[{"type":"ImageConfigControllerDegraded","status":"False","lastTransitionTime":"2025-12-04T22:22:58Z","reason":"AsExpected"},{"type":"AzureStackCloudControllerDegraded","status":"False","lastTransitionTime":"2025-12-04T22:22:58Z","reason":"AsExpected"},{"type":"NodeCADaemonAvailable","status":"True","lastTransitionTime":"2025-12-04T22:23:05Z","reason":"AsExpected","message":"The daemon set node-ca has available replicas"},{"type":"NodeCADaemonProgressing","status":"False","lastTransitionTime":"2025-12-04T22:23:05Z","reason":"AsExpected","message":"The daemon set node-ca is deployed"},{"type":"NodeCADaemonControllerDegraded","status":"False","lastTransitionTime":"2025-12-04T22:22:59Z","reason":"AsExpected"},{"type":"ImageRegistryCertificatesControllerDegraded","status":"False","lastTransitionTime":"2025-12-04T22:22:59Z","reason":"AsExpected"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-04T22:24:12Z","reason":"Removed","message":"All registry resources are removed"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-04T22:23:00Z","reason":"Removed","message":"The registry is removed"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-04T22:23:00Z","reason":"Removed","message":"The registry is removed"},{"type":"Removed","status":"True","lastTransitionTime":"2025-12-04T22:23:00Z","reason":"Removed","message":"The registry is removed"}],"readyReplicas":0,"generations":[{"group":"apps","resource":"daemonsets","namespace":"openshift-image-registry","name":"node-ca","lastGeneration":1,"hash":""}],"storageManaged":false,"storage":{}}}config/machineconfigpools/worker.json0000640000000000000000000001013515114405062016556 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2025-12-04T22:01:35Z","generation":2,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","pools.operator.machineconfiguration.openshift.io/worker":""},"name":"worker","resourceVersion":"10447","uid":"b4e1a1e3-55dc-44dd-8616-404c92b33b18"},"spec":{"configuration":{"name":"rendered-worker-c04c3a75b10185e115c02aedea740507","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-worker"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-workers-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-ssh"}]},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"worker"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/worker":""}},"paused":false},"status":{"certExpirys":[{"bundle":"KubeAPIServerServingCAData","expiry":"2035-12-02T21:43:42Z","subject":"CN=admin-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2025-12-05T21:50:08Z","subject":"CN=kube-csr-signer_@1764885640"},{"bundle":"KubeAPIServerServingCAData","expiry":"2025-12-05T21:50:08Z","subject":"CN=kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-12-04T21:50:08Z","subject":"CN=kube-apiserver-to-kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-12-04T21:50:08Z","subject":"CN=kube-control-plane-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2035-12-02T21:50:06Z","subject":"CN=kubelet-bootstrap-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-12-04T22:00:29Z","subject":"CN=openshift-kube-apiserver-operator_node-system-admin-signer@1764885629"}],"conditions":[{"lastTransitionTime":"2025-12-04T22:05:44Z","message":"","reason":"","status":"False","type":"RenderDegraded"},{"lastTransitionTime":"2025-12-04T22:05:52Z","message":"All nodes are updated with MachineConfig rendered-worker-c04c3a75b10185e115c02aedea740507","reason":"","status":"True","type":"Updated"},{"lastTransitionTime":"2025-12-04T22:05:52Z","message":"","reason":"","status":"False","type":"Updating"},{"lastTransitionTime":"2025-12-04T22:05:52Z","message":"","reason":"","status":"False","type":"NodeDegraded"},{"lastTransitionTime":"2025-12-04T22:05:52Z","message":"","reason":"","status":"False","type":"Degraded"}],"configuration":{"name":"rendered-worker-c04c3a75b10185e115c02aedea740507","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-worker"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-workers-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-ssh"}]},"degradedMachineCount":0,"machineCount":0,"observedGeneration":2,"readyMachineCount":0,"unavailableMachineCount":0,"updatedMachineCount":0}}config/machineconfigpools/master.json0000640000000000000000000001241015114405062016536 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2025-12-04T22:01:35Z","generation":2,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","operator.machineconfiguration.openshift.io/required-for-upgrade":"","pools.operator.machineconfiguration.openshift.io/master":""},"name":"master","resourceVersion":"10777","uid":"208a2ed1-c7ee-47d4-b120-5d4531767d64"},"spec":{"configuration":{"name":"rendered-master-67eaf7c4d57499a62a9899ea19c65a40","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-master"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-master-dnsmasq-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-masters-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-nable-iscsi"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-netifnames-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-lv-cinder-volumes"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-multipath-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-ssh"}]},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"master"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/master":""}},"paused":false},"status":{"certExpirys":[{"bundle":"KubeAPIServerServingCAData","expiry":"2035-12-02T21:43:42Z","subject":"CN=admin-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2025-12-05T21:50:08Z","subject":"CN=kube-csr-signer_@1764885640"},{"bundle":"KubeAPIServerServingCAData","expiry":"2025-12-05T21:50:08Z","subject":"CN=kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-12-04T21:50:08Z","subject":"CN=kube-apiserver-to-kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-12-04T21:50:08Z","subject":"CN=kube-control-plane-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2035-12-02T21:50:06Z","subject":"CN=kubelet-bootstrap-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-12-04T22:00:29Z","subject":"CN=openshift-kube-apiserver-operator_node-system-admin-signer@1764885629"}],"conditions":[{"lastTransitionTime":"2025-12-04T22:05:44Z","message":"","reason":"","status":"False","type":"RenderDegraded"},{"lastTransitionTime":"2025-12-04T22:05:53Z","message":"","reason":"","status":"False","type":"NodeDegraded"},{"lastTransitionTime":"2025-12-04T22:05:53Z","message":"","reason":"","status":"False","type":"Degraded"},{"lastTransitionTime":"2025-12-04T22:06:05Z","message":"All nodes are updated with MachineConfig rendered-master-67eaf7c4d57499a62a9899ea19c65a40","reason":"","status":"True","type":"Updated"},{"lastTransitionTime":"2025-12-04T22:06:05Z","message":"","reason":"","status":"False","type":"Updating"}],"configuration":{"name":"rendered-master-67eaf7c4d57499a62a9899ea19c65a40","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-master"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-master-dnsmasq-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-masters-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-nable-iscsi"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-netifnames-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-lv-cinder-volumes"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-multipath-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-ssh"}]},"degradedMachineCount":0,"machineCount":1,"observedGeneration":2,"readyMachineCount":1,"unavailableMachineCount":0,"updatedMachineCount":1}}config/validatingwebhookconfigurations/prometheusrules.openshift.io.json0000640000000000000000000000511515114405062025726 0ustar0000000000000000{"metadata":{"name":"prometheusrules.openshift.io","uid":"96fe3099-4017-4b74-878a-83a646f44875","resourceVersion":"10366","generation":2,"creationTimestamp":"2025-12-04T22:05:43Z","labels":{"app.kubernetes.io/component":"controller","app.kubernetes.io/managed-by":"cluster-monitoring-operator","app.kubernetes.io/name":"prometheus-operator","app.kubernetes.io/part-of":"openshift-monitoring"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"prometheusrules.openshift.io","clientConfig":{"service":{"namespace":"openshift-monitoring","name":"prometheus-operator-admission-webhook","path":"/admission-prometheusrules/validate","port":8443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["monitoring.coreos.com"],"apiVersions":["v1"],"resources":["prometheusrules"],"scope":"Namespaced"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":5,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/performance-addon-operator.json0000640000000000000000000000552115114405062025272 0ustar0000000000000000{"metadata":{"name":"performance-addon-operator","uid":"446da2c4-68d3-42c8-88ac-1ae0f00fed45","resourceVersion":"4581","generation":2,"creationTimestamp":"2025-12-04T21:54:59Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a","controller":true}]},"webhooks":[{"name":"vwb.performance.openshift.io","clientConfig":{"service":{"namespace":"openshift-cluster-node-tuning-operator","name":"performance-addon-operator-service","path":"/validate-performance-openshift-io-v2-performanceprofile","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["performance.openshift.io"],"apiVersions":["v2"],"resources":["performanceprofiles"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/network-node-identity.openshift.io.json0000640000000000000000000001075515114405062026731 0ustar0000000000000000{"metadata":{"name":"network-node-identity.openshift.io","uid":"77ec3458-e6bd-433a-b0f2-413fbbae22e3","resourceVersion":"7118","generation":1,"creationTimestamp":"2025-12-04T22:01:19Z","ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"90b2947d-5101-4de2-bef4-6acfb8950efe","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"node.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/node","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["nodes/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"pod.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/pod","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["pods/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/multus.openshift.io.json0000640000000000000000000000506715114405062024017 0ustar0000000000000000{"metadata":{"name":"multus.openshift.io","uid":"e4801346-c68d-46fb-a243-01c2f36acc49","resourceVersion":"4579","generation":2,"creationTimestamp":"2025-12-04T21:59:18Z","labels":{"app":"multus-admission-controller"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"90b2947d-5101-4de2-bef4-6acfb8950efe","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"multus-validating-config.k8s.io","clientConfig":{"service":{"namespace":"openshift-multus","name":"multus-admission-controller","path":"/validate","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["k8s.cni.cncf.io"],"apiVersions":["v1"],"resources":["network-attachment-definitions"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"NoneOnDryRun","timeoutSeconds":30,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/monitoringconfigmaps.openshift.io.json0000640000000000000000000000705215114405062026716 0ustar0000000000000000{"metadata":{"name":"monitoringconfigmaps.openshift.io","uid":"0c89dc8e-8f5c-4efa-bb83-9612c7e8cefb","resourceVersion":"17245","generation":2,"creationTimestamp":"2025-12-04T22:24:29Z","labels":{"app.kubernetes.io/managed-by":"cluster-version-operator","app.kubernetes.io/part-of":"openshift-monitoring"},"annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a","controller":true}]},"webhooks":[{"name":"monitoringconfigmaps.openshift.io","clientConfig":{"service":{"namespace":"openshift-monitoring","name":"cluster-monitoring-operator","path":"/validate-webhook/monitoringconfigmaps","port":8443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":[""],"apiVersions":["v1"],"resources":["configmaps"],"scope":"Namespaced"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{"matchExpressions":[{"key":"kubernetes.io/metadata.name","operator":"In","values":["openshift-monitoring","openshift-user-workload-monitoring"]}]},"objectSelector":{},"sideEffects":"None","timeoutSeconds":5,"admissionReviewVersions":["v1"],"matchConditions":[{"name":"monitoringconfigmaps","expression":"(request.namespace == \"openshift-monitoring\" \u0026\u0026 request.name == \"cluster-monitoring-config\") || (request.namespace == \"openshift-user-workload-monitoring\" \u0026\u0026 request.name == \"user-workload-monitoring-config\")"},{"name":"not-skipped","expression":"!has(object.metadata.labels) || !(\"monitoringconfigmaps.openshift.io/skip-validate-webhook\" in object.metadata.labels) || object.metadata.labels[\"monitoringconfigmaps.openshift.io/skip-validate-webhook\"] != \"true\""}]}]}config/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io.json0000640000000000000000000000537215114405062030631 0ustar0000000000000000{"metadata":{"name":"controlplanemachineset.machine.openshift.io","uid":"b5d70cfb-7e48-4a46-8dba-fae48c4b334c","resourceVersion":"9654","generation":2,"creationTimestamp":"2025-12-04T22:04:59Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a","controller":true}]},"webhooks":[{"name":"controlplanemachineset.machine.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"control-plane-machine-set-operator","path":"/validate-machine-openshift-io-v1-controlplanemachineset","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["machine.openshift.io"],"apiVersions":["v1"],"resources":["controlplanemachinesets"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration.json0000640000000000000000000000500115114405062032102 0ustar0000000000000000{"metadata":{"name":"cluster-baremetal-validating-webhook-configuration","uid":"fdb8eb08-afef-48e1-83ee-77c7131035a3","resourceVersion":"9372","generation":2,"creationTimestamp":"2025-12-04T22:04:53Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"vprovisioning.kb.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-baremetal-webhook-service","path":"/validate-metal3-io-v1alpha1-provisioning","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["metal3.io"],"apiVersions":["v1alpha1"],"resources":["provisionings"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1","v1beta1"]}]}config/validatingwebhookconfigurations/autoscaling.openshift.io.json0000640000000000000000000001102715114405062024770 0ustar0000000000000000{"metadata":{"name":"autoscaling.openshift.io","uid":"d0162957-3f46-4f68-b23c-22af72630286","resourceVersion":"14608","generation":4,"creationTimestamp":"2025-12-04T22:05:01Z","labels":{"k8s-app":"cluster-autoscaler-operator"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"clusterautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-clusterautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1"],"resources":["clusterautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"machineautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-machineautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1beta1"],"resources":["machineautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io.json0000640000000000000000000000514315114405062026474 0ustar0000000000000000{"metadata":{"name":"alertmanagerconfigs.openshift.io","uid":"6fc3a283-83bd-4532-aefb-72e87e2d6abf","resourceVersion":"10372","generation":2,"creationTimestamp":"2025-12-04T22:05:43Z","labels":{"app.kubernetes.io/component":"controller","app.kubernetes.io/managed-by":"cluster-monitoring-operator","app.kubernetes.io/name":"prometheus-operator","app.kubernetes.io/part-of":"openshift-monitoring"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"alertmanagerconfigs.openshift.io","clientConfig":{"service":{"namespace":"openshift-monitoring","name":"prometheus-operator-admission-webhook","path":"/admission-alertmanagerconfigs/validate","port":8443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["monitoring.coreos.com"],"apiVersions":["v1alpha1"],"resources":["alertmanagerconfigs"],"scope":"Namespaced"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":5,"admissionReviewVersions":["v1"]}]}config/authentication.json0000640000000000000000000000134315114405062014416 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"311331b3-e5ab-49bb-8ac5-fbaf0ee92c30","resourceVersion":"13088","generation":2,"creationTimestamp":"2025-12-04T21:54:40Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"27fddf3f-6200-42b6-a634-8e710050aa5a"}]},"spec":{"type":"","oauthMetadata":{"name":""},"webhookTokenAuthenticator":{"kubeConfig":{"name":"webhook-authentication-integrated-oauth"}},"serviceAccountIssuer":""},"status":{"integratedOAuthMetadata":{"name":"oauth-openshift"},"oidcClients":null}}config/proxy.json0000640000000000000000000000031315114405062012554 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"6b9d8aaf-c184-45bb-bc02-5ef20dfb05bb","resourceVersion":"550","generation":1,"creationTimestamp":"2025-12-04T21:53:58Z"},"spec":{"trustedCA":{"name":""}},"status":{}}