Name:             cert-manager-webhook-687f57d79b-9rmk6
Namespace:        cert-manager
Priority:         0
Service Account:  cert-manager-webhook
Node:             crc/192.168.126.11
Start Time:       Wed, 28 Jan 2026 16:50:45 +0000
Labels:           app=webhook
                  app.kubernetes.io/component=webhook
                  app.kubernetes.io/instance=cert-manager
                  app.kubernetes.io/name=webhook
                  app.kubernetes.io/version=v1.19.2
                  pod-template-hash=687f57d79b
Annotations:      k8s.ovn.org/pod-networks:
                    {"default":{"ip_addresses":["10.217.0.73/23"],"mac_address":"0a:58:0a:d9:00:49","gateway_ips":["10.217.0.1"],"routes":[{"dest":"10.217.0.0...
                  k8s.v1.cni.cncf.io/network-status:
                    [{
                        "name": "ovn-kubernetes",
                        "interface": "eth0",
                        "ips": [
                            "10.217.0.73"
                        ],
                        "mac": "0a:58:0a:d9:00:49",
                        "default": true,
                        "dns": {}
                    }]
                  openshift.io/scc: restricted-v2
                  prometheus.io/path: /metrics
                  prometheus.io/port: 9402
                  prometheus.io/scrape: true
                  seccomp.security.alpha.kubernetes.io/pod: runtime/default
Status:           Running
SeccompProfile:   RuntimeDefault
IP:               10.217.0.73
IPs:
  IP:           10.217.0.73
Controlled By:  ReplicaSet/cert-manager-webhook-687f57d79b
Containers:
  cert-manager-webhook:
    Container ID:  cri-o://22033d9056fc7eebfa92a719c8b6add44c21a76aa9428015f8d57ed37724ae8a
    Image:         quay.io/jetstack/cert-manager-webhook:v1.19.2
    Image ID:      quay.io/jetstack/cert-manager-webhook@sha256:041f7bb9259557188d7ff416ce90d670a0d0aa8710203927703743682064270b
    Ports:         10250/TCP, 6080/TCP, 9402/TCP
    Host Ports:    0/TCP, 0/TCP, 0/TCP
    Args:
      --v=2
      --secure-port=10250
      --dynamic-serving-ca-secret-namespace=$(POD_NAMESPACE)
      --dynamic-serving-ca-secret-name=cert-manager-webhook-ca
      --dynamic-serving-dns-names=cert-manager-webhook
      --dynamic-serving-dns-names=cert-manager-webhook.$(POD_NAMESPACE)
      --dynamic-serving-dns-names=cert-manager-webhook.$(POD_NAMESPACE).svc
    State:          Running
      Started:      Wed, 28 Jan 2026 17:07:36 +0000
    Last State:     Terminated
      Reason:       Completed
      Exit Code:    0
      Started:      Wed, 28 Jan 2026 16:50:51 +0000
      Finished:     Wed, 28 Jan 2026 17:07:23 +0000
    Ready:          True
    Restart Count:  1
    Liveness:       http-get http://:healthcheck/livez delay=60s timeout=1s period=10s #success=1 #failure=3
    Readiness:      http-get http://:healthcheck/healthz delay=5s timeout=1s period=5s #success=1 #failure=3
    Environment:
      POD_NAMESPACE:  cert-manager (v1:metadata.namespace)
    Mounts:
      /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-rl8v9 (ro)
Conditions:
  Type                        Status
  PodReadyToStartContainers   True 
  Initialized                 True 
  Ready                       True 
  ContainersReady             True 
  PodScheduled                True 
Volumes:
  kube-api-access-rl8v9:
    Type:                    Projected (a volume that contains injected data from multiple sources)
    TokenExpirationSeconds:  3607
    ConfigMapName:           kube-root-ca.crt
    ConfigMapOptional:       <nil>
    DownwardAPI:             true
    ConfigMapName:           openshift-service-ca.crt
    ConfigMapOptional:       <nil>
QoS Class:                   BestEffort
Node-Selectors:              kubernetes.io/os=linux
Tolerations:                 node.kubernetes.io/not-ready:NoExecute op=Exists for 300s
                             node.kubernetes.io/unreachable:NoExecute op=Exists for 300s
Events:
  Type     Reason                           Age                From               Message
  ----     ------                           ----               ----               -------
  Normal   Scheduled                        45m                default-scheduler  Successfully assigned cert-manager/cert-manager-webhook-687f57d79b-9rmk6 to crc
  Normal   AddedInterface                   45m                multus             Add eth0 [10.217.0.73/23] from ovn-kubernetes
  Normal   Pulling                          45m                kubelet            Pulling image "quay.io/jetstack/cert-manager-webhook:v1.19.2"
  Normal   Pulled                           44m                kubelet            Successfully pulled image "quay.io/jetstack/cert-manager-webhook:v1.19.2" in 4.068s (4.068s including waiting). Image size: 69110520 bytes.
  Normal   Killing                          28m                kubelet            Container cert-manager-webhook failed liveness probe, will be restarted
  Normal   Pulled                           28m                kubelet            Container image "quay.io/jetstack/cert-manager-webhook:v1.19.2" already present on machine
  Warning  Unhealthy                        28m (x4 over 28m)  kubelet            Readiness probe failed: Get "http://10.217.0.73:6080/healthz": dial tcp 10.217.0.73:6080: connect: connection refused
  Normal   Created                          28m (x2 over 44m)  kubelet            Created container cert-manager-webhook
  Normal   Started                          28m (x2 over 44m)  kubelet            Started container cert-manager-webhook
  Warning  Unhealthy                        20m (x6 over 30m)  kubelet            Readiness probe failed: Get "http://10.217.0.73:6080/healthz": context deadline exceeded (Client.Timeout exceeded while awaiting headers)
  Warning  Unhealthy                        20m (x5 over 29m)  kubelet            Liveness probe failed: Get "http://10.217.0.73:6080/livez": context deadline exceeded (Client.Timeout exceeded while awaiting headers)
  Warning  FailedToRetrieveImagePullSecret  19m                kubelet            Unable to retrieve some image pull secrets (cert-manager-webhook-dockercfg-ddpqm); attempting to pull the image may not succeed.
