insights-operator/gathers.json0000640000000000000000000002564115144650300015257 0ustar0000000000000000{"status_reports":[{"name":"clusterconfig/machine_healthchecks","duration_in_ms":33,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pdbs","duration_in_ms":35,"records_count":3,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/clusterroles","duration_in_ms":38,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress_certificates","duration_in_ms":51,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/metrics","duration_in_ms":1104,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/networks","duration_in_ms":12,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/silenced_alerts","duration_in_ms":24,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=false\u0026inhibited=false\u0026silenced=true\": dial tcp 172.30.95.22:9094: connect: connection refused"],"warnings":null,"panic":null},{"name":"clusterconfig/jaegers","duration_in_ms":32,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/config_maps","duration_in_ms":59,"records_count":9,"errors":["configmaps \"cluster-monitoring-config\" not found","configmaps \"gateway-mode-config\" not found","configmaps \"insights-config\" not found"],"warnings":["warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt\""],"panic":null},{"name":"clusterconfig/number_of_pods_and_netnamespaces_with_sdn_annotations","duration_in_ms":72,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/tsdb_status","duration_in_ms":1106,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/service_accounts","duration_in_ms":12607,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/infrastructures","duration_in_ms":15,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_autoscalers","duration_in_ms":33,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/crds","duration_in_ms":44,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ceph_cluster","duration_in_ms":12,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/feature_gates","duration_in_ms":33,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/validating_webhook_configurations","duration_in_ms":34,"records_count":8,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/oauths","duration_in_ms":34,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_pruners","duration_in_ms":34,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_registries","duration_in_ms":39,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators","duration_in_ms":76,"records_count":34,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkstates","duration_in_ms":22,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanenodesets","duration_in_ms":21,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_configs","duration_in_ms":110,"records_count":4,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_cluster","duration_in_ms":17,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machines","duration_in_ms":17,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanedeployments","duration_in_ms":20,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/dvo_metrics","duration_in_ms":28,"records_count":0,"errors":null,"warnings":["warning: no service found with label selector name=deployment-validation-operator"],"panic":null},{"name":"clusterconfig/ingress","duration_in_ms":39,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/install_plans","duration_in_ms":11841,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"workloads","duration_in_ms":6645,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_runtime_configs","duration_in_ms":10,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/olm_operators","duration_in_ms":39,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_pods","duration_in_ms":35,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/schedulers","duration_in_ms":17,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/active_alerts","duration_in_ms":17,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=true\": dial tcp 172.30.95.22:9094: connect: connection refused"],"warnings":null,"panic":null},{"name":"clusterconfig/machine_config_pools","duration_in_ms":28,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/lokistack","duration_in_ms":34,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/support_secret","duration_in_ms":22,"records_count":0,"errors":["secrets \"support\" not found"],"warnings":null,"panic":null},{"name":"clusterconfig/openstack_controlplanes","duration_in_ms":33,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_datahubs","duration_in_ms":28,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/mutating_webhook_configurations","duration_in_ms":39,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/authentication","duration_in_ms":36,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig","duration_in_ms":17265,"records_count":153,"errors":["function \"support_secret\" failed with an error","function \"active_alerts\" failed with an error","function \"silenced_alerts\" failed with an error","function \"pod_network_connectivity_checks\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error"],"warnings":null,"panic":null},{"name":"clusterconfig/machine_sets","duration_in_ms":14,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_version","duration_in_ms":12,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodes","duration_in_ms":29,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_images","duration_in_ms":74,"records_count":4,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_classes","duration_in_ms":11,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/certificate_signing_requests","duration_in_ms":40,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/aggregated_monitoring_cr_names","duration_in_ms":53,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"conditional","duration_in_ms":1241,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_logging","duration_in_ms":17,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cluster_apiserver","duration_in_ms":25,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/node_logs","duration_in_ms":147,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"workloads/workload_info","duration_in_ms":6645,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cost_management_metrics_configs","duration_in_ms":8,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/overlapping_namespace_uids","duration_in_ms":33,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/monitoring_persistent_volumes","duration_in_ms":33,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image","duration_in_ms":24,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkconfigurationpolicies","duration_in_ms":29,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/qemu_kubevirt_launcher_logs","duration_in_ms":28,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/version","duration_in_ms":55,"records_count":4,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators_pods_and_events","duration_in_ms":17247,"records_count":58,"errors":null,"warnings":null,"panic":null},{"name":"conditional/rapid_container_logs","duration_in_ms":0,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_machine_api_events","duration_in_ms":12,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"conditional/conditional_gatherer_rules","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pod_network_connectivity_checks","duration_in_ms":19,"records_count":0,"errors":["the server could not find the requested resource (get podnetworkconnectivitychecks.controlplane.operator.openshift.io)"],"warnings":null,"panic":null},{"name":"clusterconfig/sap_config","duration_in_ms":29,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"workloads/helmchart_info","duration_in_ms":14,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"conditional/remote_configuration","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/proxies","duration_in_ms":17,"records_count":1,"errors":null,"warnings":null,"panic":null}],"container_memory_bytes_usage":0,"uptime_seconds":47.033,"is_global_obfuscation_enabled":false}insights-operator/remote-configuration.json0000640000000000000000000000443515144650300017760 0ustar0000000000000000{"conditional_gathering_rules":[{"conditions":[{"alert":{"name":"APIRemovedInNextEUSReleaseInUse"},"type":"alert_is_firing"}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedReload"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedToSendAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"KubePodCrashLooping"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","previous":true,"tail_lines":20}}},{"conditions":[{"alert":{"name":"KubePodNotReady"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},{"conditions":[{"alert":{"name":"PrometheusOperatorSyncFailed"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},{"conditions":[{"alert":{"name":"PrometheusRemoteStorageFailures"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},{"conditions":[{"alert":{"name":"PrometheusTargetSyncFailure"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},{"conditions":[{"alert":{"name":"SamplesImagestreamImportFailing"},"type":"alert_is_firing"}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},{"conditions":[{"alert":{"name":"ThanosRuleQueueIsDroppingAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}}],"container_logs":[],"version":"1.2.0"}insights-operator/conditional-gatherer-rules.json0000640000000000000000000000577515144650300021062 0ustar0000000000000000{"version":"1.2.0","conditional_gathering_rules":[{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"APIRemovedInNextEUSReleaseInUse"}}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedReload"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedToSendAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodCrashLooping"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","tail_lines":20,"previous":true}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodNotReady"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusOperatorSyncFailed"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusRemoteStorageFailures"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusTargetSyncFailure"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"SamplesImagestreamImportFailing"}}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"ThanosRuleQueueIsDroppingAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false}],"endpoint":"https://console.redhat.com/api/gathering/v2/%s/gathering_rules"}config/workload_info.json0000640000000000000000000006663215144650277014265 0ustar0000000000000000{"pods":99,"imageCount":76,"images":{"sha256:7fccb6e19eb4caa16d32f4cf59670c2c741c98b099d1f12368b85aab3f84dc38":{"layerIDs":["sha256:25c75c34b2e2b68ba9245d9cddeb6b8a0887371ed30744064f85241a75704d87","sha256:5db9d3c7522cb0241efc32b4a5c491fdb139b96474578f1985f482a9077a3e8d","sha256:82157bdf6907bbf6a007b19e81e9dcc93ebed443c6d0503551f1976dfab322f0","sha256:e3b9612ef6081de5970c4ba06dc5f385e23706531f6b26f1fc3a68ced95e34a5","sha256:5fa101da323015348e14453e63007cb8fc20061749b0e13f106d12d5d0224bbf"],"repository":"B4CqNeqYE-Zb"},"sha256:e155421620a4ac28a759265f53059b75308fdd1491caeba6a9a34d2fbeab4954":{"layerIDs":["sha256:25c75c34b2e2b68ba9245d9cddeb6b8a0887371ed30744064f85241a75704d87","sha256:5db9d3c7522cb0241efc32b4a5c491fdb139b96474578f1985f482a9077a3e8d","sha256:82157bdf6907bbf6a007b19e81e9dcc93ebed443c6d0503551f1976dfab322f0","sha256:e3b9612ef6081de5970c4ba06dc5f385e23706531f6b26f1fc3a68ced95e34a5"],"repository":"0bgxbrCzyCJo"}},"namespaces":{"0LiT6ZNtbpYL":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:fe683caef773a1963fc13f96afe58892563ea9921db8ac39369e3a9a05ea7181","firstCommand":"N9KxLV2avCo2","firstArg":"BuLIUMMJnyP_"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:bfc52d6ca96f377d53757dc437ca720e860e3e016d16c084bd5f6f2e337d3a1d","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:e786e28fbe0b95c4f5723bebc3abde1333b259fd26673716fc5638d88286d8b7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:5c38d58b62290b59d0182b50ce3cfd87fbb7729f3ce6fc06ffa46d9805c7dd78","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:15c5e645edf257a08c061ad9ae7dab4293104a042b8396181d76dd28f396cebe","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:df623c15a78ca969fb8ad134bde911c2047bf82b50244ee8e523763b6587e072","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:df623c15a78ca969fb8ad134bde911c2047bf82b50244ee8e523763b6587e072","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:fe683caef773a1963fc13f96afe58892563ea9921db8ac39369e3a9a05ea7181","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:bbe162375a11ed3810a1081c30dd400f461f2421d5f1e27d8792048bbd216956","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:80531a0fe966e1cc0582c581951b09a7a4e42037c106748c44859110361b2c1b","firstCommand":"FC0eu9ID58Bm","firstArg":"47DEQpj8HBSa"}]}]},"0h5ohwdJx4S5":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:ae30b3ab740f21c451d0272bceacb99fa34d22bbf2ea22f1e1e18230a156104b","firstCommand":"buSkac1OkQU4","firstArg":"XV1E-c-gSQmZ"}]}]},"2IqVYeidVUxV":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:9cc42212fb15c1f3e6a88acaaa4919c9693be3c6099ea849d28855e231dc9e44","firstCommand":"po5yju59c7HJ"}],"containers":[{"imageID":"sha256:2431778975829348e271dc9bf123c7a24c81a52537a61414cd17c8436436078b","firstCommand":"UcO4la9rqCTe"}]}]},"43Xz0HbE9FHX":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:2b4063aefbb56035efcf6afc17079b35aab0a5cb6975753fbf6e10285b3b7ebe","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:aca57c8abaa83b2d1dce95fa7fe5b9416be70e100957ce48f212e2ec404387bc","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:06dcb25b4ae74ef159663cc2318f84e4665c7889b38ed62940259e5edd2b576f","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:aca57c8abaa83b2d1dce95fa7fe5b9416be70e100957ce48f212e2ec404387bc","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:dab7a82d88f90f1ef4ac307b16132d4d573a4fa9080acc3272ca084613bd902a","firstCommand":"4MEQ8E7-fUvu","firstArg":"mDEjdpyJDBZ4"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:28df36269fc553eb1adba5566d6dfc258a1a74063c4cfe8b5bdd3f202591cf56","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:aca57c8abaa83b2d1dce95fa7fe5b9416be70e100957ce48f212e2ec404387bc","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:3e2f869b1c4f98a628b2e54c1516a0d0c09c760c91e0e1a940cb76149217661b","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:aca57c8abaa83b2d1dce95fa7fe5b9416be70e100957ce48f212e2ec404387bc","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]}]},"47HAKWqp7-jn":{"count":3,"terminalCount":2,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","firstCommand":"N9KxLV2avCo2"}]}]},"4k7XyKW2A17e":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","firstCommand":"930btY2ohuPL","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","firstCommand":"aC8iSHmKHojh","firstArg":"r7zEsGNvlNrk"},{"imageID":"sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","firstCommand":"WFJEBSInAJpw","firstArg":"5gS4z5mOnDuY"},{"imageID":"sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"}]}]},"5fn-sCitjq6a":{"count":3,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:a90d19460fbc705172df7759a3da394930623c6b6974620b79ffa07bab53c51f","firstCommand":"HgS-rIunFHfD","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:a26b20d3ef7b75aeb05acf9be2702f9d478822c43f679ff578811843692b960c","firstArg":"ESRPWfqdsWE1"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:13d06502c0f0a3c73f69bf8d0743718f7cfc46e71f4a12916517ad7e9bff17e1","firstArg":"zO0oxtw_mcI5"}]}]},"5oRWKKS3566n":{"count":1,"ignoredCount":1,"shapes":[]},"6KbiDGNUd_ub":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"}]}]},"6bLpdRMvgXVP":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:240701090a5f8e40d4b88fa200cf63dffb11a8e2eae713cf3c629b016c2823b0","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"},{"imageID":"sha256:240701090a5f8e40d4b88fa200cf63dffb11a8e2eae713cf3c629b016c2823b0","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]}]},"9dJB3pvMrhr8":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:0871b6c16b38a2eda5d1c89fd75079aff0775224307e940557e6fda6ba229f38","firstCommand":"51QuNwyM-xYf","firstArg":"r7zEsGNvlNrk"}]}]},"AN3N38xANElq":{"count":1,"terminalCount":1,"shapes":[]},"B7nVq7vdWfmk":{"count":1,"ignoredCount":1,"shapes":[]},"CMkFy_B6OMUO":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5abe992def861ec075251ae17bbd66fa23bd05bd3701953c0fdcf68a8d161f1e","firstCommand":"7aQQEh6Tr2m7","firstArg":"r7zEsGNvlNrk"}]}]},"C_9an18W0cU6":{"count":6,"terminalCount":1,"ignoredCount":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"ZS9VAWJDvxuf","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"ArvlNzaZtYpC","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"PPJ_dAh1Wl4S","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"5-ZY-7KtGiOe"}]}]},"EOB8Fqt74gVH":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1faa2081a881db884a86bdfe33fcb6a6af1d14c3e9ee5c44dfe4b09045684e13","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"}]}]},"EyQn00UhCg7z":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e","firstCommand":"bsRjeCtd7lVU","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e","firstCommand":"ZDrZSWYe4Hpn"}]}]},"F-y2qosZEzxd":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5abe992def861ec075251ae17bbd66fa23bd05bd3701953c0fdcf68a8d161f1e","firstCommand":"7aQQEh6Tr2m7","firstArg":"gcNszUTvGLqr"}]}]},"ICyEPw5KVYuy":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8ea13b0cbfe9be0d3d7ea80d50e512af6a453921a553c7c79b566530142b611b","firstCommand":"ijLlFtdBW-Uk","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:e155421620a4ac28a759265f53059b75308fdd1491caeba6a9a34d2fbeab4954","firstCommand":"N9KxLV2avCo2"}]}]},"KETRwZOPBpF9":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:3bb3c46533b24f1a6a6669117dc888ed8f0c7ae56b34068a4ff2052335e34c4e","firstCommand":"buSkac1OkQU4","firstArg":"47DEQpj8HBSa"}]}]},"Kt0qS5G8piJp":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:e3d21c51712e6e0cdd9c776479f6d1ab55bc1085df5bb5f583e69ee192d11fd3","firstCommand":"9RqZYN0XQJuD"}]}]},"LBp1kjMRhgCD":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"M9RntwZOZgi3":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:95e7647e6fda21b94b692f03908e4cd154e3374fca0560229c646fefe2c46730","firstCommand":"k9iHTIyG8PyJ","firstArg":"r7zEsGNvlNrk"}]}]},"MBms5agiSYKb":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d6ab8803bac3ebada13e90d9dd6208301b981488277cdeb847c25ff8002f5a30","firstArg":"zO0oxtw_mcI5"}]}]},"N3z7Gdl4s2xN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:e1c8b9784a60860a08bd47935f0767b7b7f8f36c5c0adb7623a31b82c01d4c09","firstCommand":"vLhjmt4GJVrQ"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"47DEQpj8HBSa"}]}]},"NJ5StnkN7lNJ":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:56dffbd86bfae06921432678caf184b335bf2fc6ac7ee128f48aee396d57ea55","firstCommand":"euUHIZmT1r6w","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:56dffbd86bfae06921432678caf184b335bf2fc6ac7ee128f48aee396d57ea55","firstCommand":"euUHIZmT1r6w"}]}]},"NuNApgGLWU3S":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:0e446723bbab96c4e4662ff058d5eccba72d0c36d26c7b8b3f07183fa49d3ab9","firstCommand":"loDbMsNsNHAN"},{"imageID":"sha256:0e446723bbab96c4e4662ff058d5eccba72d0c36d26c7b8b3f07183fa49d3ab9","firstCommand":"BWdk-C4p4WVi","firstArg":"ov8ZFLf4OaCu"}]}]},"QRCRK87Nh9-g":{"count":4,"terminalCount":3,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","firstCommand":"930btY2ohuPL","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","firstCommand":"N9KxLV2avCo2","firstArg":"OOfnAGgDw729"},{"imageID":"sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","firstCommand":"VvlllczXFX2z","firstArg":"5gS4z5mOnDuY"},{"imageID":"sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","firstCommand":"VvlllczXFX2z","firstArg":"5gS4z5mOnDuY"},{"imageID":"sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","firstCommand":"VvlllczXFX2z","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","firstCommand":"VvlllczXFX2z","firstArg":"Yfg8wToYnj2U"}]}]},"QhwI_DkC7RkW":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"}],"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"}]}]},"RGIC92MKxXzi":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:1e7ac69aff2f28f6b3cbdb166c7dac7a3490167bcd670cd7057bdde1e1e7684d","firstCommand":"RxKEaTc90uWM","firstArg":"r7zEsGNvlNrk"}]}]},"WPOX0dN4tqDv":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:e3d21c51712e6e0cdd9c776479f6d1ab55bc1085df5bb5f583e69ee192d11fd3","firstCommand":"9RqZYN0XQJuD"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"47DEQpj8HBSa"}]}]},"XStfgPOmHYzB":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:e391fce0b2e04f22fc089597db9e0671ba7f8b5b3a709151b5f33dd23b262144","firstCommand":"AiycEq1CClLy","firstArg":"r7zEsGNvlNrk"}]}]},"YgQZCjyI6D9c":{"count":1,"terminalCount":1,"shapes":[]},"cMIdS73ad1cT":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","firstCommand":"09D_XsQaIohy","firstArg":"r7zEsGNvlNrk"}]}]},"cWNZj9dm5f4i":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","firstCommand":"WFJEBSInAJpw","firstArg":"r7zEsGNvlNrk"}]}]},"coRkJ8lvmtSk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb"}]}]},"de1zmznD1F_L":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:f353131d8a1223db7f637c9851016b3a348d80c2b2be663a2db6d01e14ddca88","firstCommand":"rb3iLnl9GmZR","firstArg":"r7zEsGNvlNrk"}]}]},"eCjF12pGOLUF":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:9f2b80358f029728d7f4ce46418bb6859d9ea7365de7b6f97a5f549ed6e77471","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:9f2b80358f029728d7f4ce46418bb6859d9ea7365de7b6f97a5f549ed6e77471","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"}]}]},"ecUe5cl6bPwX":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:bd8adea550cbbaf16cb9409b31ec8b997320d247f9f30c80608ac1fbf9c7a07e","firstCommand":"pgaYl1gqTV2L","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:7b8fb1f11df51c131f5be8ddfc1b1c95ac13481f58d2dcd5a465a4a8341c0f49","firstCommand":"kwBOP3_4oVMx","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:47c1d88223ffb35bb36a4d2bde736fb3e45f08e204519387e0e52e3e3dc00cfb","firstCommand":"buSkac1OkQU4","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:fa28b66298c8b34f2c7b357b012e663e3954cfc7c85aa1e44651a79aeaf8b2a9","firstCommand":"Tt12uskXp-TN","firstArg":"zO0oxtw_mcI5"}]}]},"iAB_cGZtvYGo":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5d54bd262ca625a326b01ea2bfd33db10a402c05590e6b710b0959712e1bf30b","firstCommand":"zT6_GoC4_8OY","firstArg":"r7zEsGNvlNrk"},{"imageID":"sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","firstCommand":"aC8iSHmKHojh","firstArg":"eE7ekwlit3Mq"}]}]},"inQbBSWydCWk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"ioFx0itCFPcs":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:3bb3c46533b24f1a6a6669117dc888ed8f0c7ae56b34068a4ff2052335e34c4e","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:ae30b3ab740f21c451d0272bceacb99fa34d22bbf2ea22f1e1e18230a156104b","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"}],"containers":[{"imageID":"sha256:333e6572029953b4c4676076f0991ee6e5c7d28cbe2887c71b1682f19831d8a1","firstCommand":"bFMn8sKmxXTo","firstArg":"zO0oxtw_mcI5"}]}]},"jmuesrd3LOV1":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","firstCommand":"aDHd4M_0XUOd","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","firstCommand":"wCdwTcAdXQ_H","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","firstCommand":"jXkiIgNfKeEy","firstArg":"zO0oxtw_mcI5"}]}]},"k2lPYOlQaXUX":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:6dd544a8a6b4d08fe0f4fd076109c09cf181302ab6056ec6b2b89d68a52954c5","firstCommand":"XqE_QmN1P920","firstArg":"r7zEsGNvlNrk"}]}]},"n8ih8iFf25K7":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:e155421620a4ac28a759265f53059b75308fdd1491caeba6a9a34d2fbeab4954","firstCommand":"CX8KiHZjJyVD"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e","firstCommand":"N9KxLV2avCo2"}]}]},"nMMaB9HQd060":{"count":12,"ignoredCount":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:0100b616991bd8bca68d583e902283aa4cc0d388046437d5d68407190e3fb041","firstArg":"aZFPdeh8u0QY"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:9e96b53e74d1b802c2e63544e4689c9d262e9c996902c6e8a7f3ca34b23fdd50","firstArg":"5wzTZA9Ffwb3"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:c1a0aba9ead3a33353dc8a033699dfa4795f4050516677dad6ed4ac664094692","firstArg":"P0uRYWPWnbxt"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:aaa92509b71c898caed43ac2b5d3b3fc44fff333855789eb1d7df15f08e91ea3","firstCommand":"K8aRMFBO_jyE","firstArg":"vWfRLhDFJlMA"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:a64a70eb2fef4095ba241021e37c52034c067c57121d6c588f8c7fd3dc24b55f","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:a64a70eb2fef4095ba241021e37c52034c067c57121d6c588f8c7fd3dc24b55f","firstCommand":"icTsn2s_EIax","firstArg":"SCcKjYHEPDKM"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:3f08586dd67c2d3d21053a044138f1bbedceb0847f1af8c3aa76127d86135a58","firstArg":"5wzTZA9Ffwb3"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:52ba78768a24efe94f7f95fe5bdd3c6156919979d5882682e06ae4a8a8d3fb4a","firstCommand":"NJuOSOguFZRT","firstArg":"3NvCs-dGLEBM"}],"containers":[{"imageID":"sha256:52ba78768a24efe94f7f95fe5bdd3c6156919979d5882682e06ae4a8a8d3fb4a","firstCommand":"NJuOSOguFZRT","firstArg":"nw1jEXz0CN6o"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:e4d0e747f55d3f773a63180bc4e4820ee5f17efbd45eb1dac9167fbc7520650e","firstArg":"cteiHEtNKHn0"},{"imageID":"sha256:86d47b2746de823e60068255722d2c0f1ff9d327b2865071a4f2f1e08b1f4ee9","firstArg":"bItFNczIfxkG"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:19c3c8392b72ccf9a518d1d60fab0fd1e58a05b544caa79eb11bb68f00981d9d","firstArg":"e1V8mDIYJ-Es"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:99ad83497ea12819957ccba33c807c6e4c5297621db568e5635202cb9cc69f8f","firstArg":"Sr6QxZ9vlnXv"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:52ba78768a24efe94f7f95fe5bdd3c6156919979d5882682e06ae4a8a8d3fb4a","firstArg":"ZaBBgxOjhLhc"},{"imageID":"sha256:9899b0f08b1202d149e16f09616ee7b8f37e3cda642386d93a6d3f63d72a316b","firstCommand":"oudKofjVo8ML"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:abf98e8b78df5cf21c9da051db2827b8c9081cf3ea201bf9017a5d9548dbc73e","firstArg":"TIre9pmD-tbd"},{"imageID":"sha256:86d47b2746de823e60068255722d2c0f1ff9d327b2865071a4f2f1e08b1f4ee9","firstArg":"qLdxkguDGeRy"}]}]},"nO8YkKLJMsaW":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:b41a8ae60c0eafa4a13e6dcd0e79ba63b0d7bd2bdc28aaed434b3bef98a5dc95","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:b41a8ae60c0eafa4a13e6dcd0e79ba63b0d7bd2bdc28aaed434b3bef98a5dc95","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","firstCommand":"VvlllczXFX2z","firstArg":"47DEQpj8HBSa"}]}]},"nTf6g7hF1YMN":{"count":2,"ignoredCount":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cc03f91dbf08df9907c0ebad30c54a7fa92285b19ec4e440ed762b197378a861","firstArg":"8DZ1gO9Xqn6d"}]}]},"oNeg9VIL3k3N":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:f122c11c2f6a10ca150b136f7291d2e135b3a182d67809aa49727da289787cee","firstCommand":"oNeg9VIL3k3N","firstArg":"r7zEsGNvlNrk"}]}]},"p1tmSwFC_Q2L":{"count":3,"ignoredCount":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:7fccb6e19eb4caa16d32f4cf59670c2c741c98b099d1f12368b85aab3f84dc38","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"}]}]},"pepxDbsB4SPa":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","firstCommand":"VvlllczXFX2z","firstArg":"r7zEsGNvlNrk"}]}]},"q1TpN3EUiKjG":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","firstCommand":"FATPL2W-sitV","firstArg":"r7zEsGNvlNrk"}]}]},"vDGHaQt8x6K_":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","firstArg":"zO0oxtw_mcI5"}]}]}}}machine-config-server_current.log0000640000000000000000000003063615144650270034444 0ustar0000000000000000config/pod/openshift-machine-config-operator/logs/machine-config-server-2ws9r2026-02-16T17:14:20.555493826Z I0216 17:14:20.555267 1 start.go:40] Version: bc9f50bf (0b0569287da3daea19bf47aa298037ccb4cbff98) 2026-02-16T17:14:20.614533233Z W0216 17:14:20.614405 1 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.ConfigMap: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-machine-config-operator/configmaps?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2026-02-16T17:14:20.614673537Z W0216 17:14:20.614623 1 reflector.go:561] github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: failed to list *v1.ControllerConfig: Get "https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/controllerconfigs?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2026-02-16T17:14:20.614743339Z W0216 17:14:20.614666 1 reflector.go:561] github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: failed to list *v1.MachineConfig: Get "https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigs?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2026-02-16T17:14:20.614743339Z W0216 17:14:20.614703 1 reflector.go:561] github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: failed to list *v1.MachineConfigPool: Get "https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigpools?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2026-02-16T17:14:20.615730716Z E0216 17:14:20.615668 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: Failed to watch *v1.MachineConfig: failed to list *v1.MachineConfig: Get \"https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigs?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2026-02-16T17:14:20.615730716Z E0216 17:14:20.615671 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-machine-config-operator/configmaps?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2026-02-16T17:14:20.615730716Z E0216 17:14:20.615686 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: Failed to watch *v1.ControllerConfig: failed to list *v1.ControllerConfig: Get \"https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/controllerconfigs?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2026-02-16T17:14:20.615730716Z E0216 17:14:20.615676 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: Failed to watch *v1.MachineConfigPool: failed to list *v1.MachineConfigPool: Get \"https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigpools?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2026-02-16T17:14:21.466059715Z W0216 17:14:21.465949 1 reflector.go:561] github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: failed to list *v1.MachineConfigPool: Get "https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigpools?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2026-02-16T17:14:21.466059715Z E0216 17:14:21.466026 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: Failed to watch *v1.MachineConfigPool: failed to list *v1.MachineConfigPool: Get \"https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigpools?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2026-02-16T17:14:21.484687599Z W0216 17:14:21.484605 1 reflector.go:561] github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: failed to list *v1.MachineConfig: Get "https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigs?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2026-02-16T17:14:21.484687599Z E0216 17:14:21.484666 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: Failed to watch *v1.MachineConfig: failed to list *v1.MachineConfig: Get \"https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigs?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2026-02-16T17:14:21.665727447Z W0216 17:14:21.665638 1 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.ConfigMap: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-machine-config-operator/configmaps?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2026-02-16T17:14:21.665761688Z E0216 17:14:21.665742 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-machine-config-operator/configmaps?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2026-02-16T17:14:22.187949758Z W0216 17:14:22.187861 1 reflector.go:561] github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: failed to list *v1.ControllerConfig: Get "https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/controllerconfigs?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2026-02-16T17:14:22.188027370Z E0216 17:14:22.187999 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: Failed to watch *v1.ControllerConfig: failed to list *v1.ControllerConfig: Get \"https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/controllerconfigs?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2026-02-16T17:14:23.307486821Z W0216 17:14:23.307376 1 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.ConfigMap: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-machine-config-operator/configmaps?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2026-02-16T17:14:23.307533352Z E0216 17:14:23.307484 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-machine-config-operator/configmaps?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2026-02-16T17:14:23.486059843Z W0216 17:14:23.485929 1 reflector.go:561] github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: failed to list *v1.MachineConfig: Get "https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigs?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2026-02-16T17:14:23.486059843Z E0216 17:14:23.486012 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: Failed to watch *v1.MachineConfig: failed to list *v1.MachineConfig: Get \"https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigs?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2026-02-16T17:14:23.571584777Z W0216 17:14:23.571507 1 reflector.go:561] github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: failed to list *v1.MachineConfigPool: Get "https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigpools?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2026-02-16T17:14:23.571584777Z E0216 17:14:23.571553 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: Failed to watch *v1.MachineConfigPool: failed to list *v1.MachineConfigPool: Get \"https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigpools?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2026-02-16T17:14:25.065396537Z W0216 17:14:25.065246 1 reflector.go:561] github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: failed to list *v1.ControllerConfig: Get "https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/controllerconfigs?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2026-02-16T17:14:25.065396537Z E0216 17:14:25.065327 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: Failed to watch *v1.ControllerConfig: failed to list *v1.ControllerConfig: Get \"https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/controllerconfigs?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2026-02-16T17:14:26.790866086Z W0216 17:14:26.790789 1 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.ConfigMap: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-machine-config-operator/configmaps?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2026-02-16T17:14:26.790866086Z E0216 17:14:26.790840 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-machine-config-operator/configmaps?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2026-02-16T17:14:27.091819529Z W0216 17:14:27.091714 1 reflector.go:561] github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: failed to list *v1.MachineConfigPool: Get "https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigpools?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2026-02-16T17:14:27.091876171Z E0216 17:14:27.091863 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: Failed to watch *v1.MachineConfigPool: failed to list *v1.MachineConfigPool: Get \"https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigpools?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2026-02-16T17:14:27.582242398Z W0216 17:14:27.582178 1 reflector.go:561] github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: failed to list *v1.MachineConfig: Get "https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigs?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2026-02-16T17:14:27.582280949Z E0216 17:14:27.582240 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: Failed to watch *v1.MachineConfig: failed to list *v1.MachineConfig: Get \"https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigs?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2026-02-16T17:14:38.802072479Z I0216 17:14:38.801937 1 start.go:51] Launching server with tls min version: VersionTLS12 & cipher suites [TLS_AES_128_GCM_SHA256 TLS_AES_256_GCM_SHA384 TLS_CHACHA20_POLY1305_SHA256 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256] 2026-02-16T17:14:38.802131820Z I0216 17:14:38.802080 1 api.go:67] Launching server on :22624 2026-02-16T17:14:38.802824089Z I0216 17:14:38.802761 1 api.go:67] Launching server on :22623 config/pod/openshift-machine-config-operator/machine-config-server-2ws9r.json0000640000000000000000000001275015144650270026027 0ustar0000000000000000{"metadata":{"name":"machine-config-server-2ws9r","generateName":"machine-config-server-","namespace":"openshift-machine-config-operator","uid":"9c48005e-c4df-4332-87fc-ec028f2c6921","resourceVersion":"16408","creationTimestamp":"2026-02-16T17:04:39Z","labels":{"controller-revision-hash":"59bb645b5b","k8s-app":"machine-config-server","pod-template-generation":"1"},"annotations":{"openshift.io/required-scc":"hostnetwork","openshift.io/scc":"hostnetwork"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"DaemonSet","name":"machine-config-server","uid":"86cbdba4-8fe9-4249-a677-8aeecfffcfc8","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"node-bootstrap-token","secret":{"secretName":"node-bootstrapper-token","defaultMode":420}},{"name":"certs","secret":{"secretName":"machine-config-server-tls","defaultMode":420}},{"name":"kube-api-access-gvw4s","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"machine-config-server","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","command":["/usr/bin/machine-config-server"],"args":["start","--apiserver-url=https://api-int.sno.openstack.lab:6443","--payload-version=4.18.32","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12"],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"certs","mountPath":"/etc/ssl/mcs"},{"name":"node-bootstrap-token","mountPath":"/etc/mcs/bootstrap-token"},{"name":"kube-api-access-gvw4s","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000330000,"runAsNonRoot":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"machine-config-server","serviceAccount":"machine-config-server","nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c18,c12"},"supplementalGroups":[1000330000],"fsGroup":1000330000},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchFields":[{"key":"metadata.name","operator":"In","values":["master-0"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/etcd","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/disk-pressure","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/pid-pressure","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unschedulable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:04:40Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:04:39Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:20Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:20Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:04:39Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-16T17:04:39Z","containerStatuses":[{"name":"machine-config-server","state":{"running":{"startedAt":"2026-02-16T17:14:19Z"}},"lastState":{},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","containerID":"cri-o://bdc020491a9803f4c1dec5b73c04013b94c7a0d002b33673a1496e7041e90131","started":true,"volumeMounts":[{"name":"certs","mountPath":"/etc/ssl/mcs"},{"name":"node-bootstrap-token","mountPath":"/etc/mcs/bootstrap-token"},{"name":"kube-api-access-gvw4s","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-rbac-proxy_current.log0000640000000000000000000000202415144650270035227 0ustar0000000000000000config/pod/openshift-machine-config-operator/logs/machine-config-operator-84976bb859-rsnqc2026-02-16T17:14:58.480191230Z W0216 17:14:58.480040 1 deprecated.go:66] 2026-02-16T17:14:58.480191230Z ==== Removed Flag Warning ====================== 2026-02-16T17:14:58.480191230Z 2026-02-16T17:14:58.480191230Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-02-16T17:14:58.480191230Z 2026-02-16T17:14:58.480191230Z =============================================== 2026-02-16T17:14:58.480191230Z 2026-02-16T17:14:58.480191230Z I0216 17:14:58.480163 1 kube-rbac-proxy.go:530] Reading config file: /etc/kube-rbac-proxy/config-file.yaml 2026-02-16T17:14:58.480669594Z I0216 17:14:58.480641 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-02-16T17:14:58.481783179Z I0216 17:14:58.481754 1 kube-rbac-proxy.go:347] Reading certificate files 2026-02-16T17:14:58.482050827Z I0216 17:14:58.482012 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:9001 2026-02-16T17:14:58.482362376Z I0216 17:14:58.482309 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:9001 machine-config-operator_current.log0000640000000000000000000000151315144650270036717 0ustar0000000000000000config/pod/openshift-machine-config-operator/logs/machine-config-operator-84976bb859-rsnqc2026-02-16T17:14:57.801886993Z I0216 17:14:57.801812 1 start.go:52] Version: 4.18.32 (Raw: bc9f50bf, Hash: 0b0569287da3daea19bf47aa298037ccb4cbff98) 2026-02-16T17:14:57.802046378Z I0216 17:14:57.802008 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-16T17:14:57.802195172Z I0216 17:14:57.802138 1 metrics.go:92] Registering Prometheus metrics 2026-02-16T17:14:57.802246844Z I0216 17:14:57.802221 1 metrics.go:99] Starting metrics listener on 127.0.0.1:8797 2026-02-16T17:14:57.877009452Z I0216 17:14:57.876929 1 leaderelection.go:254] attempting to acquire leader lease openshift-machine-config-operator/machine-config... config/pod/openshift-machine-config-operator/machine-config-operator-84976bb859-rsnqc.json0000640000000000000000000001634415144650270027770 0ustar0000000000000000{"metadata":{"name":"machine-config-operator-84976bb859-rsnqc","generateName":"machine-config-operator-84976bb859-","namespace":"openshift-machine-config-operator","uid":"f3c7d762-e2fe-49ca-ade5-3982d91ec2a2","resourceVersion":"17472","creationTimestamp":"2026-02-16T17:01:26Z","labels":{"k8s-app":"machine-config-operator","pod-template-hash":"84976bb859"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.57/23\"],\"mac_address\":\"0a:58:0a:80:00:39\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.57/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.57\"\n ],\n \"mac\": \"0a:58:0a:80:00:39\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"machine-config-operator-84976bb859","uid":"f3f4cb6b-61f1-4bf8-8e16-51b564351706","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"images","configMap":{"name":"machine-config-operator-images","defaultMode":420}},{"name":"proxy-tls","secret":{"secretName":"mco-proxy-tls","defaultMode":420}},{"name":"auth-proxy-config","configMap":{"name":"kube-rbac-proxy","defaultMode":420}},{"name":"kube-api-access-8p2jz","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"machine-config-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","args":["start","--images-json=/etc/mco/images/images.json","--payload-version=4.18.32","--operator-image=quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42"],"env":[{"name":"RELEASE_VERSION","value":"4.18.32"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"images","mountPath":"/etc/mco/images"},{"name":"kube-api-access-8p2jz","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]}}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","args":["--secure-listen-address=0.0.0.0:9001","--config-file=/etc/kube-rbac-proxy/config-file.yaml","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305","--upstream=http://127.0.0.1:8797","--logtostderr=true","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key"],"ports":[{"name":"metrics","containerPort":9001,"protocol":"TCP"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"proxy-tls","mountPath":"/etc/tls/private"},{"name":"auth-proxy-config","mountPath":"/etc/kube-rbac-proxy"},{"name":"kube-api-access-8p2jz","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]}}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"machine-config-operator","serviceAccount":"machine-config-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c18,c12"},"runAsUser":65534,"runAsNonRoot":true},"imagePullSecrets":[{"name":"machine-config-operator-dockercfg-q2gzj"}],"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:58Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:01:26Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:58Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:58Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:01:26Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.57","podIPs":[{"ip":"10.128.0.57"}],"startTime":"2026-02-16T17:01:26Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-16T17:14:58Z"}},"lastState":{},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://3578e7c097759d128de9a7cdaa82fbdaa554fe1149f249c339609e5acacc377e","started":true,"volumeMounts":[{"name":"proxy-tls","mountPath":"/etc/tls/private"},{"name":"auth-proxy-config","mountPath":"/etc/kube-rbac-proxy"},{"name":"kube-api-access-8p2jz","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"machine-config-operator","state":{"running":{"startedAt":"2026-02-16T17:14:57Z"}},"lastState":{},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","containerID":"cri-o://a4a81494e8a1f9b6da2ca38e538dbd7b036da6ec2d128354a9233f983cc05bd7","started":true,"volumeMounts":[{"name":"images","mountPath":"/etc/mco/images"},{"name":"kube-api-access-8p2jz","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-rbac-proxy_current.log0000640000000000000000000000202415144650270033135 0ustar0000000000000000config/pod/openshift-machine-config-operator/logs/machine-config-daemon-98q6v2026-02-16T17:14:20.748685363Z W0216 17:14:20.748521 4510 deprecated.go:66] 2026-02-16T17:14:20.748685363Z ==== Removed Flag Warning ====================== 2026-02-16T17:14:20.748685363Z 2026-02-16T17:14:20.748685363Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-02-16T17:14:20.748685363Z 2026-02-16T17:14:20.748685363Z =============================================== 2026-02-16T17:14:20.748685363Z 2026-02-16T17:14:20.748685363Z I0216 17:14:20.748638 4510 kube-rbac-proxy.go:530] Reading config file: /etc/kube-rbac-proxy/config-file.yaml 2026-02-16T17:14:20.749228438Z I0216 17:14:20.749187 4510 kube-rbac-proxy.go:233] Valid token audiences: 2026-02-16T17:14:20.750264486Z I0216 17:14:20.750230 4510 kube-rbac-proxy.go:347] Reading certificate files 2026-02-16T17:14:20.753714660Z I0216 17:14:20.753684 4510 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:9001 2026-02-16T17:14:20.754085030Z I0216 17:14:20.754069 4510 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:9001 machine-config-daemon_current.log0000640000000000000000000003366215144650270034247 0ustar0000000000000000config/pod/openshift-machine-config-operator/logs/machine-config-daemon-98q6v2026-02-16T17:14:21.407226433Z I0216 17:14:21.407157 4431 start.go:68] Version: bc9f50bf (0b0569287da3daea19bf47aa298037ccb4cbff98) 2026-02-16T17:14:21.408504967Z I0216 17:14:21.408486 4431 update.go:2731] Running: mount --rbind /run/secrets /rootfs/run/secrets 2026-02-16T17:14:21.447567824Z I0216 17:14:21.447489 4431 update.go:2731] Running: mount --rbind /usr/bin /rootfs/run/machine-config-daemon-bin 2026-02-16T17:14:21.456760483Z I0216 17:14:21.456716 4431 daemon.go:521] using appropriate binary for source=rhel-9 target=rhel-9 2026-02-16T17:14:21.790511684Z I0216 17:14:21.790474 4431 daemon.go:574] Invoking re-exec /run/bin/machine-config-daemon 2026-02-16T17:14:21.829144829Z I0216 17:14:21.829075 4431 start.go:68] Version: bc9f50bf (0b0569287da3daea19bf47aa298037ccb4cbff98) 2026-02-16T17:14:21.829447527Z I0216 17:14:21.829421 4431 update.go:2731] Running: systemctl daemon-reload 2026-02-16T17:14:22.387501298Z I0216 17:14:22.387429 4431 rpm-ostree.go:56] Enabled workaround for bug 2111817 2026-02-16T17:14:22.388438503Z I0216 17:14:22.388386 4431 image_manager_helper.go:194] Linking rpm-ostree authfile to /etc/mco/internal-registry-pull-secret.json 2026-02-16T17:14:23.048045321Z I0216 17:14:23.047867 4431 daemon.go:324] Booted osImageURL: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4aa42a4b31390d46f924ce2d0c4da772bfbf6a5e1e121bdb0f8b69f989e0a0db (418.94.202601202224-0) f509ac9d3b0d3444bb0449cbb3c07f0a75ec4ed035a308158a844fa9f78e4eaa 2026-02-16T17:14:23.052273105Z I0216 17:14:23.051095 4431 start.go:134] overriding kubernetes api to https://api-int.sno.openstack.lab:6443 2026-02-16T17:14:23.053595201Z I0216 17:14:23.053548 4431 metrics.go:92] Registering Prometheus metrics 2026-02-16T17:14:23.053708524Z I0216 17:14:23.053697 4431 metrics.go:99] Starting metrics listener on 127.0.0.1:8797 2026-02-16T17:14:23.072404900Z I0216 17:14:23.072304 4431 simple_featuregate_reader.go:171] Starting feature-gate-detector 2026-02-16T17:14:23.075062762Z I0216 17:14:23.075007 4431 writer.go:87] NodeWriter initialized with credentials from /var/lib/kubelet/kubeconfig 2026-02-16T17:14:23.078622738Z I0216 17:14:23.078561 4431 event.go:377] Event(v1.ObjectReference{Kind:"Node", Namespace:"openshift-machine-config-operator", Name:"master-0", UID:"da39ce92-6a7c-4cce-aa8b-3e495e33f616", APIVersion:"v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'FeatureGatesInitialized' FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{"AWSEFSDriverVolumeMetrics", "AdminNetworkPolicy", "AlibabaPlatform", "AzureWorkloadIdentity", "BareMetalLoadBalancer", "BuildCSIVolumes", "ChunkSizeMiB", "CloudDualStackNodeIPs", "DisableKubeletCloudCredentialProviders", "GCPLabelsTags", "HardwareSpeed", "IngressControllerLBSubnetsAWS", "KMSv1", "ManagedBootImages", "ManagedBootImagesAWS", "MultiArchInstallAWS", "MultiArchInstallGCP", "NetworkDiagnosticsConfig", "NetworkLiveMigration", "NetworkSegmentation", "NewOLM", "NodeDisruptionPolicy", "OnClusterBuild", "PersistentIPsForVirtualization", "PrivateHostedZoneAWS", "SetEIPForNLBIngressController", "StreamingCollectionEncodingToJSON", "StreamingCollectionEncodingToProtobuf", "VSphereControlPlaneMachineSet", "VSphereDriverConfiguration", "VSphereMultiVCenters", "VSphereStaticIPs", "ValidatingAdmissionPolicy"}, Disabled:[]v1.FeatureGateName{"AWSClusterHostedDNS", "AdditionalRoutingCapabilities", "AutomatedEtcdBackup", "BootcNodeManagement", "CSIDriverSharedResource", "ClusterAPIInstall", "ClusterAPIInstallIBMCloud", "ClusterMonitoringConfig", "ConsolePluginContentSecurityPolicy", "DNSNameResolver", "DynamicResourceAllocation", "EtcdBackendQuota", "EventedPLEG", "Example", "ExternalOIDC", "ExternalOIDCWithUIDAndExtraClaimMappings", "GCPClusterHostedDNS", "GatewayAPI", "ImageStreamImportMode", "IngressControllerDynamicConfigurationManager", "InsightsConfig", "InsightsConfigAPI", "InsightsOnDemandDataGather", "InsightsRuntimeExtractor", "MachineAPIMigration", "MachineAPIOperatorDisableMachineHealthCheckController", "MachineAPIProviderOpenStack", "MachineConfigNodes", "MaxUnavailableStatefulSet", "MetricsCollectionProfiles", "MinimumKubeletVersion", "MixedCPUsAllocation", "MultiArchInstallAzure", "NodeSwap", "NutanixMultiSubnets", "OVNObservability", "OpenShiftPodSecurityAdmission", "PinnedImages", "PlatformOperators", "ProcMountType", "RouteAdvertisements", "RouteExternalCertificate", "ServiceAccountTokenNodeBinding", "SignatureStores", "SigstoreImageVerification", "TranslateStreamCloseWebsocketRequests", "UpgradeStatus", "UserNamespacesPodSecurityStandards", "UserNamespacesSupport", "VSphereMultiNetworks", "VolumeAttributesClass", "VolumeGroupSnapshot"}} 2026-02-16T17:14:23.078699200Z I0216 17:14:23.078552 4431 start.go:219] FeatureGates initialized: knownFeatureGates=[AWSEFSDriverVolumeMetrics AdminNetworkPolicy AlibabaPlatform AzureWorkloadIdentity BareMetalLoadBalancer BuildCSIVolumes ChunkSizeMiB CloudDualStackNodeIPs DisableKubeletCloudCredentialProviders GCPLabelsTags HardwareSpeed IngressControllerLBSubnetsAWS KMSv1 ManagedBootImages ManagedBootImagesAWS MultiArchInstallAWS MultiArchInstallGCP NetworkDiagnosticsConfig NetworkLiveMigration NetworkSegmentation NewOLM NodeDisruptionPolicy OnClusterBuild PersistentIPsForVirtualization PrivateHostedZoneAWS SetEIPForNLBIngressController StreamingCollectionEncodingToJSON StreamingCollectionEncodingToProtobuf VSphereControlPlaneMachineSet VSphereDriverConfiguration VSphereMultiVCenters VSphereStaticIPs ValidatingAdmissionPolicy AWSClusterHostedDNS AdditionalRoutingCapabilities AutomatedEtcdBackup BootcNodeManagement CSIDriverSharedResource ClusterAPIInstall ClusterAPIInstallIBMCloud ClusterMonitoringConfig ConsolePluginContentSecurityPolicy DNSNameResolver DynamicResourceAllocation EtcdBackendQuota EventedPLEG Example ExternalOIDC ExternalOIDCWithUIDAndExtraClaimMappings GCPClusterHostedDNS GatewayAPI ImageStreamImportMode IngressControllerDynamicConfigurationManager InsightsConfig InsightsConfigAPI InsightsOnDemandDataGather InsightsRuntimeExtractor MachineAPIMigration MachineAPIOperatorDisableMachineHealthCheckController MachineAPIProviderOpenStack MachineConfigNodes MaxUnavailableStatefulSet MetricsCollectionProfiles MinimumKubeletVersion MixedCPUsAllocation MultiArchInstallAzure NodeSwap NutanixMultiSubnets OVNObservability OpenShiftPodSecurityAdmission PinnedImages PlatformOperators ProcMountType RouteAdvertisements RouteExternalCertificate ServiceAccountTokenNodeBinding SignatureStores SigstoreImageVerification TranslateStreamCloseWebsocketRequests UpgradeStatus UserNamespacesPodSecurityStandards UserNamespacesSupport VSphereMultiNetworks VolumeAttributesClass VolumeGroupSnapshot] 2026-02-16T17:14:23.078762262Z I0216 17:14:23.078743 4431 update.go:2776] "Starting to manage node: master-0" 2026-02-16T17:14:23.086896562Z I0216 17:14:23.086098 4431 image_manager_helper.go:92] Running captured: rpm-ostree status 2026-02-16T17:14:23.149915948Z I0216 17:14:23.149846 4431 daemon.go:1764] State: idle 2026-02-16T17:14:23.149915948Z Deployments: 2026-02-16T17:14:23.149915948Z * ostree-unverified-registry:quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4aa42a4b31390d46f924ce2d0c4da772bfbf6a5e1e121bdb0f8b69f989e0a0db 2026-02-16T17:14:23.149915948Z Digest: sha256:4aa42a4b31390d46f924ce2d0c4da772bfbf6a5e1e121bdb0f8b69f989e0a0db 2026-02-16T17:14:23.149915948Z Version: 418.94.202601202224-0 (2026-01-20T22:28:53Z) 2026-02-16T17:14:23.149915948Z 2026-02-16T17:14:23.149915948Z ostree-unverified-registry:quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4aa42a4b31390d46f924ce2d0c4da772bfbf6a5e1e121bdb0f8b69f989e0a0db 2026-02-16T17:14:23.149915948Z Digest: sha256:4aa42a4b31390d46f924ce2d0c4da772bfbf6a5e1e121bdb0f8b69f989e0a0db 2026-02-16T17:14:23.149915948Z Version: 418.94.202601202224-0 (2026-01-20T22:28:53Z) 2026-02-16T17:14:23.150858053Z I0216 17:14:23.150798 4431 coreos.go:53] CoreOS aleph version: mtime=2022-08-01 23:42:11 +0000 UTC 2026-02-16T17:14:23.150858053Z { 2026-02-16T17:14:23.150858053Z "container-image": { 2026-02-16T17:14:23.150858053Z "image-digest": "sha256:8b9dae65133b42e82fbe59cba45f3769df203e177e821790a3fba596474c8370", 2026-02-16T17:14:23.150858053Z "image-labels": { 2026-02-16T17:14:23.150858053Z "containers.bootc": "1", 2026-02-16T17:14:23.150858053Z "coreos-assembler.image-config-checksum": "b444a32e2801642f1e41777fd51fa53304496c58a3a6b15e5964a1f86f866507", 2026-02-16T17:14:23.150858053Z "coreos-assembler.image-input-checksum": "47a6ab48a64d2ff2fdbd9651bd7c821497073a07592a6ce507e0dfeadf4c7504", 2026-02-16T17:14:23.150858053Z "io.openshift.build.version-display-names": "machine-os=Red Hat Enterprise Linux CoreOS", 2026-02-16T17:14:23.150858053Z "io.openshift.build.versions": "machine-os=418.94.202511191518-0", 2026-02-16T17:14:23.150858053Z "org.opencontainers.image.revision": "e221971a4bbfc9cb9b57c4d99b700b8e8ef9fb76", 2026-02-16T17:14:23.150858053Z "org.opencontainers.image.source": "https://github.com/openshift/os", 2026-02-16T17:14:23.150858053Z "org.opencontainers.image.version": "418.94.202511191518-0", 2026-02-16T17:14:23.150858053Z "ostree.bootable": "true", 2026-02-16T17:14:23.150858053Z "ostree.commit": "bbdd07d3be544d0ba69dab968c61ceb3c3cb8a98ef4880c66660203fe895f683", 2026-02-16T17:14:23.150858053Z "ostree.final-diffid": "sha256:12787d84fa137cd5649a9005efe98ec9d05ea46245fdc50aecb7dd007f2035b1", 2026-02-16T17:14:23.150858053Z "ostree.linux": "5.14.0-427.100.1.el9_4.x86_64", 2026-02-16T17:14:23.150858053Z "rpmostree.inputhash": "22d9a49c206a6adf1b0d62a260f1bc6ff84d278419009d7956d11de6ff9f7f09" 2026-02-16T17:14:23.150858053Z }, 2026-02-16T17:14:23.150858053Z "image-name": "oci-archive:/rhcos-418.94.202511191518-0-ostree.x86_64.ociarchive" 2026-02-16T17:14:23.150858053Z }, 2026-02-16T17:14:23.150858053Z "osbuild-version": "147", 2026-02-16T17:14:23.150858053Z "ostree-commit": "bbdd07d3be544d0ba69dab968c61ceb3c3cb8a98ef4880c66660203fe895f683", 2026-02-16T17:14:23.150858053Z "ref": "docker://ostree-image-signed:oci-archive:/rhcos-418.94.202511191518-0-ostree.x86_64.ociarchive", 2026-02-16T17:14:23.150858053Z "version": "418.94.202511191518-0" 2026-02-16T17:14:23.150858053Z } 2026-02-16T17:14:23.150881964Z I0216 17:14:23.150874 4431 coreos.go:70] Ignition provisioning: time=2026-02-16T16:57:44Z 2026-02-16T17:14:23.150889464Z I0216 17:14:23.150883 4431 image_manager_helper.go:92] Running captured: journalctl --list-boots 2026-02-16T17:14:23.164943274Z I0216 17:14:23.163888 4431 daemon.go:1773] journalctl --list-boots: 2026-02-16T17:14:23.164943274Z IDX BOOT ID FIRST ENTRY LAST ENTRY 2026-02-16T17:14:23.164943274Z -1 4b8043a619a942c4a3ddd330b8dbba91 Mon 2026-02-16 16:57:31 UTC Mon 2026-02-16 17:13:13 UTC 2026-02-16T17:14:23.164943274Z 0 16009b8c65114dd49a27539c3ce647e4 Mon 2026-02-16 17:13:26 UTC Mon 2026-02-16 17:14:23 UTC 2026-02-16T17:14:23.164943274Z I0216 17:14:23.164323 4431 image_manager_helper.go:92] Running captured: systemctl list-units --state=failed --no-legend 2026-02-16T17:14:23.177277148Z I0216 17:14:23.177246 4431 daemon.go:1789] systemd service state: OK 2026-02-16T17:14:23.177326069Z I0216 17:14:23.177317 4431 daemon.go:1361] Starting MachineConfigDaemon 2026-02-16T17:14:23.177408881Z I0216 17:14:23.177394 4431 daemon.go:1368] Enabling Kubelet Healthz Monitor 2026-02-16T17:14:23.219825239Z I0216 17:14:23.219745 4431 daemon.go:2873] Found 0 requested local packages in the booted deployment 2026-02-16T17:14:24.079872400Z I0216 17:14:24.079809 4431 daemon.go:655] Node master-0 is part of the control plane 2026-02-16T17:14:24.135747582Z I0216 17:14:24.135691 4431 daemon.go:1938] Running: /run/machine-config-daemon-bin/nmstatectl persist-nic-names --root / --kargs-out /tmp/nmstate-kargs2947921163 --cleanup 2026-02-16T17:14:24.165334562Z [2026-02-16T17:14:24Z INFO nmstatectl] Nmstate version: 2.2.56 2026-02-16T17:14:24.168548849Z 2026-02-16T17:14:24.168568680Z [2026-02-16T17:14:24Z INFO nmstatectl::persist_nic] /etc/systemd/network does not exist, no need to clean up 2026-02-16T17:14:24.182049055Z I0216 17:14:24.181986 4431 daemon.go:1600] Previous boot ostree-finalize-staged.service appears successful 2026-02-16T17:14:24.182119487Z I0216 17:14:24.182104 4431 daemon.go:1723] Current config: rendered-master-ccc1c4b4035b8605635ebee7b29103f5 2026-02-16T17:14:24.182150327Z I0216 17:14:24.182139 4431 daemon.go:1724] Desired config: rendered-master-4ff3bdc50d696d239efb12817ae47acf 2026-02-16T17:14:24.182185168Z I0216 17:14:24.182170 4431 daemon.go:1732] state: Degraded 2026-02-16T17:14:24.182257380Z I0216 17:14:24.182240 4431 update.go:2731] Running: rpm-ostree cleanup -r 2026-02-16T17:14:26.517730185Z Bootloader updated; bootconfig swap: yes; bootversion: boot.1.1, deployment count change: -1 2026-02-16T17:14:32.083444444Z I0216 17:14:32.083368 4431 update.go:2776] "Disk currentConfig \"rendered-master-4ff3bdc50d696d239efb12817ae47acf\" overrides node's currentConfig annotation \"rendered-master-ccc1c4b4035b8605635ebee7b29103f5\"" 2026-02-16T17:14:32.089213220Z I0216 17:14:32.089166 4431 daemon.go:2136] Validating against current config rendered-master-4ff3bdc50d696d239efb12817ae47acf 2026-02-16T17:14:32.089720094Z I0216 17:14:32.089704 4431 daemon.go:2048] SSH key location ("/home/core/.ssh/authorized_keys.d/ignition") up-to-date! 2026-02-16T17:14:32.089750834Z I0216 17:14:32.089742 4431 image_manager_helper.go:92] Running captured: rpm-ostree kargs 2026-02-16T17:14:32.180493820Z I0216 17:14:32.180421 4431 update.go:2776] "Validated on-disk state" 2026-02-16T17:14:32.186683307Z I0216 17:14:32.186634 4431 daemon.go:2238] Completing update to target MachineConfig: rendered-master-4ff3bdc50d696d239efb12817ae47acf 2026-02-16T17:15:23.221429912Z I0216 17:15:23.221317 4431 certificate_writer.go:294] Certificate was synced from controllerconfig resourceVersion 13330 config/pod/openshift-machine-config-operator/machine-config-daemon-98q6v.json0000640000000000000000000001511515144650270025671 0ustar0000000000000000{"metadata":{"name":"machine-config-daemon-98q6v","generateName":"machine-config-daemon-","namespace":"openshift-machine-config-operator","uid":"648abb6c-9c81-4e5c-b5f1-3b7eb254f743","resourceVersion":"16422","creationTimestamp":"2026-02-16T17:01:37Z","labels":{"controller-revision-hash":"845cfbc69","k8s-app":"machine-config-daemon","pod-template-generation":"1"},"annotations":{"openshift.io/required-scc":"privileged","openshift.io/scc":"privileged"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"DaemonSet","name":"machine-config-daemon","uid":"f6991e47-5624-45b2-b26f-381e82c403c4","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"rootfs","hostPath":{"path":"/","type":""}},{"name":"proxy-tls","secret":{"secretName":"proxy-tls","defaultMode":420}},{"name":"mcd-auth-proxy-config","configMap":{"name":"kube-rbac-proxy","defaultMode":420}},{"name":"kube-api-access-sx92x","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"machine-config-daemon","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","command":["/usr/bin/machine-config-daemon"],"args":["start","--payload-version=4.18.32"],"ports":[{"name":"health","hostPort":8798,"containerPort":8798,"protocol":"TCP"}],"env":[{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"rootfs","mountPath":"/rootfs","mountPropagation":"HostToContainer"},{"name":"kube-api-access-sx92x","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/health","port":8798,"host":"127.0.0.1","scheme":"HTTP"},"initialDelaySeconds":120,"timeoutSeconds":1,"periodSeconds":30,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"readOnlyRootFilesystem":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","args":["--secure-listen-address=0.0.0.0:9001","--config-file=/etc/kube-rbac-proxy/config-file.yaml","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12","--upstream=http://127.0.0.1:8797","--logtostderr=true","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key"],"ports":[{"name":"metrics","hostPort":9001,"containerPort":9001,"protocol":"TCP"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"proxy-tls","mountPath":"/etc/tls/private"},{"name":"mcd-auth-proxy-config","mountPath":"/etc/kube-rbac-proxy"},{"name":"kube-api-access-sx92x","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":600,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux"},"serviceAccountName":"machine-config-daemon","serviceAccount":"machine-config-daemon","nodeName":"master-0","hostNetwork":true,"hostPID":true,"securityContext":{},"imagePullSecrets":[{"name":"machine-config-daemon-dockercfg-q5h8t"}],"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchFields":[{"key":"metadata.name","operator":"In","values":["master-0"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:01:38Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:01:37Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:21Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:21Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:01:37Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-16T17:01:37Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-16T17:14:20Z"}},"lastState":{},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://17104543b9da3593ba424383349543390a7b869403edf6ab8bc4ba2652888980","started":true,"volumeMounts":[{"name":"proxy-tls","mountPath":"/etc/tls/private"},{"name":"mcd-auth-proxy-config","mountPath":"/etc/kube-rbac-proxy"},{"name":"kube-api-access-sx92x","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"machine-config-daemon","state":{"running":{"startedAt":"2026-02-16T17:14:20Z"}},"lastState":{},"ready":true,"restartCount":4,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","containerID":"cri-o://68f33191bbdd9baf1095b1769d81979c4da11a7d920a2c849ce21980a92a7ecd","started":true,"volumeMounts":[{"name":"rootfs","mountPath":"/rootfs"},{"name":"kube-api-access-sx92x","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-rbac-proxy_current.log0000640000000000000000000000224515144650270035470 0ustar0000000000000000config/pod/openshift-machine-config-operator/logs/machine-config-controller-686c884b4d-ksx482026-02-16T17:14:57.963795409Z W0216 17:14:57.963594 1 deprecated.go:66] 2026-02-16T17:14:57.963795409Z ==== Removed Flag Warning ====================== 2026-02-16T17:14:57.963795409Z 2026-02-16T17:14:57.963795409Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-02-16T17:14:57.963795409Z 2026-02-16T17:14:57.963795409Z =============================================== 2026-02-16T17:14:57.963795409Z 2026-02-16T17:14:57.963795409Z I0216 17:14:57.963750 1 kube-rbac-proxy.go:530] Reading config file: /etc/kube-rbac-proxy/config-file.yaml 2026-02-16T17:14:57.964812690Z I0216 17:14:57.964669 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-02-16T17:14:57.973755165Z I0216 17:14:57.973667 1 kube-rbac-proxy.go:347] Reading certificate files 2026-02-16T17:14:57.989719436Z I0216 17:14:57.989658 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:9001 2026-02-16T17:14:57.991269603Z I0216 17:14:57.990553 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:9001 2026-02-16T17:15:10.865184602Z I0216 17:15:10.865113 1 log.go:245] http: proxy error: dial tcp 127.0.0.1:8797: connect: connection refused machine-config-controller_current.log0000640000000000000000000000113715144650270037505 0ustar0000000000000000config/pod/openshift-machine-config-operator/logs/machine-config-controller-686c884b4d-ksx482026-02-16T17:14:57.497351323Z I0216 17:14:57.496154 1 start.go:61] Version: bc9f50bf (0b0569287da3daea19bf47aa298037ccb4cbff98) 2026-02-16T17:14:57.497351323Z I0216 17:14:57.496353 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-16T17:14:57.666400739Z I0216 17:14:57.666351 1 leaderelection.go:254] attempting to acquire leader lease openshift-machine-config-operator/machine-config-controller... config/pod/openshift-machine-config-operator/machine-config-controller-686c884b4d-ksx48.json0000640000000000000000000001650615144650270030224 0ustar0000000000000000{"metadata":{"name":"machine-config-controller-686c884b4d-ksx48","generateName":"machine-config-controller-686c884b4d-","namespace":"openshift-machine-config-operator","uid":"c8729b1a-e365-4cf7-8a05-91a9987dabe9","resourceVersion":"17450","creationTimestamp":"2026-02-16T17:01:41Z","labels":{"k8s-app":"machine-config-controller","pod-template-hash":"686c884b4d"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.69/23\"],\"mac_address\":\"0a:58:0a:80:00:45\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.69/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.69\"\n ],\n \"mac\": \"0a:58:0a:80:00:45\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"machine-config-controller-686c884b4d","uid":"9cb57978-da2f-4279-ac57-77d28723fb09","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"proxy-tls","secret":{"secretName":"mcc-proxy-tls","defaultMode":420}},{"name":"mcc-auth-proxy-config","configMap":{"name":"kube-rbac-proxy","defaultMode":420}},{"name":"kube-api-access-hmj52","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"machine-config-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","command":["/usr/bin/machine-config-controller"],"args":["start","--resourcelock-namespace=openshift-machine-config-operator","--v=2","--payload-version=4.18.32"],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"kube-api-access-hmj52","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000330000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","args":["--secure-listen-address=0.0.0.0:9001","--config-file=/etc/kube-rbac-proxy/config-file.yaml","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12","--upstream=http://127.0.0.1:8797","--logtostderr=true","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key"],"ports":[{"name":"metrics","containerPort":9001,"protocol":"TCP"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"proxy-tls","mountPath":"/etc/tls/private"},{"name":"mcc-auth-proxy-config","mountPath":"/etc/kube-rbac-proxy"},{"name":"kube-api-access-hmj52","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000330000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"machine-config-controller","serviceAccount":"machine-config-controller","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c18,c12"},"fsGroup":1000330000,"seccompProfile":{"type":"RuntimeDefault"}},"imagePullSecrets":[{"name":"machine-config-controller-dockercfg-t46bw"}],"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:58Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:01:41Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:58Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:58Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:01:41Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.69","podIPs":[{"ip":"10.128.0.69"}],"startTime":"2026-02-16T17:01:41Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-16T17:14:57Z"}},"lastState":{},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://d7731adcb1e4539a65b2c7f3daf888135793fea7b0a6cb8d9092fe38bfc1b95c","started":true,"volumeMounts":[{"name":"proxy-tls","mountPath":"/etc/tls/private"},{"name":"mcc-auth-proxy-config","mountPath":"/etc/kube-rbac-proxy"},{"name":"kube-api-access-hmj52","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"machine-config-controller","state":{"running":{"startedAt":"2026-02-16T17:14:57Z"}},"lastState":{},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","containerID":"cri-o://d15b4d1a6a8536eea2aa39cd278ffc178d8cef246140518d56f1faaa885e619a","started":true,"volumeMounts":[{"name":"kube-api-access-hmj52","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-rbac-proxy-crio_current.log0000640000000000000000000000225215144650270034461 0ustar0000000000000000config/pod/openshift-machine-config-operator/logs/kube-rbac-proxy-crio-master-02026-02-16T17:13:53.799482113Z W0216 17:13:53.799358 1 deprecated.go:66] 2026-02-16T17:13:53.799482113Z ==== Removed Flag Warning ====================== 2026-02-16T17:13:53.799482113Z 2026-02-16T17:13:53.799482113Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-02-16T17:13:53.799482113Z 2026-02-16T17:13:53.799482113Z =============================================== 2026-02-16T17:13:53.799482113Z 2026-02-16T17:13:53.799482113Z I0216 17:13:53.799448 1 kube-rbac-proxy.go:530] Reading config file: /etc/kubernetes/crio-metrics-proxy.cfg 2026-02-16T17:13:53.803264205Z I0216 17:13:53.803233 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-02-16T17:13:53.803832611Z I0216 17:13:53.803769 1 dynamic_cafile_content.go:160] "Starting controller" name="client-ca::/etc/kubernetes/kubelet-ca.crt" 2026-02-16T17:13:53.807708525Z I0216 17:13:53.807675 1 kube-rbac-proxy.go:347] Reading certificate files 2026-02-16T17:13:53.808648071Z I0216 17:13:53.808615 1 kube-rbac-proxy.go:395] Starting TCP socket on :9637 2026-02-16T17:13:53.810609674Z I0216 17:13:53.810587 1 kube-rbac-proxy.go:402] Listening securely on :9637 config/pod/openshift-machine-config-operator/logs/kube-rbac-proxy-crio-master-0/setup_current.log0000640000000000000000000000012615144650270031732 0ustar00000000000000002026-02-16T17:13:52.222104481Z Waiting for kubelet key and certificate to be availableconfig/pod/openshift-machine-config-operator/kube-rbac-proxy-crio-master-0.json0000640000000000000000000001300615144650270026255 0ustar0000000000000000{"metadata":{"name":"kube-rbac-proxy-crio-master-0","namespace":"openshift-machine-config-operator","uid":"295dd2cc-4b35-40bc-959c-aa8ad90fc453","resourceVersion":"16472","creationTimestamp":"2026-02-16T16:59:02Z","annotations":{"kubernetes.io/config.hash":"b3322fd3717f4aec0d8f54ec7862c07e","kubernetes.io/config.mirror":"b3322fd3717f4aec0d8f54ec7862c07e","kubernetes.io/config.seen":"2026-02-16T16:58:16.617766285Z","kubernetes.io/config.source":"file","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"da39ce92-6a7c-4cce-aa8b-3e495e33f616","controller":true}]},"spec":{"volumes":[{"name":"etc-kube","hostPath":{"path":"/etc/kubernetes","type":""}},{"name":"var-lib-kubelet","hostPath":{"path":"/var/lib/kubelet","type":""}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","command":["/bin/bash","-ec"],"args":["echo -n \"Waiting for kubelet key and certificate to be available\"\nwhile [ -n \"$(test -e /var/lib/kubelet/pki/kubelet-server-current.pem)\" ] ; do\n echo -n \".\"\n sleep 1\n (( tries += 1 ))\n if [[ \"${tries}\" -gt 10 ]]; then\n echo \"Timed out waiting for kubelet key and cert.\"\n exit 1\n fi\ndone\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"var-lib-kubelet","mountPath":"/var","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"kube-rbac-proxy-crio","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","args":["--secure-listen-address=:9637","--config-file=/etc/kubernetes/crio-metrics-proxy.cfg","--client-ca-file=/etc/kubernetes/kubelet-ca.crt","--logtostderr=true","--kubeconfig=/var/lib/kubelet/kubeconfig","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12","--upstream=http://127.0.0.1:9537","--tls-cert-file=/var/lib/kubelet/pki/kubelet-server-current.pem","--tls-private-key-file=/var/lib/kubelet/pki/kubelet-server-current.pem"],"ports":[{"hostPort":9637,"containerPort":9637,"protocol":"TCP"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-kube","readOnly":true,"mountPath":"/etc/kubernetes","mountPropagation":"HostToContainer"},{"name":"var-lib-kubelet","readOnly":true,"mountPath":"/var/lib/kubelet","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:18Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:18Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:18Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:18Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:18Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-16T17:14:18Z","initContainerStatuses":[{"name":"setup","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-16T17:13:52Z","finishedAt":"2026-02-16T17:13:52Z","containerID":"cri-o://a2626c4f0d02f1b08ed65857f9aece164559757f234922a3555b40b68623d959"}},"lastState":{},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://a2626c4f0d02f1b08ed65857f9aece164559757f234922a3555b40b68623d959","started":false}],"containerStatuses":[{"name":"kube-rbac-proxy-crio","state":{"running":{"startedAt":"2026-02-16T17:13:53Z"}},"lastState":{},"ready":true,"restartCount":5,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://9cac97f2a7ed5b660f1fe9defbb77e1823cc7917bedfcd9a1ee2cf3d27a5413c","started":true}],"qosClass":"Burstable"}}cluster-policy-controller_current.log0000640000000000000000000003103315144650270034214 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-02-16T17:13:53.078955806Z I0216 17:13:53.078691 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-16T17:13:53.081758022Z I0216 17:13:53.081685 1 observer_polling.go:159] Starting file observer 2026-02-16T17:13:53.114535579Z I0216 17:13:53.114350 1 builder.go:298] cluster-policy-controller version 4.18.0-202601190115.p2.g5fd8525.assembly.stream.el9-5fd8525-5fd852525909ce6eab52972ba9ce8fcf56528eb9 2026-02-16T17:13:53.120047508Z I0216 17:13:53.119991 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.crt::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.key" 2026-02-16T17:14:11.531339928Z I0216 17:14:11.531243 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-02-16T17:14:11.538467351Z I0216 17:14:11.538413 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-02-16T17:14:11.538467351Z I0216 17:14:11.538437 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-02-16T17:14:11.538467351Z I0216 17:14:11.538458 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-02-16T17:14:11.538496541Z I0216 17:14:11.538464 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-02-16T17:14:11.551028600Z I0216 17:14:11.550886 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-16T17:14:11.551028600Z I0216 17:14:11.550899 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-02-16T17:14:11.551028600Z W0216 17:14:11.550937 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-16T17:14:11.551028600Z W0216 17:14:11.550949 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-16T17:14:11.551028600Z W0216 17:14:11.550959 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-16T17:14:11.551028600Z W0216 17:14:11.550994 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-16T17:14:11.551028600Z W0216 17:14:11.551001 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-16T17:14:11.551028600Z W0216 17:14:11.551008 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-16T17:14:11.554547486Z I0216 17:14:11.554498 1 builder.go:439] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-16T17:14:11.555292366Z I0216 17:14:11.555185 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-16T17:14:11.555292366Z I0216 17:14:11.555242 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-16T17:14:11.555377288Z I0216 17:14:11.555325 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-16T17:14:11.555476511Z I0216 17:14:11.555438 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.crt::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.key" certDetail="\"system:admin\" [client] groups=[system:masters] issuer=\"kube-control-plane-signer\" (2026-02-16 16:50:49 +0000 UTC to 2027-02-16 16:50:50 +0000 UTC (now=2026-02-16 17:14:11.555396189 +0000 UTC))" 2026-02-16T17:14:11.555733758Z I0216 17:14:11.555635 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771262033\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771262033\" (2026-02-16 16:13:53 +0000 UTC to 2027-02-16 16:13:53 +0000 UTC (now=2026-02-16 17:14:11.555594284 +0000 UTC))" 2026-02-16T17:14:11.555733758Z I0216 17:14:11.555661 1 secure_serving.go:213] Serving securely on 127.0.0.1:10357 2026-02-16T17:14:11.555733758Z I0216 17:14:11.555689 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-02-16T17:14:11.555733758Z I0216 17:14:11.555718 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-16T17:14:11.555798790Z I0216 17:14:11.555749 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.crt::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.key" 2026-02-16T17:14:11.556299963Z I0216 17:14:11.556265 1 leaderelection.go:254] attempting to acquire leader lease kube-system/cluster-policy-controller-lock... 2026-02-16T17:14:11.558052771Z I0216 17:14:11.557879 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-16T17:14:11.558052771Z I0216 17:14:11.557897 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T17:14:11.558052771Z I0216 17:14:11.557970 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T17:14:11.561247927Z I0216 17:14:11.561161 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T17:14:11.561826783Z I0216 17:14:11.561761 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T17:14:11.561826783Z I0216 17:14:11.561804 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T17:14:11.658653623Z I0216 17:14:11.658566 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T17:14:11.658653623Z I0216 17:14:11.658627 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T17:14:11.658915700Z I0216 17:14:11.658732 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-16T17:14:11.658915700Z I0216 17:14:11.658896 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-16 16:50:47 +0000 UTC to 2026-02-17 16:50:47 +0000 UTC (now=2026-02-16 17:14:11.658860258 +0000 UTC))" 2026-02-16T17:14:11.659191587Z I0216 17:14:11.659082 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.crt::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.key" certDetail="\"system:admin\" [client] groups=[system:masters] issuer=\"kube-control-plane-signer\" (2026-02-16 16:50:49 +0000 UTC to 2027-02-16 16:50:50 +0000 UTC (now=2026-02-16 17:14:11.659064384 +0000 UTC))" 2026-02-16T17:14:11.659264069Z I0216 17:14:11.659228 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771262033\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771262033\" (2026-02-16 16:13:53 +0000 UTC to 2027-02-16 16:13:53 +0000 UTC (now=2026-02-16 17:14:11.659209288 +0000 UTC))" 2026-02-16T17:14:11.659420243Z I0216 17:14:11.659372 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-02-16 16:44:14 +0000 UTC to 2036-02-14 16:44:14 +0000 UTC (now=2026-02-16 17:14:11.659354222 +0000 UTC))" 2026-02-16T17:14:11.659420243Z I0216 17:14:11.659402 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-02-16 16:50:49 +0000 UTC to 2026-02-17 16:50:49 +0000 UTC (now=2026-02-16 17:14:11.659389623 +0000 UTC))" 2026-02-16T17:14:11.659439884Z I0216 17:14:11.659420 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-02-16 16:50:49 +0000 UTC to 2027-02-16 16:50:49 +0000 UTC (now=2026-02-16 17:14:11.659409093 +0000 UTC))" 2026-02-16T17:14:11.659456724Z I0216 17:14:11.659439 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-02-16 16:50:49 +0000 UTC to 2027-02-16 16:50:49 +0000 UTC (now=2026-02-16 17:14:11.659428204 +0000 UTC))" 2026-02-16T17:14:11.659473615Z I0216 17:14:11.659458 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-02-16 16:50:47 +0000 UTC to 2036-02-14 16:50:47 +0000 UTC (now=2026-02-16 17:14:11.659444984 +0000 UTC))" 2026-02-16T17:14:11.659490675Z I0216 17:14:11.659476 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-csr-signer_@1771261235\" [] issuer=\"kubelet-signer\" (2026-02-16 17:00:34 +0000 UTC to 2026-02-17 16:50:49 +0000 UTC (now=2026-02-16 17:14:11.659464955 +0000 UTC))" 2026-02-16T17:14:11.659507376Z I0216 17:14:11.659494 1 tlsconfig.go:181] "Loaded client CA" index=6 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"openshift-kube-apiserver-operator_node-system-admin-signer@1771261220\" [] issuer=\"\" (2026-02-16 17:00:19 +0000 UTC to 2027-02-16 17:00:20 +0000 UTC (now=2026-02-16 17:14:11.659482035 +0000 UTC))" 2026-02-16T17:14:11.659524066Z I0216 17:14:11.659510 1 tlsconfig.go:181] "Loaded client CA" index=7 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-16 16:50:47 +0000 UTC to 2026-02-17 16:50:47 +0000 UTC (now=2026-02-16 17:14:11.659500596 +0000 UTC))" 2026-02-16T17:14:11.659679591Z I0216 17:14:11.659638 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.crt::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.key" certDetail="\"system:admin\" [client] groups=[system:masters] issuer=\"kube-control-plane-signer\" (2026-02-16 16:50:49 +0000 UTC to 2027-02-16 16:50:50 +0000 UTC (now=2026-02-16 17:14:11.659623149 +0000 UTC))" 2026-02-16T17:14:11.659865826Z I0216 17:14:11.659808 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771262033\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771262033\" (2026-02-16 16:13:53 +0000 UTC to 2027-02-16 16:13:53 +0000 UTC (now=2026-02-16 17:14:11.659757583 +0000 UTC))" kube-controller-manager_current.log0000640000000000000000000005744215144650270033610 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-02-16T17:14:59.364150807Z I0216 17:14:59.364097 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-controller-manager-operator/openshift-controller-manager-operator-5f5f84757d" duration="10.09134ms" 2026-02-16T17:14:59.364253070Z I0216 17:14:59.364228 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-controller-manager-operator/openshift-controller-manager-operator-5f5f84757d" duration="28.11µs" 2026-02-16T17:14:59.428510895Z I0216 17:14:59.427656 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-apiserver/apiserver-fc4bf7f79" duration="59.942µs" 2026-02-16T17:14:59.501782667Z I0216 17:14:59.501715 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-service-ca/service-ca-676cd8b9b5" duration="17.374794ms" 2026-02-16T17:14:59.504285404Z I0216 17:14:59.501909 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-service-ca/service-ca-676cd8b9b5" duration="53.702µs" 2026-02-16T17:14:59.526327591Z I0216 17:14:59.526269 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-cb4f7b4cf" duration="12.392431ms" 2026-02-16T17:14:59.529991844Z I0216 17:14:59.527926 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-cb4f7b4cf" duration="23.101µs" 2026-02-16T17:14:59.622538608Z I0216 17:14:59.621101 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-controller-manager/controller-manager-7fc9897cf8" duration="49.332µs" 2026-02-16T17:14:59.683859003Z I0216 17:14:59.683268 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-storage-operator/cluster-storage-operator-75b869db96" duration="27.299499ms" 2026-02-16T17:14:59.683859003Z I0216 17:14:59.683329 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-storage-operator/cluster-storage-operator-75b869db96" duration="28.311µs" 2026-02-16T17:14:59.725315917Z I0216 17:14:59.725261 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-controller/operator-controller-controller-manager-85c9b89969" duration="46.991µs" 2026-02-16T17:14:59.809096291Z I0216 17:14:59.808189 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/thanos-querier-64bf6cdbbc" duration="67.222µs" 2026-02-16T17:14:59.851385271Z I0216 17:14:59.849907 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/package-server-manager-5c696dbdcd" duration="32.361µs" 2026-02-16T17:14:59.882700033Z I0216 17:14:59.882449 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-config-operator/openshift-config-operator-7c6bdb986f" duration="52.932µs" 2026-02-16T17:14:59.936653261Z I0216 17:14:59.934297 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-kube-storage-version-migrator/migrator-5bd989df77" duration="42.242µs" 2026-02-16T17:15:00.009394857Z I0216 17:15:00.006696 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-kube-controller-manager-operator/kube-controller-manager-operator-78ff47c7c5" duration="21.388988ms" 2026-02-16T17:15:00.009394857Z I0216 17:15:00.006934 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-kube-controller-manager-operator/kube-controller-manager-operator-78ff47c7c5" duration="52.791µs" 2026-02-16T17:15:00.090246782Z I0216 17:15:00.089918 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-route-controller-manager/route-controller-manager-dcdb76cc6" duration="51.933836ms" 2026-02-16T17:15:00.090246782Z I0216 17:15:00.090225 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-route-controller-manager/route-controller-manager-dcdb76cc6" duration="53.392µs" 2026-02-16T17:15:00.184460217Z I0216 17:15:00.183866 1 job_controller.go:573] "enqueueing job" logger="job-controller" key="openshift-operator-lifecycle-manager/collect-profiles-29521035" delay="0s" 2026-02-16T17:15:00.233358920Z I0216 17:15:00.233298 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/control-plane-machine-set-operator-d8bf84b88" duration="25.264527ms" 2026-02-16T17:15:00.234275098Z I0216 17:15:00.234139 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/control-plane-machine-set-operator-d8bf84b88" duration="80.133µs" 2026-02-16T17:15:00.256377948Z I0216 17:15:00.254436 1 job_controller.go:573] "enqueueing job" logger="job-controller" key="openshift-operator-lifecycle-manager/collect-profiles-29521035" delay="1s" 2026-02-16T17:15:00.267862691Z I0216 17:15:00.267746 1 job_controller.go:573] "enqueueing job" logger="job-controller" key="openshift-operator-lifecycle-manager/collect-profiles-29521035" delay="1s" 2026-02-16T17:15:00.286725630Z I0216 17:15:00.286126 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-samples-operator/cluster-samples-operator-f8cbff74c" duration="20.476299ms" 2026-02-16T17:15:00.286725630Z I0216 17:15:00.286213 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-samples-operator/cluster-samples-operator-f8cbff74c" duration="51.812µs" 2026-02-16T17:15:00.309083417Z I0216 17:15:00.309025 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-credential-operator/cloud-credential-operator-595c8f9ff" duration="22.743009ms" 2026-02-16T17:15:00.309160780Z I0216 17:15:00.309137 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-credential-operator/cloud-credential-operator-595c8f9ff" duration="59.952µs" 2026-02-16T17:15:00.345331391Z I0216 17:15:00.342812 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-7485d55966" duration="12.252457ms" 2026-02-16T17:15:00.345331391Z I0216 17:15:00.343215 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-7485d55966" duration="66.902µs" 2026-02-16T17:15:00.466972950Z I0216 17:15:00.466898 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-controller-manager/controller-manager-7fc9897cf8" duration="19.231961ms" 2026-02-16T17:15:00.467037152Z I0216 17:15:00.467015 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-controller-manager/controller-manager-7fc9897cf8" duration="73.262µs" 2026-02-16T17:15:00.490185553Z I0216 17:15:00.490135 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/machine-api-operator-bd7dd5c46" duration="15.400193ms" 2026-02-16T17:15:00.490319307Z I0216 17:15:00.490305 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/machine-api-operator-bd7dd5c46" duration="65.782µs" 2026-02-16T17:15:00.521478305Z I0216 17:15:00.521428 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-7485d645b8" duration="15.695802ms" 2026-02-16T17:15:00.521577168Z I0216 17:15:00.521543 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-7485d645b8" duration="66.912µs" 2026-02-16T17:15:00.551797657Z I0216 17:15:00.551695 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-686c884b4d" duration="12.549845ms" 2026-02-16T17:15:00.551859469Z I0216 17:15:00.551808 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-686c884b4d" duration="64.912µs" 2026-02-16T17:15:00.562871757Z I0216 17:15:00.562449 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-oauth-apiserver/apiserver-66788cb45c" duration="47.742µs" 2026-02-16T17:15:00.595247202Z I0216 17:15:00.591356 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-console-operator/console-operator-7777d5cc66" duration="78.572µs" 2026-02-16T17:15:00.621637573Z I0216 17:15:00.621570 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-dns-operator/dns-operator-86b8869b79" duration="8.701378ms" 2026-02-16T17:15:00.621694865Z I0216 17:15:00.621671 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-dns-operator/dns-operator-86b8869b79" duration="64.152µs" 2026-02-16T17:15:00.693037728Z I0216 17:15:00.692902 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-autoscaler-operator-67fd9768b5" duration="16.28664ms" 2026-02-16T17:15:00.693070589Z I0216 17:15:00.693030 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-autoscaler-operator-67fd9768b5" duration="82.372µs" 2026-02-16T17:15:00.715174648Z I0216 17:15:00.715105 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-operator-84976bb859" duration="13.154035ms" 2026-02-16T17:15:00.715210559Z I0216 17:15:00.715200 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-operator-84976bb859" duration="60.232µs" 2026-02-16T17:15:00.761470901Z I0216 17:15:00.761396 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/openshift-state-metrics-546cc7d765" duration="13.263187ms" 2026-02-16T17:15:00.761538513Z I0216 17:15:00.761517 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/openshift-state-metrics-546cc7d765" duration="83.232µs" 2026-02-16T17:15:00.791497604Z I0216 17:15:00.791413 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-baremetal-operator-7bc947fc7d" duration="15.981911ms" 2026-02-16T17:15:00.791537775Z I0216 17:15:00.791503 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-baremetal-operator-7bc947fc7d" duration="37.241µs" 2026-02-16T17:15:00.796317392Z I0216 17:15:00.796257 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/telemeter-client-6bbd87b65b" duration="84.093µs" 2026-02-16T17:15:00.822705023Z I0216 17:15:00.822194 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-olm-operator/cluster-olm-operator-55b69c6c48" duration="62.612µs" 2026-02-16T17:15:00.857147301Z I0216 17:15:00.857087 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-multus/multus-admission-controller-6d678b8d67" duration="17.519819ms" 2026-02-16T17:15:00.857212123Z I0216 17:15:00.857188 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-multus/multus-admission-controller-6d678b8d67" duration="62.982µs" 2026-02-16T17:15:00.917070073Z I0216 17:15:00.916954 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/kube-state-metrics-7cc9598d54" duration="81.782µs" 2026-02-16T17:15:00.953135392Z I0216 17:15:00.953055 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-console-operator/console-operator-7777d5cc66" duration="9.528853ms" 2026-02-16T17:15:00.953168853Z I0216 17:15:00.953131 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-console-operator/console-operator-7777d5cc66" duration="41.351µs" 2026-02-16T17:15:01.008891955Z I0216 17:15:01.008822 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/telemeter-client-6bbd87b65b" duration="12.312179ms" 2026-02-16T17:15:01.008947827Z I0216 17:15:01.008927 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/telemeter-client-6bbd87b65b" duration="47.551µs" 2026-02-16T17:15:01.043701155Z I0216 17:15:01.043615 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-olm-operator/cluster-olm-operator-55b69c6c48" duration="15.121375ms" 2026-02-16T17:15:01.043742936Z I0216 17:15:01.043709 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-olm-operator/cluster-olm-operator-55b69c6c48" duration="55.982µs" 2026-02-16T17:15:01.068787186Z I0216 17:15:01.068719 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/kube-state-metrics-7cc9598d54" duration="9.385949ms" 2026-02-16T17:15:01.068882299Z I0216 17:15:01.068843 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/kube-state-metrics-7cc9598d54" duration="79.283µs" 2026-02-16T17:15:01.114772299Z I0216 17:15:01.114692 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/thanos-querier-64bf6cdbbc" duration="102.313µs" 2026-02-16T17:15:01.149873248Z I0216 17:15:01.149814 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-kube-storage-version-migrator/migrator-5bd989df77" duration="10.348048ms" 2026-02-16T17:15:01.149943760Z I0216 17:15:01.149916 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-kube-storage-version-migrator/migrator-5bd989df77" duration="69.672µs" 2026-02-16T17:15:01.162651651Z I0216 17:15:01.162543 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-apiserver/apiserver-fc4bf7f79" duration="53.201µs" 2026-02-16T17:15:01.586648182Z I0216 17:15:01.585950 1 replica_set.go:477] "pod will be enqueued after a while for availability check" logger="replicaset-controller" duration=5 kind="ReplicaSet" pod="openshift-catalogd/catalogd-controller-manager-67bc7c997f-mn6cr" 2026-02-16T17:15:01.668530348Z I0216 17:15:01.668471 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-catalogd/catalogd-controller-manager-67bc7c997f" duration="82.202376ms" 2026-02-16T17:15:01.668668572Z I0216 17:15:01.668638 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-catalogd/catalogd-controller-manager-67bc7c997f" duration="83.502µs" 2026-02-16T17:15:01.774757023Z I0216 17:15:01.774685 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-controller/operator-controller-controller-manager-85c9b89969" duration="65.572725ms" 2026-02-16T17:15:01.774796214Z I0216 17:15:01.774754 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-controller/operator-controller-controller-manager-85c9b89969" duration="38.001µs" 2026-02-16T17:15:01.816494686Z I0216 17:15:01.816408 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-oauth-apiserver/apiserver-66788cb45c" duration="47.752µs" 2026-02-16T17:15:01.941849348Z I0216 17:15:01.938114 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-oauth-apiserver/apiserver-66788cb45c" duration="13.967499ms" 2026-02-16T17:15:01.941849348Z I0216 17:15:01.938236 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-oauth-apiserver/apiserver-66788cb45c" duration="75.622µs" 2026-02-16T17:15:03.272610278Z E0216 17:15:03.271639 1 resource_quota_controller.go:446] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, metrics.k8s.io/v1beta1: stale GroupVersion discovery: metrics.k8s.io/v1beta1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1" logger="UnhandledError" 2026-02-16T17:15:03.689406466Z I0216 17:15:03.689343 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-config-operator/openshift-config-operator-7c6bdb986f" duration="8.597444ms" 2026-02-16T17:15:03.690162119Z I0216 17:15:03.690116 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-config-operator/openshift-config-operator-7c6bdb986f" duration="81.153µs" 2026-02-16T17:15:04.199854324Z I0216 17:15:04.199772 1 garbagecollector.go:826] "failed to discover some groups" logger="garbage-collector-controller" groups="" 2026-02-16T17:15:04.200140253Z I0216 17:15:04.200099 1 garbagecollector.go:232] "syncing garbage collector with updated resources from discovery" logger="garbage-collector-controller" attempt=1 diff="added: [oauth.openshift.io/v1, Resource=oauthaccesstokens oauth.openshift.io/v1, Resource=oauthauthorizetokens oauth.openshift.io/v1, Resource=oauthclientauthorizations oauth.openshift.io/v1, Resource=oauthclients oauth.openshift.io/v1, Resource=useroauthaccesstokens user.openshift.io/v1, Resource=groups user.openshift.io/v1, Resource=identities user.openshift.io/v1, Resource=users], removed: []" 2026-02-16T17:15:04.207258522Z I0216 17:15:04.207162 1 shared_informer.go:313] Waiting for caches to sync for garbage collector 2026-02-16T17:15:04.209878912Z I0216 17:15:04.209808 1 reflector.go:368] Caches populated for *v1.UserOAuthAccessToken from github.com/openshift/client-go@v0.0.0-20241001162912-da6d55e4611f/oauth/informers/externalversions/factory.go:125 2026-02-16T17:15:04.308073680Z I0216 17:15:04.307995 1 shared_informer.go:320] Caches are synced for garbage collector 2026-02-16T17:15:04.308073680Z I0216 17:15:04.308033 1 garbagecollector.go:281] "synced garbage collector" logger="garbage-collector-controller" 2026-02-16T17:15:06.684119495Z I0216 17:15:06.683941 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-catalogd/catalogd-controller-manager-67bc7c997f" duration="14.348351ms" 2026-02-16T17:15:06.684183087Z I0216 17:15:06.684161 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-catalogd/catalogd-controller-manager-67bc7c997f" duration="94.333µs" 2026-02-16T17:15:06.835521838Z I0216 17:15:06.835433 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/thanos-querier-64bf6cdbbc" duration="17.354594ms" 2026-02-16T17:15:06.835740505Z I0216 17:15:06.835689 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/thanos-querier-64bf6cdbbc" duration="190.286µs" 2026-02-16T17:15:06.914497885Z I0216 17:15:06.914413 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-apiserver/apiserver-fc4bf7f79" duration="91.573µs" 2026-02-16T17:15:06.961012294Z I0216 17:15:06.959600 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-apiserver/apiserver-fc4bf7f79" duration="18.180099ms" 2026-02-16T17:15:06.961012294Z I0216 17:15:06.959891 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-apiserver/apiserver-fc4bf7f79" duration="61.912µs" 2026-02-16T17:15:12.790089832Z I0216 17:15:12.790025 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress/router-default-864ddd5f56" duration="70.342µs" 2026-02-16T17:15:12.812559922Z I0216 17:15:12.812363 1 replica_set.go:477] "pod will be enqueued after a while for availability check" logger="replicaset-controller" duration=30 kind="ReplicaSet" pod="openshift-ingress/router-default-864ddd5f56-pm4rt" 2026-02-16T17:15:12.825846571Z I0216 17:15:12.825784 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress/router-default-864ddd5f56" duration="13.089892ms" 2026-02-16T17:15:12.827184002Z I0216 17:15:12.827128 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress/router-default-864ddd5f56" duration="468.365µs" 2026-02-16T17:15:31.661685719Z I0216 17:15:31.659443 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-745bd8d89b" duration="119.463µs" 2026-02-16T17:15:31.706563328Z I0216 17:15:31.706501 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-745bd8d89b" duration="21.245863ms" 2026-02-16T17:15:31.706707122Z I0216 17:15:31.706672 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-745bd8d89b" duration="108.993µs" 2026-02-16T17:15:31.739576893Z I0216 17:15:31.739494 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/package-server-manager-5c696dbdcd" duration="8.210943ms" 2026-02-16T17:15:31.739794049Z I0216 17:15:31.739762 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/package-server-manager-5c696dbdcd" duration="63.552µs" kube-controller-manager_previous.log0000640000000000000000000003171115144650270033771 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-02-16T17:13:54.389514708Z I0216 17:13:54.389503 1 flags.go:64] FLAG: --requestheader-allowed-names="[]" 2026-02-16T17:13:54.389514708Z I0216 17:13:54.389509 1 flags.go:64] FLAG: --requestheader-client-ca-file="" 2026-02-16T17:13:54.389524519Z I0216 17:13:54.389512 1 flags.go:64] FLAG: --requestheader-extra-headers-prefix="[x-remote-extra-]" 2026-02-16T17:13:54.389524519Z I0216 17:13:54.389518 1 flags.go:64] FLAG: --requestheader-group-headers="[x-remote-group]" 2026-02-16T17:13:54.389533399Z I0216 17:13:54.389523 1 flags.go:64] FLAG: --requestheader-username-headers="[x-remote-user]" 2026-02-16T17:13:54.389533399Z I0216 17:13:54.389528 1 flags.go:64] FLAG: --resource-quota-sync-period="5m0s" 2026-02-16T17:13:54.389542189Z I0216 17:13:54.389531 1 flags.go:64] FLAG: --root-ca-file="/etc/kubernetes/secrets/kube-apiserver-complete-server-ca-bundle.crt" 2026-02-16T17:13:54.389542189Z I0216 17:13:54.389535 1 flags.go:64] FLAG: --route-reconciliation-period="10s" 2026-02-16T17:13:54.389542189Z I0216 17:13:54.389538 1 flags.go:64] FLAG: --secondary-node-eviction-rate="0.01" 2026-02-16T17:13:54.389551719Z I0216 17:13:54.389542 1 flags.go:64] FLAG: --secure-port="10257" 2026-02-16T17:13:54.389551719Z I0216 17:13:54.389546 1 flags.go:64] FLAG: --service-account-private-key-file="/etc/kubernetes/secrets/service-account.key" 2026-02-16T17:13:54.389560510Z I0216 17:13:54.389550 1 flags.go:64] FLAG: --service-cluster-ip-range="172.30.0.0/16" 2026-02-16T17:13:54.389560510Z I0216 17:13:54.389553 1 flags.go:64] FLAG: --show-hidden-metrics-for-version="" 2026-02-16T17:13:54.389560510Z I0216 17:13:54.389556 1 flags.go:64] FLAG: --terminated-pod-gc-threshold="12500" 2026-02-16T17:13:54.389569860Z I0216 17:13:54.389560 1 flags.go:64] FLAG: --tls-cert-file="" 2026-02-16T17:13:54.389569860Z I0216 17:13:54.389564 1 flags.go:64] FLAG: --tls-cipher-suites="[]" 2026-02-16T17:13:54.389578630Z I0216 17:13:54.389568 1 flags.go:64] FLAG: --tls-min-version="" 2026-02-16T17:13:54.389578630Z I0216 17:13:54.389572 1 flags.go:64] FLAG: --tls-private-key-file="" 2026-02-16T17:13:54.389587380Z I0216 17:13:54.389575 1 flags.go:64] FLAG: --tls-sni-cert-key="[]" 2026-02-16T17:13:54.389587380Z I0216 17:13:54.389580 1 flags.go:64] FLAG: --unhealthy-zone-threshold="0.55" 2026-02-16T17:13:54.389587380Z I0216 17:13:54.389584 1 flags.go:64] FLAG: --unsupported-kube-api-over-localhost="false" 2026-02-16T17:13:54.389596801Z I0216 17:13:54.389589 1 flags.go:64] FLAG: --use-service-account-credentials="true" 2026-02-16T17:13:54.389596801Z I0216 17:13:54.389592 1 flags.go:64] FLAG: --v="2" 2026-02-16T17:13:54.389605611Z I0216 17:13:54.389597 1 flags.go:64] FLAG: --version="false" 2026-02-16T17:13:54.389605611Z I0216 17:13:54.389602 1 flags.go:64] FLAG: --vmodule="" 2026-02-16T17:13:54.389850557Z W0216 17:13:54.389821 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallAzure 2026-02-16T17:13:54.389850557Z W0216 17:13:54.389833 1 feature_gate.go:330] unrecognized feature gate: ClusterAPIInstallIBMCloud 2026-02-16T17:13:54.389850557Z W0216 17:13:54.389836 1 feature_gate.go:330] unrecognized feature gate: VSphereControlPlaneMachineSet 2026-02-16T17:13:54.389850557Z W0216 17:13:54.389839 1 feature_gate.go:330] unrecognized feature gate: InsightsRuntimeExtractor 2026-02-16T17:13:54.389850557Z W0216 17:13:54.389842 1 feature_gate.go:353] Setting GA feature gate ValidatingAdmissionPolicy=true. It will be removed in a future release. 2026-02-16T17:13:54.389850557Z W0216 17:13:54.389846 1 feature_gate.go:330] unrecognized feature gate: AWSClusterHostedDNS 2026-02-16T17:13:54.389868368Z W0216 17:13:54.389850 1 feature_gate.go:351] Setting deprecated feature gate KMSv1=true. It will be removed in a future release. 2026-02-16T17:13:54.389868368Z W0216 17:13:54.389854 1 feature_gate.go:330] unrecognized feature gate: VSphereStaticIPs 2026-02-16T17:13:54.389868368Z W0216 17:13:54.389857 1 feature_gate.go:330] unrecognized feature gate: RouteAdvertisements 2026-02-16T17:13:54.389868368Z W0216 17:13:54.389859 1 feature_gate.go:330] unrecognized feature gate: BuildCSIVolumes 2026-02-16T17:13:54.389868368Z W0216 17:13:54.389863 1 feature_gate.go:353] Setting GA feature gate CloudDualStackNodeIPs=true. It will be removed in a future release. 2026-02-16T17:13:54.389868368Z W0216 17:13:54.389866 1 feature_gate.go:330] unrecognized feature gate: MachineAPIMigration 2026-02-16T17:13:54.389879118Z W0216 17:13:54.389869 1 feature_gate.go:330] unrecognized feature gate: ClusterAPIInstall 2026-02-16T17:13:54.389879118Z W0216 17:13:54.389872 1 feature_gate.go:330] unrecognized feature gate: NewOLM 2026-02-16T17:13:54.389879118Z W0216 17:13:54.389874 1 feature_gate.go:330] unrecognized feature gate: ClusterMonitoringConfig 2026-02-16T17:13:54.389888638Z W0216 17:13:54.389877 1 feature_gate.go:330] unrecognized feature gate: SetEIPForNLBIngressController 2026-02-16T17:13:54.389888638Z W0216 17:13:54.389880 1 feature_gate.go:330] unrecognized feature gate: NodeDisruptionPolicy 2026-02-16T17:13:54.389888638Z W0216 17:13:54.389883 1 feature_gate.go:330] unrecognized feature gate: MachineAPIProviderOpenStack 2026-02-16T17:13:54.389888638Z W0216 17:13:54.389886 1 feature_gate.go:330] unrecognized feature gate: InsightsOnDemandDataGather 2026-02-16T17:13:54.389898569Z W0216 17:13:54.389889 1 feature_gate.go:330] unrecognized feature gate: ImageStreamImportMode 2026-02-16T17:13:54.389898569Z W0216 17:13:54.389891 1 feature_gate.go:330] unrecognized feature gate: MinimumKubeletVersion 2026-02-16T17:13:54.389898569Z W0216 17:13:54.389894 1 feature_gate.go:330] unrecognized feature gate: InsightsConfig 2026-02-16T17:13:54.389908049Z W0216 17:13:54.389897 1 feature_gate.go:330] unrecognized feature gate: ConsolePluginContentSecurityPolicy 2026-02-16T17:13:54.389908049Z W0216 17:13:54.389900 1 feature_gate.go:330] unrecognized feature gate: PlatformOperators 2026-02-16T17:13:54.389908049Z W0216 17:13:54.389903 1 feature_gate.go:330] unrecognized feature gate: AdminNetworkPolicy 2026-02-16T17:13:54.389917489Z W0216 17:13:54.389906 1 feature_gate.go:330] unrecognized feature gate: BareMetalLoadBalancer 2026-02-16T17:13:54.389917489Z W0216 17:13:54.389910 1 feature_gate.go:330] unrecognized feature gate: HardwareSpeed 2026-02-16T17:13:54.389917489Z W0216 17:13:54.389912 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallGCP 2026-02-16T17:13:54.389926919Z W0216 17:13:54.389916 1 feature_gate.go:353] Setting GA feature gate DisableKubeletCloudCredentialProviders=true. It will be removed in a future release. 2026-02-16T17:13:54.389926919Z W0216 17:13:54.389919 1 feature_gate.go:330] unrecognized feature gate: NetworkDiagnosticsConfig 2026-02-16T17:13:54.389926919Z W0216 17:13:54.389922 1 feature_gate.go:330] unrecognized feature gate: UpgradeStatus 2026-02-16T17:13:54.389940600Z W0216 17:13:54.389925 1 feature_gate.go:330] unrecognized feature gate: OnClusterBuild 2026-02-16T17:13:54.389940600Z W0216 17:13:54.389930 1 feature_gate.go:330] unrecognized feature gate: ManagedBootImagesAWS 2026-02-16T17:13:54.389940600Z W0216 17:13:54.389933 1 feature_gate.go:330] unrecognized feature gate: GCPClusterHostedDNS 2026-02-16T17:13:54.389940600Z W0216 17:13:54.389936 1 feature_gate.go:330] unrecognized feature gate: ManagedBootImages 2026-02-16T17:13:54.389940600Z W0216 17:13:54.389938 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallAWS 2026-02-16T17:13:54.389951200Z W0216 17:13:54.389941 1 feature_gate.go:330] unrecognized feature gate: IngressControllerLBSubnetsAWS 2026-02-16T17:13:54.389951200Z W0216 17:13:54.389944 1 feature_gate.go:330] unrecognized feature gate: GatewayAPI 2026-02-16T17:13:54.389951200Z W0216 17:13:54.389947 1 feature_gate.go:330] unrecognized feature gate: SigstoreImageVerification 2026-02-16T17:13:54.389977641Z W0216 17:13:54.389949 1 feature_gate.go:330] unrecognized feature gate: GCPLabelsTags 2026-02-16T17:13:54.389977641Z W0216 17:13:54.389952 1 feature_gate.go:330] unrecognized feature gate: MachineConfigNodes 2026-02-16T17:13:54.389977641Z W0216 17:13:54.389970 1 feature_gate.go:330] unrecognized feature gate: PrivateHostedZoneAWS 2026-02-16T17:13:54.389977641Z W0216 17:13:54.389973 1 feature_gate.go:330] unrecognized feature gate: PersistentIPsForVirtualization 2026-02-16T17:13:54.389991971Z W0216 17:13:54.389976 1 feature_gate.go:330] unrecognized feature gate: ExternalOIDC 2026-02-16T17:13:54.389991971Z W0216 17:13:54.389980 1 feature_gate.go:330] unrecognized feature gate: AWSEFSDriverVolumeMetrics 2026-02-16T17:13:54.389991971Z W0216 17:13:54.389982 1 feature_gate.go:330] unrecognized feature gate: AdditionalRoutingCapabilities 2026-02-16T17:13:54.389991971Z W0216 17:13:54.389986 1 feature_gate.go:330] unrecognized feature gate: VSphereMultiNetworks 2026-02-16T17:13:54.389991971Z W0216 17:13:54.389989 1 feature_gate.go:330] unrecognized feature gate: AlibabaPlatform 2026-02-16T17:13:54.390002272Z W0216 17:13:54.389991 1 feature_gate.go:330] unrecognized feature gate: BootcNodeManagement 2026-02-16T17:13:54.390002272Z W0216 17:13:54.389994 1 feature_gate.go:330] unrecognized feature gate: ExternalOIDCWithUIDAndExtraClaimMappings 2026-02-16T17:13:54.390002272Z W0216 17:13:54.389997 1 feature_gate.go:330] unrecognized feature gate: VSphereDriverConfiguration 2026-02-16T17:13:54.390002272Z W0216 17:13:54.389999 1 feature_gate.go:330] unrecognized feature gate: DNSNameResolver 2026-02-16T17:13:54.390012162Z W0216 17:13:54.390002 1 feature_gate.go:330] unrecognized feature gate: VSphereMultiVCenters 2026-02-16T17:13:54.390012162Z W0216 17:13:54.390005 1 feature_gate.go:330] unrecognized feature gate: MachineAPIOperatorDisableMachineHealthCheckController 2026-02-16T17:13:54.390012162Z W0216 17:13:54.390008 1 feature_gate.go:330] unrecognized feature gate: NetworkSegmentation 2026-02-16T17:13:54.390012162Z W0216 17:13:54.390010 1 feature_gate.go:330] unrecognized feature gate: Example 2026-02-16T17:13:54.390022032Z W0216 17:13:54.390013 1 feature_gate.go:330] unrecognized feature gate: IngressControllerDynamicConfigurationManager 2026-02-16T17:13:54.390022032Z W0216 17:13:54.390015 1 feature_gate.go:330] unrecognized feature gate: NetworkLiveMigration 2026-02-16T17:13:54.390022032Z W0216 17:13:54.390018 1 feature_gate.go:330] unrecognized feature gate: OpenShiftPodSecurityAdmission 2026-02-16T17:13:54.390035812Z W0216 17:13:54.390021 1 feature_gate.go:330] unrecognized feature gate: MixedCPUsAllocation 2026-02-16T17:13:54.390035812Z W0216 17:13:54.390023 1 feature_gate.go:330] unrecognized feature gate: AzureWorkloadIdentity 2026-02-16T17:13:54.390035812Z W0216 17:13:54.390026 1 feature_gate.go:330] unrecognized feature gate: AutomatedEtcdBackup 2026-02-16T17:13:54.390035812Z W0216 17:13:54.390029 1 feature_gate.go:330] unrecognized feature gate: SignatureStores 2026-02-16T17:13:54.390035812Z W0216 17:13:54.390032 1 feature_gate.go:330] unrecognized feature gate: NutanixMultiSubnets 2026-02-16T17:13:54.390046073Z W0216 17:13:54.390034 1 feature_gate.go:330] unrecognized feature gate: EtcdBackendQuota 2026-02-16T17:13:54.390046073Z W0216 17:13:54.390037 1 feature_gate.go:330] unrecognized feature gate: InsightsConfigAPI 2026-02-16T17:13:54.390046073Z W0216 17:13:54.390040 1 feature_gate.go:330] unrecognized feature gate: CSIDriverSharedResource 2026-02-16T17:13:54.390046073Z W0216 17:13:54.390043 1 feature_gate.go:330] unrecognized feature gate: MetricsCollectionProfiles 2026-02-16T17:13:54.390055943Z W0216 17:13:54.390046 1 feature_gate.go:330] unrecognized feature gate: VolumeGroupSnapshot 2026-02-16T17:13:54.390055943Z W0216 17:13:54.390048 1 feature_gate.go:330] unrecognized feature gate: ChunkSizeMiB 2026-02-16T17:13:54.390055943Z W0216 17:13:54.390051 1 feature_gate.go:330] unrecognized feature gate: OVNObservability 2026-02-16T17:13:54.390055943Z W0216 17:13:54.390054 1 feature_gate.go:330] unrecognized feature gate: PinnedImages 2026-02-16T17:13:54.720021001Z I0216 17:13:54.719930 1 serving.go:380] Generated self-signed cert (/var/run/kubernetes/kube-controller-manager.crt, /var/run/kubernetes/kube-controller-manager.key) 2026-02-16T17:13:54.721487521Z I0216 17:13:54.721433 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/kubernetes/kube-controller-manager.crt::/var/run/kubernetes/kube-controller-manager.key" 2026-02-16T17:14:04.951331324Z E0216 17:14:04.951116 1 run.go:72] "command failed" err="unable to load configmap based request-header-client-ca-file: Get \"https://localhost:6443/api/v1/namespaces/kube-system/configmaps/extension-apiserver-authentication\": net/http: TLS handshake timeout" config/pod/kube-system/bootstrap-kube-controller-manager-master-0.json0000640000000000000000000002735015144650270024625 0ustar0000000000000000{"metadata":{"name":"bootstrap-kube-controller-manager-master-0","namespace":"kube-system","uid":"67aa7027-5cfd-41e1-9f0a-cb3a00bd09ba","resourceVersion":"16429","creationTimestamp":"2026-02-16T16:59:40Z","labels":{"openshift.io/component":"controller-manager","openshift.io/control-plane":"true"},"annotations":{"kubernetes.io/config.hash":"80420f2e7c3cdda71f7d0d6ccbe6f9f3","kubernetes.io/config.mirror":"80420f2e7c3cdda71f7d0d6ccbe6f9f3","kubernetes.io/config.seen":"2026-02-16T16:58:16.617803795Z","kubernetes.io/config.source":"file","openshift.io/run-level":"0","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"da39ce92-6a7c-4cce-aa8b-3e495e33f616","controller":true}]},"spec":{"volumes":[{"name":"secrets","hostPath":{"path":"/etc/kubernetes/bootstrap-secrets","type":""}},{"name":"etc-kubernetes-cloud","hostPath":{"path":"/etc/kubernetes/cloud","type":""}},{"name":"config","hostPath":{"path":"/etc/kubernetes/bootstrap-configs","type":""}},{"name":"ssl-certs-host","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"logs","hostPath":{"path":"/var/log/bootstrap-control-plane","type":""}}],"containers":[{"name":"kube-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","command":["hyperkube","kube-controller-manager"],"args":["--openshift-config=/etc/kubernetes/config/kube-controller-manager-config.yaml","--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--v=2","--allocate-node-cidrs=false","--authentication-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--cert-dir=/var/run/kubernetes","--cloud-provider=external","--cluster-cidr=10.128.0.0/16","--cluster-signing-cert-file=/etc/kubernetes/secrets/kubelet-signer.crt","--cluster-signing-duration=720h","--cluster-signing-key-file=/etc/kubernetes/secrets/kubelet-signer.key","--controllers=*","--controllers=-bootstrapsigner","--controllers=-tokencleaner","--controllers=-ttl","--enable-dynamic-provisioning=true","--feature-gates=AWSClusterHostedDNS=false","--feature-gates=AWSEFSDriverVolumeMetrics=true","--feature-gates=AdditionalRoutingCapabilities=false","--feature-gates=AdminNetworkPolicy=true","--feature-gates=AlibabaPlatform=true","--feature-gates=AutomatedEtcdBackup=false","--feature-gates=AzureWorkloadIdentity=true","--feature-gates=BareMetalLoadBalancer=true","--feature-gates=BootcNodeManagement=false","--feature-gates=BuildCSIVolumes=true","--feature-gates=CSIDriverSharedResource=false","--feature-gates=ChunkSizeMiB=true","--feature-gates=CloudDualStackNodeIPs=true","--feature-gates=ClusterAPIInstall=false","--feature-gates=ClusterAPIInstallIBMCloud=false","--feature-gates=ClusterMonitoringConfig=false","--feature-gates=ConsolePluginContentSecurityPolicy=false","--feature-gates=DNSNameResolver=false","--feature-gates=DisableKubeletCloudCredentialProviders=true","--feature-gates=DynamicResourceAllocation=false","--feature-gates=EtcdBackendQuota=false","--feature-gates=EventedPLEG=false","--feature-gates=Example=false","--feature-gates=ExternalOIDC=false","--feature-gates=ExternalOIDCWithUIDAndExtraClaimMappings=false","--feature-gates=GCPClusterHostedDNS=false","--feature-gates=GCPLabelsTags=true","--feature-gates=GatewayAPI=false","--feature-gates=HardwareSpeed=true","--feature-gates=ImageStreamImportMode=false","--feature-gates=IngressControllerDynamicConfigurationManager=false","--feature-gates=IngressControllerLBSubnetsAWS=true","--feature-gates=InsightsConfig=false","--feature-gates=InsightsConfigAPI=false","--feature-gates=InsightsOnDemandDataGather=false","--feature-gates=InsightsRuntimeExtractor=false","--feature-gates=KMSv1=true","--feature-gates=MachineAPIMigration=false","--feature-gates=MachineAPIOperatorDisableMachineHealthCheckController=false","--feature-gates=MachineAPIProviderOpenStack=false","--feature-gates=MachineConfigNodes=false","--feature-gates=ManagedBootImages=true","--feature-gates=ManagedBootImagesAWS=true","--feature-gates=MaxUnavailableStatefulSet=false","--feature-gates=MetricsCollectionProfiles=false","--feature-gates=MinimumKubeletVersion=false","--feature-gates=MixedCPUsAllocation=false","--feature-gates=MultiArchInstallAWS=true","--feature-gates=MultiArchInstallAzure=false","--feature-gates=MultiArchInstallGCP=true","--feature-gates=NetworkDiagnosticsConfig=true","--feature-gates=NetworkLiveMigration=true","--feature-gates=NetworkSegmentation=true","--feature-gates=NewOLM=true","--feature-gates=NodeDisruptionPolicy=true","--feature-gates=NodeSwap=false","--feature-gates=NutanixMultiSubnets=false","--feature-gates=OVNObservability=false","--feature-gates=OnClusterBuild=true","--feature-gates=OpenShiftPodSecurityAdmission=false","--feature-gates=PersistentIPsForVirtualization=true","--feature-gates=PinnedImages=false","--feature-gates=PlatformOperators=false","--feature-gates=PrivateHostedZoneAWS=true","--feature-gates=ProcMountType=false","--feature-gates=RouteAdvertisements=false","--feature-gates=RouteExternalCertificate=false","--feature-gates=ServiceAccountTokenNodeBinding=false","--feature-gates=SetEIPForNLBIngressController=true","--feature-gates=SignatureStores=false","--feature-gates=SigstoreImageVerification=false","--feature-gates=StreamingCollectionEncodingToJSON=true","--feature-gates=StreamingCollectionEncodingToProtobuf=true","--feature-gates=TranslateStreamCloseWebsocketRequests=false","--feature-gates=UpgradeStatus=false","--feature-gates=UserNamespacesPodSecurityStandards=false","--feature-gates=UserNamespacesSupport=false","--feature-gates=VSphereControlPlaneMachineSet=true","--feature-gates=VSphereDriverConfiguration=true","--feature-gates=VSphereMultiNetworks=false","--feature-gates=VSphereMultiVCenters=true","--feature-gates=VSphereStaticIPs=true","--feature-gates=ValidatingAdmissionPolicy=true","--feature-gates=VolumeAttributesClass=false","--feature-gates=VolumeGroupSnapshot=false","--flex-volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec","--kube-api-burst=300","--kube-api-qps=150","--leader-elect-renew-deadline=12s","--leader-elect-resource-lock=leases","--leader-elect-retry-period=3s","--leader-elect=true","--pv-recycler-pod-template-filepath-hostpath=","--pv-recycler-pod-template-filepath-nfs=","--root-ca-file=/etc/kubernetes/secrets/kube-apiserver-complete-server-ca-bundle.crt","--secure-port=10257","--service-account-private-key-file=/etc/kubernetes/secrets/service-account.key","--service-cluster-ip-range=172.30.0.0/16","--use-service-account-credentials=true"],"ports":[{"hostPort":10257,"containerPort":10257,"protocol":"TCP"}],"resources":{"requests":{"cpu":"60m","memory":"200Mi"}},"volumeMounts":[{"name":"ssl-certs-host","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"etc-kubernetes-cloud","readOnly":true,"mountPath":"/etc/kubernetes/cloud"},{"name":"config","readOnly":true,"mountPath":"/etc/kubernetes/config"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"timeoutSeconds":3,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"},{"name":"cluster-policy-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5d54bd262ca625a326b01ea2bfd33db10a402c05590e6b710b0959712e1bf30b","command":["cluster-policy-controller","start"],"args":["--config=/etc/kubernetes/config/cluster-policy-controller-config.yaml","--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--namespace=$(POD_NAMESPACE)","--v=2"],"ports":[{"hostPort":10357,"containerPort":10357,"protocol":"TCP"}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"200Mi"}},"volumeMounts":[{"name":"ssl-certs-host","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"etc-kubernetes-cloud","readOnly":true,"mountPath":"/etc/kubernetes/cloud"},{"name":"config","readOnly":true,"mountPath":"/etc/kubernetes/config"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"timeoutSeconds":3,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priority":0,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:18Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:18Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:29Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:29Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:18Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-16T17:14:18Z","containerStatuses":[{"name":"cluster-policy-controller","state":{"running":{"startedAt":"2026-02-16T17:13:52Z"}},"lastState":{},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5d54bd262ca625a326b01ea2bfd33db10a402c05590e6b710b0959712e1bf30b","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5d54bd262ca625a326b01ea2bfd33db10a402c05590e6b710b0959712e1bf30b","containerID":"cri-o://aab010443e5953fae2765f398f189cc7072cddd5f5db6fb4755e40a70cbb95c4","started":true},{"name":"kube-controller-manager","state":{"running":{"startedAt":"2026-02-16T17:14:15Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","startedAt":"2026-02-16T17:13:54Z","finishedAt":"2026-02-16T17:14:04Z","containerID":"cri-o://d54435268699b5dc02b3724fd4ebc95d522940a0665dadaaf5801a043f6d163e"}},"ready":true,"restartCount":7,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","containerID":"cri-o://62478ab5c23f3ea9a0e6eac2c1335867a9ed27280579a87a6023cc6f8b882123","started":true}],"qosClass":"Burstable"}}kube-controller-manager-operator_current.log0000640000000000000000000001020415144650270044367 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-78ff47c7c5-txr5k2026-02-16T17:14:58.428096779Z I0216 17:14:58.427948 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-16T17:14:58.428096779Z I0216 17:14:58.428071 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-16T17:14:58.439163879Z I0216 17:14:58.439029 1 observer_polling.go:159] Starting file observer 2026-02-16T17:14:58.692689831Z I0216 17:14:58.692637 1 builder.go:304] kube-controller-manager-operator version 4.18.0-202601161039.p2.g9a9a437.assembly.stream.el9-9a9a437-9a9a437f2342dc9bba7844298b955d5f9bbc76bb 2026-02-16T17:14:59.128693831Z I0216 17:14:59.128630 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-16T17:14:59.128693831Z W0216 17:14:59.128652 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-16T17:14:59.128693831Z W0216 17:14:59.128656 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-16T17:14:59.128693831Z W0216 17:14:59.128660 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-16T17:14:59.128693831Z W0216 17:14:59.128663 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-16T17:14:59.128693831Z W0216 17:14:59.128665 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-16T17:14:59.128693831Z W0216 17:14:59.128668 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-16T17:14:59.147465788Z I0216 17:14:59.146621 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-16T17:14:59.147465788Z I0216 17:14:59.146862 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-16T17:14:59.147465788Z I0216 17:14:59.146917 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-16T17:14:59.147465788Z I0216 17:14:59.146938 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-16T17:14:59.147465788Z I0216 17:14:59.146952 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-controller-manager-operator/kube-controller-manager-operator-lock... 2026-02-16T17:14:59.149858421Z I0216 17:14:59.146967 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-16T17:14:59.149858421Z I0216 17:14:59.147242 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-16T17:14:59.149858421Z I0216 17:14:59.148166 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-16T17:14:59.149858421Z I0216 17:14:59.148216 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T17:14:59.149858421Z I0216 17:14:59.147406 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-16T17:14:59.149858421Z I0216 17:14:59.148617 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T17:14:59.247721379Z I0216 17:14:59.247617 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-16T17:14:59.248341818Z I0216 17:14:59.248298 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T17:14:59.249103831Z I0216 17:14:59.249044 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file kube-controller-manager-operator-78ff47c7c5-txr5k.json0000640000000000000000000001417115144650270033510 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator{"metadata":{"name":"kube-controller-manager-operator-78ff47c7c5-txr5k","generateName":"kube-controller-manager-operator-78ff47c7c5-","namespace":"openshift-kube-controller-manager-operator","uid":"442600dc-09b2-4fee-9f89-777296b2ee40","resourceVersion":"17384","creationTimestamp":"2026-02-16T16:58:52Z","labels":{"app":"kube-controller-manager-operator","pod-template-hash":"78ff47c7c5"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.22/23\"],\"mac_address\":\"0a:58:0a:80:00:16\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.22/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.22\"\n ],\n \"mac\": \"0a:58:0a:80:00:16\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-controller-manager-operator-78ff47c7c5","uid":"6960d573-0bb7-4821-9218-8aece9786f83","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","command":["cluster-kube-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39"},{"name":"CLUSTER_POLICY_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5d54bd262ca625a326b01ea2bfd33db10a402c05590e6b710b0959712e1bf30b"},{"name":"TOOLS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ffa02bd6af0b44d4955aba57f727e13671f503393926be6d8965e31dcfcd6e3c"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-controller-manager-operator","serviceAccount":"kube-controller-manager-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:58Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T16:59:56Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:58Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:58Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T16:59:56Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.22","podIPs":[{"ip":"10.128.0.22"}],"startTime":"2026-02-16T16:59:56Z","containerStatuses":[{"name":"kube-controller-manager-operator","state":{"running":{"startedAt":"2026-02-16T17:14:57Z"}},"lastState":{},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","containerID":"cri-o://eaa418d7f6a36f58cde0a1f71f41979582dd4e652c978199a1440c9abf983aef","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-controller-manager/logs/installer-2-master-0/installer_current.log0000640000000000000000000000015615144650270031001 0ustar0000000000000000unable to retrieve container logs for cri-o://2c53a58c131794a80fa1c0999460553c2cc95a04f4d47697c0e7fb42de126acfconfig/pod/openshift-kube-controller-manager/installer-2-master-0.json0000640000000000000000000001706315144650270024473 0ustar0000000000000000{"metadata":{"name":"installer-2-master-0","namespace":"openshift-kube-controller-manager","uid":"5d39ed24-4301-4cea-8a42-a08f4ba8b479","resourceVersion":"15064","creationTimestamp":"2026-02-16T17:01:32Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.62/23\"],\"mac_address\":\"0a:58:0a:80:00:3e\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.62/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.62\"\n ],\n \"mac\": \"0a:58:0a:80:00:3e\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-2","uid":"979391f6-5a5f-4ab8-aac8-85d39fba0581"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","command":["cluster-kube-controller-manager-operator","installer"],"args":["-v=2","--revision=2","--namespace=openshift-kube-controller-manager","--pod=kube-controller-manager-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-controller-manager-pod","--configmaps=config","--configmaps=cluster-policy-controller-config","--configmaps=controller-manager-kubeconfig","--optional-configmaps=cloud-config","--configmaps=kube-controller-cert-syncer-kubeconfig","--configmaps=serviceaccount-ca","--configmaps=service-ca","--configmaps=recycler-config","--secrets=service-account-private-key","--optional-secrets=serving-cert","--secrets=localhost-recovery-client-token","--cert-dir=/etc/kubernetes/static-pod-resources/kube-controller-manager-certs","--cert-configmaps=aggregator-client-ca","--cert-configmaps=client-ca","--optional-cert-configmaps=trusted-ca-bundle","--cert-secrets=kube-controller-manager-client-cert-key","--cert-secrets=csr-signer"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"imagePullSecrets":[{"name":"installer-sa-dockercfg-qlqr4"}],"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:02:39Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:01:33Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:02:37Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:02:37Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:01:33Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-16T17:01:33Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"taller revisions to settle for node master-0\nI0216 17:01:35.234528 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0216 17:01:35.234558 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0216 17:01:35.248736 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\nI0216 17:01:45.254520 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\nI0216 17:01:55.820613 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\nW0216 17:02:05.252061 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": dial tcp 172.30.0.1:443: connect: connection refused\nW0216 17:02:15.250548 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": dial tcp 172.30.0.1:443: connect: connection refused\nW0216 17:02:25.251080 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": dial tcp 172.30.0.1:443: connect: connection refused\nW0216 17:02:35.250231 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": dial tcp 172.30.0.1:443: connect: connection refused\nW0216 17:02:35.250822 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": dial tcp 172.30.0.1:443: connect: connection refused\nF0216 17:02:35.250856 1 cmd.go:109] timed out waiting for the condition\n","startedAt":"2026-02-16T17:01:34Z","finishedAt":"2026-02-16T17:02:35Z","containerID":"cri-o://2c53a58c131794a80fa1c0999460553c2cc95a04f4d47697c0e7fb42de126acf"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","containerID":"cri-o://2c53a58c131794a80fa1c0999460553c2cc95a04f4d47697c0e7fb42de126acf","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}config/pod/openshift-image-registry/node-ca-xv2wv.json0000640000000000000000000000653215144650270021521 0ustar0000000000000000{"metadata":{"name":"node-ca-xv2wv","generateName":"node-ca-","namespace":"openshift-image-registry","uid":"810a2275-fae5-45df-a3b8-92860451d33b","resourceVersion":"14271","creationTimestamp":"2026-02-16T17:08:26Z","labels":{"controller-revision-hash":"59598b9cbd","name":"node-ca","pod-template-generation":"1"},"annotations":{"openshift.io/required-scc":"privileged","openshift.io/scc":"privileged"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"DaemonSet","name":"node-ca","uid":"23692882-f912-4e9b-b00a-513060d28d0e","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"host","hostPath":{"path":"/etc/docker/certs.d","type":""}},{"name":"serviceca","configMap":{"name":"image-registry-certificates","defaultMode":420}},{"name":"kube-api-access-ktgm7","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"node-ca","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fc2817e5b16d83dac91d1a274fb93521165953e9bdc28f3073b127eacc5a534e","command":["/bin/sh","-c","trap 'jobs -p | xargs -r kill; echo shutting down node-ca; exit 0' TERM\nwhile [ true ];\ndo\n for f in $(ls /tmp/serviceca); do\n echo $f\n ca_file_path=\"/tmp/serviceca/${f}\"\n f=$(echo $f | sed -r 's/(.*)\\.\\./\\1:/')\n reg_dir_path=\"/etc/docker/certs.d/${f}\"\n if [ -e \"${reg_dir_path}\" ]; then\n cp -u $ca_file_path $reg_dir_path/ca.crt\n else\n mkdir $reg_dir_path\n cp $ca_file_path $reg_dir_path/ca.crt\n fi\n done\n for d in $(ls /etc/docker/certs.d); do\n echo $d\n dp=$(echo $d | sed -r 's/(.*):/\\1\\.\\./')\n reg_conf_path=\"/tmp/serviceca/${dp}\"\n if [ ! -e \"${reg_conf_path}\" ]; then\n rm -rf /etc/docker/certs.d/$d\n fi\n done\n sleep 60 \u0026 wait ${!}\ndone\n"],"resources":{"requests":{"cpu":"10m","memory":"10Mi"}},"volumeMounts":[{"name":"serviceca","mountPath":"/tmp/serviceca"},{"name":"host","mountPath":"/etc/docker/certs.d"},{"name":"kube-api-access-ktgm7","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":1001,"runAsGroup":0,"runAsNonRoot":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux"},"serviceAccountName":"node-ca","serviceAccount":"node-ca","hostNetwork":true,"securityContext":{},"imagePullSecrets":[{"name":"node-ca-dockercfg-gvwqd"}],"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchFields":[{"key":"metadata.name","operator":"In","values":["master-0"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Pending","qosClass":"Burstable"}}cluster-image-registry-operator_current.log0000640000000000000000000000153215144650270040467 0ustar0000000000000000config/pod/openshift-image-registry/logs/cluster-image-registry-operator-96c8c64b8-zwwnk2026-02-16T17:14:36.006930217Z Overwriting root TLS certificate authority trust store 2026-02-16T17:14:36.850068271Z I0216 17:14:36.848830 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-16T17:14:36.855520489Z I0216 17:14:36.855459 1 observer_polling.go:159] Starting file observer 2026-02-16T17:14:36.934433584Z I0216 17:14:36.934373 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-16T17:14:36.936307195Z I0216 17:14:36.936270 1 leaderelection.go:254] attempting to acquire leader lease openshift-image-registry/openshift-master-controllers... config/pod/openshift-image-registry/cluster-image-registry-operator-96c8c64b8-zwwnk.json0000640000000000000000000001550515144650270027775 0ustar0000000000000000{"metadata":{"name":"cluster-image-registry-operator-96c8c64b8-zwwnk","generateName":"cluster-image-registry-operator-96c8c64b8-","namespace":"openshift-image-registry","uid":"5dfc09be-2f60-4420-8d3a-6b00b1d3e6fd","resourceVersion":"16360","creationTimestamp":"2026-02-16T16:58:50Z","labels":{"name":"cluster-image-registry-operator","pod-template-hash":"96c8c64b8"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.10/23\"],\"mac_address\":\"0a:58:0a:80:00:0a\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.10/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.10\"\n ],\n \"mac\": \"0a:58:0a:80:00:0a\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-image-registry-operator-96c8c64b8","uid":"3506fa5b-7484-4b05-984a-e67001726ff6","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"image-registry-operator-tls","secret":{"secretName":"image-registry-operator-tls","defaultMode":420}},{"name":"trusted-ca","configMap":{"name":"trusted-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420,"optional":true}},{"name":"bound-sa-token","projected":{"sources":[{"serviceAccountToken":{"audience":"openshift","expirationSeconds":3600,"path":"token"}}],"defaultMode":420}},{"name":"kube-api-access-b5mwd","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-image-registry-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc03f91dbf08df9907c0ebad30c54a7fa92285b19ec4e440ed762b197378a861","args":["--files=/var/run/configmaps/trusted-ca/tls-ca-bundle.pem","--files=/etc/secrets/tls.crt","--files=/etc/secrets/tls.key"],"ports":[{"name":"metrics","containerPort":60000,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.32"},{"name":"WATCH_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"OPERATOR_NAME","value":"cluster-image-registry-operator"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc03f91dbf08df9907c0ebad30c54a7fa92285b19ec4e440ed762b197378a861"},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fc2817e5b16d83dac91d1a274fb93521165953e9bdc28f3073b127eacc5a534e"},{"name":"IMAGE_PRUNER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e155421620a4ac28a759265f53059b75308fdd1491caeba6a9a34d2fbeab4954"},{"name":"AZURE_ENVIRONMENT_FILEPATH","value":"/tmp/azurestackcloud.json"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"trusted-ca","mountPath":"/var/run/configmaps/trusted-ca/"},{"name":"image-registry-operator-tls","mountPath":"/etc/secrets"},{"name":"bound-sa-token","readOnly":true,"mountPath":"/var/run/secrets/openshift/serviceaccount"},{"name":"kube-api-access-b5mwd","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000340000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-image-registry-operator","serviceAccount":"cluster-image-registry-operator","nodeName":"master-0","shareProcessNamespace":false,"securityContext":{"seLinuxOptions":{"level":"s0:c18,c17"},"fsGroup":1000340000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:36Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T16:59:56Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:36Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:36Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T16:59:56Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.10","podIPs":[{"ip":"10.128.0.10"}],"startTime":"2026-02-16T16:59:56Z","containerStatuses":[{"name":"cluster-image-registry-operator","state":{"running":{"startedAt":"2026-02-16T17:14:35Z"}},"lastState":{},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc03f91dbf08df9907c0ebad30c54a7fa92285b19ec4e440ed762b197378a861","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc03f91dbf08df9907c0ebad30c54a7fa92285b19ec4e440ed762b197378a861","containerID":"cri-o://e663fa585fa9b333671e87d8b98645a4ea3e7b1b7a725b36b379c4e86f1caadd","started":true,"volumeMounts":[{"name":"trusted-ca","mountPath":"/var/run/configmaps/trusted-ca/"},{"name":"image-registry-operator-tls","mountPath":"/etc/secrets"},{"name":"bound-sa-token","mountPath":"/var/run/secrets/openshift/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-b5mwd","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-dns/node-resolver-vfxj4.json0000640000000000000000000001515315144650270020577 0ustar0000000000000000{"metadata":{"name":"node-resolver-vfxj4","generateName":"node-resolver-","namespace":"openshift-dns","uid":"a6fe41b0-1a42-4f07-8220-d9aaa50788ad","resourceVersion":"16449","creationTimestamp":"2026-02-16T17:00:47Z","labels":{"controller-revision-hash":"759d7d8788","dns.operator.openshift.io/daemonset-node-resolver":"","pod-template-generation":"1"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"DaemonSet","name":"node-resolver","uid":"d5a95fcc-2107-45b6-8a00-2a496b186a40","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"hosts-file","hostPath":{"path":"/etc/hosts","type":"File"}},{"name":"kube-api-access-8m29g","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"dns-node-resolver","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e155421620a4ac28a759265f53059b75308fdd1491caeba6a9a34d2fbeab4954","command":["/bin/bash","-c","#!/bin/bash\nset -uo pipefail\n\ntrap 'jobs -p | xargs kill || true; wait; exit 0' TERM\n\nOPENSHIFT_MARKER=\"openshift-generated-node-resolver\"\nHOSTS_FILE=\"/etc/hosts\"\nTEMP_FILE=\"/etc/hosts.tmp\"\n\nIFS=', ' read -r -a services \u003c\u003c\u003c \"${SERVICES}\"\n\n# Make a temporary file with the old hosts file's attributes.\nif ! cp -f --attributes-only \"${HOSTS_FILE}\" \"${TEMP_FILE}\"; then\n echo \"Failed to preserve hosts file. Exiting.\"\n exit 1\nfi\n\nwhile true; do\n declare -A svc_ips\n for svc in \"${services[@]}\"; do\n # Fetch service IP from cluster dns if present. We make several tries\n # to do it: IPv4, IPv6, IPv4 over TCP and IPv6 over TCP. The two last ones\n # are for deployments with Kuryr on older OpenStack (OSP13) - those do not\n # support UDP loadbalancers and require reaching DNS through TCP.\n cmds=('dig -t A @\"${NAMESERVER}\" +short \"${svc}.${CLUSTER_DOMAIN}\"|grep -v \"^;\"'\n 'dig -t AAAA @\"${NAMESERVER}\" +short \"${svc}.${CLUSTER_DOMAIN}\"|grep -v \"^;\"'\n 'dig -t A +tcp +retry=0 @\"${NAMESERVER}\" +short \"${svc}.${CLUSTER_DOMAIN}\"|grep -v \"^;\"'\n 'dig -t AAAA +tcp +retry=0 @\"${NAMESERVER}\" +short \"${svc}.${CLUSTER_DOMAIN}\"|grep -v \"^;\"')\n for i in ${!cmds[*]}\n do\n ips=($(eval \"${cmds[i]}\"))\n if [[ \"$?\" -eq 0 \u0026\u0026 \"${#ips[@]}\" -ne 0 ]]; then\n svc_ips[\"${svc}\"]=\"${ips[@]}\"\n break\n fi\n done\n done\n\n # Update /etc/hosts only if we get valid service IPs\n # We will not update /etc/hosts when there is coredns service outage or api unavailability\n # Stale entries could exist in /etc/hosts if the service is deleted\n if [[ -n \"${svc_ips[*]-}\" ]]; then\n # Build a new hosts file from /etc/hosts with our custom entries filtered out\n if ! sed --silent \"/# ${OPENSHIFT_MARKER}/d; w ${TEMP_FILE}\" \"${HOSTS_FILE}\"; then\n # Only continue rebuilding the hosts entries if its original content is preserved\n sleep 60 \u0026 wait\n continue\n fi\n\n # Append resolver entries for services\n rc=0\n for svc in \"${!svc_ips[@]}\"; do\n for ip in ${svc_ips[${svc}]}; do\n echo \"${ip} ${svc} ${svc}.${CLUSTER_DOMAIN} # ${OPENSHIFT_MARKER}\" \u003e\u003e \"${TEMP_FILE}\" || rc=$?\n done\n done\n if [[ $rc -ne 0 ]]; then\n sleep 60 \u0026 wait\n continue\n fi\n\n\n # TODO: Update /etc/hosts atomically to avoid any inconsistent behavior\n # Replace /etc/hosts with our modified version if needed\n cmp \"${TEMP_FILE}\" \"${HOSTS_FILE}\" || cp -f \"${TEMP_FILE}\" \"${HOSTS_FILE}\"\n # TEMP_FILE is not removed to avoid file create/delete and attributes copy churn\n fi\n sleep 60 \u0026 wait\n unset svc_ips\ndone\n"],"env":[{"name":"SERVICES","value":"image-registry.openshift-image-registry.svc"},{"name":"NAMESERVER","value":"172.30.0.10"},{"name":"CLUSTER_DOMAIN","value":"cluster.local"}],"resources":{"requests":{"cpu":"5m","memory":"21Mi"}},"volumeMounts":[{"name":"hosts-file","mountPath":"/etc/hosts"},{"name":"kube-api-access-8m29g","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux"},"serviceAccountName":"node-resolver","serviceAccount":"node-resolver","nodeName":"master-0","hostNetwork":true,"securityContext":{},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchFields":[{"key":"metadata.name","operator":"In","values":["master-0"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:00:48Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:00:47Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:21Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:21Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:00:47Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-16T17:00:47Z","containerStatuses":[{"name":"dns-node-resolver","state":{"running":{"startedAt":"2026-02-16T17:14:21Z"}},"lastState":{},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e155421620a4ac28a759265f53059b75308fdd1491caeba6a9a34d2fbeab4954","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e155421620a4ac28a759265f53059b75308fdd1491caeba6a9a34d2fbeab4954","containerID":"cri-o://9bb121c20d32f58b029c9f769238c1b163f3d4ad3991ada34d435c50d5d6208a","started":true,"volumeMounts":[{"name":"hosts-file","mountPath":"/etc/hosts"},{"name":"kube-api-access-8m29g","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-dns/logs/dns-default-qcgxx/kube-rbac-proxy_current.log0000640000000000000000000000156615144650270025645 0ustar00000000000000002026-02-16T17:14:58.672155580Z W0216 17:14:58.672010 1 deprecated.go:66] 2026-02-16T17:14:58.672155580Z ==== Removed Flag Warning ====================== 2026-02-16T17:14:58.672155580Z 2026-02-16T17:14:58.672155580Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-02-16T17:14:58.672155580Z 2026-02-16T17:14:58.672155580Z =============================================== 2026-02-16T17:14:58.672155580Z 2026-02-16T17:14:58.672563702Z I0216 17:14:58.672534 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-02-16T17:14:58.673634685Z I0216 17:14:58.673602 1 kube-rbac-proxy.go:347] Reading certificate files 2026-02-16T17:14:58.673922084Z I0216 17:14:58.673877 1 kube-rbac-proxy.go:395] Starting TCP socket on :9154 2026-02-16T17:14:58.674557193Z I0216 17:14:58.674243 1 kube-rbac-proxy.go:402] Listening securely on :9154 config/pod/openshift-dns/logs/dns-default-qcgxx/dns_current.log0000640000000000000000000000070215144650270023406 0ustar00000000000000002026-02-16T17:14:57.978519772Z .:5353 2026-02-16T17:14:57.978519772Z hostname.bind.:5353 2026-02-16T17:14:57.978623055Z [INFO] plugin/reload: Running configuration SHA512 = c40f1fac74a6633c6b1943fe251ad80adf3d5bd9b35c9e7d9b72bc260c5e2455f03e403e3b79d32f0936ff27e81ff6d07c68a95724b1c2c23510644372976718 2026-02-16T17:14:57.978623055Z CoreDNS-1.11.3 2026-02-16T17:14:57.978623055Z linux/amd64, go1.22.12 (Red Hat 1.22.12-3.el9_5) X:strictfipsruntime, config/pod/openshift-dns/dns-default-qcgxx.json0000640000000000000000000001650415144650270020313 0ustar0000000000000000{"metadata":{"name":"dns-default-qcgxx","generateName":"dns-default-","namespace":"openshift-dns","uid":"2d96ccdc-0b09-437d-bfca-1958af5d9953","resourceVersion":"17608","creationTimestamp":"2026-02-16T17:00:47Z","labels":{"controller-revision-hash":"549968cb59","dns.operator.openshift.io/daemonset-dns":"default","pod-template-generation":"1"},"annotations":{"cluster-autoscaler.kubernetes.io/enable-ds-eviction":"true","k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.32/23\"],\"mac_address\":\"0a:58:0a:80:00:20\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.32/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.32\"\n ],\n \"mac\": \"0a:58:0a:80:00:20\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"DaemonSet","name":"dns-default","uid":"5743d163-cf0b-4595-a823-5abd7e63b58b","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config-volume","configMap":{"name":"dns-default","items":[{"key":"Corefile","path":"Corefile"}],"defaultMode":420}},{"name":"metrics-tls","secret":{"secretName":"dns-default-metrics-tls","defaultMode":420}},{"name":"kube-api-access-zl5w2","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"dns","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8ea13b0cbfe9be0d3d7ea80d50e512af6a453921a553c7c79b566530142b611b","command":["coredns"],"args":["-conf","/etc/coredns/Corefile"],"ports":[{"name":"dns","containerPort":5353,"protocol":"UDP"},{"name":"dns-tcp","containerPort":5353,"protocol":"TCP"}],"resources":{"requests":{"cpu":"50m","memory":"70Mi"}},"volumeMounts":[{"name":"config-volume","readOnly":true,"mountPath":"/etc/coredns"},{"name":"kube-api-access-zl5w2","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/health","port":8080,"scheme":"HTTP"},"initialDelaySeconds":60,"timeoutSeconds":5,"periodSeconds":10,"successThreshold":1,"failureThreshold":5},"readinessProbe":{"httpGet":{"path":"/ready","port":8181,"scheme":"HTTP"},"initialDelaySeconds":10,"timeoutSeconds":3,"periodSeconds":3,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","args":["--logtostderr","--secure-listen-address=:9154","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256","--upstream=http://127.0.0.1:9153/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key"],"ports":[{"name":"metrics","containerPort":9154,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"40Mi"}},"volumeMounts":[{"name":"metrics-tls","readOnly":true,"mountPath":"/etc/tls/private"},{"name":"kube-api-access-zl5w2","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"Default","nodeSelector":{"kubernetes.io/os":"linux"},"serviceAccountName":"dns","serviceAccount":"dns","nodeName":"master-0","securityContext":{},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchFields":[{"key":"metadata.name","operator":"In","values":["master-0"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/disk-pressure","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/pid-pressure","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unschedulable","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:58Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:00:47Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:15:09Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:15:09Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:00:47Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.32","podIPs":[{"ip":"10.128.0.32"}],"startTime":"2026-02-16T17:00:47Z","containerStatuses":[{"name":"dns","state":{"running":{"startedAt":"2026-02-16T17:14:57Z"}},"lastState":{},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8ea13b0cbfe9be0d3d7ea80d50e512af6a453921a553c7c79b566530142b611b","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8ea13b0cbfe9be0d3d7ea80d50e512af6a453921a553c7c79b566530142b611b","containerID":"cri-o://c0518932ae18e90d52ddc6e706ebc2050e4927706bf959c7d317686ddf39a8c4","started":true,"volumeMounts":[{"name":"config-volume","mountPath":"/etc/coredns","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-zl5w2","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-16T17:14:58Z"}},"lastState":{},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://dbf513153b490360d777be6ca05f18ad905f65e50e441d5e6e8adfc27b930dc9","started":true,"volumeMounts":[{"name":"metrics-tls","mountPath":"/etc/tls/private","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-zl5w2","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-dns-operator/logs/dns-operator-86b8869b79-nhxlp/kube-rbac-proxy_current.log0000640000000000000000000000156615144650270031162 0ustar00000000000000002026-02-16T17:14:58.699909683Z W0216 17:14:58.696048 1 deprecated.go:66] 2026-02-16T17:14:58.699909683Z ==== Removed Flag Warning ====================== 2026-02-16T17:14:58.699909683Z 2026-02-16T17:14:58.699909683Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-02-16T17:14:58.699909683Z 2026-02-16T17:14:58.699909683Z =============================================== 2026-02-16T17:14:58.699909683Z 2026-02-16T17:14:58.699909683Z I0216 17:14:58.696571 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-02-16T17:14:58.699909683Z I0216 17:14:58.697585 1 kube-rbac-proxy.go:347] Reading certificate files 2026-02-16T17:14:58.699909683Z I0216 17:14:58.698636 1 kube-rbac-proxy.go:395] Starting TCP socket on :9393 2026-02-16T17:14:58.699909683Z I0216 17:14:58.698913 1 kube-rbac-proxy.go:402] Listening securely on :9393 config/pod/openshift-dns-operator/logs/dns-operator-86b8869b79-nhxlp/dns-operator_current.log0000640000000000000000000002665315144650270030571 0ustar00000000000000002026-02-16T17:14:58.315331013Z I0216 17:14:58.315156 1 simple_featuregate_reader.go:171] Starting feature-gate-detector 2026-02-16T17:14:58.330066396Z time="2026-02-16T17:14:58Z" level=info msg="FeatureGates initializedknownFeatures[AWSClusterHostedDNS AWSEFSDriverVolumeMetrics AdditionalRoutingCapabilities AdminNetworkPolicy AlibabaPlatform AutomatedEtcdBackup AzureWorkloadIdentity BareMetalLoadBalancer BootcNodeManagement BuildCSIVolumes CSIDriverSharedResource ChunkSizeMiB CloudDualStackNodeIPs ClusterAPIInstall ClusterAPIInstallIBMCloud ClusterMonitoringConfig ConsolePluginContentSecurityPolicy DNSNameResolver DisableKubeletCloudCredentialProviders DynamicResourceAllocation EtcdBackendQuota EventedPLEG Example ExternalOIDC ExternalOIDCWithUIDAndExtraClaimMappings GCPClusterHostedDNS GCPLabelsTags GatewayAPI HardwareSpeed ImageStreamImportMode IngressControllerDynamicConfigurationManager IngressControllerLBSubnetsAWS InsightsConfig InsightsConfigAPI InsightsOnDemandDataGather InsightsRuntimeExtractor KMSv1 MachineAPIMigration MachineAPIOperatorDisableMachineHealthCheckController MachineAPIProviderOpenStack MachineConfigNodes ManagedBootImages ManagedBootImagesAWS MaxUnavailableStatefulSet MetricsCollectionProfiles MinimumKubeletVersion MixedCPUsAllocation MultiArchInstallAWS MultiArchInstallAzure MultiArchInstallGCP NetworkDiagnosticsConfig NetworkLiveMigration NetworkSegmentation NewOLM NodeDisruptionPolicy NodeSwap NutanixMultiSubnets OVNObservability OnClusterBuild OpenShiftPodSecurityAdmission PersistentIPsForVirtualization PinnedImages PlatformOperators PrivateHostedZoneAWS ProcMountType RouteAdvertisements RouteExternalCertificate ServiceAccountTokenNodeBinding SetEIPForNLBIngressController SignatureStores SigstoreImageVerification StreamingCollectionEncodingToJSON StreamingCollectionEncodingToProtobuf TranslateStreamCloseWebsocketRequests UpgradeStatus UserNamespacesPodSecurityStandards UserNamespacesSupport VSphereControlPlaneMachineSet VSphereDriverConfiguration VSphereMultiNetworks VSphereMultiVCenters VSphereStaticIPs ValidatingAdmissionPolicy VolumeAttributesClass VolumeGroupSnapshot]" 2026-02-16T17:14:58.330066396Z I0216 17:14:58.329612 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-dns-operator", Name:"dns-operator", UID:"", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'FeatureGatesInitialized' FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{"AWSEFSDriverVolumeMetrics", "AdminNetworkPolicy", "AlibabaPlatform", "AzureWorkloadIdentity", "BareMetalLoadBalancer", "BuildCSIVolumes", "ChunkSizeMiB", "CloudDualStackNodeIPs", "DisableKubeletCloudCredentialProviders", "GCPLabelsTags", "HardwareSpeed", "IngressControllerLBSubnetsAWS", "KMSv1", "ManagedBootImages", "ManagedBootImagesAWS", "MultiArchInstallAWS", "MultiArchInstallGCP", "NetworkDiagnosticsConfig", "NetworkLiveMigration", "NetworkSegmentation", "NewOLM", "NodeDisruptionPolicy", "OnClusterBuild", "PersistentIPsForVirtualization", "PrivateHostedZoneAWS", "SetEIPForNLBIngressController", "StreamingCollectionEncodingToJSON", "StreamingCollectionEncodingToProtobuf", "VSphereControlPlaneMachineSet", "VSphereDriverConfiguration", "VSphereMultiVCenters", "VSphereStaticIPs", "ValidatingAdmissionPolicy"}, Disabled:[]v1.FeatureGateName{"AWSClusterHostedDNS", "AdditionalRoutingCapabilities", "AutomatedEtcdBackup", "BootcNodeManagement", "CSIDriverSharedResource", "ClusterAPIInstall", "ClusterAPIInstallIBMCloud", "ClusterMonitoringConfig", "ConsolePluginContentSecurityPolicy", "DNSNameResolver", "DynamicResourceAllocation", "EtcdBackendQuota", "EventedPLEG", "Example", "ExternalOIDC", "ExternalOIDCWithUIDAndExtraClaimMappings", "GCPClusterHostedDNS", "GatewayAPI", "ImageStreamImportMode", "IngressControllerDynamicConfigurationManager", "InsightsConfig", "InsightsConfigAPI", "InsightsOnDemandDataGather", "InsightsRuntimeExtractor", "MachineAPIMigration", "MachineAPIOperatorDisableMachineHealthCheckController", "MachineAPIProviderOpenStack", "MachineConfigNodes", "MaxUnavailableStatefulSet", "MetricsCollectionProfiles", "MinimumKubeletVersion", "MixedCPUsAllocation", "MultiArchInstallAzure", "NodeSwap", "NutanixMultiSubnets", "OVNObservability", "OpenShiftPodSecurityAdmission", "PinnedImages", "PlatformOperators", "ProcMountType", "RouteAdvertisements", "RouteExternalCertificate", "ServiceAccountTokenNodeBinding", "SignatureStores", "SigstoreImageVerification", "TranslateStreamCloseWebsocketRequests", "UpgradeStatus", "UserNamespacesPodSecurityStandards", "UserNamespacesSupport", "VSphereMultiNetworks", "VolumeAttributesClass", "VolumeGroupSnapshot"}} 2026-02-16T17:14:58.333106539Z 2026-02-16T17:14:58Z INFO controller-runtime.metrics Starting metrics server 2026-02-16T17:14:58.333333876Z 2026-02-16T17:14:58Z INFO Starting EventSource {"controller": "status_controller", "source": "kind source: *v1.DNS"} 2026-02-16T17:14:58.333333876Z 2026-02-16T17:14:58Z INFO controller-runtime.metrics Serving metrics server {"bindAddress": "127.0.0.1:60000", "secure": false} 2026-02-16T17:14:58.333333876Z 2026-02-16T17:14:58Z INFO Starting EventSource {"controller": "status_controller", "source": "kind source: *v1.DaemonSet"} 2026-02-16T17:14:58.333351377Z 2026-02-16T17:14:58Z INFO Starting EventSource {"controller": "status_controller", "source": "kind source: *v1.ClusterOperator"} 2026-02-16T17:14:58.333351377Z 2026-02-16T17:14:58Z INFO Starting Controller {"controller": "status_controller"} 2026-02-16T17:14:58.333423859Z 2026-02-16T17:14:58Z INFO Starting EventSource {"controller": "dns_controller", "source": "kind source: *v1.DNS"} 2026-02-16T17:14:58.333456570Z 2026-02-16T17:14:58Z INFO Starting EventSource {"controller": "dns_controller", "source": "kind source: *v1.DaemonSet"} 2026-02-16T17:14:58.333482951Z 2026-02-16T17:14:58Z INFO Starting EventSource {"controller": "dns_controller", "source": "kind source: *v1.Service"} 2026-02-16T17:14:58.333513882Z 2026-02-16T17:14:58Z INFO Starting EventSource {"controller": "dns_controller", "source": "kind source: *v1.ConfigMap"} 2026-02-16T17:14:58.333546393Z 2026-02-16T17:14:58Z INFO Starting EventSource {"controller": "dns_controller", "source": "kind source: *v1.ConfigMap"} 2026-02-16T17:14:58.333576494Z 2026-02-16T17:14:58Z INFO Starting EventSource {"controller": "dns_controller", "source": "kind source: *v1.Node"} 2026-02-16T17:14:58.333598104Z 2026-02-16T17:14:58Z INFO Starting Controller {"controller": "dns_controller"} 2026-02-16T17:14:58.598080793Z 2026-02-16T17:14:58Z INFO Starting workers {"controller": "status_controller", "worker count": 1} 2026-02-16T17:14:58.682066454Z 2026-02-16T17:14:58Z INFO Starting workers {"controller": "dns_controller", "worker count": 1} 2026-02-16T17:14:58.682066454Z time="2026-02-16T17:14:58Z" level=info msg="reconciling request: /default" 2026-02-16T17:14:59.255676413Z time="2026-02-16T17:14:59Z" level=info msg="updated DNS default status: old: v1.DNSStatus{ClusterIP:\"172.30.0.10\", ClusterDomain:\"cluster.local\", Conditions:[]v1.OperatorCondition{v1.OperatorCondition{Type:\"Degraded\", Status:\"False\", LastTransitionTime:time.Date(2026, time.February, 16, 17, 1, 19, 0, time.Local), Reason:\"AsExpected\", Message:\"Enough DNS pods are available, and the DNS service has a cluster IP address.\"}, v1.OperatorCondition{Type:\"Progressing\", Status:\"False\", LastTransitionTime:time.Date(2026, time.February, 16, 17, 0, 47, 0, time.Local), Reason:\"AsExpected\", Message:\"All DNS and node-resolver pods are available, and the DNS service has a cluster IP address.\"}, v1.OperatorCondition{Type:\"Available\", Status:\"True\", LastTransitionTime:time.Date(2026, time.February, 16, 17, 1, 19, 0, time.Local), Reason:\"AsExpected\", Message:\"The DNS daemonset has available pods, and the DNS service has a cluster IP address.\"}, v1.OperatorCondition{Type:\"Upgradeable\", Status:\"True\", LastTransitionTime:time.Date(2026, time.February, 16, 17, 0, 47, 0, time.Local), Reason:\"AsExpected\", Message:\"DNS Operator can be upgraded\"}}}, new: v1.DNSStatus{ClusterIP:\"172.30.0.10\", ClusterDomain:\"cluster.local\", Conditions:[]v1.OperatorCondition{v1.OperatorCondition{Type:\"Degraded\", Status:\"True\", LastTransitionTime:time.Date(2026, time.February, 16, 17, 14, 59, 0, time.Local), Reason:\"NoDNSPodsAvailable\", Message:\"No DNS pods are available.\"}, v1.OperatorCondition{Type:\"Progressing\", Status:\"True\", LastTransitionTime:time.Date(2026, time.February, 16, 17, 14, 59, 0, time.Local), Reason:\"Reconciling\", Message:\"Have 0 available DNS pods, want 1.\"}, v1.OperatorCondition{Type:\"Available\", Status:\"False\", LastTransitionTime:time.Date(2026, time.February, 16, 17, 14, 59, 0, time.Local), Reason:\"NoDaemonSetPods\", Message:\"The DNS daemonset has no pods available.\"}, v1.OperatorCondition{Type:\"Upgradeable\", Status:\"True\", LastTransitionTime:time.Date(2026, time.February, 16, 17, 0, 47, 0, time.Local), Reason:\"AsExpected\", Message:\"DNS Operator can be upgraded\"}}}" 2026-02-16T17:14:59.261775561Z time="2026-02-16T17:14:59Z" level=info msg="reconciling request: /default" 2026-02-16T17:15:09.876314312Z time="2026-02-16T17:15:09Z" level=info msg="reconciling request: /default" 2026-02-16T17:15:18.887080452Z time="2026-02-16T17:15:18Z" level=info msg="reconciling request: /default" 2026-02-16T17:15:18.933376295Z time="2026-02-16T17:15:18Z" level=info msg="updated DNS default status: old: v1.DNSStatus{ClusterIP:\"172.30.0.10\", ClusterDomain:\"cluster.local\", Conditions:[]v1.OperatorCondition{v1.OperatorCondition{Type:\"Degraded\", Status:\"True\", LastTransitionTime:time.Date(2026, time.February, 16, 17, 14, 59, 0, time.Local), Reason:\"NoDNSPodsAvailable\", Message:\"No DNS pods are available.\"}, v1.OperatorCondition{Type:\"Progressing\", Status:\"True\", LastTransitionTime:time.Date(2026, time.February, 16, 17, 14, 59, 0, time.Local), Reason:\"Reconciling\", Message:\"Have 0 available DNS pods, want 1.\"}, v1.OperatorCondition{Type:\"Available\", Status:\"False\", LastTransitionTime:time.Date(2026, time.February, 16, 17, 14, 59, 0, time.Local), Reason:\"NoDaemonSetPods\", Message:\"The DNS daemonset has no pods available.\"}, v1.OperatorCondition{Type:\"Upgradeable\", Status:\"True\", LastTransitionTime:time.Date(2026, time.February, 16, 17, 0, 47, 0, time.Local), Reason:\"AsExpected\", Message:\"DNS Operator can be upgraded\"}}}, new: v1.DNSStatus{ClusterIP:\"172.30.0.10\", ClusterDomain:\"cluster.local\", Conditions:[]v1.OperatorCondition{v1.OperatorCondition{Type:\"Degraded\", Status:\"False\", LastTransitionTime:time.Date(2026, time.February, 16, 17, 15, 18, 0, time.Local), Reason:\"AsExpected\", Message:\"Enough DNS pods are available, and the DNS service has a cluster IP address.\"}, v1.OperatorCondition{Type:\"Progressing\", Status:\"False\", LastTransitionTime:time.Date(2026, time.February, 16, 17, 15, 18, 0, time.Local), Reason:\"AsExpected\", Message:\"All DNS and node-resolver pods are available, and the DNS service has a cluster IP address.\"}, v1.OperatorCondition{Type:\"Available\", Status:\"True\", LastTransitionTime:time.Date(2026, time.February, 16, 17, 15, 18, 0, time.Local), Reason:\"AsExpected\", Message:\"The DNS daemonset has available pods, and the DNS service has a cluster IP address.\"}, v1.OperatorCondition{Type:\"Upgradeable\", Status:\"True\", LastTransitionTime:time.Date(2026, time.February, 16, 17, 0, 47, 0, time.Local), Reason:\"AsExpected\", Message:\"DNS Operator can be upgraded\"}}}" 2026-02-16T17:15:18.935666816Z time="2026-02-16T17:15:18Z" level=info msg="reconciling request: /default" config/pod/openshift-dns-operator/dns-operator-86b8869b79-nhxlp.json0000640000000000000000000001563615144650270023635 0ustar0000000000000000{"metadata":{"name":"dns-operator-86b8869b79-nhxlp","generateName":"dns-operator-86b8869b79-","namespace":"openshift-dns-operator","uid":"d9859457-f0d1-4754-a6c5-cf05d5abf447","resourceVersion":"17459","creationTimestamp":"2026-02-16T16:58:51Z","labels":{"name":"dns-operator","pod-template-hash":"86b8869b79"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.15/23\"],\"mac_address\":\"0a:58:0a:80:00:0f\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.15/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.15\"\n ],\n \"mac\": \"0a:58:0a:80:00:0f\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"dns-operator-86b8869b79","uid":"69e1dbde-9208-4fe9-b715-0ad994cda5fb","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420}},{"name":"kube-api-access-t4gl5","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"dns-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e1c8b9784a60860a08bd47935f0767b7b7f8f36c5c0adb7623a31b82c01d4c09","command":["dns-operator"],"env":[{"name":"RELEASE_VERSION","value":"4.18.32"},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8ea13b0cbfe9be0d3d7ea80d50e512af6a453921a553c7c79b566530142b611b"},{"name":"OPENSHIFT_CLI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e155421620a4ac28a759265f53059b75308fdd1491caeba6a9a34d2fbeab4954"},{"name":"KUBE_RBAC_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0"}],"resources":{"requests":{"cpu":"10m","memory":"29Mi"}},"volumeMounts":[{"name":"kube-api-access-t4gl5","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","args":["--logtostderr","--secure-listen-address=:9393","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256","--upstream=http://127.0.0.1:60000/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key"],"ports":[{"name":"metrics","containerPort":9393,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"40Mi"}},"volumeMounts":[{"name":"metrics-tls","readOnly":true,"mountPath":"/etc/tls/private"},{"name":"kube-api-access-t4gl5","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":2,"dnsPolicy":"Default","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"dns-operator","serviceAccount":"dns-operator","nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:58Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T16:59:56Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:58Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:58Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T16:59:56Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.15","podIPs":[{"ip":"10.128.0.15"}],"startTime":"2026-02-16T16:59:56Z","containerStatuses":[{"name":"dns-operator","state":{"running":{"startedAt":"2026-02-16T17:14:57Z"}},"lastState":{},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e1c8b9784a60860a08bd47935f0767b7b7f8f36c5c0adb7623a31b82c01d4c09","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e1c8b9784a60860a08bd47935f0767b7b7f8f36c5c0adb7623a31b82c01d4c09","containerID":"cri-o://18eb2ea9f07d5c6d110107b6cae077ae63beca1d3e388a0edf9c5be4e7025b94","started":true,"volumeMounts":[{"name":"kube-api-access-t4gl5","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-16T17:14:58Z"}},"lastState":{},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://6c8043a73593eb818d47c831f8cfbf4afec441fd3742943afa12b44d4e57561c","started":true,"volumeMounts":[{"name":"metrics-tls","mountPath":"/etc/tls/private","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-t4gl5","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-console/logs/downloads-dcd7b7d95-dhhfh/download-server_current.log0000640000000000000000000000173615144650270027730 0ustar00000000000000002026-02-16T17:14:45.856133950Z ::ffff:10.128.0.2 - - [16/Feb/2026 17:14:45] "GET / HTTP/1.1" 200 - 2026-02-16T17:14:45.856722956Z ::ffff:10.128.0.2 - - [16/Feb/2026 17:14:45] "GET / HTTP/1.1" 200 - 2026-02-16T17:14:55.835836050Z ::ffff:10.128.0.2 - - [16/Feb/2026 17:14:55] "GET / HTTP/1.1" 200 - 2026-02-16T17:14:55.857204147Z ::ffff:10.128.0.2 - - [16/Feb/2026 17:14:55] "GET / HTTP/1.1" 200 - 2026-02-16T17:15:05.835183974Z ::ffff:10.128.0.2 - - [16/Feb/2026 17:15:05] "GET / HTTP/1.1" 200 - 2026-02-16T17:15:05.835309428Z ::ffff:10.128.0.2 - - [16/Feb/2026 17:15:05] "GET / HTTP/1.1" 200 - 2026-02-16T17:15:15.836512117Z ::ffff:10.128.0.2 - - [16/Feb/2026 17:15:15] "GET / HTTP/1.1" 200 - 2026-02-16T17:15:15.837273011Z ::ffff:10.128.0.2 - - [16/Feb/2026 17:15:15] "GET / HTTP/1.1" 200 - 2026-02-16T17:15:25.835241832Z ::ffff:10.128.0.2 - - [16/Feb/2026 17:15:25] "GET / HTTP/1.1" 200 - 2026-02-16T17:15:25.836287094Z ::ffff:10.128.0.2 - - [16/Feb/2026 17:15:25] "GET / HTTP/1.1" 200 - config/pod/openshift-console/downloads-dcd7b7d95-dhhfh.json0000640000000000000000000002262215144650270022274 0ustar0000000000000000{"metadata":{"name":"downloads-dcd7b7d95-dhhfh","generateName":"downloads-dcd7b7d95-","namespace":"openshift-console","uid":"08a90dc5-b0d8-4aad-a002-736492b6c1a9","resourceVersion":"16841","creationTimestamp":"2026-02-16T17:04:18Z","labels":{"app":"console","component":"downloads","pod-template-hash":"dcd7b7d95"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.80/23\"],\"mac_address\":\"0a:58:0a:80:00:50\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.80/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.80\"\n ],\n \"mac\": \"0a:58:0a:80:00:50\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"downloads-dcd7b7d95","uid":"5f0f80be-7d01-432a-bd6d-5e2dc76febb1","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"kube-api-access-p6xfw","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"download-server","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7fccb6e19eb4caa16d32f4cf59670c2c741c98b099d1f12368b85aab3f84dc38","command":["/bin/sh"],"args":["-c","cat \u003c\u003cEOF \u003e\u003e/tmp/serve.py\nimport errno, http.server, os, re, signal, socket, sys, tarfile, tempfile, threading, time, zipfile\n\nsignal.signal(signal.SIGTERM, lambda signum, frame: sys.exit(0))\n\ndef write_index(path, message):\n with open(path, 'wb') as f:\n f.write('\\n'.join([\n '\u003c!doctype html\u003e',\n '\u003chtml lang=\"en\"\u003e',\n '\u003chead\u003e',\n ' \u003cmeta charset=\"utf-8\"\u003e',\n '\u003c/head\u003e',\n '\u003cbody\u003e',\n ' {}'.format(message),\n '\u003c/body\u003e',\n '\u003c/html\u003e',\n '',\n ]).encode('utf-8'))\n\n# Launch multiple listeners as threads\nclass Thread(threading.Thread):\n def __init__(self, i, socket):\n threading.Thread.__init__(self)\n self.i = i\n self.socket = socket\n self.daemon = True\n self.start()\n\n def run(self):\n server = http.server.SimpleHTTPRequestHandler\n server.server_version = \"OpenShift Downloads Server\"\n server.sys_version = \"\"\n httpd = http.server.HTTPServer(addr, server, False)\n\n # Prevent the HTTP server from re-binding every handler.\n # https://stackoverflow.com/questions/46210672/\n httpd.socket = self.socket\n httpd.server_bind = self.server_close = lambda self: None\n\n httpd.serve_forever()\n\ntemp_dir = tempfile.mkdtemp()\nprint('serving from {}'.format(temp_dir))\nos.chdir(temp_dir)\nfor arch in ['amd64', 'arm64', 'ppc64le', 's390x']:\n os.mkdir(arch)\ncontent = ['\u003ca href=\"oc-license\"\u003elicense\u003c/a\u003e']\nos.symlink('/usr/share/openshift/LICENSE', 'oc-license')\n\nfor arch, operating_system, path in [\n ('amd64', 'linux', '/usr/share/openshift/linux_amd64/oc'),\n ('amd64', 'mac', '/usr/share/openshift/mac/oc'),\n ('amd64', 'windows', '/usr/share/openshift/windows/oc.exe'),\n ('arm64', 'linux', '/usr/share/openshift/linux_arm64/oc'),\n ('arm64', 'mac', '/usr/share/openshift/mac_arm64/oc'),\n ('ppc64le', 'linux', '/usr/share/openshift/linux_ppc64le/oc'),\n ('s390x', 'linux', '/usr/share/openshift/linux_s390x/oc'),\n ]:\n basename = os.path.basename(path)\n target_path = os.path.join(arch, operating_system, basename)\n os.mkdir(os.path.join(arch, operating_system))\n os.symlink(path, target_path)\n base_root, _ = os.path.splitext(basename)\n archive_path_root = os.path.join(arch, operating_system, base_root)\n with tarfile.open('{}.tar'.format(archive_path_root), 'w') as tar:\n tar.add(path, basename)\n with zipfile.ZipFile('{}.zip'.format(archive_path_root), 'w') as zip:\n zip.write(path, basename)\n content.append(\n '\u003ca href=\"{0}\"\u003eoc ({1} {2})\u003c/a\u003e (\u003ca href=\"{3}.tar\"\u003etar\u003c/a\u003e \u003ca href=\"{3}.zip\"\u003ezip\u003c/a\u003e)'.format(\n target_path, arch, operating_system, archive_path_root\n )\n )\n\nfor root, directories, filenames in os.walk(temp_dir):\n root_link = os.path.relpath(temp_dir, os.path.join(root, 'child')).replace(os.path.sep, '/')\n for directory in directories:\n write_index(\n path=os.path.join(root, directory, 'index.html'),\n message='\u003cp\u003eDirectory listings are disabled. See \u003ca href=\"{}\"\u003ehere\u003c/a\u003e for available content.\u003c/p\u003e'.format(root_link),\n )\n\nwrite_index(\n path=os.path.join(temp_dir, 'index.html'),\n message='\\n'.join(\n ['\u003cul\u003e'] +\n [' \u003cli\u003e{}\u003c/li\u003e'.format(entry) for entry in content] +\n ['\u003c/ul\u003e']\n ),\n)\n\n# Create socket\n# IPv6 should handle IPv4 passively so long as it is not bound to a\n# specific address or set to IPv6_ONLY\n# https://stackoverflow.com/questions/25817848/python-3-does-http-server-support-ipv6\ntry:\n addr = ('::', 8080)\n sock = socket.socket(socket.AF_INET6, socket.SOCK_STREAM)\nexcept socket.error as err:\n # errno.EAFNOSUPPORT is \"socket.error: [Errno 97] Address family not supported by protocol\"\n # When IPv6 is disabled, socket will bind using IPv4.\n if err.errno == errno.EAFNOSUPPORT:\n addr = ('', 8080)\n sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)\n else:\n raise \nsock.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)\nsock.bind(addr)\nsock.listen(5)\n\n[Thread(i, socket=sock) for i in range(100)]\ntime.sleep(9e9)\nEOF\nexec python3 /tmp/serve.py\n"],"ports":[{"name":"http","containerPort":8080,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"kube-api-access-p6xfw","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/","port":8080,"scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/","port":8080,"scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000700000,"readOnlyRootFilesystem":false,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":0,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"default","serviceAccount":"default","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c26,c25"},"runAsNonRoot":true,"fsGroup":1000700000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:36Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:04:18Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:45Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:45Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:04:18Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.80","podIPs":[{"ip":"10.128.0.80"}],"startTime":"2026-02-16T17:04:18Z","containerStatuses":[{"name":"download-server","state":{"running":{"startedAt":"2026-02-16T17:14:36Z"}},"lastState":{},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7fccb6e19eb4caa16d32f4cf59670c2c741c98b099d1f12368b85aab3f84dc38","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7fccb6e19eb4caa16d32f4cf59670c2c741c98b099d1f12368b85aab3f84dc38","containerID":"cri-o://605f4d37dca5a7b7cb782ef97f0d0cf40cf83a6f18a4a48dec6e2d525f6967fe","started":true,"volumeMounts":[{"name":"kube-api-access-p6xfw","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-console/console-795746f87c-qdv9c.json0000640000000000000000000001220315144650270021564 0ustar0000000000000000{"metadata":{"name":"console-795746f87c-qdv9c","generateName":"console-795746f87c-","namespace":"openshift-console","uid":"4573747f-1dff-4f51-9a56-b413287082b6","resourceVersion":"14473","creationTimestamp":"2026-02-16T17:08:33Z","labels":{"app":"console","component":"ui","pod-template-hash":"795746f87c"},"annotations":{"console.openshift.io/authn-ca-trust-config-version":"12192","console.openshift.io/console-config-version":"14455","console.openshift.io/image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8164cc9e16e8be9ea18be73c9df5041af326ed6b3059faff08f76e568cf4dc2","console.openshift.io/infrastructure-config-version":"537","console.openshift.io/oauth-secret-version":"12214","console.openshift.io/proxy-config-version":"554","console.openshift.io/service-ca-config-version":"14197","console.openshift.io/trusted-ca-config-version":"14208","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"console-795746f87c","uid":"f448c650-e3f7-486a-b41a-86ffde2dcec9","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"console-serving-cert","secret":{"secretName":"console-serving-cert","defaultMode":420}},{"name":"console-oauth-config","secret":{"secretName":"console-oauth-config","defaultMode":420}},{"name":"console-config","configMap":{"name":"console-config","defaultMode":420}},{"name":"service-ca","configMap":{"name":"service-ca","defaultMode":420}},{"name":"trusted-ca-bundle","configMap":{"name":"trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420}},{"name":"oauth-serving-cert","configMap":{"name":"oauth-serving-cert","defaultMode":420}},{"name":"kube-api-access-k2mkf","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"console","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8164cc9e16e8be9ea18be73c9df5041af326ed6b3059faff08f76e568cf4dc2","command":["/opt/bridge/bin/bridge","--public-dir=/opt/bridge/static","--config=/var/console-config/console-config.yaml","--service-ca-file=/var/service-ca/service-ca.crt","--v=2"],"ports":[{"name":"https","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"100Mi"}},"volumeMounts":[{"name":"console-serving-cert","readOnly":true,"mountPath":"/var/serving-cert"},{"name":"console-oauth-config","readOnly":true,"mountPath":"/var/oauth-config"},{"name":"console-config","readOnly":true,"mountPath":"/var/console-config"},{"name":"service-ca","readOnly":true,"mountPath":"/var/service-ca"},{"name":"trusted-ca-bundle","readOnly":true,"mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"oauth-serving-cert","readOnly":true,"mountPath":"/var/oauth-serving-cert"},{"name":"kube-api-access-k2mkf","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/health","port":8443,"scheme":"HTTPS"},"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":1},"readinessProbe":{"httpGet":{"path":"/health","port":8443,"scheme":"HTTPS"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"/health","port":8443,"scheme":"HTTPS"},"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":30},"lifecycle":{"preStop":{"exec":{"command":["sleep","25"]}}},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000700000,"readOnlyRootFilesystem":false,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":40,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"console","serviceAccount":"console","securityContext":{"seLinuxOptions":{"level":"s0:c26,c25"},"runAsNonRoot":true,"fsGroup":1000700000,"seccompProfile":{"type":"RuntimeDefault"}},"imagePullSecrets":[{"name":"console-dockercfg-sk6rc"}],"affinity":{},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Pending","qosClass":"Burstable"}}config/pod/openshift-console/console-599b567ff7-nrcpr.json0000640000000000000000000001220315144650270021742 0ustar0000000000000000{"metadata":{"name":"console-599b567ff7-nrcpr","generateName":"console-599b567ff7-","namespace":"openshift-console","uid":"ed3d89d0-bc00-482e-a656-7fdf4646ab0a","resourceVersion":"14532","creationTimestamp":"2026-02-16T17:08:35Z","labels":{"app":"console","component":"ui","pod-template-hash":"599b567ff7"},"annotations":{"console.openshift.io/authn-ca-trust-config-version":"12192","console.openshift.io/console-config-version":"14510","console.openshift.io/image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8164cc9e16e8be9ea18be73c9df5041af326ed6b3059faff08f76e568cf4dc2","console.openshift.io/infrastructure-config-version":"537","console.openshift.io/oauth-secret-version":"12214","console.openshift.io/proxy-config-version":"554","console.openshift.io/service-ca-config-version":"14197","console.openshift.io/trusted-ca-config-version":"14208","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"console-599b567ff7","uid":"da6e5501-6d99-40ef-8af7-36dcadc36283","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"console-serving-cert","secret":{"secretName":"console-serving-cert","defaultMode":420}},{"name":"console-oauth-config","secret":{"secretName":"console-oauth-config","defaultMode":420}},{"name":"console-config","configMap":{"name":"console-config","defaultMode":420}},{"name":"service-ca","configMap":{"name":"service-ca","defaultMode":420}},{"name":"trusted-ca-bundle","configMap":{"name":"trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420}},{"name":"oauth-serving-cert","configMap":{"name":"oauth-serving-cert","defaultMode":420}},{"name":"kube-api-access-st6bv","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"console","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8164cc9e16e8be9ea18be73c9df5041af326ed6b3059faff08f76e568cf4dc2","command":["/opt/bridge/bin/bridge","--public-dir=/opt/bridge/static","--config=/var/console-config/console-config.yaml","--service-ca-file=/var/service-ca/service-ca.crt","--v=2"],"ports":[{"name":"https","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"100Mi"}},"volumeMounts":[{"name":"console-serving-cert","readOnly":true,"mountPath":"/var/serving-cert"},{"name":"console-oauth-config","readOnly":true,"mountPath":"/var/oauth-config"},{"name":"console-config","readOnly":true,"mountPath":"/var/console-config"},{"name":"service-ca","readOnly":true,"mountPath":"/var/service-ca"},{"name":"trusted-ca-bundle","readOnly":true,"mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"oauth-serving-cert","readOnly":true,"mountPath":"/var/oauth-serving-cert"},{"name":"kube-api-access-st6bv","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/health","port":8443,"scheme":"HTTPS"},"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":1},"readinessProbe":{"httpGet":{"path":"/health","port":8443,"scheme":"HTTPS"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"/health","port":8443,"scheme":"HTTPS"},"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":30},"lifecycle":{"preStop":{"exec":{"command":["sleep","25"]}}},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000700000,"readOnlyRootFilesystem":false,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":40,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"console","serviceAccount":"console","securityContext":{"seLinuxOptions":{"level":"s0:c26,c25"},"runAsNonRoot":true,"fsGroup":1000700000,"seccompProfile":{"type":"RuntimeDefault"}},"imagePullSecrets":[{"name":"console-dockercfg-sk6rc"}],"affinity":{},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Pending","qosClass":"Burstable"}}console-operator_current.log0000640000000000000000000000776115144650270033015 0ustar0000000000000000config/pod/openshift-console-operator/logs/console-operator-7777d5cc66-64vhv2026-02-16T17:14:58.374292335Z I0216 17:14:58.374021 1 cmd.go:250] Using service-serving-cert provided certificates 2026-02-16T17:14:58.374799641Z I0216 17:14:58.374764 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-16T17:14:58.376184613Z I0216 17:14:58.376110 1 observer_polling.go:159] Starting file observer 2026-02-16T17:14:58.695668102Z I0216 17:14:58.694934 1 builder.go:298] console-operator version - 2026-02-16T17:14:59.159100615Z I0216 17:14:59.157574 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-16T17:14:59.159100615Z W0216 17:14:59.157610 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-16T17:14:59.159100615Z W0216 17:14:59.157618 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-16T17:14:59.159100615Z W0216 17:14:59.157623 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-16T17:14:59.159100615Z W0216 17:14:59.157628 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-16T17:14:59.159100615Z W0216 17:14:59.157632 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-16T17:14:59.159100615Z W0216 17:14:59.157638 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-16T17:14:59.167784462Z I0216 17:14:59.165600 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-16T17:14:59.167784462Z I0216 17:14:59.165687 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-16T17:14:59.167784462Z I0216 17:14:59.165737 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-16T17:14:59.167784462Z I0216 17:14:59.165789 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-16T17:14:59.167784462Z I0216 17:14:59.165937 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-16T17:14:59.167784462Z I0216 17:14:59.166064 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-16T17:14:59.167784462Z I0216 17:14:59.166072 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T17:14:59.167784462Z I0216 17:14:59.166087 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-16T17:14:59.167784462Z I0216 17:14:59.166093 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T17:14:59.177849171Z I0216 17:14:59.176537 1 builder.go:439] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-16T17:14:59.177849171Z I0216 17:14:59.176794 1 leaderelection.go:254] attempting to acquire leader lease openshift-console-operator/console-operator-lock... 2026-02-16T17:14:59.267100334Z I0216 17:14:59.266644 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T17:14:59.267100334Z I0216 17:14:59.266695 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-16T17:14:59.267100334Z I0216 17:14:59.266827 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file config/pod/openshift-console-operator/console-operator-7777d5cc66-64vhv.json0000640000000000000000000001464015144650270025255 0ustar0000000000000000{"metadata":{"name":"console-operator-7777d5cc66-64vhv","generateName":"console-operator-7777d5cc66-","namespace":"openshift-console-operator","uid":"0517b180-00ee-47fe-a8e7-36a3931b7e72","resourceVersion":"17501","creationTimestamp":"2026-02-16T17:03:56Z","labels":{"name":"console-operator","pod-template-hash":"7777d5cc66"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.78/23\"],\"mac_address\":\"0a:58:0a:80:00:4e\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.78/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.78\"\n ],\n \"mac\": \"0a:58:0a:80:00:4e\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"console-operator-7777d5cc66","uid":"ce651338-bf30-4891-ac02-a7cc586845c4","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config","configMap":{"name":"console-operator-config","defaultMode":420}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"trusted-ca","configMap":{"name":"trusted-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420}},{"name":"kube-api-access-sbrtz","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"console-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:95e7647e6fda21b94b692f03908e4cd154e3374fca0560229c646fefe2c46730","command":["console","operator"],"args":["--config=/var/run/configmaps/config/controller-config.yaml"],"ports":[{"name":"metrics","containerPort":60000,"protocol":"TCP"}],"env":[{"name":"CONSOLE_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8164cc9e16e8be9ea18be73c9df5041af326ed6b3059faff08f76e568cf4dc2"},{"name":"DOWNLOADS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7fccb6e19eb4caa16d32f4cf59670c2c741c98b099d1f12368b85aab3f84dc38"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"},{"name":"OPERATOR_NAME","value":"console-operator"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"100Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca","mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"kube-api-access-sbrtz","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000710000,"readOnlyRootFilesystem":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"console-operator","serviceAccount":"console-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c27,c4"},"runAsNonRoot":true,"fsGroup":1000710000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:58Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:03:56Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:59Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:59Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:03:56Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.78","podIPs":[{"ip":"10.128.0.78"}],"startTime":"2026-02-16T17:03:56Z","containerStatuses":[{"name":"console-operator","state":{"running":{"startedAt":"2026-02-16T17:14:57Z"}},"lastState":{},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:95e7647e6fda21b94b692f03908e4cd154e3374fca0560229c646fefe2c46730","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:95e7647e6fda21b94b692f03908e4cd154e3374fca0560229c646fefe2c46730","containerID":"cri-o://186fd3f0db823e5328c89f464f7fcd6084fe37b5dd8507f965b2e41f003c7c49","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca","mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"kube-api-access-sbrtz","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-oauth-apiserver/logs/apiserver-66788cb45c-dp9bc/oauth-apiserver_current.log0000640000000000000000000005037415144650270031266 0ustar00000000000000002026-02-16T17:14:58.571714923Z I0216 17:14:58.571702 1 flags.go:64] FLAG: --storage-backend="" 2026-02-16T17:14:58.571714923Z I0216 17:14:58.571705 1 flags.go:64] FLAG: --storage-initialization-timeout="1m0s" 2026-02-16T17:14:58.571714923Z I0216 17:14:58.571708 1 flags.go:64] FLAG: --storage-media-type="application/json" 2026-02-16T17:14:58.571727293Z I0216 17:14:58.571718 1 flags.go:64] FLAG: --strict-transport-security-directives="[]" 2026-02-16T17:14:58.571727293Z I0216 17:14:58.571724 1 flags.go:64] FLAG: --tls-cert-file="/var/run/secrets/serving-cert/tls.crt" 2026-02-16T17:14:58.571740723Z I0216 17:14:58.571727 1 flags.go:64] FLAG: --tls-cipher-suites="[TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256]" 2026-02-16T17:14:58.571740723Z I0216 17:14:58.571737 1 flags.go:64] FLAG: --tls-min-version="VersionTLS12" 2026-02-16T17:14:58.571751554Z I0216 17:14:58.571740 1 flags.go:64] FLAG: --tls-private-key-file="/var/run/secrets/serving-cert/tls.key" 2026-02-16T17:14:58.571751554Z I0216 17:14:58.571744 1 flags.go:64] FLAG: --tls-sni-cert-key="[]" 2026-02-16T17:14:58.571762494Z I0216 17:14:58.571751 1 flags.go:64] FLAG: --tracing-config-file="" 2026-02-16T17:14:58.571762494Z I0216 17:14:58.571754 1 flags.go:64] FLAG: --v="2" 2026-02-16T17:14:58.571762494Z I0216 17:14:58.571757 1 flags.go:64] FLAG: --vmodule="" 2026-02-16T17:14:58.571762494Z I0216 17:14:58.571760 1 flags.go:64] FLAG: --watch-cache="true" 2026-02-16T17:14:58.571774154Z I0216 17:14:58.571762 1 flags.go:64] FLAG: --watch-cache-sizes="[]" 2026-02-16T17:14:58.571826856Z W0216 17:14:58.571803 1 registry.go:345] setting componentGlobalsRegistry in SetFallback. We recommend calling componentGlobalsRegistry.Set() right after parsing flags to avoid using feature gates before their final values are set by the flags. 2026-02-16T17:14:58.571826856Z I0216 17:14:58.571819 1 registry.go:379] setting kube:feature gate emulation version to 1.31 2026-02-16T17:14:58.597542016Z I0216 17:14:58.597472 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-16T17:14:59.087779653Z I0216 17:14:59.087242 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-02-16T17:14:59.095036236Z I0216 17:14:59.094521 1 audit.go:340] Using audit backend: ignoreErrors 2026-02-16T17:14:59.105193788Z I0216 17:14:59.105115 1 shared_informer.go:313] Waiting for caches to sync for *generic.policySource[*k8s.io/api/admissionregistration/v1.ValidatingAdmissionPolicy,*k8s.io/api/admissionregistration/v1.ValidatingAdmissionPolicyBinding,k8s.io/apiserver/pkg/admission/plugin/policy/validating.Validator] 2026-02-16T17:14:59.108743988Z I0216 17:14:59.108706 1 plugins.go:157] Loaded 2 mutating admission controller(s) successfully in the following order: NamespaceLifecycle,MutatingAdmissionWebhook. 2026-02-16T17:14:59.108743988Z I0216 17:14:59.108738 1 plugins.go:160] Loaded 2 validating admission controller(s) successfully in the following order: ValidatingAdmissionPolicy,ValidatingAdmissionWebhook. 2026-02-16T17:14:59.109497901Z I0216 17:14:59.109459 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-02-16T17:14:59.109497901Z I0216 17:14:59.109490 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-02-16T17:14:59.109515841Z I0216 17:14:59.109510 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-02-16T17:14:59.109535752Z I0216 17:14:59.109520 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-02-16T17:14:59.140437562Z I0216 17:14:59.140366 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-16T17:14:59.140437562Z I0216 17:14:59.140394 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-16T17:14:59.140437562Z I0216 17:14:59.140429 1 store.go:1641] "Monitoring resource count at path" resource="oauthclients.oauth.openshift.io" path="//oauth/clients" 2026-02-16T17:14:59.145798626Z I0216 17:14:59.143785 1 cacher.go:463] cacher (oauthclients.oauth.openshift.io): initialized 2026-02-16T17:14:59.145798626Z I0216 17:14:59.143815 1 reflector.go:368] Caches populated for *oauth.OAuthClient from storage/cacher.go:/oauth/clients 2026-02-16T17:14:59.151131660Z I0216 17:14:59.150436 1 store.go:1641] "Monitoring resource count at path" resource="oauthauthorizetokens.oauth.openshift.io" path="//oauth/authorizetokens" 2026-02-16T17:14:59.152215894Z I0216 17:14:59.152178 1 cacher.go:463] cacher (oauthauthorizetokens.oauth.openshift.io): initialized 2026-02-16T17:14:59.152215894Z I0216 17:14:59.152210 1 reflector.go:368] Caches populated for *oauth.OAuthAuthorizeToken from storage/cacher.go:/oauth/authorizetokens 2026-02-16T17:14:59.161788608Z I0216 17:14:59.160548 1 store.go:1641] "Monitoring resource count at path" resource="oauthaccesstokens.oauth.openshift.io" path="//oauth/accesstokens" 2026-02-16T17:14:59.163463259Z I0216 17:14:59.162680 1 cacher.go:463] cacher (oauthaccesstokens.oauth.openshift.io): initialized 2026-02-16T17:14:59.163463259Z I0216 17:14:59.162708 1 reflector.go:368] Caches populated for *oauth.OAuthAccessToken from storage/cacher.go:/oauth/accesstokens 2026-02-16T17:14:59.169434143Z I0216 17:14:59.169375 1 store.go:1641] "Monitoring resource count at path" resource="oauthclientauthorizations.oauth.openshift.io" path="//oauth/clientauthorizations" 2026-02-16T17:14:59.171615800Z I0216 17:14:59.171582 1 handler.go:286] Adding GroupVersion oauth.openshift.io v1 to ResourceManager 2026-02-16T17:14:59.172069244Z I0216 17:14:59.172040 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-02-16T17:14:59.172069244Z I0216 17:14:59.172052 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-02-16T17:14:59.180428881Z I0216 17:14:59.180365 1 store.go:1641] "Monitoring resource count at path" resource="users.user.openshift.io" path="//users" 2026-02-16T17:14:59.186367653Z I0216 17:14:59.186322 1 store.go:1641] "Monitoring resource count at path" resource="identities.user.openshift.io" path="//useridentities" 2026-02-16T17:14:59.192169102Z I0216 17:14:59.190686 1 cacher.go:463] cacher (users.user.openshift.io): initialized 2026-02-16T17:14:59.192169102Z I0216 17:14:59.190716 1 cacher.go:463] cacher (identities.user.openshift.io): initialized 2026-02-16T17:14:59.192169102Z I0216 17:14:59.190739 1 reflector.go:368] Caches populated for *user.Identity from storage/cacher.go:/useridentities 2026-02-16T17:14:59.192169102Z I0216 17:14:59.190756 1 cacher.go:463] cacher (oauthclientauthorizations.oauth.openshift.io): initialized 2026-02-16T17:14:59.192169102Z I0216 17:14:59.190772 1 reflector.go:368] Caches populated for *oauth.OAuthClientAuthorization from storage/cacher.go:/oauth/clientauthorizations 2026-02-16T17:14:59.192169102Z I0216 17:14:59.190724 1 reflector.go:368] Caches populated for *user.User from storage/cacher.go:/users 2026-02-16T17:14:59.194570265Z I0216 17:14:59.193932 1 store.go:1641] "Monitoring resource count at path" resource="groups.user.openshift.io" path="//groups" 2026-02-16T17:14:59.195838064Z I0216 17:14:59.195198 1 handler.go:286] Adding GroupVersion user.openshift.io v1 to ResourceManager 2026-02-16T17:14:59.195838064Z I0216 17:14:59.195266 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-02-16T17:14:59.195838064Z I0216 17:14:59.195273 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-02-16T17:14:59.221850064Z I0216 17:14:59.217919 1 cacher.go:463] cacher (groups.user.openshift.io): initialized 2026-02-16T17:14:59.225857577Z I0216 17:14:59.225810 1 reflector.go:368] Caches populated for *user.Group from storage/cacher.go:/groups 2026-02-16T17:14:59.325646434Z I0216 17:14:59.324399 1 genericapiserver.go:538] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-02-16T17:14:59.325646434Z I0216 17:14:59.324432 1 genericapiserver.go:570] "[graceful-termination] using HTTP Server shutdown timeout" shutdownTimeout="2s" 2026-02-16T17:14:59.329092560Z I0216 17:14:59.328892 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"api.openshift-oauth-apiserver.svc\" [serving] validServingFor=[api.openshift-oauth-apiserver.svc,api.openshift-oauth-apiserver.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771261227\" (2026-02-16 17:00:46 +0000 UTC to 2028-02-16 17:00:47 +0000 UTC (now=2026-02-16 17:14:59.328856012 +0000 UTC))" 2026-02-16T17:14:59.329092560Z I0216 17:14:59.329072 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771262098\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771262098\" (2026-02-16 16:14:58 +0000 UTC to 2029-02-16 16:14:58 +0000 UTC (now=2026-02-16 17:14:59.329049898 +0000 UTC))" 2026-02-16T17:14:59.329123891Z I0216 17:14:59.329094 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-16T17:14:59.329133181Z I0216 17:14:59.329123 1 genericapiserver.go:693] [graceful-termination] waiting for shutdown to be initiated 2026-02-16T17:14:59.332867266Z I0216 17:14:59.329148 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-16T17:14:59.332867266Z I0216 17:14:59.329163 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-16T17:14:59.332867266Z I0216 17:14:59.329190 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-16T17:14:59.332867266Z I0216 17:14:59.329318 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-16T17:14:59.332867266Z I0216 17:14:59.330329 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-16T17:14:59.332867266Z I0216 17:14:59.330338 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T17:14:59.332867266Z I0216 17:14:59.330352 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-16T17:14:59.332867266Z I0216 17:14:59.330358 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T17:14:59.336127356Z I0216 17:14:59.336086 1 reflector.go:368] Caches populated for *v1.ValidatingAdmissionPolicyBinding from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T17:14:59.336441676Z I0216 17:14:59.336396 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T17:14:59.337187828Z I0216 17:14:59.337150 1 reflector.go:368] Caches populated for *v1.ValidatingWebhookConfiguration from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T17:14:59.341290025Z I0216 17:14:59.341244 1 reflector.go:368] Caches populated for *v1.MutatingWebhookConfiguration from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T17:14:59.341824181Z I0216 17:14:59.341789 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T17:14:59.343130331Z I0216 17:14:59.342302 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T17:14:59.343130331Z I0216 17:14:59.342373 1 reflector.go:368] Caches populated for *v1.ValidatingAdmissionPolicy from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T17:14:59.348066003Z I0216 17:14:59.345720 1 reflector.go:368] Caches populated for *v1.Group from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T17:14:59.348066003Z I0216 17:14:59.346084 1 reflector.go:368] Caches populated for *v1.OAuthClient from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T17:14:59.351400115Z I0216 17:14:59.351282 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T17:14:59.406199169Z I0216 17:14:59.406124 1 shared_informer.go:320] Caches are synced for *generic.policySource[*k8s.io/api/admissionregistration/v1.ValidatingAdmissionPolicy,*k8s.io/api/admissionregistration/v1.ValidatingAdmissionPolicyBinding,k8s.io/apiserver/pkg/admission/plugin/policy/validating.Validator] 2026-02-16T17:14:59.406199169Z I0216 17:14:59.406152 1 policy_source.go:224] refreshing policies 2026-02-16T17:14:59.415347691Z I0216 17:14:59.415297 1 policy_source.go:419] informer started for config.openshift.io/v1, Kind=Infrastructure 2026-02-16T17:14:59.422613394Z I0216 17:14:59.419461 1 reflector.go:368] Caches populated for config.openshift.io/v1, Resource=infrastructures from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T17:14:59.434314743Z I0216 17:14:59.434063 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T17:14:59.434314743Z I0216 17:14:59.434080 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-16T17:14:59.434314743Z I0216 17:14:59.434154 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T17:14:59.434356355Z I0216 17:14:59.434302 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-16 16:50:47 +0000 UTC to 2026-02-17 16:50:47 +0000 UTC (now=2026-02-16 17:14:59.434271772 +0000 UTC))" 2026-02-16T17:14:59.434622763Z I0216 17:14:59.434519 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"api.openshift-oauth-apiserver.svc\" [serving] validServingFor=[api.openshift-oauth-apiserver.svc,api.openshift-oauth-apiserver.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771261227\" (2026-02-16 17:00:46 +0000 UTC to 2028-02-16 17:00:47 +0000 UTC (now=2026-02-16 17:14:59.434501189 +0000 UTC))" 2026-02-16T17:14:59.434738757Z I0216 17:14:59.434654 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771262098\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771262098\" (2026-02-16 16:14:58 +0000 UTC to 2029-02-16 16:14:58 +0000 UTC (now=2026-02-16 17:14:59.434638123 +0000 UTC))" 2026-02-16T17:14:59.436081278Z I0216 17:14:59.435100 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-02-16 16:44:14 +0000 UTC to 2036-02-14 16:44:14 +0000 UTC (now=2026-02-16 17:14:59.435079977 +0000 UTC))" 2026-02-16T17:14:59.436081278Z I0216 17:14:59.435130 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-02-16 16:50:49 +0000 UTC to 2026-02-17 16:50:49 +0000 UTC (now=2026-02-16 17:14:59.435116778 +0000 UTC))" 2026-02-16T17:14:59.436081278Z I0216 17:14:59.435148 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-02-16 16:50:49 +0000 UTC to 2027-02-16 16:50:49 +0000 UTC (now=2026-02-16 17:14:59.435137289 +0000 UTC))" 2026-02-16T17:14:59.436081278Z I0216 17:14:59.435165 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-02-16 16:50:49 +0000 UTC to 2027-02-16 16:50:49 +0000 UTC (now=2026-02-16 17:14:59.435154479 +0000 UTC))" 2026-02-16T17:14:59.436081278Z I0216 17:14:59.435181 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-02-16 16:50:47 +0000 UTC to 2036-02-14 16:50:47 +0000 UTC (now=2026-02-16 17:14:59.43517017 +0000 UTC))" 2026-02-16T17:14:59.436081278Z I0216 17:14:59.435197 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-csr-signer_@1771261235\" [] issuer=\"kubelet-signer\" (2026-02-16 17:00:34 +0000 UTC to 2026-02-17 16:50:49 +0000 UTC (now=2026-02-16 17:14:59.43518644 +0000 UTC))" 2026-02-16T17:14:59.436081278Z I0216 17:14:59.435217 1 tlsconfig.go:181] "Loaded client CA" index=6 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"openshift-kube-apiserver-operator_node-system-admin-signer@1771261220\" [] issuer=\"\" (2026-02-16 17:00:19 +0000 UTC to 2027-02-16 17:00:20 +0000 UTC (now=2026-02-16 17:14:59.435201941 +0000 UTC))" 2026-02-16T17:14:59.436081278Z I0216 17:14:59.435232 1 tlsconfig.go:181] "Loaded client CA" index=7 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-16 16:50:47 +0000 UTC to 2026-02-17 16:50:47 +0000 UTC (now=2026-02-16 17:14:59.435221941 +0000 UTC))" 2026-02-16T17:14:59.436081278Z I0216 17:14:59.435414 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"api.openshift-oauth-apiserver.svc\" [serving] validServingFor=[api.openshift-oauth-apiserver.svc,api.openshift-oauth-apiserver.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771261227\" (2026-02-16 17:00:46 +0000 UTC to 2028-02-16 17:00:47 +0000 UTC (now=2026-02-16 17:14:59.435394047 +0000 UTC))" 2026-02-16T17:14:59.436081278Z I0216 17:14:59.435542 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771262098\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771262098\" (2026-02-16 16:14:58 +0000 UTC to 2029-02-16 16:14:58 +0000 UTC (now=2026-02-16 17:14:59.435527261 +0000 UTC))" 2026-02-16T17:15:00.461131370Z I0216 17:15:00.461072 1 policy_source.go:224] refreshing policies config/pod/openshift-oauth-apiserver/apiserver-66788cb45c-dp9bc.json0000640000000000000000000002542415144650270023630 0ustar0000000000000000{"metadata":{"name":"apiserver-66788cb45c-dp9bc","generateName":"apiserver-66788cb45c-","namespace":"openshift-oauth-apiserver","uid":"7390ccc6-dfbe-4f51-960c-7628f49bffb7","resourceVersion":"17548","creationTimestamp":"2026-02-16T17:00:50Z","labels":{"apiserver":"true","app":"openshift-oauth-apiserver","oauth-apiserver-anti-affinity":"true","pod-template-hash":"66788cb45c","revision":"1"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.35/23\"],\"mac_address\":\"0a:58:0a:80:00:23\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.35/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.35\"\n ],\n \"mac\": \"0a:58:0a:80:00:23\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","operator.openshift.io/dep-openshift-oauth-apiserver.etcd-client.secret":"dfz49A==","operator.openshift.io/dep-openshift-oauth-apiserver.etcd-serving-ca.configmap":"za6WWg=="},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"apiserver-66788cb45c","uid":"8f67abc1-f338-4fd8-b2ce-ce8e23643967","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"audit-policies","configMap":{"name":"audit-1","defaultMode":420}},{"name":"etcd-client","secret":{"secretName":"etcd-client","defaultMode":420}},{"name":"etcd-serving-ca","configMap":{"name":"etcd-serving-ca","defaultMode":420}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420}},{"name":"trusted-ca-bundle","configMap":{"name":"trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420,"optional":true}},{"name":"encryption-config","secret":{"secretName":"encryption-config-1","defaultMode":420,"optional":true}},{"name":"audit-dir","hostPath":{"path":"/var/log/oauth-apiserver","type":""}},{"name":"kube-api-access-5v65g","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"initContainers":[{"name":"fix-audit-permissions","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192","command":["sh","-c","chmod 0700 /var/log/oauth-apiserver \u0026\u0026 touch /var/log/oauth-apiserver/audit.log \u0026\u0026 chmod 0600 /var/log/oauth-apiserver/*"],"resources":{"requests":{"cpu":"15m","memory":"50Mi"}},"volumeMounts":[{"name":"audit-dir","mountPath":"/var/log/oauth-apiserver"},{"name":"kube-api-access-5v65g","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"containers":[{"name":"oauth-apiserver","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192","command":["/bin/bash","-ec"],"args":["if [ -s /var/run/configmaps/trusted-ca-bundle/tls-ca-bundle.pem ]; then\n echo \"Copying system trust bundle\"\n cp -f /var/run/configmaps/trusted-ca-bundle/tls-ca-bundle.pem /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\nexec oauth-apiserver start \\\n --secure-port=8443 \\\n --audit-log-path=/var/log/oauth-apiserver/audit.log \\\n --audit-log-format=json \\\n --audit-log-maxsize=100 \\\n --audit-log-maxbackup=10 \\\n --audit-policy-file=/var/run/configmaps/audit/policy.yaml \\\n --etcd-cafile=/var/run/configmaps/etcd-serving-ca/ca-bundle.crt \\\n --etcd-keyfile=/var/run/secrets/etcd-client/tls.key \\\n --etcd-certfile=/var/run/secrets/etcd-client/tls.crt \\\n --etcd-healthcheck-timeout=9s \\\n --etcd-readycheck-timeout=9s \\\n --shutdown-delay-duration=50s \\\n --shutdown-send-retry-after=true \\\n --tls-private-key-file=/var/run/secrets/serving-cert/tls.key \\\n --tls-cert-file=/var/run/secrets/serving-cert/tls.crt \\\n --enable-priority-and-fairness=false \\\n --api-audiences=https://kubernetes.default.svc \\\n --cors-allowed-origins='//127\\.0\\.0\\.1(:|$)' \\\n --cors-allowed-origins='//localhost(:|$)' \\\n --etcd-servers=https://192.168.32.10:2379 \\\n --tls-cipher-suites=TLS_AES_128_GCM_SHA256 \\\n --tls-cipher-suites=TLS_AES_256_GCM_SHA384 \\\n --tls-cipher-suites=TLS_CHACHA20_POLY1305_SHA256 \\\n --tls-cipher-suites=TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 \\\n --tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 \\\n --tls-cipher-suites=TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 \\\n --tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 \\\n --tls-cipher-suites=TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --tls-cipher-suites=TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --tls-min-version=VersionTLS12 \\\n --v=2\n"],"ports":[{"containerPort":8443,"protocol":"TCP"}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"150m","memory":"200Mi"}},"volumeMounts":[{"name":"audit-policies","mountPath":"/var/run/configmaps/audit"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"etcd-serving-ca","mountPath":"/var/run/configmaps/etcd-serving-ca"},{"name":"trusted-ca-bundle","mountPath":"/var/run/configmaps/trusted-ca-bundle"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"encryption-config","mountPath":"/var/run/secrets/encryption-config"},{"name":"audit-dir","mountPath":"/var/log/oauth-apiserver"},{"name":"kube-api-access-5v65g","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"livez?exclude=etcd","port":8443,"scheme":"HTTPS"},"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"readyz?exclude=etcd\u0026exclude=etcd-readiness","port":8443,"scheme":"HTTPS"},"timeoutSeconds":10,"periodSeconds":5,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"livez","port":8443,"scheme":"HTTPS"},"timeoutSeconds":10,"periodSeconds":5,"successThreshold":1,"failureThreshold":30},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Always","terminationGracePeriodSeconds":120,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"oauth-apiserver-sa","serviceAccount":"oauth-apiserver-sa","nodeName":"master-0","securityContext":{},"affinity":{"podAntiAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":[{"labelSelector":{"matchLabels":{"apiserver":"true","app":"openshift-oauth-apiserver","oauth-apiserver-anti-affinity":"true"}},"topologyKey":"kubernetes.io/hostname"}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:56Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:00:59Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:15:01Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:15:01Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:00:50Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.35","podIPs":[{"ip":"10.128.0.35"}],"startTime":"2026-02-16T17:00:50Z","initContainerStatuses":[{"name":"fix-audit-permissions","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-16T17:14:54Z","finishedAt":"2026-02-16T17:14:54Z","containerID":"cri-o://f56650a7cd747679b26e32b6c1845bca37f45bc74f5c310339afb92474238f56"}},"lastState":{},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192","containerID":"cri-o://f56650a7cd747679b26e32b6c1845bca37f45bc74f5c310339afb92474238f56","started":false,"volumeMounts":[{"name":"audit-dir","mountPath":"/var/log/oauth-apiserver"},{"name":"kube-api-access-5v65g","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"containerStatuses":[{"name":"oauth-apiserver","state":{"running":{"startedAt":"2026-02-16T17:14:58Z"}},"lastState":{},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192","containerID":"cri-o://a5e1bc9705809e56cb5532964f561268e78fe67a532cfa1c9cdadd3fae8399c5","started":true,"volumeMounts":[{"name":"audit-policies","mountPath":"/var/run/configmaps/audit"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"etcd-serving-ca","mountPath":"/var/run/configmaps/etcd-serving-ca"},{"name":"trusted-ca-bundle","mountPath":"/var/run/configmaps/trusted-ca-bundle"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"encryption-config","mountPath":"/var/run/secrets/encryption-config"},{"name":"audit-dir","mountPath":"/var/log/oauth-apiserver"},{"name":"kube-api-access-5v65g","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-ingress/logs/router-default-864ddd5f56-pm4rt/router_current.log0000640000000000000000000002344215144650270027107 0ustar00000000000000002026-02-16T17:14:41.754922599Z [-]backend-http failed: backend reported failure 2026-02-16T17:14:41.754922599Z [-]has-synced failed: Router not synced 2026-02-16T17:14:42.753898719Z I0216 17:14:42.753846 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:14:42.753898719Z [-]backend-http failed: backend reported failure 2026-02-16T17:14:42.753898719Z [-]has-synced failed: Router not synced 2026-02-16T17:14:43.756101127Z I0216 17:14:43.754284 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:14:43.756101127Z [-]backend-http failed: backend reported failure 2026-02-16T17:14:43.756101127Z [-]has-synced failed: Router not synced 2026-02-16T17:14:44.753926057Z I0216 17:14:44.753841 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:14:44.753926057Z [-]backend-http failed: backend reported failure 2026-02-16T17:14:44.753926057Z [-]has-synced failed: Router not synced 2026-02-16T17:14:45.755444925Z I0216 17:14:45.755385 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:14:45.755444925Z [-]backend-http failed: backend reported failure 2026-02-16T17:14:45.755444925Z [-]has-synced failed: Router not synced 2026-02-16T17:14:46.754684503Z I0216 17:14:46.754620 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:14:46.754684503Z [-]backend-http failed: backend reported failure 2026-02-16T17:14:46.754684503Z [-]has-synced failed: Router not synced 2026-02-16T17:14:47.753627047Z I0216 17:14:47.753582 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:14:47.753627047Z [-]backend-http failed: backend reported failure 2026-02-16T17:14:47.753627047Z [-]has-synced failed: Router not synced 2026-02-16T17:14:48.754253049Z I0216 17:14:48.754197 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:14:48.754253049Z [-]backend-http failed: backend reported failure 2026-02-16T17:14:48.754253049Z [-]has-synced failed: Router not synced 2026-02-16T17:14:49.753869500Z I0216 17:14:49.753818 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:14:49.753869500Z [-]backend-http failed: backend reported failure 2026-02-16T17:14:49.753869500Z [-]has-synced failed: Router not synced 2026-02-16T17:14:50.753318537Z I0216 17:14:50.753232 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:14:50.753318537Z [-]backend-http failed: backend reported failure 2026-02-16T17:14:50.753318537Z [-]has-synced failed: Router not synced 2026-02-16T17:14:51.776553664Z I0216 17:14:51.776519 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:14:51.776553664Z [-]backend-http failed: backend reported failure 2026-02-16T17:14:51.776553664Z [-]has-synced failed: Router not synced 2026-02-16T17:14:52.829202065Z I0216 17:14:52.829159 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:14:52.829202065Z [-]backend-http failed: backend reported failure 2026-02-16T17:14:52.829202065Z [-]has-synced failed: Router not synced 2026-02-16T17:14:53.755024299Z I0216 17:14:53.754422 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:14:53.755024299Z [-]backend-http failed: backend reported failure 2026-02-16T17:14:53.755024299Z [-]has-synced failed: Router not synced 2026-02-16T17:14:54.753609919Z I0216 17:14:54.753560 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:14:54.753609919Z [-]backend-http failed: backend reported failure 2026-02-16T17:14:54.753609919Z [-]has-synced failed: Router not synced 2026-02-16T17:14:55.755551042Z I0216 17:14:55.755375 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:14:55.755551042Z [-]backend-http failed: backend reported failure 2026-02-16T17:14:55.755551042Z [-]has-synced failed: Router not synced 2026-02-16T17:14:56.754352398Z I0216 17:14:56.754296 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:14:56.754352398Z [-]backend-http failed: backend reported failure 2026-02-16T17:14:56.754352398Z [-]has-synced failed: Router not synced 2026-02-16T17:14:57.754223328Z I0216 17:14:57.754155 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:14:57.754223328Z [-]backend-http failed: backend reported failure 2026-02-16T17:14:57.754223328Z [-]has-synced failed: Router not synced 2026-02-16T17:14:58.754229402Z I0216 17:14:58.753035 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:14:58.754229402Z [-]backend-http failed: backend reported failure 2026-02-16T17:14:58.754229402Z [-]has-synced failed: Router not synced 2026-02-16T17:14:59.755898867Z I0216 17:14:59.755737 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:14:59.755898867Z [-]backend-http failed: backend reported failure 2026-02-16T17:14:59.755898867Z [-]has-synced failed: Router not synced 2026-02-16T17:15:00.140024492Z W0216 17:15:00.139331 1 reflector.go:547] github.com/openshift/router/pkg/router/controller/factory/factory.go:124: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-16T17:15:00.140024492Z I0216 17:15:00.139373 1 trace.go:236] Trace[843747958]: "Reflector ListAndWatch" name:github.com/openshift/router/pkg/router/controller/factory/factory.go:124 (16-Feb-2026 17:14:30.130) (total time: 30008ms): 2026-02-16T17:15:00.140024492Z Trace[843747958]: ---"Objects listed" error:the server is currently unable to handle the request (get routes.route.openshift.io) 30008ms (17:15:00.139) 2026-02-16T17:15:00.140024492Z Trace[843747958]: [30.008869801s] [30.008869801s] END 2026-02-16T17:15:00.140024492Z E0216 17:15:00.139394 1 reflector.go:150] github.com/openshift/router/pkg/router/controller/factory/factory.go:124: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-16T17:15:00.758272913Z I0216 17:15:00.758203 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:15:00.758272913Z [-]backend-http failed: backend reported failure 2026-02-16T17:15:00.758272913Z [-]has-synced failed: Router not synced 2026-02-16T17:15:01.755267044Z I0216 17:15:01.754265 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:15:01.755267044Z [-]backend-http failed: backend reported failure 2026-02-16T17:15:01.755267044Z [-]has-synced failed: Router not synced 2026-02-16T17:15:02.754463583Z I0216 17:15:02.754416 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:15:02.754463583Z [-]backend-http failed: backend reported failure 2026-02-16T17:15:02.754463583Z [-]has-synced failed: Router not synced 2026-02-16T17:15:03.753554228Z I0216 17:15:03.753514 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:15:03.753554228Z [-]backend-http failed: backend reported failure 2026-02-16T17:15:03.753554228Z [-]has-synced failed: Router not synced 2026-02-16T17:15:04.756743950Z I0216 17:15:04.756699 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:15:04.756743950Z [-]backend-http failed: backend reported failure 2026-02-16T17:15:04.756743950Z [-]has-synced failed: Router not synced 2026-02-16T17:15:05.754222646Z I0216 17:15:05.754154 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:15:05.754222646Z [-]backend-http failed: backend reported failure 2026-02-16T17:15:05.754222646Z [-]has-synced failed: Router not synced 2026-02-16T17:15:06.760658467Z I0216 17:15:06.760609 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:15:06.760658467Z [-]backend-http failed: backend reported failure 2026-02-16T17:15:06.760658467Z [-]has-synced failed: Router not synced 2026-02-16T17:15:07.756057739Z I0216 17:15:07.754240 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:15:07.756057739Z [-]backend-http failed: backend reported failure 2026-02-16T17:15:07.756057739Z [-]has-synced failed: Router not synced 2026-02-16T17:15:08.753907186Z I0216 17:15:08.753764 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:15:08.753907186Z [-]backend-http failed: backend reported failure 2026-02-16T17:15:08.753907186Z [-]has-synced failed: Router not synced 2026-02-16T17:15:09.754737275Z I0216 17:15:09.754631 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:15:09.754737275Z [-]backend-http failed: backend reported failure 2026-02-16T17:15:09.754737275Z [-]has-synced failed: Router not synced 2026-02-16T17:15:10.754718507Z I0216 17:15:10.754653 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:15:10.754718507Z [-]backend-http failed: backend reported failure 2026-02-16T17:15:10.754718507Z [-]has-synced failed: Router not synced 2026-02-16T17:15:11.754054571Z I0216 17:15:11.753945 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:15:11.754054571Z [-]backend-http failed: backend reported failure 2026-02-16T17:15:11.754054571Z [-]has-synced failed: Router not synced 2026-02-16T17:15:12.277896411Z I0216 17:15:12.277811 1 reflector.go:359] Caches populated for *v1.Route from github.com/openshift/router/pkg/router/controller/factory/factory.go:124 2026-02-16T17:15:12.292283793Z E0216 17:15:12.292209 1 haproxy.go:418] can't scrape HAProxy: dial unix /var/lib/haproxy/run/haproxy.sock: connect: no such file or directory 2026-02-16T17:15:12.358990333Z I0216 17:15:12.358913 1 router.go:669] "msg"="router reloaded" "logger"="template" "output"=" - Checking http://localhost:80 ...\n - Health check ok : 0 retry attempt(s).\n" config/pod/openshift-ingress/router-default-864ddd5f56-pm4rt.json0000640000000000000000000002032115144650270023242 0ustar0000000000000000{"metadata":{"name":"router-default-864ddd5f56-pm4rt","generateName":"router-default-864ddd5f56-","namespace":"openshift-ingress","uid":"f0b1ebd3-1068-4624-9b6d-3e9f45ded76a","resourceVersion":"17624","creationTimestamp":"2026-02-16T17:00:51Z","labels":{"ingresscontroller.operator.openshift.io/deployment-ingresscontroller":"default","ingresscontroller.operator.openshift.io/hash":"575d6c6cf5","pod-template-hash":"864ddd5f56"},"annotations":{"openshift.io/required-scc":"hostnetwork","openshift.io/scc":"hostnetwork"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"router-default-864ddd5f56","uid":"1fede488-17fa-4630-99b0-06876d9acdba","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"default-certificate","secret":{"secretName":"router-certs-default","defaultMode":420}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"defaultMode":420,"optional":false}},{"name":"stats-auth","secret":{"secretName":"router-stats-default","defaultMode":420}},{"name":"metrics-certs","secret":{"secretName":"router-metrics-certs-default","defaultMode":420}},{"name":"kube-api-access-94kdz","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"router","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb","ports":[{"name":"http","hostPort":80,"containerPort":80,"protocol":"TCP"},{"name":"https","hostPort":443,"containerPort":443,"protocol":"TCP"},{"name":"metrics","hostPort":1936,"containerPort":1936,"protocol":"TCP"}],"env":[{"name":"DEFAULT_CERTIFICATE_DIR","value":"/etc/pki/tls/private"},{"name":"DEFAULT_DESTINATION_CA_PATH","value":"/var/run/configmaps/service-ca/service-ca.crt"},{"name":"RELOAD_INTERVAL","value":"5s"},{"name":"ROUTER_ALLOW_WILDCARD_ROUTES","value":"false"},{"name":"ROUTER_CANONICAL_HOSTNAME","value":"router-default.apps.sno.openstack.lab"},{"name":"ROUTER_CIPHERS","value":"ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384"},{"name":"ROUTER_CIPHERSUITES","value":"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256"},{"name":"ROUTER_DISABLE_HTTP2","value":"true"},{"name":"ROUTER_DISABLE_NAMESPACE_OWNERSHIP_CHECK","value":"false"},{"name":"ROUTER_DOMAIN","value":"apps.sno.openstack.lab"},{"name":"ROUTER_IDLE_CLOSE_ON_RESPONSE","value":"true"},{"name":"ROUTER_LOAD_BALANCE_ALGORITHM","value":"random"},{"name":"ROUTER_METRICS_TLS_CERT_FILE","value":"/etc/pki/tls/metrics-certs/tls.crt"},{"name":"ROUTER_METRICS_TLS_KEY_FILE","value":"/etc/pki/tls/metrics-certs/tls.key"},{"name":"ROUTER_METRICS_TYPE","value":"haproxy"},{"name":"ROUTER_SERVICE_HTTPS_PORT","value":"443"},{"name":"ROUTER_SERVICE_HTTP_PORT","value":"80"},{"name":"ROUTER_SERVICE_NAME","value":"default"},{"name":"ROUTER_SERVICE_NAMESPACE","value":"openshift-ingress"},{"name":"ROUTER_SET_FORWARDED_HEADERS","value":"append"},{"name":"ROUTER_TCP_BALANCE_SCHEME","value":"source"},{"name":"ROUTER_THREADS","value":"4"},{"name":"SSL_MIN_VERSION","value":"TLSv1.2"},{"name":"STATS_PASSWORD_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsPassword"},{"name":"STATS_PORT","value":"1936"},{"name":"STATS_USERNAME_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsUsername"}],"resources":{"requests":{"cpu":"100m","memory":"256Mi"}},"volumeMounts":[{"name":"default-certificate","readOnly":true,"mountPath":"/etc/pki/tls/private"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca"},{"name":"stats-auth","readOnly":true,"mountPath":"/var/lib/haproxy/conf/metrics-auth"},{"name":"metrics-certs","readOnly":true,"mountPath":"/etc/pki/tls/metrics-certs"},{"name":"kube-api-access-94kdz","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3,"terminationGracePeriodSeconds":10},"readinessProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":1,"successThreshold":1,"failureThreshold":120},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000660000,"runAsNonRoot":true,"readOnlyRootFilesystem":false,"allowPrivilegeEscalation":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":3600,"dnsPolicy":"ClusterFirstWithHostNet","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"router","serviceAccount":"router","nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c26,c5"},"supplementalGroups":[1000660000],"fsGroup":1000660000},"schedulerName":"default-scheduler","tolerations":[{"key":"kubernetes.io/e2e-evict-taint-key","operator":"Equal","value":"evictTaintVal","effect":"NoExecute"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority","topologySpreadConstraints":[{"maxSkew":1,"topologyKey":"topology.kubernetes.io/zone","whenUnsatisfiable":"ScheduleAnyway","labelSelector":{"matchExpressions":[{"key":"ingresscontroller.operator.openshift.io/hash","operator":"In","values":["575d6c6cf5"]}]}}]},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:03:32Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:03:28Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:15:12Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:15:12Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:03:28Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-16T17:03:28Z","containerStatuses":[{"name":"router","state":{"running":{"startedAt":"2026-02-16T17:14:19Z"}},"lastState":{},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb","containerID":"cri-o://2b957c1b138060c3f9a90460ab5c917baa8b9b7947048853c149a12a64c8d256","started":true,"volumeMounts":[{"name":"default-certificate","mountPath":"/etc/pki/tls/private","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca-bundle","mountPath":"/var/run/configmaps/service-ca","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"stats-auth","mountPath":"/var/lib/haproxy/conf/metrics-auth","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"metrics-certs","mountPath":"/etc/pki/tls/metrics-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-94kdz","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}authentication-operator_current.log0000640000000000000000000003253315144650270037202 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-755d954778-lf4cb2026-02-16T17:14:56.686872044Z Copying system trust bundle 2026-02-16T17:14:57.229901784Z W0216 17:14:57.229767 1 cmd.go:167] Unable to read initial content of "/tmp/terminate": open /tmp/terminate: no such file or directory 2026-02-16T17:14:57.230855943Z I0216 17:14:57.230271 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-16T17:14:57.230855943Z I0216 17:14:57.230294 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-16T17:14:57.232955168Z I0216 17:14:57.231095 1 observer_polling.go:159] Starting file observer 2026-02-16T17:14:57.232955168Z I0216 17:14:57.232281 1 observer_polling.go:159] Starting file observer 2026-02-16T17:14:57.385743493Z I0216 17:14:57.382828 1 builder.go:304] cluster-authentication-operator version - 2026-02-16T17:14:57.385743493Z I0216 17:14:57.383690 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-16T17:14:58.240133162Z I0216 17:14:58.239596 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-02-16T17:14:58.623986999Z I0216 17:14:58.623804 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-02-16T17:14:58.623986999Z I0216 17:14:58.623826 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-02-16T17:14:58.623986999Z I0216 17:14:58.623843 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-02-16T17:14:58.623986999Z I0216 17:14:58.623848 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-02-16T17:14:58.633079079Z I0216 17:14:58.630055 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-16T17:14:58.633079079Z W0216 17:14:58.630073 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-16T17:14:58.633079079Z W0216 17:14:58.630078 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-16T17:14:58.633079079Z W0216 17:14:58.630082 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-16T17:14:58.633079079Z W0216 17:14:58.630085 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-16T17:14:58.633079079Z W0216 17:14:58.630087 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-16T17:14:58.633079079Z W0216 17:14:58.630090 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-16T17:14:58.633079079Z I0216 17:14:58.630342 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-02-16T17:14:58.691845715Z I0216 17:14:58.691732 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-16T17:14:58.692291258Z I0216 17:14:58.692005 1 leaderelection.go:254] attempting to acquire leader lease openshift-authentication-operator/cluster-authentication-operator-lock... 2026-02-16T17:14:58.706332620Z I0216 17:14:58.706276 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-16T17:14:58.706372941Z I0216 17:14:58.706324 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-16T17:14:58.706372941Z I0216 17:14:58.706352 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T17:14:58.706435763Z I0216 17:14:58.706335 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T17:14:58.706536736Z I0216 17:14:58.706511 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-16T17:14:58.706536736Z I0216 17:14:58.706527 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-16T17:14:58.706761343Z I0216 17:14:58.706731 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771261227\" (2026-02-16 17:00:32 +0000 UTC to 2028-02-16 17:00:33 +0000 UTC (now=2026-02-16 17:14:58.706688141 +0000 UTC))" 2026-02-16T17:14:58.706865166Z I0216 17:14:58.706269 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-16T17:14:58.706865166Z I0216 17:14:58.706855 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-16T17:14:58.706936699Z I0216 17:14:58.706919 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771262098\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771262097\" (2026-02-16 16:14:57 +0000 UTC to 2027-02-16 16:14:57 +0000 UTC (now=2026-02-16 17:14:58.706893877 +0000 UTC))" 2026-02-16T17:14:58.707027561Z I0216 17:14:58.706961 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-16T17:14:58.707064002Z I0216 17:14:58.707031 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-16T17:14:58.707097173Z I0216 17:14:58.707070 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-16T17:14:58.709006952Z I0216 17:14:58.708951 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2026-02-16T17:14:58.709525548Z I0216 17:14:58.709488 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2026-02-16T17:14:58.710076165Z I0216 17:14:58.710056 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-02-16T17:14:58.712961534Z I0216 17:14:58.712555 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/authentication/request/headerrequest/requestheader_controller.go:175 2026-02-16T17:14:58.809053847Z I0216 17:14:58.806841 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T17:14:58.809053847Z I0216 17:14:58.806890 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-16T17:14:58.809053847Z I0216 17:14:58.806886 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T17:14:58.809053847Z I0216 17:14:58.807144 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-16 16:50:47 +0000 UTC to 2026-02-17 16:50:47 +0000 UTC (now=2026-02-16 17:14:58.807116827 +0000 UTC))" 2026-02-16T17:14:58.809053847Z I0216 17:14:58.807324 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771261227\" (2026-02-16 17:00:32 +0000 UTC to 2028-02-16 17:00:33 +0000 UTC (now=2026-02-16 17:14:58.807300803 +0000 UTC))" 2026-02-16T17:14:58.809053847Z I0216 17:14:58.807435 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771262098\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771262097\" (2026-02-16 16:14:57 +0000 UTC to 2027-02-16 16:14:57 +0000 UTC (now=2026-02-16 17:14:58.807424107 +0000 UTC))" 2026-02-16T17:14:58.809053847Z I0216 17:14:58.807550 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-02-16 16:44:14 +0000 UTC to 2036-02-14 16:44:14 +0000 UTC (now=2026-02-16 17:14:58.80753964 +0000 UTC))" 2026-02-16T17:14:58.809053847Z I0216 17:14:58.807564 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-02-16 16:50:49 +0000 UTC to 2026-02-17 16:50:49 +0000 UTC (now=2026-02-16 17:14:58.807555951 +0000 UTC))" 2026-02-16T17:14:58.809053847Z I0216 17:14:58.807580 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-02-16 16:50:49 +0000 UTC to 2027-02-16 16:50:49 +0000 UTC (now=2026-02-16 17:14:58.807567821 +0000 UTC))" 2026-02-16T17:14:58.809053847Z I0216 17:14:58.807604 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-02-16 16:50:49 +0000 UTC to 2027-02-16 16:50:49 +0000 UTC (now=2026-02-16 17:14:58.807584812 +0000 UTC))" 2026-02-16T17:14:58.809053847Z I0216 17:14:58.807619 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-02-16 16:50:47 +0000 UTC to 2036-02-14 16:50:47 +0000 UTC (now=2026-02-16 17:14:58.807608853 +0000 UTC))" 2026-02-16T17:14:58.809053847Z I0216 17:14:58.807631 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-csr-signer_@1771261235\" [] issuer=\"kubelet-signer\" (2026-02-16 17:00:34 +0000 UTC to 2026-02-17 16:50:49 +0000 UTC (now=2026-02-16 17:14:58.807623843 +0000 UTC))" 2026-02-16T17:14:58.809053847Z I0216 17:14:58.807648 1 tlsconfig.go:181] "Loaded client CA" index=6 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"openshift-kube-apiserver-operator_node-system-admin-signer@1771261220\" [] issuer=\"\" (2026-02-16 17:00:19 +0000 UTC to 2027-02-16 17:00:20 +0000 UTC (now=2026-02-16 17:14:58.807637133 +0000 UTC))" 2026-02-16T17:14:58.809053847Z I0216 17:14:58.807660 1 tlsconfig.go:181] "Loaded client CA" index=7 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-16 16:50:47 +0000 UTC to 2026-02-17 16:50:47 +0000 UTC (now=2026-02-16 17:14:58.807653014 +0000 UTC))" 2026-02-16T17:14:58.809053847Z I0216 17:14:58.807759 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771261227\" (2026-02-16 17:00:32 +0000 UTC to 2028-02-16 17:00:33 +0000 UTC (now=2026-02-16 17:14:58.807745637 +0000 UTC))" 2026-02-16T17:14:58.809053847Z I0216 17:14:58.807842 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771262098\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771262097\" (2026-02-16 16:14:57 +0000 UTC to 2027-02-16 16:14:57 +0000 UTC (now=2026-02-16 17:14:58.807834239 +0000 UTC))" config/pod/openshift-authentication-operator/authentication-operator-755d954778-lf4cb.json0000640000000000000000000001555715144650270030102 0ustar0000000000000000{"metadata":{"name":"authentication-operator-755d954778-lf4cb","generateName":"authentication-operator-755d954778-","namespace":"openshift-authentication-operator","uid":"9aa57eb4-c511-4ab8-a5d7-385e1ed9ee41","resourceVersion":"17261","creationTimestamp":"2026-02-16T16:58:51Z","labels":{"app":"authentication-operator","pod-template-hash":"755d954778"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.9/23\"],\"mac_address\":\"0a:58:0a:80:00:09\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.9/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.9\"\n ],\n \"mac\": \"0a:58:0a:80:00:09\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"authentication-operator-755d954778","uid":"5d6928a6-110c-41ae-bbee-2ebfc9fdea03","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config","configMap":{"name":"authentication-operator-config","defaultMode":440}},{"name":"trusted-ca-bundle","configMap":{"name":"trusted-ca-bundle","defaultMode":420,"optional":true}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","defaultMode":420,"optional":true}},{"name":"kube-api-access-f42cr","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"authentication-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963","command":["/bin/bash","-ec"],"args":["if [ -s /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\nexec authentication-operator operator --config=/var/run/configmaps/config/operator-config.yaml --v=2 --terminate-on-files=/var/run/configmaps/trusted-ca-bundle/ca-bundle.crt --terminate-on-files=/tmp/terminate\n"],"env":[{"name":"IMAGE_OAUTH_SERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2969828f1fcae82b7ef16d3588046ace3cf51b9ea578658c42475386e0ee1fc7"},{"name":"IMAGE_OAUTH_APISERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"},{"name":"OPERAND_OAUTH_SERVER_IMAGE_VERSION","value":"4.18.32_openshift"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"20m","memory":"200Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/trusted-ca-bundle"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca-bundle"},{"name":"kube-api-access-f42cr","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]},"runAsUser":0,"readOnlyRootFilesystem":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"authentication-operator","serviceAccount":"authentication-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c16,c0"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:57Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T16:59:56Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:57Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:57Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T16:59:56Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.9","podIPs":[{"ip":"10.128.0.9"}],"startTime":"2026-02-16T16:59:56Z","containerStatuses":[{"name":"authentication-operator","state":{"running":{"startedAt":"2026-02-16T17:14:56Z"}},"lastState":{},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963","containerID":"cri-o://4592a4eaa04bafb6bbe94b87216e3a2f3a1314c0e37470ac34dbb8c88f6b8e44","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","mountPath":"/var/run/configmaps/trusted-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca-bundle","mountPath":"/var/run/configmaps/service-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-f42cr","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-authentication/oauth-openshift-64f85b8fc9-n9msn.json0000640000000000000000000001562215144650270024775 0ustar0000000000000000{"metadata":{"name":"oauth-openshift-64f85b8fc9-n9msn","generateName":"oauth-openshift-64f85b8fc9-","namespace":"openshift-authentication","uid":"2be9d55c-a4ec-48cd-93d2-0a1dced745a8","resourceVersion":"14349","creationTimestamp":"2026-02-16T17:08:27Z","labels":{"app":"oauth-openshift","oauth-openshift-anti-affinity":"true","pod-template-hash":"64f85b8fc9"},"annotations":{"openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","operator.openshift.io/bootstrap-user-exists":"true","operator.openshift.io/rvs-hash":"qS3mM7tklSEjvhnl4gKOHyxws9lbaDXQ1toUJGFEzWhlgkJsPtOVI8qHxaMt_emvQQ3Xad_5zovcmQHQEf7YUA"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"oauth-openshift-64f85b8fc9","uid":"0e5cc9b9-0228-4fec-8d25-084a29438ae1","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"audit-policies","configMap":{"name":"audit","defaultMode":420}},{"name":"audit-dir","hostPath":{"path":"/var/log/oauth-server","type":""}},{"name":"v4-0-config-system-session","secret":{"secretName":"v4-0-config-system-session","defaultMode":420}},{"name":"v4-0-config-system-cliconfig","configMap":{"name":"v4-0-config-system-cliconfig","defaultMode":420}},{"name":"v4-0-config-system-serving-cert","secret":{"secretName":"v4-0-config-system-serving-cert","defaultMode":420}},{"name":"v4-0-config-system-service-ca","configMap":{"name":"v4-0-config-system-service-ca","defaultMode":420}},{"name":"v4-0-config-system-router-certs","secret":{"secretName":"v4-0-config-system-router-certs","defaultMode":420}},{"name":"v4-0-config-system-ocp-branding-template","secret":{"secretName":"v4-0-config-system-ocp-branding-template","defaultMode":420}},{"name":"v4-0-config-user-template-login","secret":{"secretName":"v4-0-config-user-template-login","defaultMode":420,"optional":true}},{"name":"v4-0-config-user-template-provider-selection","secret":{"secretName":"v4-0-config-user-template-provider-selection","defaultMode":420,"optional":true}},{"name":"v4-0-config-user-template-error","secret":{"secretName":"v4-0-config-user-template-error","defaultMode":420,"optional":true}},{"name":"v4-0-config-system-trusted-ca-bundle","configMap":{"name":"v4-0-config-system-trusted-ca-bundle","defaultMode":420,"optional":true}},{"name":"kube-api-access-7mrkc","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"oauth-openshift","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2969828f1fcae82b7ef16d3588046ace3cf51b9ea578658c42475386e0ee1fc7","command":["/bin/bash","-ec"],"args":["if [ -s /var/config/system/configmaps/v4-0-config-system-trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /var/config/system/configmaps/v4-0-config-system-trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\nexec oauth-server osinserver \\\n--config=/var/config/system/configmaps/v4-0-config-system-cliconfig/v4-0-config-system-cliconfig \\\n--v=2 \\\n--audit-log-format=json \\\n--audit-log-maxbackup=10 \\\n--audit-log-maxsize=100 \\\n--audit-log-path=/var/log/oauth-server/audit.log \\\n--audit-policy-file=/var/run/configmaps/audit/audit.yaml\n"],"ports":[{"name":"https","containerPort":6443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"audit-policies","mountPath":"/var/run/configmaps/audit"},{"name":"audit-dir","mountPath":"/var/log/oauth-server"},{"name":"v4-0-config-system-session","readOnly":true,"mountPath":"/var/config/system/secrets/v4-0-config-system-session"},{"name":"v4-0-config-system-cliconfig","readOnly":true,"mountPath":"/var/config/system/configmaps/v4-0-config-system-cliconfig"},{"name":"v4-0-config-system-serving-cert","readOnly":true,"mountPath":"/var/config/system/secrets/v4-0-config-system-serving-cert"},{"name":"v4-0-config-system-service-ca","readOnly":true,"mountPath":"/var/config/system/configmaps/v4-0-config-system-service-ca"},{"name":"v4-0-config-system-router-certs","readOnly":true,"mountPath":"/var/config/system/secrets/v4-0-config-system-router-certs"},{"name":"v4-0-config-system-ocp-branding-template","readOnly":true,"mountPath":"/var/config/system/secrets/v4-0-config-system-ocp-branding-template"},{"name":"v4-0-config-user-template-login","readOnly":true,"mountPath":"/var/config/user/template/secret/v4-0-config-user-template-login"},{"name":"v4-0-config-user-template-provider-selection","readOnly":true,"mountPath":"/var/config/user/template/secret/v4-0-config-user-template-provider-selection"},{"name":"v4-0-config-user-template-error","readOnly":true,"mountPath":"/var/config/user/template/secret/v4-0-config-user-template-error"},{"name":"v4-0-config-system-trusted-ca-bundle","readOnly":true,"mountPath":"/var/config/system/configmaps/v4-0-config-system-trusted-ca-bundle"},{"name":"kube-api-access-7mrkc","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":6443,"scheme":"HTTPS"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/healthz","port":6443,"scheme":"HTTPS"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"lifecycle":{"preStop":{"exec":{"command":["sleep","25"]}}},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0,"readOnlyRootFilesystem":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":40,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"oauth-openshift","serviceAccount":"oauth-openshift","securityContext":{},"imagePullSecrets":[{"name":"oauth-openshift-dockercfg-nkhdh"}],"affinity":{"podAntiAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":[{"labelSelector":{"matchLabels":{"app":"oauth-openshift","oauth-openshift-anti-affinity":"true"}},"topologyKey":"kubernetes.io/hostname"}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Pending","qosClass":"Burstable"}}events/openshift-machine-config-operator.json0000640000000000000000000015107615144650270020152 0ustar0000000000000000{"items":[{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T16:58:49Z","reason":"BackOff","message":"Back-off restarting failed container kube-rbac-proxy-crio in pod kube-rbac-proxy-crio-master-0_openshift-machine-config-operator(b3322fd3717f4aec0d8f54ec7862c07e)","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T16:59:02Z","reason":"Created","message":"Created container: kube-rbac-proxy-crio","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T16:59:02Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T16:59:03Z","reason":"Started","message":"Started container kube-rbac-proxy-crio","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:25Z","reason":"ScalingReplicaSet","message":"Scaled up replica set machine-config-operator-84976bb859 to 1","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:26Z","reason":"SuccessfulCreate","message":"Created pod: machine-config-operator-84976bb859-rsnqc","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:26Z","reason":"Scheduled","message":"Successfully assigned openshift-machine-config-operator/machine-config-operator-84976bb859-rsnqc to master-0","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:31Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.57/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:33Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:33Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:33Z","reason":"Created","message":"Created container: machine-config-operator","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:33Z","reason":"Started","message":"Started container machine-config-operator","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:34Z","reason":"SecretCreated","message":"Created Secret/master-user-data-managed -n openshift-machine-api because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:34Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:34Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/machine-config-daemon because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:34Z","reason":"SecretCreated","message":"Created Secret/worker-user-data-managed -n openshift-machine-api because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:34Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:34Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:34Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/machine-config-daemon-events because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:34Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/mcd-prometheus-k8s -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:34Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/machine-config-daemon -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:34Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/machine-config-daemon-events -n default because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:35Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/machine-config-daemon -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:35Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/machine-config-daemon-events -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:35Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/mcd-prometheus-k8s -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:36Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-rbac-proxy -n openshift-machine-config-operator:\ncause by changes in data.config-file.yaml","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:36Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/machine-config-daemon because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:36Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/machine-config-daemon -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:37Z","reason":"SuccessfulCreate","message":"Created pod: machine-config-daemon-98q6v","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:37Z","reason":"ValidatingAdmissionPolicyCreated","message":"Created ValidatingAdmissionPolicy.admissionregistration.k8s.io/mcn-guards because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:37Z","reason":"ValidatingAdmissionPolicyBindingCreated","message":"Created ValidatingAdmissionPolicyBinding.admissionregistration.k8s.io/mcn-guards-binding because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:37Z","reason":"Scheduled","message":"Successfully assigned openshift-machine-config-operator/machine-config-daemon-98q6v to master-0","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:37Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:38Z","reason":"Created","message":"Created container: machine-config-daemon","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:38Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:38Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:38Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:38Z","reason":"Started","message":"Started container machine-config-daemon","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:38Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:39Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/machine-config-controller-events -n default because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:39Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/mcc-prometheus-k8s -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:39Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/machine-config-controller because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:39Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/mcc-prometheus-k8s -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:39Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/machine-config-controller-events -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:39Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/machine-config-controller-events because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:40Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/machine-config-controller because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:40Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/machine-os-puller -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:40Z","reason":"ValidatingAdmissionPolicyCreated","message":"Created ValidatingAdmissionPolicy.admissionregistration.k8s.io/custom-machine-config-pool-selector because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:40Z","reason":"ValidatingAdmissionPolicyCreated","message":"Created ValidatingAdmissionPolicy.admissionregistration.k8s.io/managed-bootimages-platform-check because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:40Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/machine-os-puller-binding -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:40Z","reason":"ValidatingAdmissionPolicyCreated","message":"Created ValidatingAdmissionPolicy.admissionregistration.k8s.io/machine-configuration-guards because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:40Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/machine-config-controller -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:41Z","reason":"Scheduled","message":"Successfully assigned openshift-machine-config-operator/machine-config-controller-686c884b4d-ksx48 to master-0","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:41Z","reason":"ValidatingAdmissionPolicyBindingCreated","message":"Created ValidatingAdmissionPolicyBinding.admissionregistration.k8s.io/managed-bootimages-platform-check-binding because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:41Z","reason":"SuccessfulCreate","message":"Created pod: machine-config-controller-686c884b4d-ksx48","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:41Z","reason":"ValidatingAdmissionPolicyBindingCreated","message":"Created ValidatingAdmissionPolicyBinding.admissionregistration.k8s.io/custom-machine-config-pool-selector-binding because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:41Z","reason":"ScalingReplicaSet","message":"Scaled up replica set machine-config-controller-686c884b4d to 1","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:41Z","reason":"ValidatingAdmissionPolicyBindingCreated","message":"Created ValidatingAdmissionPolicyBinding.admissionregistration.k8s.io/machine-configuration-guards-binding because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:02:20Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"proxy-tls\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:02:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-8p2jz\" : [failed to fetch token: Post \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-machine-config-operator/serviceaccounts/machine-config-operator/token\": dial tcp 192.168.32.10:6443: connect: connection refused, failed to sync configmap cache: timed out waiting for the condition]","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:02:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-hmj52\" : [failed to fetch token: Post \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-machine-config-operator/serviceaccounts/machine-config-controller/token\": dial tcp 192.168.32.10:6443: connect: connection refused, failed to sync configmap cache: timed out waiting for the condition]","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-sx92x\" : [failed to fetch token: Post \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-machine-config-operator/serviceaccounts/machine-config-daemon/token\": dial tcp 192.168.32.10:6443: connect: connection refused, failed to sync configmap cache: timed out waiting for the condition]","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"proxy-tls\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"mcc-auth-proxy-config\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"images\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"auth-proxy-config\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"proxy-tls\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"mcd-auth-proxy-config\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:02:47Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.69/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:02:47Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:02:47Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:02:47Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:03:28Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:38Z","reason":"SecretCreated","message":"Created Secret/node-bootstrapper-token -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:38Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/machine-config-server because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:38Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system-bootstrap-node-renewal because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:38Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/machine-config-server -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:38Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/node-bootstrapper -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:38Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/machine-config-server because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:39Z","reason":"Scheduled","message":"Successfully assigned openshift-machine-config-operator/machine-config-server-2ws9r to master-0","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:39Z","reason":"SuccessfulCreate","message":"Created pod: machine-config-server-2ws9r","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:40Z","reason":"Started","message":"Started container machine-config-server","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:40Z","reason":"Created","message":"Created container: machine-config-server","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:40Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:41Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/machine-os-builder -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:41Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/machine-os-builder-events because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:41Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/machine-os-builder because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:41Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/machine-os-builder-anyuid because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:41Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/machine-os-builder because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:41Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/machine-os-builder-events -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:41Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/machine-os-builder-events -n default because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:42Z","reason":"RenderedConfigGenerated","message":"rendered-master-f9bbc0c2cf4b5177e99dbf2979cd47a4 successfully generated (release version: 4.18.32, controller version: 0b0569287da3daea19bf47aa298037ccb4cbff98)","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:42Z","reason":"RenderedConfigGenerated","message":"rendered-worker-634061234a51a4316df7a29b146c37b3 successfully generated (release version: 4.18.32, controller version: 0b0569287da3daea19bf47aa298037ccb4cbff98)","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:43Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-rbac-proxy -n openshift-machine-config-operator:\ncause by changes in data.config-file.yaml","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:45Z","reason":"Killing","message":"Container machine-config-daemon failed liveness probe, will be restarted","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:45Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"http://127.0.0.1:8798/health\": dial tcp 127.0.0.1:8798: connect: connection refused","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:48Z","reason":"OperatorVersionChanged","message":"clusteroperator/machine-config started a version change from [] to [{operator 4.18.32} {operator-image quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42}]","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:52Z","reason":"RenderedConfigGenerated","message":"rendered-master-4ff3bdc50d696d239efb12817ae47acf successfully generated (release version: 4.18.32, controller version: 0b0569287da3daea19bf47aa298037ccb4cbff98)","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:52Z","reason":"RenderedConfigGenerated","message":"rendered-worker-c7ccd6fb94dd6d087e4a528948c79fb2 successfully generated (release version: 4.18.32, controller version: 0b0569287da3daea19bf47aa298037ccb4cbff98)","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:53Z","reason":"OperatorDegraded: RequiredPoolsFailed","message":"Unable to apply 4.18.32: error during syncRequiredMachineConfigPools: context deadline exceeded","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:54Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:55Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:55Z","reason":"Created","message":"Created container: machine-config-daemon","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:57Z","reason":"AnnotationChange","message":"Node master-0 now has machineconfiguration.openshift.io/state=Done","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:57Z","reason":"AnnotationChange","message":"Node master-0 now has machineconfiguration.openshift.io/desiredConfig=rendered-master-ccc1c4b4035b8605635ebee7b29103f5","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:57Z","reason":"AnnotationChange","message":"Node master-0 now has machineconfiguration.openshift.io/desiredConfig=rendered-master-4ff3bdc50d696d239efb12817ae47acf","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:57Z","reason":"RenderedConfigGenerated","message":"rendered-master-ccc1c4b4035b8605635ebee7b29103f5 successfully generated (release version: 4.18.32, controller version: 0b0569287da3daea19bf47aa298037ccb4cbff98)","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:57Z","reason":"AnnotationChange","message":"Node master-0 now has machineconfiguration.openshift.io/reason=missing MachineConfig rendered-master-ccc1c4b4035b8605635ebee7b29103f5\nmachineconfig.machineconfiguration.openshift.io \"rendered-master-ccc1c4b4035b8605635ebee7b29103f5\" not found","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:57Z","reason":"SetDesiredConfig","message":"Targeted node master-0 to MachineConfig: rendered-master-4ff3bdc50d696d239efb12817ae47acf","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:57Z","reason":"AnnotationChange","message":"Node master-0 now has machineconfiguration.openshift.io/currentConfig=rendered-master-ccc1c4b4035b8605635ebee7b29103f5","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:07:15Z","reason":"ProbeError","message":"Liveness probe error: Get \"http://127.0.0.1:8798/health\": dial tcp 127.0.0.1:8798: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:07:34Z","reason":"OperatorDegraded: MachineConfigPoolsFailed","message":"Unable to apply 4.18.32: the server was unable to return a response in the time allotted, but may still be processing the request (get machineconfigpools.machineconfiguration.openshift.io master)","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:07:51Z","reason":"Started","message":"Started container machine-config-controller","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:07:51Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:07:51Z","reason":"Created","message":"Created container: machine-config-controller","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:07:59Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-rbac-proxy -n openshift-machine-config-operator:\ncause by changes in data.config-file.yaml","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:08:16Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:08:17Z","reason":"AddSigtermProtection","message":"Adding SIGTERM protection","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:08:17Z","reason":"Drain","message":"Drain not required, skipping","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:08:17Z","reason":"BootResync","message":"Booting node master-0, currentConfig rendered-master-ccc1c4b4035b8605635ebee7b29103f5, desiredConfig rendered-master-4ff3bdc50d696d239efb12817ae47acf","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:13:51Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:13:52Z","reason":"Created","message":"Created container: setup","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:13:52Z","reason":"Started","message":"Started container setup","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:13:53Z","reason":"Created","message":"Created container: kube-rbac-proxy-crio","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:13:53Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:13:53Z","reason":"Started","message":"Started container kube-rbac-proxy-crio","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:15Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:16Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:19Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:19Z","reason":"Created","message":"Created container: machine-config-server","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:19Z","reason":"Started","message":"Started container machine-config-server","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:20Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:20Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:20Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:20Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:20Z","reason":"Started","message":"Started container machine-config-daemon","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:20Z","reason":"Created","message":"Created container: machine-config-daemon","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:23Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:32Z","reason":"NodeNotReady","message":"Node is not ready","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:32Z","reason":"NodeNotReady","message":"Node is not ready","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:32Z","reason":"NodeNotReady","message":"Node is not ready","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:33Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:33Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:35Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"proxy-tls\" : object \"openshift-machine-config-operator\"/\"mcc-proxy-tls\" not registered","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:35Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"images\" : object \"openshift-machine-config-operator\"/\"machine-config-operator-images\" not registered","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:35Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"proxy-tls\" : object \"openshift-machine-config-operator\"/\"mco-proxy-tls\" not registered","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:54Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.69/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:54Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.57/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:55Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:55Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:57Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:57Z","reason":"Started","message":"Started container machine-config-controller","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:57Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:57Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:57Z","reason":"Created","message":"Created container: machine-config-controller","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:57Z","reason":"Started","message":"Started container machine-config-operator","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:57Z","reason":"Created","message":"Created container: machine-config-operator","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:58Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:58Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"}]}events/openshift-kube-controller-manager-operator.json0000640000000000000000000017743215144650270022026 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T16:55:13Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-controller-manager-operator-78ff47c7c5 to 1","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T16:55:23Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-78ff47c7c5-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T16:58:50Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-78ff47c7c5-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T16:58:52Z","reason":"SuccessfulCreate","message":"Created pod: kube-controller-manager-operator-78ff47c7c5-txr5k","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T16:58:52Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T16:59:56Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-controller-manager-operator/kube-controller-manager-operator-78ff47c7c5-txr5k to master-0","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T16:59:58Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_kube-controller-manager-operator-78ff47c7c5-txr5k_openshift-kube-controller-manager-operator_442600dc-09b2-4fee-9f89-777296b2ee40_0(22c631e15f175386fc7bc2946d5bbdc67e8b6c0891aab2689fbf461e266b07ab): error adding pod openshift-kube-controller-manager-operator_kube-controller-manager-operator-78ff47c7c5-txr5k to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"22c631e15f175386fc7bc2946d5bbdc67e8b6c0891aab2689fbf461e266b07ab\" Netns:\"/var/run/netns/04d428b0-1e00-46ad-8b1a-2b3539456e9e\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-kube-controller-manager-operator;K8S_POD_NAME=kube-controller-manager-operator-78ff47c7c5-txr5k;K8S_POD_INFRA_CONTAINER_ID=22c631e15f175386fc7bc2946d5bbdc67e8b6c0891aab2689fbf461e266b07ab;K8S_POD_UID=442600dc-09b2-4fee-9f89-777296b2ee40\" Path:\"\" ERRORED: error configuring pod [openshift-kube-controller-manager-operator/kube-controller-manager-operator-78ff47c7c5-txr5k] networking: [openshift-kube-controller-manager-operator/kube-controller-manager-operator-78ff47c7c5-txr5k/442600dc-09b2-4fee-9f89-777296b2ee40:ovn-kubernetes]: error adding container to network \"ovn-kubernetes\": failed to send CNI request: Post \"http://dummy/\": dial unix /var/run/ovn-kubernetes/cni//ovn-cni-server.sock: connect: connection refused\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:06Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_kube-controller-manager-operator-78ff47c7c5-txr5k_openshift-kube-controller-manager-operator_442600dc-09b2-4fee-9f89-777296b2ee40_0(ae8301f683e0c2e7dd3e78dd17a0392299d3335bf1d839dd7b9e85e118c390a5): error adding pod openshift-kube-controller-manager-operator_kube-controller-manager-operator-78ff47c7c5-txr5k to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"ae8301f683e0c2e7dd3e78dd17a0392299d3335bf1d839dd7b9e85e118c390a5\" Netns:\"/var/run/netns/8f141194-0e04-4abe-834a-0112db25606b\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-kube-controller-manager-operator;K8S_POD_NAME=kube-controller-manager-operator-78ff47c7c5-txr5k;K8S_POD_INFRA_CONTAINER_ID=ae8301f683e0c2e7dd3e78dd17a0392299d3335bf1d839dd7b9e85e118c390a5;K8S_POD_UID=442600dc-09b2-4fee-9f89-777296b2ee40\" Path:\"\" ERRORED: error configuring pod [openshift-kube-controller-manager-operator/kube-controller-manager-operator-78ff47c7c5-txr5k] networking: [openshift-kube-controller-manager-operator/kube-controller-manager-operator-78ff47c7c5-txr5k/442600dc-09b2-4fee-9f89-777296b2ee40:ovn-kubernetes]: error adding container to network \"ovn-kubernetes\": failed to send CNI request: Post \"http://dummy/\": dial unix /var/run/ovn-kubernetes/cni//ovn-cni-server.sock: connect: connection refused\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:23Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.22/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:24Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:29Z","reason":"Started","message":"Started container kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:29Z","reason":"Created","message":"Created container: kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:29Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39\" in 4.69s (4.69s including waiting). Image size: 503717987 bytes.","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:32Z","reason":"CABundleUpdateRequired","message":"\"csr-controller-signer-ca\" in \"openshift-kube-controller-manager-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:32Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:32Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-controller-manager version \"raw-internal\" changed from \"\" to \"4.18.32\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:32Z","reason":"LeaderElection","message":"kube-controller-manager-operator-78ff47c7c5-txr5k_96d36150-9913-4567-abf6-585f70bb3d55 became leader","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"All is well\" to \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\",Progressing changed from Unknown to False (\"All is well\"),Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; \"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"\" \"nodes\" \"\" \"\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"} {\"\" \"nodes\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.32\"}]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:34Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:34Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:34Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:34Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"extendedArguments\": map[string]any{\n+ \t\t\"cluster-cidr\": []any{string(\"10.128.0.0/16\")},\n+ \t\t\"cluster-name\": []any{string(\"sno-gsjck\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")},\n+ \t},\n+ \t\"featureGates\": []any{\n+ \t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"),\n+ \t\tstring(\"DisableKubeletCloudCredentialProviders=true\"),\n+ \t\tstring(\"GCPLabelsTags=true\"), string(\"HardwareSpeed=true\"),\n+ \t\tstring(\"IngressControllerLBSubnetsAWS=true\"), string(\"KMSv1=true\"),\n+ \t\tstring(\"ManagedBootImages=true\"), string(\"ManagedBootImagesAWS=true\"),\n+ \t\tstring(\"MultiArchInstallAWS=true\"), ...,\n+ \t},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:35Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; \" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:35Z","reason":"TargetUpdateRequired","message":"\"csr-signer\" in \"openshift-kube-controller-manager-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:36Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/csr-controller-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:36Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:36Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:36Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-controller-manager-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:36Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-controller-manager because it changed","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:38Z","reason":"ObservedConfigWriteError","message":"Failed to write observed config: Operation cannot be fulfilled on kubecontrollermanagers.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:39Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:39Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated extendedArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:39Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated featureGates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:39Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:39Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:39Z","reason":"ObserveServiceCAConfigMap","message":"observed change in config","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:39Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:41Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:42Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"extendedArguments\": map[string]any{\n+ \t\t\"cluster-cidr\": []any{string(\"10.128.0.0/16\")},\n+ \t\t\"cluster-name\": []any{string(\"sno-gsjck\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")},\n+ \t},\n+ \t\"featureGates\": []any{\n+ \t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"),\n+ \t\tstring(\"DisableKubeletCloudCredentialProviders=true\"),\n+ \t\tstring(\"GCPLabelsTags=true\"), string(\"HardwareSpeed=true\"),\n+ \t\tstring(\"IngressControllerLBSubnetsAWS=true\"), string(\"KMSv1=true\"),\n+ \t\tstring(\"ManagedBootImages=true\"), string(\"ManagedBootImagesAWS=true\"),\n+ \t\tstring(\"MultiArchInstallAWS=true\"), ...,\n+ \t},\n+ \t\"serviceServingCert\": map[string]any{\n+ \t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resources/configmaps/service-ca/ca-bundle.crt\"),\n+ \t},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubecontrollermanagers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:42Z","reason":"ConfigMissing","message":"no observedConfig","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:43Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-controller-manager -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubecontrollermanagers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\" to \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:44Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:45Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:47Z","reason":"ServiceCreated","message":"Created Service/kube-controller-manager -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:48Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/kube-controller-manager-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:50Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:50Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-controller-manager-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:50Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/pv-recycler-controller -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:51Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:52Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:52Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:52Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:52Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\\nGarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.22:54522-\u003e172.30.0.10:53: read: connection refused\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\\nGarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.22:54522-\u003e172.30.0.10:53: read: connection refused\" to \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:53Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:00Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:06Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:08Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:09Z","reason":"SecretCreated","message":"Created Secret/serving-cert-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:10Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:10Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:11Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:11Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:11Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/cluster-policy-controller-config has changed,required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"InstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:13Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:13Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:13Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:15Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:21Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:24Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:25Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:26Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:27Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"required configmap/cluster-policy-controller-config has changed,required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:33Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:45Z","reason":"SATokenSignerControllerStuck","message":"unexpected addresses: 192.168.32.10","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:02:26Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access\" : [failed to fetch token: Post \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-kube-controller-manager-operator/serviceaccounts/kube-controller-manager-operator/token\": dial tcp 192.168.32.10:6443: connect: connection refused, failed to sync configmap cache: timed out waiting for the condition]","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:03:22Z","reason":"BackOff","message":"Back-off restarting failed container kube-controller-manager-operator in pod kube-controller-manager-operator-78ff47c7c5-txr5k_openshift-kube-controller-manager-operator(442600dc-09b2-4fee-9f89-777296b2ee40)","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:03:37Z","reason":"Started","message":"Started container kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:03:37Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:03:37Z","reason":"Created","message":"Created container: kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:08:32Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:08:32Z","reason":"LeaderElection","message":"kube-controller-manager-operator-78ff47c7c5-txr5k_0c08c62a-ec39-4a47-982d-6004e7bef898 became leader","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:08:36Z","reason":"SATokenSignerControllerOK","message":"found expected kube-apiserver endpoints","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:08:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeInstallerDegraded: 1 nodes are failing on revision 2:\\nNodeInstallerDegraded: installer: taller revisions to settle for node master-0\\nNodeInstallerDegraded: I0216 17:01:35.234528 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I0216 17:01:35.234558 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I0216 17:01:35.248736 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\\nNodeInstallerDegraded: I0216 17:01:45.254520 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\\nNodeInstallerDegraded: I0216 17:01:55.820613 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\\nNodeInstallerDegraded: W0216 17:02:05.252061 1 cmd.go:470] Error getting installer pods on current node master-0: Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\\\": dial tcp 172.30.0.1:443: connect: connection refused\\nNodeInstallerDegraded: W0216 17:02:15.250548 1 cmd.go:470] Error getting installer pods on current node master-0: Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\\\": dial tcp 172.30.0.1:443: connect: connection refused\\nNodeInstallerDegraded: W0216 17:02:25.251080 1 cmd.go:470] Error getting installer pods on current node master-0: Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\\\": dial tcp 172.30.0.1:443: connect: connection refused\\nNodeInstallerDegraded: W0216 17:02:35.250231 1 cmd.go:470] Error getting installer pods on current node master-0: Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\\\": dial tcp 172.30.0.1:443: connect: connection refused\\nNodeInstallerDegraded: W0216 17:02:35.250822 1 cmd.go:470] Error getting installer pods on current node master-0: Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\\\": dial tcp 172.30.0.1:443: connect: connection refused\\nNodeInstallerDegraded: F0216 17:02:35.250856 1 cmd.go:109] timed out waiting for the condition\\nNodeInstallerDegraded: \\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:08:37Z","reason":"InstallerPodFailed","message":"installer errors: installer: taller revisions to settle for node master-0\nI0216 17:01:35.234528 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0216 17:01:35.234558 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0216 17:01:35.248736 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\nI0216 17:01:45.254520 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\nI0216 17:01:55.820613 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\nW0216 17:02:05.252061 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": dial tcp 172.30.0.1:443: connect: connection refused\nW0216 17:02:15.250548 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": dial tcp 172.30.0.1:443: connect: connection refused\nW0216 17:02:25.251080 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": dial tcp 172.30.0.1:443: connect: connection refused\nW0216 17:02:35.250231 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": dial tcp 172.30.0.1:443: connect: connection refused\nW0216 17:02:35.250822 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": dial tcp 172.30.0.1:443: connect: connection refused\nF0216 17:02:35.250856 1 cmd.go:109] timed out waiting for the condition\n","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:08:38Z","reason":"SecretCreated","message":"Created Secret/next-service-account-private-key -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:14:14Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:14:28Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access\" : object \"openshift-kube-controller-manager-operator\"/\"kube-root-ca.crt\" not registered","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:14:33Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:14:35Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : object \"openshift-kube-controller-manager-operator\"/\"kube-controller-manager-operator-serving-cert\" not registered","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:14:35Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : object \"openshift-kube-controller-manager-operator\"/\"kube-controller-manager-operator-config\" not registered","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:14:54Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.22/23] from ovn-kubernetes","type":"Normal"}]}events/openshift-kube-controller-manager.json0000640000000000000000000000437415144650270020167 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-16T17:01:17Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.45/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-16T17:01:17Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-16T17:01:18Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-16T17:01:18Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-16T17:01:30Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-16T17:01:34Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.62/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-16T17:01:34Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-16T17:01:34Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-16T17:01:34Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-16T17:02:26Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access\" : [failed to fetch token: Post \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-kube-controller-manager/serviceaccounts/installer-sa/token\": dial tcp 192.168.32.10:6443: connect: connection refused, failed to sync configmap cache: timed out waiting for the condition]","type":"Warning"}]}events/openshift-image-registry.json0000640000000000000000000002356315144650270016401 0ustar0000000000000000{"items":[{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T16:55:28Z","reason":"ScalingReplicaSet","message":"Scaled up replica set cluster-image-registry-operator-96c8c64b8 to 1","type":"Normal"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T16:55:29Z","reason":"FailedCreate","message":"Error creating: pods \"cluster-image-registry-operator-96c8c64b8-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T16:58:48Z","reason":"FailedCreate","message":"Error creating: pods \"cluster-image-registry-operator-96c8c64b8-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T16:58:50Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T16:58:50Z","reason":"SuccessfulCreate","message":"Created pod: cluster-image-registry-operator-96c8c64b8-zwwnk","type":"Normal"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T16:59:56Z","reason":"Scheduled","message":"Successfully assigned openshift-image-registry/cluster-image-registry-operator-96c8c64b8-zwwnk to master-0","type":"Normal"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:00:28Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"image-registry-operator-tls\" : secret \"image-registry-operator-tls\" not found","type":"Warning"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:00:35Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"image-registry-operator-tls\" : secret \"image-registry-operator-tls\" not found","type":"Warning"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:00:46Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.10/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:00:46Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc03f91dbf08df9907c0ebad30c54a7fa92285b19ec4e440ed762b197378a861\"","type":"Normal"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:00:49Z","reason":"Created","message":"Created container: cluster-image-registry-operator","type":"Normal"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:00:49Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc03f91dbf08df9907c0ebad30c54a7fa92285b19ec4e440ed762b197378a861\" in 3.589s (3.589s including waiting). Image size: 543577525 bytes.","type":"Normal"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:00:49Z","reason":"Started","message":"Started container cluster-image-registry-operator","type":"Normal"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:00:50Z","reason":"LeaderElection","message":"cluster-image-registry-operator-96c8c64b8-zwwnk_cf094955-2733-454d-a7bd-a8f8eed191ed became leader","type":"Normal"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:00:50Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:02:20Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"image-registry-operator-tls\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:02:28Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-b5mwd\" : [failed to fetch token: Post \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-image-registry/serviceaccounts/cluster-image-registry-operator/token\": dial tcp 192.168.32.10:6443: connect: connection refused, failed to sync configmap cache: timed out waiting for the condition]","type":"Warning"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:02:28Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"bound-sa-token\" : failed to fetch token: Post \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-image-registry/serviceaccounts/cluster-image-registry-operator/token\": dial tcp 192.168.32.10:6443: connect: connection refused","type":"Warning"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"trusted-ca\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:07:55Z","reason":"DaemonSetUpdated","message":"Updated DaemonSet.apps/node-ca -n openshift-image-registry because it changed","type":"Normal"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:08:26Z","reason":"SuccessfulCreate","message":"Created pod: node-ca-xv2wv","type":"Normal"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:14:14Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:14:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"trusted-ca\" : object \"openshift-image-registry\"/\"trusted-ca\" not registered","type":"Warning"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:14:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"image-registry-operator-tls\" : object \"openshift-image-registry\"/\"image-registry-operator-tls\" not registered","type":"Warning"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:14:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-b5mwd\" : [object \"openshift-image-registry\"/\"kube-root-ca.crt\" not registered, object \"openshift-image-registry\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:14:32Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:14:35Z","reason":"Created","message":"Created container: cluster-image-registry-operator","type":"Normal"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:14:35Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc03f91dbf08df9907c0ebad30c54a7fa92285b19ec4e440ed762b197378a861\" already present on machine","type":"Normal"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:14:35Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.10/23] from ovn-kubernetes","type":"Normal"}]}events/openshift-dns.json0000640000000000000000000001663115144650270014233 0ustar0000000000000000{"items":[{"namespace":"openshift-dns","lastTimestamp":"2026-02-16T17:00:47Z","reason":"SuccessfulCreate","message":"Created pod: dns-default-qcgxx","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2026-02-16T17:00:47Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"metrics-tls\" : secret \"dns-default-metrics-tls\" not found","type":"Warning"},{"namespace":"openshift-dns","lastTimestamp":"2026-02-16T17:00:47Z","reason":"SuccessfulCreate","message":"Created pod: node-resolver-vfxj4","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2026-02-16T17:00:47Z","reason":"Created","message":"Created container: dns-node-resolver","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2026-02-16T17:00:47Z","reason":"Scheduled","message":"Successfully assigned openshift-dns/dns-default-qcgxx to master-0","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2026-02-16T17:00:47Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e155421620a4ac28a759265f53059b75308fdd1491caeba6a9a34d2fbeab4954\" already present on machine","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2026-02-16T17:00:47Z","reason":"Scheduled","message":"Successfully assigned openshift-dns/node-resolver-vfxj4 to master-0","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2026-02-16T17:00:48Z","reason":"Started","message":"Started container dns-node-resolver","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2026-02-16T17:00:50Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.32/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2026-02-16T17:00:50Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8ea13b0cbfe9be0d3d7ea80d50e512af6a453921a553c7c79b566530142b611b\"","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2026-02-16T17:00:58Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8ea13b0cbfe9be0d3d7ea80d50e512af6a453921a553c7c79b566530142b611b\" in 8.59s (8.59s including waiting). Image size: 479006001 bytes.","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2026-02-16T17:00:59Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2026-02-16T17:00:59Z","reason":"Started","message":"Started container dns","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2026-02-16T17:00:59Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0\" already present on machine","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2026-02-16T17:00:59Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2026-02-16T17:00:59Z","reason":"Created","message":"Created container: dns","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2026-02-16T17:02:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-zl5w2\" : [failed to fetch token: Post \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-dns/serviceaccounts/dns/token\": dial tcp 192.168.32.10:6443: connect: connection refused, failed to sync configmap cache: timed out waiting for the condition]","type":"Warning"},{"namespace":"openshift-dns","lastTimestamp":"2026-02-16T17:02:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-8m29g\" : [failed to fetch token: Post \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-dns/serviceaccounts/node-resolver/token\": dial tcp 192.168.32.10:6443: connect: connection refused, failed to sync configmap cache: timed out waiting for the condition]","type":"Warning"},{"namespace":"openshift-dns","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"metrics-tls\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-dns","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config-volume\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-dns","lastTimestamp":"2026-02-16T17:14:14Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-dns","lastTimestamp":"2026-02-16T17:14:20Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e155421620a4ac28a759265f53059b75308fdd1491caeba6a9a34d2fbeab4954\" already present on machine","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2026-02-16T17:14:21Z","reason":"Started","message":"Started container dns-node-resolver","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2026-02-16T17:14:21Z","reason":"Created","message":"Created container: dns-node-resolver","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2026-02-16T17:14:32Z","reason":"NodeNotReady","message":"Node is not ready","type":"Warning"},{"namespace":"openshift-dns","lastTimestamp":"2026-02-16T17:14:33Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-dns","lastTimestamp":"2026-02-16T17:14:35Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config-volume\" : object \"openshift-dns\"/\"dns-default\" not registered","type":"Warning"},{"namespace":"openshift-dns","lastTimestamp":"2026-02-16T17:14:35Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"metrics-tls\" : object \"openshift-dns\"/\"dns-default-metrics-tls\" not registered","type":"Warning"},{"namespace":"openshift-dns","lastTimestamp":"2026-02-16T17:14:54Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.32/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2026-02-16T17:14:55Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8ea13b0cbfe9be0d3d7ea80d50e512af6a453921a553c7c79b566530142b611b\" already present on machine","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2026-02-16T17:14:57Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0\" already present on machine","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2026-02-16T17:14:57Z","reason":"Started","message":"Started container dns","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2026-02-16T17:14:57Z","reason":"Created","message":"Created container: dns","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2026-02-16T17:14:58Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"}]}events/openshift-dns-operator.json0000640000000000000000000003000115144650270016047 0ustar0000000000000000{"items":[{"namespace":"openshift-dns-operator","lastTimestamp":"2026-02-16T16:55:13Z","reason":"ScalingReplicaSet","message":"Scaled up replica set dns-operator-86b8869b79 to 1","type":"Normal"},{"namespace":"openshift-dns-operator","lastTimestamp":"2026-02-16T16:55:23Z","reason":"FailedCreate","message":"Error creating: pods \"dns-operator-86b8869b79-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-dns-operator","lastTimestamp":"2026-02-16T16:58:49Z","reason":"FailedCreate","message":"Error creating: pods \"dns-operator-86b8869b79-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-dns-operator","lastTimestamp":"2026-02-16T16:58:51Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-dns-operator","lastTimestamp":"2026-02-16T16:58:51Z","reason":"SuccessfulCreate","message":"Created pod: dns-operator-86b8869b79-nhxlp","type":"Normal"},{"namespace":"openshift-dns-operator","lastTimestamp":"2026-02-16T16:59:56Z","reason":"Scheduled","message":"Successfully assigned openshift-dns-operator/dns-operator-86b8869b79-nhxlp to master-0","type":"Normal"},{"namespace":"openshift-dns-operator","lastTimestamp":"2026-02-16T17:00:28Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"metrics-tls\" : secret \"metrics-tls\" not found","type":"Warning"},{"namespace":"openshift-dns-operator","lastTimestamp":"2026-02-16T17:00:33Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"metrics-tls\" : secret \"metrics-tls\" not found","type":"Warning"},{"namespace":"openshift-dns-operator","lastTimestamp":"2026-02-16T17:00:36Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.15/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-dns-operator","lastTimestamp":"2026-02-16T17:00:36Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e1c8b9784a60860a08bd47935f0767b7b7f8f36c5c0adb7623a31b82c01d4c09\"","type":"Normal"},{"namespace":"openshift-dns-operator","lastTimestamp":"2026-02-16T17:00:46Z","reason":"Started","message":"Started container dns-operator","type":"Normal"},{"namespace":"openshift-dns-operator","lastTimestamp":"2026-02-16T17:00:46Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-dns-operator","lastTimestamp":"2026-02-16T17:00:46Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-dns-operator","lastTimestamp":"2026-02-16T17:00:46Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-dns-operator","lastTimestamp":"2026-02-16T17:00:46Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0\" already present on machine","type":"Normal"},{"namespace":"openshift-dns-operator","lastTimestamp":"2026-02-16T17:00:46Z","reason":"Created","message":"Created container: dns-operator","type":"Normal"},{"namespace":"openshift-dns-operator","lastTimestamp":"2026-02-16T17:00:46Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e1c8b9784a60860a08bd47935f0767b7b7f8f36c5c0adb7623a31b82c01d4c09\" in 9.138s (9.138s including waiting). Image size: 463090242 bytes.","type":"Normal"},{"namespace":"openshift-dns-operator","lastTimestamp":"2026-02-16T17:02:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-t4gl5\" : [failed to fetch token: Post \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-dns-operator/serviceaccounts/dns-operator/token\": dial tcp 192.168.32.10:6443: connect: connection refused, failed to sync configmap cache: timed out waiting for the condition]","type":"Warning"},{"namespace":"openshift-dns-operator","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"metrics-tls\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-dns-operator","lastTimestamp":"2026-02-16T17:14:16Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-dns-operator","lastTimestamp":"2026-02-16T17:14:28Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-t4gl5\" : [object \"openshift-dns-operator\"/\"kube-root-ca.crt\" not registered, object \"openshift-dns-operator\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-dns-operator","lastTimestamp":"2026-02-16T17:14:33Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-dns-operator","lastTimestamp":"2026-02-16T17:14:35Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"metrics-tls\" : object \"openshift-dns-operator\"/\"metrics-tls\" not registered","type":"Warning"},{"namespace":"openshift-dns-operator","lastTimestamp":"2026-02-16T17:14:37Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-t4gl5\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-dns-operator","lastTimestamp":"2026-02-16T17:14:55Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e1c8b9784a60860a08bd47935f0767b7b7f8f36c5c0adb7623a31b82c01d4c09\" already present on machine","type":"Normal"},{"namespace":"openshift-dns-operator","lastTimestamp":"2026-02-16T17:14:55Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.15/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-dns-operator","lastTimestamp":"2026-02-16T17:14:57Z","reason":"Created","message":"Created container: dns-operator","type":"Normal"},{"namespace":"openshift-dns-operator","lastTimestamp":"2026-02-16T17:14:57Z","reason":"Started","message":"Started container dns-operator","type":"Normal"},{"namespace":"openshift-dns-operator","lastTimestamp":"2026-02-16T17:14:57Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0\" already present on machine","type":"Normal"},{"namespace":"openshift-dns-operator","lastTimestamp":"2026-02-16T17:14:58Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-dns-operator","lastTimestamp":"2026-02-16T17:14:58Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"}]}events/openshift-console.json0000640000000000000000000001543215144650270015107 0ustar0000000000000000{"items":[{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:04:18Z","reason":"Scheduled","message":"Successfully assigned openshift-console/downloads-dcd7b7d95-dhhfh to master-0","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:04:18Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:04:18Z","reason":"ScalingReplicaSet","message":"Scaled up replica set downloads-dcd7b7d95 to 1","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:04:18Z","reason":"SuccessfulCreate","message":"Created pod: downloads-dcd7b7d95-dhhfh","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:04:18Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:04:19Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7fccb6e19eb4caa16d32f4cf59670c2c741c98b099d1f12368b85aab3f84dc38\"","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:04:19Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.80/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:04:55Z","reason":"Started","message":"Started container download-server","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:04:55Z","reason":"Created","message":"Created container: download-server","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:04:55Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7fccb6e19eb4caa16d32f4cf59670c2c741c98b099d1f12368b85aab3f84dc38\" in 35.292s (35.292s including waiting). Image size: 2890715256 bytes.","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:04:56Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"http://10.128.0.80:8080/\": dial tcp 10.128.0.80:8080: connect: connection refused","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:04:56Z","reason":"ProbeError","message":"Readiness probe error: Get \"http://10.128.0.80:8080/\": dial tcp 10.128.0.80:8080: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:08:26Z","reason":"ScalingReplicaSet","message":"Scaled up replica set console-d585cf8d9 to 1","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:08:26Z","reason":"SuccessfulCreate","message":"Created pod: console-d585cf8d9-slttc","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:08:26Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:08:27Z","reason":"ScalingReplicaSet","message":"Scaled up replica set console-5b8dffb75d to 1","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:08:27Z","reason":"SuccessfulCreate","message":"Created pod: console-5b8dffb75d-kxct8","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:08:33Z","reason":"ScalingReplicaSet","message":"Scaled down replica set console-d585cf8d9 to 0 from 1","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:08:33Z","reason":"SuccessfulCreate","message":"Created pod: console-795746f87c-qdv9c","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:08:33Z","reason":"SuccessfulDelete","message":"Deleted pod: console-d585cf8d9-slttc","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:08:33Z","reason":"ScalingReplicaSet","message":"Scaled up replica set console-795746f87c to 1 from 0","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:08:35Z","reason":"SuccessfulCreate","message":"Created pod: console-599b567ff7-nrcpr","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:08:35Z","reason":"ScalingReplicaSet","message":"Scaled up replica set console-599b567ff7 to 1 from 0","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:08:35Z","reason":"ScalingReplicaSet","message":"Scaled down replica set console-5b8dffb75d to 0 from 1","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:08:35Z","reason":"SuccessfulDelete","message":"Deleted pod: console-5b8dffb75d-kxct8","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:14:15Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:14:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-p6xfw\" : [object \"openshift-console\"/\"kube-root-ca.crt\" not registered, object \"openshift-console\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:14:33Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:14:35Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.80/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:14:36Z","reason":"Started","message":"Started container download-server","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:14:36Z","reason":"Created","message":"Created container: download-server","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:14:36Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7fccb6e19eb4caa16d32f4cf59670c2c741c98b099d1f12368b85aab3f84dc38\" already present on machine","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:14:37Z","reason":"ProbeError","message":"Readiness probe error: Get \"http://10.128.0.80:8080/\": dial tcp 10.128.0.80:8080: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:14:37Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"http://10.128.0.80:8080/\": dial tcp 10.128.0.80:8080: connect: connection refused","type":"Warning"}]}events/openshift-console-operator.json0000640000000000000000000011100715144650270016733 0ustar0000000000000000{"items":[{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:03:56Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.78/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:03:56Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:95e7647e6fda21b94b692f03908e4cd154e3374fca0560229c646fefe2c46730\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:03:56Z","reason":"ScalingReplicaSet","message":"Scaled up replica set console-operator-7777d5cc66 to 1","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:03:56Z","reason":"SuccessfulCreate","message":"Created pod: console-operator-7777d5cc66-64vhv","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:03:56Z","reason":"Scheduled","message":"Successfully assigned openshift-console-operator/console-operator-7777d5cc66-64vhv to master-0","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:03:59Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:95e7647e6fda21b94b692f03908e4cd154e3374fca0560229c646fefe2c46730\" in 2.394s (2.394s including waiting). Image size: 507065596 bytes.","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:06Z","reason":"BackOff","message":"Back-off restarting failed container console-operator in pod console-operator-7777d5cc66-64vhv_openshift-console-operator(0517b180-00ee-47fe-a8e7-36a3931b7e72)","type":"Warning"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:18Z","reason":"Started","message":"Started container console-operator","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:18Z","reason":"Created","message":"Created container: console-operator","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:18Z","reason":"OperatorVersionChanged","message":"clusteroperator/console version \"operator\" changed from \"\" to \"4.18.32\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:18Z","reason":"FastControllerResync","message":"Controller \"HealthCheckController\" resync interval is set to 30s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:18Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:18Z","reason":"DeploymentCreated","message":"Created Deployment.apps/downloads -n openshift-console because it was missing","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded set to False (\"All is well\"),Progressing set to False (\"All is well\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [] to [{\"operator.openshift.io\" \"consoles\" \"\" \"cluster\"} {\"config.openshift.io\" \"consoles\" \"\" \"cluster\"} {\"config.openshift.io\" \"infrastructures\" \"\" \"cluster\"} {\"config.openshift.io\" \"proxies\" \"\" \"cluster\"} {\"config.openshift.io\" \"oauths\" \"\" \"cluster\"} {\"oauth.openshift.io\" \"oauthclients\" \"\" \"console\"} {\"\" \"namespaces\" \"\" \"openshift-console-operator\"} {\"\" \"namespaces\" \"\" \"openshift-console\"} {\"\" \"configmaps\" \"openshift-config-managed\" \"console-public\"}],status.versions changed from [] to [{\"operator\" \"4.18.32\"}]","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:18Z","reason":"PodDisruptionBudgetCreated","message":"Created PodDisruptionBudget.policy/console -n openshift-console because it was missing","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:18Z","reason":"PodDisruptionBudgetCreated","message":"Created PodDisruptionBudget.policy/downloads -n openshift-console because it was missing","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:18Z","reason":"LeaderElection","message":"console-operator-7777d5cc66-64vhv_0f2d464d-6deb-481c-b12b-7445436bf227 became leader","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:18Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:95e7647e6fda21b94b692f03908e4cd154e3374fca0560229c646fefe2c46730\" already present on machine","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/oauth-serving-cert -n openshift-console because it was missing","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/default-ingress-cert -n openshift-console because it was missing","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:20Z","reason":"ServiceCreated","message":"Created Service/console -n openshift-console because it was missing","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:20Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"All is well\" to \"OAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:20Z","reason":"SecretCreated","message":"Created Secret/console-oauth-config -n openshift-console because it was missing","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:20Z","reason":"ServiceCreated","message":"Created Service/downloads -n openshift-console because it was missing","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:27Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/downloads -n openshift-console because it changed","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:29Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"OAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\" to \"OAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"OAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\" to \"OAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:35Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"OAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\" to \"OAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\",Upgradeable changed from True to False (\"DownloadsDefaultRouteSyncUpgradeable: Internal error occurred: resource quota evaluation timed out\")","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"OAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\" to \"OAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nConsoleDefaultRouteSyncDegraded: timed out waiting for the condition\",Upgradeable message changed from \"DownloadsDefaultRouteSyncUpgradeable: Internal error occurred: resource quota evaluation timed out\" to \"ConsoleDefaultRouteSyncUpgradeable: timed out waiting for the condition\\nDownloadsDefaultRouteSyncUpgradeable: Internal error occurred: resource quota evaluation timed out\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:47Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: status.relatedObjects changed from [{\"operator.openshift.io\" \"consoles\" \"\" \"cluster\"} {\"config.openshift.io\" \"consoles\" \"\" \"cluster\"} {\"config.openshift.io\" \"infrastructures\" \"\" \"cluster\"} {\"config.openshift.io\" \"proxies\" \"\" \"cluster\"} {\"config.openshift.io\" \"oauths\" \"\" \"cluster\"} {\"oauth.openshift.io\" \"oauthclients\" \"\" \"console\"} {\"\" \"namespaces\" \"\" \"openshift-console-operator\"} {\"\" \"namespaces\" \"\" \"openshift-console\"} {\"\" \"configmaps\" \"openshift-config-managed\" \"console-public\"}] to [{\"console.openshift.io\" \"consoleplugins\" \"\" \"monitoring-plugin\"} {\"operator.openshift.io\" \"consoles\" \"\" \"cluster\"} {\"config.openshift.io\" \"consoles\" \"\" \"cluster\"} {\"config.openshift.io\" \"infrastructures\" \"\" \"cluster\"} {\"config.openshift.io\" \"proxies\" \"\" \"cluster\"} {\"config.openshift.io\" \"oauths\" \"\" \"cluster\"} {\"oauth.openshift.io\" \"oauthclients\" \"\" \"console\"} {\"\" \"namespaces\" \"\" \"openshift-console-operator\"} {\"\" \"namespaces\" \"\" \"openshift-console\"} {\"\" \"configmaps\" \"openshift-config-managed\" \"console-public\"}]","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"OAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nConsoleDefaultRouteSyncDegraded: timed out waiting for the condition\" to \"OAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nConsoleDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\",Upgradeable message changed from \"ConsoleDefaultRouteSyncUpgradeable: timed out waiting for the condition\\nDownloadsDefaultRouteSyncUpgradeable: Internal error occurred: resource quota evaluation timed out\" to \"ConsoleDefaultRouteSyncUpgradeable: Internal error occurred: resource quota evaluation timed out\\nDownloadsDefaultRouteSyncUpgradeable: Internal error occurred: resource quota evaluation timed out\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:07:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded changed from False to True (\"ConsoleDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\")","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:07:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"ConsoleDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\" to \"ConsoleDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nDownloadsDeploymentSyncDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get deployments.apps downloads)\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:07:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"ConsoleDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nPDBSyncDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get poddisruptionbudgets.policy console)\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\" to \"ConsoleDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:07:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"ConsoleDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nDownloadsDeploymentSyncDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get deployments.apps downloads)\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\" to \"ConsoleDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nDownloadsDeploymentSyncDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get deployments.apps downloads)\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nPDBSyncDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get poddisruptionbudgets.policy downloads)\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:07:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"ConsoleDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\" to \"ConsoleDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nPDBSyncDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get poddisruptionbudgets.policy console)\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:08:00Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"ConsoleDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nDownloadsDeploymentSyncDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get deployments.apps downloads)\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nPDBSyncDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get poddisruptionbudgets.policy downloads)\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\" to \"ConsoleDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nDownloadsDeploymentSyncDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get deployments.apps downloads)\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:08:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"ConsoleDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nDownloadsDeploymentSyncDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get deployments.apps downloads)\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\" to \"ConsoleDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:08:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"ConsoleDefaultRouteSyncDegraded: no ingress for host console-openshift-console.apps.sno.openstack.lab in route console in namespace openshift-console\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\" to \"DownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nOAuthClientsControllerDegraded: no ingress for host console-openshift-console.apps.sno.openstack.lab in route console in namespace openshift-console\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\",Upgradeable message changed from \"ConsoleDefaultRouteSyncUpgradeable: no ingress for host console-openshift-console.apps.sno.openstack.lab in route console in namespace openshift-console\\nDownloadsDefaultRouteSyncUpgradeable: Internal error occurred: resource quota evaluation timed out\" to \"DownloadsDefaultRouteSyncUpgradeable: Internal error occurred: resource quota evaluation timed out\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:08:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"ConsoleDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\" to \"ConsoleDefaultRouteSyncDegraded: no ingress for host console-openshift-console.apps.sno.openstack.lab in route console in namespace openshift-console\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\",Upgradeable message changed from \"ConsoleDefaultRouteSyncUpgradeable: Internal error occurred: resource quota evaluation timed out\\nDownloadsDefaultRouteSyncUpgradeable: Internal error occurred: resource quota evaluation timed out\" to \"ConsoleDefaultRouteSyncUpgradeable: no ingress for host console-openshift-console.apps.sno.openstack.lab in route console in namespace openshift-console\\nDownloadsDefaultRouteSyncUpgradeable: Internal error occurred: resource quota evaluation timed out\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:08:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"DownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nOAuthClientsControllerDegraded: no ingress for host console-openshift-console.apps.sno.openstack.lab in route console in namespace openshift-console\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\" to \"DownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:08:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"DownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\" to \"DownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: no ingress for host console-openshift-console.apps.sno.openstack.lab in route console in namespace openshift-console\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:08:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"DownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: no ingress for host console-openshift-console.apps.sno.openstack.lab in route console in namespace openshift-console\" to \"RouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: no ingress for host console-openshift-console.apps.sno.openstack.lab in route console in namespace openshift-console\",Upgradeable changed from False to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:08:11Z","reason":"ConfigMapCreated","message":"Created ConfigMap/console-config -n openshift-console because it was missing","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:08:12Z","reason":"ConfigMapCreated","message":"Created ConfigMap/console-public -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:08:12Z","reason":"DeploymentCreated","message":"Created Deployment.apps/console -n openshift-console because it was missing","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:08:13Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"RouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: no ingress for host console-openshift-console.apps.sno.openstack.lab in route console in namespace openshift-console\" to \"RouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\",Progressing changed from False to True (\"SyncLoopRefreshProgressing: changes made during sync updates, additional sync expected\"),Available changed from Unknown to False (\"DeploymentAvailable: 0 replicas available for console deployment\")","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:08:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"RouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\" to \"RouteHealthDegraded: console route is not admitted\",Available message changed from \"DeploymentAvailable: 0 replicas available for console deployment\" to \"DeploymentAvailable: 0 replicas available for console deployment\\nRouteHealthAvailable: console route is not admitted\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:08:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"RouteHealthDegraded: console route is not admitted\" to \"RouteHealthDegraded: route not yet available, https://console-openshift-console.apps.sno.openstack.lab returns '503 Service Unavailable'\",Available message changed from \"DeploymentAvailable: 0 replicas available for console deployment\\nRouteHealthAvailable: console route is not admitted\" to \"DeploymentAvailable: 0 replicas available for console deployment\\nRouteHealthAvailable: route not yet available, https://console-openshift-console.apps.sno.openstack.lab returns '503 Service Unavailable'\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:08:32Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: status.relatedObjects changed from [{\"console.openshift.io\" \"consoleplugins\" \"\" \"monitoring-plugin\"} {\"operator.openshift.io\" \"consoles\" \"\" \"cluster\"} {\"config.openshift.io\" \"consoles\" \"\" \"cluster\"} {\"config.openshift.io\" \"infrastructures\" \"\" \"cluster\"} {\"config.openshift.io\" \"proxies\" \"\" \"cluster\"} {\"config.openshift.io\" \"oauths\" \"\" \"cluster\"} {\"oauth.openshift.io\" \"oauthclients\" \"\" \"console\"} {\"\" \"namespaces\" \"\" \"openshift-console-operator\"} {\"\" \"namespaces\" \"\" \"openshift-console\"} {\"\" \"configmaps\" \"openshift-config-managed\" \"console-public\"}] to [{\"console.openshift.io\" \"consoleplugins\" \"\" \"monitoring-plugin\"} {\"console.openshift.io\" \"consoleplugins\" \"\" \"networking-console-plugin\"} {\"operator.openshift.io\" \"consoles\" \"\" \"cluster\"} {\"config.openshift.io\" \"consoles\" \"\" \"cluster\"} {\"config.openshift.io\" \"infrastructures\" \"\" \"cluster\"} {\"config.openshift.io\" \"proxies\" \"\" \"cluster\"} {\"config.openshift.io\" \"oauths\" \"\" \"cluster\"} {\"oauth.openshift.io\" \"oauthclients\" \"\" \"console\"} {\"\" \"namespaces\" \"\" \"openshift-console-operator\"} {\"\" \"namespaces\" \"\" \"openshift-console\"} {\"\" \"configmaps\" \"openshift-config-managed\" \"console-public\"}]","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:08:35Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/console-config -n openshift-console:\ncause by changes in data.console-config.yaml","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:08:35Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/console -n openshift-console because it changed","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:08:35Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Progressing message changed from \"SyncLoopRefreshProgressing: changes made during sync updates, additional sync expected\" to \"SyncLoopRefreshProgressing: working toward version 4.18.32, 0 replicas available\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:08:35Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Progressing message changed from \"SyncLoopRefreshProgressing: working toward version 4.18.32, 0 replicas available\" to \"SyncLoopRefreshProgressing: changes made during sync updates, additional sync expected\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:14:15Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:14:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"trusted-ca\" : object \"openshift-console-operator\"/\"trusted-ca\" not registered","type":"Warning"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:14:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : object \"openshift-console-operator\"/\"console-operator-config\" not registered","type":"Warning"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:14:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-sbrtz\" : [object \"openshift-console-operator\"/\"kube-root-ca.crt\" not registered, object \"openshift-console-operator\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:14:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : object \"openshift-console-operator\"/\"serving-cert\" not registered","type":"Warning"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:14:27Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:14:54Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.78/23] from ovn-kubernetes","type":"Normal"}]}events/openshift-oauth-apiserver.json0000640000000000000000000001604615144650270016565 0ustar0000000000000000{"items":[{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:00:50Z","reason":"Scheduled","message":"Successfully assigned openshift-oauth-apiserver/apiserver-66788cb45c-dp9bc to master-0","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:00:50Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-66788cb45c to 1","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:00:50Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-66788cb45c-dp9bc","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:00:51Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.35/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:00:51Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192\"","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:00:58Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192\" in 7.316s (7.316s including waiting). Image size: 500175306 bytes.","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:00:59Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:00:59Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:00:59Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192\" already present on machine","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:00:59Z","reason":"Created","message":"Created container: oauth-apiserver","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:00:59Z","reason":"Started","message":"Started container oauth-apiserver","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:02:12Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-5v65g\" : [failed to fetch token: Post \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-oauth-apiserver/serviceaccounts/oauth-apiserver-sa/token\": dial tcp 192.168.32.10:6443: connect: connection refused, failed to sync configmap cache: timed out waiting for the condition]","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:02:15Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"etcd-serving-ca\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:02:15Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:02:15Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"audit-policies\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:02:15Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"etcd-client\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:02:15Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"trusted-ca-bundle\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:02:15Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"encryption-config\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:14:15Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:14:21Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"etcd-serving-ca\" : object \"openshift-oauth-apiserver\"/\"etcd-serving-ca\" not registered","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:14:21Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"etcd-client\" : object \"openshift-oauth-apiserver\"/\"etcd-client\" not registered","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:14:21Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"encryption-config\" : object \"openshift-oauth-apiserver\"/\"encryption-config-1\" not registered","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:14:21Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"audit-policies\" : object \"openshift-oauth-apiserver\"/\"audit-1\" not registered","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:14:21Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-5v65g\" : [object \"openshift-oauth-apiserver\"/\"kube-root-ca.crt\" not registered, object \"openshift-oauth-apiserver\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:14:21Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:14:23Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"trusted-ca-bundle\" : object \"openshift-oauth-apiserver\"/\"trusted-ca-bundle\" not registered","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:14:23Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : object \"openshift-oauth-apiserver\"/\"serving-cert\" not registered","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:14:52Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.35/23] from ovn-kubernetes","type":"Normal"}]}events/openshift-ingress.json0000640000000000000000000000611015144650270015110 0ustar0000000000000000{"items":[{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T17:00:51Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T17:00:51Z","reason":"ScalingReplicaSet","message":"Scaled up replica set router-default-864ddd5f56 to 1","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T17:00:51Z","reason":"SuccessfulCreate","message":"Created pod: router-default-864ddd5f56-pm4rt","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T17:02:51Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T17:03:28Z","reason":"Scheduled","message":"Successfully assigned openshift-ingress/router-default-864ddd5f56-pm4rt to master-0","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T17:03:28Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb\"","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T17:03:31Z","reason":"Started","message":"Started container router","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T17:03:31Z","reason":"Created","message":"Created container: router","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T17:03:31Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb\" in 2.579s (2.579s including waiting). Image size: 481879166 bytes.","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T17:14:19Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb\" already present on machine","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T17:14:19Z","reason":"Created","message":"Created container: router","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T17:14:19Z","reason":"Started","message":"Started container router","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T17:14:30Z","reason":"ProbeError","message":"Startup probe error: HTTP probe failed with statuscode: 500\nbody: [-]backend-http failed: reason withheld\n[-]has-synced failed: reason withheld\n[+]process-running ok\nhealthz check failed\n\n","type":"Warning"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T17:14:30Z","reason":"Unhealthy","message":"Startup probe failed: HTTP probe failed with statuscode: 500","type":"Warning"}]}events/openshift-authentication-operator.json0000640000000000000000000040001315144650270020306 0ustar0000000000000000{"items":[{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T16:55:15Z","reason":"ScalingReplicaSet","message":"Scaled up replica set authentication-operator-755d954778 to 1","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T16:55:25Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-755d954778-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T16:58:49Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-755d954778-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T16:58:51Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T16:58:51Z","reason":"SuccessfulCreate","message":"Created pod: authentication-operator-755d954778-lf4cb","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T16:59:56Z","reason":"Scheduled","message":"Successfully assigned openshift-authentication-operator/authentication-operator-755d954778-lf4cb to master-0","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T16:59:58Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_authentication-operator-755d954778-lf4cb_openshift-authentication-operator_9aa57eb4-c511-4ab8-a5d7-385e1ed9ee41_0(7d93cb4502ffa248022429ed843e52a6dda3fa68352e9ee52370209f6d1530fe): error adding pod openshift-authentication-operator_authentication-operator-755d954778-lf4cb to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"7d93cb4502ffa248022429ed843e52a6dda3fa68352e9ee52370209f6d1530fe\" Netns:\"/var/run/netns/1aa4ba52-cd68-418d-a567-84c6be05a263\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-authentication-operator;K8S_POD_NAME=authentication-operator-755d954778-lf4cb;K8S_POD_INFRA_CONTAINER_ID=7d93cb4502ffa248022429ed843e52a6dda3fa68352e9ee52370209f6d1530fe;K8S_POD_UID=9aa57eb4-c511-4ab8-a5d7-385e1ed9ee41\" Path:\"\" ERRORED: error configuring pod [openshift-authentication-operator/authentication-operator-755d954778-lf4cb] networking: [openshift-authentication-operator/authentication-operator-755d954778-lf4cb/9aa57eb4-c511-4ab8-a5d7-385e1ed9ee41:ovn-kubernetes]: error adding container to network \"ovn-kubernetes\": failed to send CNI request: Post \"http://dummy/\": dial unix /var/run/ovn-kubernetes/cni//ovn-cni-server.sock: connect: connection refused\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:06Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_authentication-operator-755d954778-lf4cb_openshift-authentication-operator_9aa57eb4-c511-4ab8-a5d7-385e1ed9ee41_0(368ea21b12ee629f43d4f26e25177485b2a06fdf19b09ce692f98e61e2248fe1): error adding pod openshift-authentication-operator_authentication-operator-755d954778-lf4cb to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"368ea21b12ee629f43d4f26e25177485b2a06fdf19b09ce692f98e61e2248fe1\" Netns:\"/var/run/netns/88258e9d-54a2-45ed-9119-b752c64f5183\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-authentication-operator;K8S_POD_NAME=authentication-operator-755d954778-lf4cb;K8S_POD_INFRA_CONTAINER_ID=368ea21b12ee629f43d4f26e25177485b2a06fdf19b09ce692f98e61e2248fe1;K8S_POD_UID=9aa57eb4-c511-4ab8-a5d7-385e1ed9ee41\" Path:\"\" ERRORED: error configuring pod [openshift-authentication-operator/authentication-operator-755d954778-lf4cb] networking: [openshift-authentication-operator/authentication-operator-755d954778-lf4cb/9aa57eb4-c511-4ab8-a5d7-385e1ed9ee41:ovn-kubernetes]: error adding container to network \"ovn-kubernetes\": failed to send CNI request: Post \"http://dummy/\": dial unix /var/run/ovn-kubernetes/cni//ovn-cni-server.sock: connect: connection refused\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:18Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.9/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:18Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:24Z","reason":"Started","message":"Started container authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:24Z","reason":"Created","message":"Created container: authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:24Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963\" in 6.209s (6.209s including waiting). Image size: 508050651 bytes.","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:25Z","reason":"LeaderElection","message":"authentication-operator-755d954778-lf4cb_0df7ca66-df85-4c9b-bead-bc05ea42b2f1 became leader","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:26Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"operator\" changed from \"\" to \"4.18.32\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:26Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"operator\" \"4.18.32\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:26Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded changed from Unknown to False (\"All is well\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available changed from Unknown to False (\"ReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:27Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:28Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:28Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:28Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:28Z","reason":"ObserveAPIAudiences","message":"service account issuer changed from to https://kubernetes.default.svc","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:28Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthAPIServer\") of observed config: \"\\u00a0\\u00a0map[string]any(\\n-\\u00a0\\tnil,\\n+\\u00a0\\t{\\n+\\u00a0\\t\\t\\\"apiServerArguments\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"api-audiences\\\": []any{string(\\\"https://kubernetes.default.svc\\\")},\\n+\\u00a0\\t\\t\\t\\\"cors-allowed-origins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+\\u00a0\\t\\t\\t\\\"etcd-servers\\\": []any{string(\\\"https://192.168.32.10:2379\\\")},\\n+\\u00a0\\t\\t\\t\\\"tls-cipher-suites\\\": []any{\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t\\t\\\"tls-min-version\\\": string(\\\"VersionTLS12\\\"),\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t},\\n\\u00a0\\u00a0)\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:28Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"All is well\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:29Z","reason":"ObserveTemplates","message":"templates changed to map[\"error\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/errors.html\" \"login\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/login.html\" \"providerSelection\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/providers.html\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:29Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \"\\u00a0\\u00a0map[string]any(\\n-\\u00a0\\tnil,\\n+\\u00a0\\t{\\n+\\u00a0\\t\\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+\\u00a0\\t\\t\\\"oauthConfig\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"assetPublicURL\\\": string(\\\"\\\"),\\n+\\u00a0\\t\\t\\t\\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"),\\n+\\u00a0\\t\\t\\t\\\"templates\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\t\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t\\t\\\"tokenConfig\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\t\\\"accessTokenMaxAgeSeconds\\\": float64(86400),\\n+\\u00a0\\t\\t\\t\\t\\\"authorizeTokenMaxAgeSeconds\\\": float64(300),\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t\\t\\\"serverArguments\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"audit-log-format\\\": []any{string(\\\"json\\\")},\\n+\\u00a0\\t\\t\\t\\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")},\\n+\\u00a0\\t\\t\\t\\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")},\\n+\\u00a0\\t\\t\\t\\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")},\\n+\\u00a0\\t\\t\\t\\\"audit-policy-file\\\": []any{string(\\\"/var/run/configmaps/audit/audit.\\\"...)},\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t\\t\\\"servingInfo\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"cipherSuites\\\": []any{\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t\\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n+\\u00a0\\t},\\n\\u00a0\\u00a0)\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:29Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\",Available message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:29Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:29Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:29Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"ReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:29Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:29Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:29Z","reason":"ObserveAPIServerURL","message":"loginURL changed from to https://api.sno.openstack.lab:6443","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:29Z","reason":"ObserveAuditProfile","message":"AuditProfile changed from '%!s(\u003cnil\u003e)' to 'map[audit-log-format:[json] audit-log-maxbackup:[10] audit-log-maxsize:[100] audit-log-path:[/var/log/oauth-server/audit.log] audit-policy-file:[/var/run/configmaps/audit/audit.yaml]]'","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:29Z","reason":"ObserveTokenConfig","message":"accessTokenMaxAgeSeconds changed from %!d(float64=0) to %!d(float64=86400)","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:29Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:31Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:32Z","reason":"CSRApproval","message":"The CSR \"system:openshift:openshift-authenticator-7lxqx\" has been approved","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:32Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:32Z","reason":"NoValidCertificateFound","message":"No valid client certificate for OpenShiftAuthenticatorCertRequester is found: unable to parse certificate: data does not contain any valid RSA or ECDSA certificates","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:32Z","reason":"CSRCreated","message":"A csr \"system:openshift:openshift-authenticator-7lxqx\" is created for OpenShiftAuthenticatorCertRequester","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:33Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/audit -n openshift-authentication: namespaces \"openshift-authentication\" not found","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:33Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:33Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:34Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:34Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:38Z","reason":"ClientCertificateCreated","message":"A new client certificate for OpenShiftAuthenticatorCertRequester is available","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:39Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:43Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:44Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/v4-0-config-system-trusted-ca-bundle -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:45Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"All is well\" to \"AuthenticatorCertKeyProgressing: All is well\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:45Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-ocp-branding-template -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:45Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:48Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-apiserver-sa -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:48Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:48Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:49Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\",Progressing changed from False to True (\"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\"),Available message changed from \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:50Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:52Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:52Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:52Z","reason":"ServiceCreated","message":"Created Service/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:54Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:56Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:56Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:56Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \"\\u00a0\\u00a0map[string]any{\\n\\u00a0\\u00a0\\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n\\u00a0\\u00a0\\t\\\"oauthConfig\\\": map[string]any{\\\"assetPublicURL\\\": string(\\\"\\\"), \\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"), \\\"templates\\\": map[string]any{\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...)}, \\\"tokenConfig\\\": map[string]any{\\\"accessTokenMaxAgeSeconds\\\": float64(86400), \\\"authorizeTokenMaxAgeSeconds\\\": float64(300)}},\\n\\u00a0\\u00a0\\t\\\"serverArguments\\\": map[string]any{\\\"audit-log-format\\\": []any{string(\\\"json\\\")}, \\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")}, \\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")}, \\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")}, ...},\\n\\u00a0\\u00a0\\t\\\"servingInfo\\\": map[string]any{\\n\\u00a0\\u00a0\\t\\t\\\"cipherSuites\\\": []any{string(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"), string(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"), string(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\\\"), ...},\\n\\u00a0\\u00a0\\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+\\u00a0\\t\\t\\\"namedCertificates\\\": []any{\\n+\\u00a0\\t\\t\\tmap[string]any{\\n+\\u00a0\\t\\t\\t\\t\\\"certFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"keyFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"names\\\": []any{string(\\\"*.apps.sno.openstack.lab\\\")},\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t},\\n\\u00a0\\u00a0\\t},\\n\\u00a0\\u00a0\\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n\\u00a0\\u00a0}\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:56Z","reason":"ObserveRouterSecret","message":"namedCertificates changed to []interface {}{map[string]interface {}{\"certFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"keyFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"names\":[]interface {}{\"*.apps.sno.openstack.lab\"}}}","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:56Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-router-certs -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:56Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:56Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:56Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:56Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:01:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/oauth-serving-cert -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:01:01Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.oauth.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:01:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:01:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:01:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:01:01Z","reason":"OpenShiftAPICheckFailed","message":"\"user.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:01:01Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.user.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:01:01Z","reason":"OpenShiftAPICheckFailed","message":"\"oauth.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:01:02Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: status.versions changed from [{\"operator\" \"4.18.32\"}] to [{\"operator\" \"4.18.32\"} {\"oauth-apiserver\" \"4.18.32\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:01:02Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"oauth-apiserver\" changed from \"\" to \"4.18.32\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:01:02Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing changed from True to False (\"AuthenticatorCertKeyProgressing: All is well\"),Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:01:35Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963\" already present on machine","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:01:35Z","reason":"Created","message":"Created container: authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:01:35Z","reason":"Started","message":"Started container authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:01:36Z","reason":"LeaderElection","message":"authentication-operator-755d954778-lf4cb_7efe8790-24dd-436a-ada1-e99041ce8aca became leader","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:01:37Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:01:38Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:01:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:01:44Z","reason":"SecretCreated","message":"Created Secret/webhook-authentication-integrated-oauth -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:02:20Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:02:20Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"service-ca-bundle\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:02:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-f42cr\" : [failed to fetch token: Post \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-authentication-operator/serviceaccounts/authentication-operator/token\": dial tcp 192.168.32.10:6443: connect: connection refused, failed to sync configmap cache: timed out waiting for the condition]","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"trusted-ca-bundle\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:03:33Z","reason":"ConfigMapCreated","message":"Created ConfigMap/v4-0-config-system-metadata -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:03:33Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-session -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:03:33Z","reason":"DeploymentCreated","message":"Created Deployment.apps/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:03:33Z","reason":"ConfigMapCreated","message":"Created ConfigMap/v4-0-config-system-cliconfig -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:03:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded changed from False to True (\"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:04:43Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"oauth-openshift\" changed from \"\" to \"4.18.32_openshift\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:04:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: status.versions changed from [{\"operator\" \"4.18.32\"} {\"oauth-apiserver\" \"4.18.32\"}] to [{\"operator\" \"4.18.32\"} {\"oauth-apiserver\" \"4.18.32\"} {\"oauth-openshift\" \"4.18.32_openshift\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:04:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerRouteEndpointAccessibleControllerDegraded: ingress.config/cluster does not yet have status for the \\\"openshift-authentication/oauth-openshift\\\" route\\nWellKnownReadyControllerDegraded: failed to get oauth metadata from openshift-config-managed/oauth-openshift ConfigMap: configmap \\\"oauth-openshift\\\" not found (check authentication operator, it is supposed to create this)\" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerRouteEndpointAccessibleControllerDegraded: ingress.config/cluster does not yet have status for the \\\"openshift-authentication/oauth-openshift\\\" route\\nWellKnownReadyControllerDegraded: failed to get oauth metadata from openshift-config-managed/oauth-openshift ConfigMap: configmap \\\"oauth-openshift\\\" not found (check authentication operator, it is supposed to create this)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:04:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded changed from True to False (\"OAuthServerRouteEndpointAccessibleControllerDegraded: ingress.config/cluster does not yet have status for the \\\"openshift-authentication/oauth-openshift\\\" route\\nWellKnownReadyControllerDegraded: failed to get oauth metadata from openshift-config-managed/oauth-openshift ConfigMap: configmap \\\"oauth-openshift\\\" not found (check authentication operator, it is supposed to create this)\"),Progressing changed from False to True (\"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"),Available message changed from \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: failed to retrieve route from cache: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get oauth metadata from openshift-config-managed/oauth-openshift ConfigMap: configmap \\\"oauth-openshift\\\" not found (check authentication operator, it is supposed to create this)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:04:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available\" to \"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available\\nWellKnownReadyControllerProgressing: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\",Available message changed from \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: failed to retrieve route from cache: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get oauth metadata from openshift-config-managed/oauth-openshift ConfigMap: configmap \\\"oauth-openshift\\\" not found (check authentication operator, it is supposed to create this)\" to \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: failed to retrieve route from cache: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:04:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/oauth-openshift -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:07:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\" to \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nRouterCertsDomainValidationControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get secrets router-certs)\\nWebhookAuthenticatorControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get authentications.config.openshift.io cluster)\",Progressing message changed from \"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available\\nWellKnownReadyControllerProgressing: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\" to \"APIServerDeploymentProgressing: deployment/openshift-oauth-apiserver: could not be retrieved\\nOAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available\\nWellKnownReadyControllerProgressing: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\",Available message changed from \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\" to \"APIServerDeploymentAvailable: deployment/openshift-oauth-apiserver: could not be retrieved\\nOAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:07:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded changed from False to True (\"OAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:07:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nRouterCertsDomainValidationControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get secrets router-certs)\\nWebhookAuthenticatorControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get authentications.config.openshift.io cluster)\" to \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get authentications.config.openshift.io cluster)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:07:56Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get authentications.config.openshift.io cluster)\" to \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:07:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/ns.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-authentication)\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/authentication-clusterrolebinding.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:openshift-authentication)\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerStaticResourcesDegraded: \\\"oauth-apiserver/ns.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-oauth-apiserver)\\nAPIServerStaticResourcesDegraded: \\\"oauth-apiserver/apiserver-clusterrolebinding.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:oauth-apiserver)\\nAPIServerStaticResourcesDegraded: \\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/ns.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-authentication)\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/authentication-clusterrolebinding.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:openshift-authentication)\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:07:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\" to \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/ns.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-authentication)\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/authentication-clusterrolebinding.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:openshift-authentication)\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:08:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerStaticResourcesDegraded: \\\"oauth-apiserver/ns.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-oauth-apiserver)\\nAPIServerStaticResourcesDegraded: \\\"oauth-apiserver/apiserver-clusterrolebinding.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:oauth-apiserver)\\nAPIServerStaticResourcesDegraded: \\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/ns.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-authentication)\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/authentication-clusterrolebinding.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:openshift-authentication)\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerStaticResourcesDegraded: \\\"oauth-apiserver/ns.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-oauth-apiserver)\\nAPIServerStaticResourcesDegraded: \\\"oauth-apiserver/apiserver-clusterrolebinding.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:oauth-apiserver)\\nAPIServerStaticResourcesDegraded: \\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:08:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerStaticResourcesDegraded: \\\"oauth-apiserver/ns.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-oauth-apiserver)\\nAPIServerStaticResourcesDegraded: \\\"oauth-apiserver/apiserver-clusterrolebinding.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:oauth-apiserver)\\nAPIServerStaticResourcesDegraded: \\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\" to \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:08:03Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\" to \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nCustomRouteControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get routes.route.openshift.io oauth-openshift)\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:08:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available\\nWellKnownReadyControllerProgressing: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\" to \"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: observed generation is 2, desired generation is 3.\\nWellKnownReadyControllerProgressing: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:08:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nCustomRouteControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get routes.route.openshift.io oauth-openshift)\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\" to \"CustomRouteControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get routes.route.openshift.io oauth-openshift)\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\",Progressing message changed from \"APIServerDeploymentProgressing: deployment/openshift-oauth-apiserver: could not be retrieved\\nOAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available\\nWellKnownReadyControllerProgressing: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\" to \"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available\\nWellKnownReadyControllerProgressing: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\",Available message changed from \"APIServerDeploymentAvailable: deployment/openshift-oauth-apiserver: could not be retrieved\\nOAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\" to \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:08:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"CustomRouteControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get routes.route.openshift.io oauth-openshift)\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:08:10Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/oauth-openshift -n openshift-authentication because it changed","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:08:12Z","reason":"ObserveConsoleURL","message":"assetPublicURL changed from to https://console-openshift-console.apps.sno.openstack.lab","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:08:12Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \"\\u00a0\\u00a0map[string]any{\\n\\u00a0\\u00a0\\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n\\u00a0\\u00a0\\t\\\"oauthConfig\\\": map[string]any{\\n-\\u00a0\\t\\t\\\"assetPublicURL\\\": string(\\\"\\\"),\\n+\\u00a0\\t\\t\\\"assetPublicURL\\\": string(\\\"https://console-openshift-console.apps.sno.openstack.lab\\\"),\\n\\u00a0\\u00a0\\t\\t\\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"),\\n\\u00a0\\u00a0\\t\\t\\\"templates\\\": map[string]any{\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...)},\\n\\u00a0\\u00a0\\t\\t\\\"tokenConfig\\\": map[string]any{\\\"accessTokenMaxAgeSeconds\\\": float64(86400), \\\"authorizeTokenMaxAgeSeconds\\\": float64(300)},\\n\\u00a0\\u00a0\\t},\\n\\u00a0\\u00a0\\t\\\"serverArguments\\\": map[string]any{\\\"audit-log-format\\\": []any{string(\\\"json\\\")}, \\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")}, \\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")}, \\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")}, ...},\\n\\u00a0\\u00a0\\t\\\"servingInfo\\\": map[string]any{\\\"cipherSuites\\\": []any{string(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"), string(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"), string(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\\\"), ...}, \\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"), \\\"namedCertificates\\\": []any{map[string]any{\\\"certFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...), \\\"keyFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...), \\\"names\\\": []any{string(\\\"*.apps.sno.openstack.lab\\\")}}}},\\n\\u00a0\\u00a0\\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n\\u00a0\\u00a0}\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:08:17Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/v4-0-config-system-cliconfig -n openshift-authentication:\ncause by changes in data.v4-0-config-system-cliconfig","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:08:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\" to \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:08:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:14:14Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:14:23Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : object \"openshift-authentication-operator\"/\"serving-cert\" not registered","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:14:23Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"service-ca-bundle\" : object \"openshift-authentication-operator\"/\"service-ca-bundle\" not registered","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:14:23Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-f42cr\" : [object \"openshift-authentication-operator\"/\"kube-root-ca.crt\" not registered, object \"openshift-authentication-operator\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:14:23Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"trusted-ca-bundle\" : object \"openshift-authentication-operator\"/\"trusted-ca-bundle\" not registered","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:14:25Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:14:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : object \"openshift-authentication-operator\"/\"authentication-operator-config\" not registered","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:14:54Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.9/23] from ovn-kubernetes","type":"Normal"}]}events/openshift-authentication.json0000640000000000000000000000754615144650270016473 0ustar0000000000000000{"items":[{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:03:33Z","reason":"SuccessfulCreate","message":"Created pod: oauth-openshift-989b889c9-l264c","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:03:33Z","reason":"Scheduled","message":"Successfully assigned openshift-authentication/oauth-openshift-989b889c9-l264c to master-0","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:03:33Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"v4-0-config-system-cliconfig\" : configmap \"v4-0-config-system-cliconfig\" not found","type":"Warning"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:03:33Z","reason":"ScalingReplicaSet","message":"Scaled up replica set oauth-openshift-989b889c9 to 1","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:03:34Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.75/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:03:34Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2969828f1fcae82b7ef16d3588046ace3cf51b9ea578658c42475386e0ee1fc7\"","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:03:36Z","reason":"Started","message":"Started container oauth-openshift","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:03:36Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2969828f1fcae82b7ef16d3588046ace3cf51b9ea578658c42475386e0ee1fc7\" in 1.836s (1.836s including waiting). Image size: 476284775 bytes.","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:03:36Z","reason":"Created","message":"Created container: oauth-openshift","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:04:39Z","reason":"SuccessfulDelete","message":"Deleted pod: oauth-openshift-989b889c9-l264c","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:04:39Z","reason":"Killing","message":"Stopping container oauth-openshift","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:04:39Z","reason":"SuccessfulCreate","message":"Created pod: oauth-openshift-8cd8fdb64-4ltx8","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:04:39Z","reason":"ScalingReplicaSet","message":"Scaled down replica set oauth-openshift-989b889c9 to 0 from 1","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:04:39Z","reason":"ScalingReplicaSet","message":"Scaled up replica set oauth-openshift-8cd8fdb64 to 1 from 0","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:04:47Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:08:27Z","reason":"ScalingReplicaSet","message":"Scaled up replica set oauth-openshift-64f85b8fc9 to 1 from 0","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:08:27Z","reason":"SuccessfulCreate","message":"Created pod: oauth-openshift-64f85b8fc9-n9msn","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:08:27Z","reason":"ScalingReplicaSet","message":"Scaled down replica set oauth-openshift-8cd8fdb64 to 0 from 1","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:08:27Z","reason":"SuccessfulDelete","message":"Deleted pod: oauth-openshift-8cd8fdb64-4ltx8","type":"Normal"}]}events/openshift-config-managed.json0000640000000000000000000000061015144650270016274 0ustar0000000000000000{"items":[{"namespace":"openshift-config-managed","lastTimestamp":"2026-02-16T17:00:51Z","reason":"PublishedRouterCA","message":"Published \"default-ingress-cert\" in \"openshift-config-managed\"","type":"Normal"},{"namespace":"openshift-config-managed","lastTimestamp":"2026-02-16T17:00:51Z","reason":"PublishedRouterCertificates","message":"Published router certificates","type":"Normal"}]}config/serviceaccounts.json0000640000000000000000000003722615144650263014620 0ustar0000000000000000{"serviceAccounts":{"TOTAL_COUNT":367,"namespaces":{"default":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-public":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-system":[{"name":"attachdetach-controller","secrets":1},{"name":"builder","secrets":1},{"name":"certificate-controller","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"clusterrole-aggregation-controller","secrets":1},{"name":"cronjob-controller","secrets":1},{"name":"daemon-set-controller","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"deployment-controller","secrets":1},{"name":"disruption-controller","secrets":1},{"name":"endpoint-controller","secrets":1},{"name":"endpointslice-controller","secrets":1},{"name":"endpointslicemirroring-controller","secrets":1},{"name":"ephemeral-volume-controller","secrets":1},{"name":"expand-controller","secrets":1},{"name":"generic-garbage-collector","secrets":1},{"name":"horizontal-pod-autoscaler","secrets":1},{"name":"job-controller","secrets":1},{"name":"legacy-service-account-token-cleaner","secrets":1},{"name":"namespace-controller","secrets":1},{"name":"node-controller","secrets":1},{"name":"persistent-volume-binder","secrets":1},{"name":"pod-garbage-collector","secrets":1},{"name":"pv-protection-controller","secrets":1},{"name":"pvc-protection-controller","secrets":1},{"name":"replicaset-controller","secrets":1},{"name":"replication-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"root-ca-cert-publisher","secrets":1},{"name":"service-account-controller","secrets":1},{"name":"service-ca-cert-publisher","secrets":1},{"name":"statefulset-controller","secrets":1},{"name":"ttl-after-finished-controller","secrets":1},{"name":"validatingadmissionpolicy-status-controller","secrets":1}],"openshift":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-sa","secrets":1}],"openshift-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-operator","secrets":1}],"openshift-authentication":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-openshift","secrets":1}],"openshift-authentication-operator":[{"name":"authentication-operator","secrets":1},{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-catalogd":[{"name":"builder","secrets":1},{"name":"catalogd-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager":[{"name":"builder","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"cloud-node-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"cluster-cloud-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-credential-operator":[{"name":"builder","secrets":1},{"name":"cloud-credential-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-network-config-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-platform-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-csi-drivers":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-machine-approver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-approver-sa","secrets":1}],"openshift-cluster-node-tuning-operator":[{"name":"builder","secrets":1},{"name":"cluster-node-tuning-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"tuned","secrets":1}],"openshift-cluster-olm-operator":[{"name":"builder","secrets":1},{"name":"cluster-olm-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-samples-operator":[{"name":"builder","secrets":1},{"name":"cluster-samples-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-storage-operator":[{"name":"builder","secrets":1},{"name":"cluster-storage-operator","secrets":1},{"name":"csi-snapshot-controller","secrets":1},{"name":"csi-snapshot-controller-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-version":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-managed":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-config-operator","secrets":1}],"openshift-console":[{"name":"builder","secrets":1},{"name":"console","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-console-operator":[{"name":"builder","secrets":1},{"name":"console-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-console-user-settings":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-sa","secrets":1}],"openshift-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-operator","secrets":1}],"openshift-dns":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns","secrets":1},{"name":"node-resolver","secrets":1}],"openshift-dns-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns-operator","secrets":1}],"openshift-etcd":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-backup-sa","secrets":1},{"name":"etcd-sa","secrets":1},{"name":"installer-sa","secrets":1}],"openshift-etcd-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-operator","secrets":1}],"openshift-host-network":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-image-registry":[{"name":"builder","secrets":1},{"name":"cluster-image-registry-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"node-ca","secrets":1},{"name":"pruner","secrets":1}],"openshift-infra":[{"name":"build-config-change-controller","secrets":1},{"name":"build-controller","secrets":1},{"name":"builder","secrets":1},{"name":"cluster-csr-approver-controller","secrets":1},{"name":"cluster-quota-reconciliation-controller","secrets":1},{"name":"default","secrets":1},{"name":"default-rolebindings-controller","secrets":1},{"name":"deployer","secrets":1},{"name":"deployer-controller","secrets":1},{"name":"deploymentconfig-controller","secrets":1},{"name":"image-import-controller","secrets":1},{"name":"image-trigger-controller","secrets":1},{"name":"ingress-to-route-controller","secrets":1},{"name":"namespace-security-allocation-controller","secrets":1},{"name":"node-bootstrapper","secrets":1},{"name":"origin-namespace-controller","secrets":1},{"name":"podsecurity-admission-label-syncer-controller","secrets":1},{"name":"privileged-namespaces-psa-label-syncer","secrets":1},{"name":"pv-recycler-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"serviceaccount-controller","secrets":1},{"name":"serviceaccount-pull-secrets-controller","secrets":1},{"name":"template-instance-controller","secrets":1},{"name":"template-instance-finalizer-controller","secrets":1},{"name":"unidling-controller","secrets":1}],"openshift-ingress":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"router","secrets":1}],"openshift-ingress-canary":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ingress-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ingress-operator","secrets":1}],"openshift-insights":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"gather","secrets":1},{"name":"operator","secrets":1}],"openshift-kni-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-kube-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-apiserver-operator","secrets":1}],"openshift-kube-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"kube-controller-manager-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-controller-manager-operator","secrets":1}],"openshift-kube-scheduler":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1},{"name":"openshift-kube-scheduler-sa","secrets":1}],"openshift-kube-scheduler-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-kube-scheduler-operator","secrets":1}],"openshift-kube-storage-version-migrator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-sa","secrets":1}],"openshift-kube-storage-version-migrator-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-operator","secrets":1}],"openshift-machine-api":[{"name":"builder","secrets":1},{"name":"cluster-autoscaler","secrets":1},{"name":"cluster-autoscaler-operator","secrets":1},{"name":"cluster-baremetal-operator","secrets":1},{"name":"control-plane-machine-set-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-api-controllers","secrets":1},{"name":"machine-api-operator","secrets":1},{"name":"machine-api-termination-handler","secrets":1}],"openshift-machine-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-config-controller","secrets":1},{"name":"machine-config-daemon","secrets":1},{"name":"machine-config-operator","secrets":1},{"name":"machine-config-server","secrets":1},{"name":"machine-os-builder","secrets":1},{"name":"machine-os-puller","secrets":1},{"name":"node-bootstrapper","secrets":1}],"openshift-marketplace":[{"name":"builder","secrets":1},{"name":"certified-operators","secrets":1},{"name":"community-operators","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"marketplace-operator","secrets":1},{"name":"redhat-marketplace","secrets":1},{"name":"redhat-operators","secrets":1}],"openshift-monitoring":[{"name":"alertmanager-main","secrets":1},{"name":"builder","secrets":1},{"name":"cluster-monitoring-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-state-metrics","secrets":1},{"name":"metrics-server","secrets":1},{"name":"monitoring-plugin","secrets":1},{"name":"node-exporter","secrets":1},{"name":"openshift-state-metrics","secrets":1},{"name":"prometheus-k8s","secrets":1},{"name":"prometheus-operator","secrets":1},{"name":"prometheus-operator-admission-webhook","secrets":1},{"name":"telemeter-client","secrets":1},{"name":"thanos-querier","secrets":1}],"openshift-multus":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"metrics-daemon-sa","secrets":1},{"name":"multus","secrets":1},{"name":"multus-ac","secrets":1},{"name":"multus-ancillary-tools","secrets":1}],"openshift-network-console":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-network-diagnostics":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-diagnostics","secrets":1}],"openshift-network-node-identity":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-node-identity","secrets":1}],"openshift-network-operator":[{"name":"builder","secrets":1},{"name":"cluster-network-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"iptables-alerter","secrets":1}],"openshift-node":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-nutanix-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-oauth-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-apiserver-sa","secrets":1}],"openshift-openstack-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-operator-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"operator-controller-controller-manager","secrets":1}],"openshift-operator-lifecycle-manager":[{"name":"builder","secrets":1},{"name":"collect-profiles","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"olm-operator-serviceaccount","secrets":1}],"openshift-operators":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovirt-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovn-kubernetes":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ovn-kubernetes-control-plane","secrets":1},{"name":"ovn-kubernetes-node","secrets":1}],"openshift-route-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"route-controller-manager-sa","secrets":1}],"openshift-service-ca":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca","secrets":1}],"openshift-service-ca-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca-operator","secrets":1}],"openshift-user-workload-monitoring":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-vsphere-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}]}}}config/installplans.json0000640000000000000000000000010015144650262014100 0ustar0000000000000000{"items":null,"stats":{"TOTAL_COUNT":0,"TOTAL_NONUNIQ_COUNT":0}}config/tsdb.json0000640000000000000000000000376615144650250012352 0ustar0000000000000000{"status":"success","data":{"headStats":{"numSeries":159282,"numLabelPairs":7311,"chunkCount":159282,"minTime":1771261515160,"maxTime":1771262118416},"seriesCountByMetricName":[{"name":"etcd_request_duration_seconds_bucket","value":14784},{"name":"apiserver_request_sli_duration_seconds_bucket","value":11374},{"name":"apiserver_request_duration_seconds_bucket","value":11128},{"name":"resource_verb:apiserver_request_duration_seconds_bucket:rate:5m","value":6379},{"name":"resource_verb:apiserver_request_duration_seconds_bucket:rate:1m","value":6379},{"name":"workqueue_work_duration_seconds_bucket","value":4748},{"name":"workqueue_queue_duration_seconds_bucket","value":4748},{"name":"apiserver_request_body_size_bytes_bucket","value":4704},{"name":"apiserver_response_sizes_bucket","value":3432},{"name":"apiserver_watch_cache_read_wait_seconds_bucket","value":2114}],"labelValueCountByLabelName":[{"name":"__name__","value":1812},{"name":"name","value":998},{"name":"id","value":533},{"name":"type","value":441},{"name":"device","value":420},{"name":"resource","value":419},{"name":"le","value":376},{"name":"kind","value":188},{"name":"resource_prefix","value":183},{"name":"crd","value":134}],"memoryInBytesByLabelName":[{"name":"__name__","value":6488949},{"name":"id","value":4294704},{"name":"name","value":2505418},{"name":"instance","value":2453023},{"name":"namespace","value":2137469},{"name":"pod","value":2077513},{"name":"service","value":1290462},{"name":"apiserver","value":1268988},{"name":"job","value":1210633},{"name":"endpoint","value":1035620}],"seriesCountByLabelValuePair":[{"name":"endpoint=https","value":91601},{"name":"apiserver=kube-apiserver","value":78774},{"name":"namespace=default","value":62016},{"name":"job=apiserver","value":62016},{"name":"service=kubernetes","value":62012},{"name":"instance=192.168.32.10:6443","value":61262},{"name":"node=master-0","value":36550},{"name":"service=kubelet","value":36154},{"name":"endpoint=https-metrics","value":36111},{"name":"job=kubelet","value":35939}]}}config/metrics0000640000000000000000000000000015144650250012066 0ustar0000000000000000config/node/logs/master-0.log0000640000000000000000000004504215144650247014546 0ustar0000000000000000Feb 16 17:14:36.533481 master-0 kubenswrapper[4167]: E0216 17:14:36.533433 4167 projected.go:288] Couldn't get configMap openshift-route-controller-manager/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Feb 16 17:14:36.675093 master-0 kubenswrapper[4167]: I0216 17:14:36.675059 4167 patch_prober.go:28] interesting pod/downloads-dcd7b7d95-dhhfh container/download-server namespace/openshift-console: Readiness probe status=failure output="Get \"http://10.128.0.80:8080/\": dial tcp 10.128.0.80:8080: connect: connection refused" start-of-body= Feb 16 17:14:36.675150 master-0 kubenswrapper[4167]: I0216 17:14:36.675106 4167 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-console/downloads-dcd7b7d95-dhhfh" podUID="08a90dc5-b0d8-4aad-a002-736492b6c1a9" containerName="download-server" probeResult="failure" output="Get \"http://10.128.0.80:8080/\": dial tcp 10.128.0.80:8080: connect: connection refused" Feb 16 17:14:36.850109 master-0 kubenswrapper[4167]: E0216 17:14:36.850017 4167 projected.go:288] Couldn't get configMap openshift-kube-scheduler-operator/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Feb 16 17:14:36.850109 master-0 kubenswrapper[4167]: E0216 17:14:36.850050 4167 projected.go:194] Error preparing data for projected volume kube-api-access for pod openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-7485d55966-sgmpf: failed to sync configmap cache: timed out waiting for the condition Feb 16 17:14:36.850212 master-0 kubenswrapper[4167]: E0216 17:14:36.850121 4167 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/eaf7edff-0a89-4ac0-b9dd-511e098b5434-kube-api-access podName:eaf7edff-0a89-4ac0-b9dd-511e098b5434 nodeName:}" failed. No retries permitted until 2026-02-16 17:14:52.850086922 +0000 UTC m=+34.580533300 (durationBeforeRetry 16s). Error: MountVolume.SetUp failed for volume "kube-api-access" (UniqueName: "kubernetes.io/projected/eaf7edff-0a89-4ac0-b9dd-511e098b5434-kube-api-access") pod "openshift-kube-scheduler-operator-7485d55966-sgmpf" (UID: "eaf7edff-0a89-4ac0-b9dd-511e098b5434") : failed to sync configmap cache: timed out waiting for the condition Feb 16 17:14:37.134331 master-0 kubenswrapper[4167]: E0216 17:14:37.134305 4167 projected.go:194] Error preparing data for projected volume kube-api-access-wzlnz for pod openshift-route-controller-manager/route-controller-manager-dcdb76cc6-5rcvl: failed to sync configmap cache: timed out waiting for the condition Feb 16 17:14:37.134406 master-0 kubenswrapper[4167]: E0216 17:14:37.134398 4167 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/78be97a3-18d1-4962-804f-372974dc8ccc-kube-api-access-wzlnz podName:78be97a3-18d1-4962-804f-372974dc8ccc nodeName:}" failed. No retries permitted until 2026-02-16 17:14:53.134363204 +0000 UTC m=+34.864809622 (durationBeforeRetry 16s). Error: MountVolume.SetUp failed for volume "kube-api-access-wzlnz" (UniqueName: "kubernetes.io/projected/78be97a3-18d1-4962-804f-372974dc8ccc-kube-api-access-wzlnz") pod "route-controller-manager-dcdb76cc6-5rcvl" (UID: "78be97a3-18d1-4962-804f-372974dc8ccc") : failed to sync configmap cache: timed out waiting for the condition Feb 16 17:14:37.163689 master-0 kubenswrapper[4167]: E0216 17:14:37.163652 4167 projected.go:288] Couldn't get configMap openshift-kube-controller-manager-operator/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Feb 16 17:14:37.163775 master-0 kubenswrapper[4167]: E0216 17:14:37.163692 4167 projected.go:194] Error preparing data for projected volume kube-api-access for pod openshift-kube-controller-manager-operator/kube-controller-manager-operator-78ff47c7c5-txr5k: failed to sync configmap cache: timed out waiting for the condition Feb 16 17:14:37.163775 master-0 kubenswrapper[4167]: E0216 17:14:37.163765 4167 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/442600dc-09b2-4fee-9f89-777296b2ee40-kube-api-access podName:442600dc-09b2-4fee-9f89-777296b2ee40 nodeName:}" failed. No retries permitted until 2026-02-16 17:14:53.163741969 +0000 UTC m=+34.894188357 (durationBeforeRetry 16s). Error: MountVolume.SetUp failed for volume "kube-api-access" (UniqueName: "kubernetes.io/projected/442600dc-09b2-4fee-9f89-777296b2ee40-kube-api-access") pod "kube-controller-manager-operator-78ff47c7c5-txr5k" (UID: "442600dc-09b2-4fee-9f89-777296b2ee40") : failed to sync configmap cache: timed out waiting for the condition Feb 16 17:14:37.164091 master-0 kubenswrapper[4167]: E0216 17:14:37.164030 4167 projected.go:288] Couldn't get configMap openshift-kube-storage-version-migrator/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Feb 16 17:14:37.267096 master-0 kubenswrapper[4167]: E0216 17:14:37.267030 4167 projected.go:288] Couldn't get configMap openshift-dns-operator/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Feb 16 17:14:37.267419 master-0 kubenswrapper[4167]: E0216 17:14:37.267380 4167 projected.go:288] Couldn't get configMap openshift-controller-manager/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition Feb 16 17:14:37.287918 master-0 kubenswrapper[4167]: E0216 17:14:37.287875 4167 projected.go:194] Error preparing data for projected volume kube-api-access-2cjmj for pod openshift-controller-manager/controller-manager-7fc9897cf8-9rjwd: failed to sync configmap cache: timed out waiting for the condition Feb 16 17:14:37.288021 master-0 kubenswrapper[4167]: E0216 17:14:37.287998 4167 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/e1a7c783-2e23-4284-b648-147984cf1022-kube-api-access-2cjmj podName:e1a7c783-2e23-4284-b648-147984cf1022 nodeName:}" failed. No retries permitted until 2026-02-16 17:14:53.28794756 +0000 UTC m=+35.018393978 (durationBeforeRetry 16s). Error: MountVolume.SetUp failed for volume "kube-api-access-2cjmj" (UniqueName: "kubernetes.io/projected/e1a7c783-2e23-4284-b648-147984cf1022-kube-api-access-2cjmj") pod "controller-manager-7fc9897cf8-9rjwd" (UID: "e1a7c783-2e23-4284-b648-147984cf1022") : failed to sync configmap cache: timed out waiting for the condition Feb 16 17:14:37.558209 master-0 kubenswrapper[4167]: E0216 17:14:37.558170 4167 projected.go:194] Error preparing data for projected volume kube-api-access-t4gl5 for pod openshift-dns-operator/dns-operator-86b8869b79-nhxlp: failed to sync configmap cache: timed out waiting for the condition Feb 16 17:14:37.558286 master-0 kubenswrapper[4167]: E0216 17:14:37.558239 4167 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/d9859457-f0d1-4754-a6c5-cf05d5abf447-kube-api-access-t4gl5 podName:d9859457-f0d1-4754-a6c5-cf05d5abf447 nodeName:}" failed. No retries permitted until 2026-02-16 17:14:53.558220183 +0000 UTC m=+35.288666561 (durationBeforeRetry 16s). Error: MountVolume.SetUp failed for volume "kube-api-access-t4gl5" (UniqueName: "kubernetes.io/projected/d9859457-f0d1-4754-a6c5-cf05d5abf447-kube-api-access-t4gl5") pod "dns-operator-86b8869b79-nhxlp" (UID: "d9859457-f0d1-4754-a6c5-cf05d5abf447") : failed to sync configmap cache: timed out waiting for the condition Feb 16 17:14:37.635114 master-0 kubenswrapper[4167]: E0216 17:14:37.635048 4167 projected.go:194] Error preparing data for projected volume kube-api-access-bs597 for pod openshift-kube-storage-version-migrator/migrator-5bd989df77-gcfg6: failed to sync configmap cache: timed out waiting for the condition Feb 16 17:14:37.635304 master-0 kubenswrapper[4167]: E0216 17:14:37.635156 4167 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/62fc29f4-557f-4a75-8b78-6ca425c81b81-kube-api-access-bs597 podName:62fc29f4-557f-4a75-8b78-6ca425c81b81 nodeName:}" failed. No retries permitted until 2026-02-16 17:14:53.635125684 +0000 UTC m=+35.365572102 (durationBeforeRetry 16s). Error: MountVolume.SetUp failed for volume "kube-api-access-bs597" (UniqueName: "kubernetes.io/projected/62fc29f4-557f-4a75-8b78-6ca425c81b81-kube-api-access-bs597") pod "migrator-5bd989df77-gcfg6" (UID: "62fc29f4-557f-4a75-8b78-6ca425c81b81") : failed to sync configmap cache: timed out waiting for the condition Feb 16 17:14:37.692446 master-0 kubenswrapper[4167]: I0216 17:14:37.692413 4167 patch_prober.go:28] interesting pod/downloads-dcd7b7d95-dhhfh container/download-server namespace/openshift-console: Readiness probe status=failure output="Get \"http://10.128.0.80:8080/\": dial tcp 10.128.0.80:8080: connect: connection refused" start-of-body= Feb 16 17:14:37.692517 master-0 kubenswrapper[4167]: I0216 17:14:37.692453 4167 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-console/downloads-dcd7b7d95-dhhfh" podUID="08a90dc5-b0d8-4aad-a002-736492b6c1a9" containerName="download-server" probeResult="failure" output="Get \"http://10.128.0.80:8080/\": dial tcp 10.128.0.80:8080: connect: connection refused" Feb 16 17:14:54.823320 master-0 kubenswrapper[4167]: I0216 17:14:54.823280 4167 patch_prober.go:28] interesting pod/packageserver-6d5d8c8c95-kzfjw container/packageserver namespace/openshift-operator-lifecycle-manager: Readiness probe status=failure output="Get \"https://10.128.0.59:5443/healthz\": dial tcp 10.128.0.59:5443: connect: connection refused" start-of-body= Feb 16 17:14:54.823387 master-0 kubenswrapper[4167]: I0216 17:14:54.823343 4167 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-operator-lifecycle-manager/packageserver-6d5d8c8c95-kzfjw" podUID="e73ee493-de15-44c2-bd51-e12fcbb27a15" containerName="packageserver" probeResult="failure" output="Get \"https://10.128.0.59:5443/healthz\": dial tcp 10.128.0.59:5443: connect: connection refused" Feb 16 17:14:56.158914 master-0 kubenswrapper[4167]: I0216 17:14:56.158655 4167 patch_prober.go:28] interesting pod/marketplace-operator-6cc5b65c6b-s4gp2 container/marketplace-operator namespace/openshift-marketplace: Readiness probe status=failure output="Get \"http://10.128.0.11:8080/healthz\": dial tcp 10.128.0.11:8080: connect: connection refused" start-of-body= Feb 16 17:14:56.158914 master-0 kubenswrapper[4167]: I0216 17:14:56.158697 4167 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-marketplace/marketplace-operator-6cc5b65c6b-s4gp2" podUID="74b2561b-933b-4c58-a63a-7a8c671d0ae9" containerName="marketplace-operator" probeResult="failure" output="Get \"http://10.128.0.11:8080/healthz\": dial tcp 10.128.0.11:8080: connect: connection refused" Feb 16 17:14:57.466165 master-0 kubenswrapper[4167]: I0216 17:14:57.466130 4167 patch_prober.go:28] interesting pod/controller-manager-7fc9897cf8-9rjwd container/controller-manager namespace/openshift-controller-manager: Readiness probe status=failure output="Get \"https://10.128.0.61:8443/healthz\": dial tcp 10.128.0.61:8443: connect: connection refused" start-of-body= Feb 16 17:14:57.466239 master-0 kubenswrapper[4167]: I0216 17:14:57.466179 4167 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-controller-manager/controller-manager-7fc9897cf8-9rjwd" podUID="e1a7c783-2e23-4284-b648-147984cf1022" containerName="controller-manager" probeResult="failure" output="Get \"https://10.128.0.61:8443/healthz\": dial tcp 10.128.0.61:8443: connect: connection refused" Feb 16 17:14:58.680257 master-0 kubenswrapper[4167]: I0216 17:14:58.680207 4167 patch_prober.go:28] interesting pod/console-operator-7777d5cc66-64vhv container/console-operator namespace/openshift-console-operator: Readiness probe status=failure output="Get \"https://10.128.0.78:8443/readyz\": dial tcp 10.128.0.78:8443: connect: connection refused" start-of-body= Feb 16 17:14:58.680342 master-0 kubenswrapper[4167]: I0216 17:14:58.680255 4167 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-console-operator/console-operator-7777d5cc66-64vhv" podUID="0517b180-00ee-47fe-a8e7-36a3931b7e72" containerName="console-operator" probeResult="failure" output="Get \"https://10.128.0.78:8443/readyz\": dial tcp 10.128.0.78:8443: connect: connection refused" Feb 16 17:15:18.474379 master-0 kubenswrapper[4167]: E0216 17:15:18.474293 4167 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"e1757e5acb838902f4011b0dfc2a220b74f028cc05105e020bfd55c78d223550\": container with ID starting with e1757e5acb838902f4011b0dfc2a220b74f028cc05105e020bfd55c78d223550 not found: ID does not exist" containerID="e1757e5acb838902f4011b0dfc2a220b74f028cc05105e020bfd55c78d223550" Feb 16 17:15:18.475332 master-0 kubenswrapper[4167]: E0216 17:15:18.475156 4167 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"3bc3b0a3c7a9d33ae08dca9280e63bf069111d5618b0180dcffe8f0d1a422a94\": container with ID starting with 3bc3b0a3c7a9d33ae08dca9280e63bf069111d5618b0180dcffe8f0d1a422a94 not found: ID does not exist" containerID="3bc3b0a3c7a9d33ae08dca9280e63bf069111d5618b0180dcffe8f0d1a422a94" Feb 16 17:15:18.475808 master-0 kubenswrapper[4167]: E0216 17:15:18.475735 4167 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"fba47eb24f74d8dc16f686568935b61829e866ee98f522e6506264cd0528411b\": container with ID starting with fba47eb24f74d8dc16f686568935b61829e866ee98f522e6506264cd0528411b not found: ID does not exist" containerID="fba47eb24f74d8dc16f686568935b61829e866ee98f522e6506264cd0528411b" Feb 16 17:15:18.476472 master-0 kubenswrapper[4167]: E0216 17:15:18.476401 4167 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"c533cb820095a78f39c6f42ffac03ee174e3ee777a839e55594e3c6025a91606\": container with ID starting with c533cb820095a78f39c6f42ffac03ee174e3ee777a839e55594e3c6025a91606 not found: ID does not exist" containerID="c533cb820095a78f39c6f42ffac03ee174e3ee777a839e55594e3c6025a91606" Feb 16 17:15:18.476927 master-0 kubenswrapper[4167]: E0216 17:15:18.476873 4167 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"31bd9a890a5059e0b580fdd2f2ff6c6e7a091febf9ee4623d9457ea21452090a\": container with ID starting with 31bd9a890a5059e0b580fdd2f2ff6c6e7a091febf9ee4623d9457ea21452090a not found: ID does not exist" containerID="31bd9a890a5059e0b580fdd2f2ff6c6e7a091febf9ee4623d9457ea21452090a" Feb 16 17:15:18.477454 master-0 kubenswrapper[4167]: E0216 17:15:18.477373 4167 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"e2ac9e086f60d8394dafb914a71895490f5e6c94804446cbace8d6c68123a12b\": container with ID starting with e2ac9e086f60d8394dafb914a71895490f5e6c94804446cbace8d6c68123a12b not found: ID does not exist" containerID="e2ac9e086f60d8394dafb914a71895490f5e6c94804446cbace8d6c68123a12b" Feb 16 17:15:18.477896 master-0 kubenswrapper[4167]: E0216 17:15:18.477840 4167 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"9a2847bba4fb3a03af2537d3d204da4564b5ff5aff8a875dc47e687e78893239\": container with ID starting with 9a2847bba4fb3a03af2537d3d204da4564b5ff5aff8a875dc47e687e78893239 not found: ID does not exist" containerID="9a2847bba4fb3a03af2537d3d204da4564b5ff5aff8a875dc47e687e78893239" Feb 16 17:15:18.480674 master-0 kubenswrapper[4167]: E0216 17:15:18.480621 4167 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"01f4f89971ebb359e0eeec52882d07d21354b8e08fc6c1173fde440ef3e5d38b\": container with ID starting with 01f4f89971ebb359e0eeec52882d07d21354b8e08fc6c1173fde440ef3e5d38b not found: ID does not exist" containerID="01f4f89971ebb359e0eeec52882d07d21354b8e08fc6c1173fde440ef3e5d38b" Feb 16 17:15:18.481272 master-0 kubenswrapper[4167]: E0216 17:15:18.481207 4167 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"cd7ca8585e9770f668282d25d327e2a91ec2db08fd3ae45538225dc8a5ab9091\": container with ID starting with cd7ca8585e9770f668282d25d327e2a91ec2db08fd3ae45538225dc8a5ab9091 not found: ID does not exist" containerID="cd7ca8585e9770f668282d25d327e2a91ec2db08fd3ae45538225dc8a5ab9091" Feb 16 17:15:18.482053 master-0 kubenswrapper[4167]: E0216 17:15:18.482007 4167 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"ab4cf257e6e0f29ed254052561254039fa1b8a8f9b4ce54fa741917d9a4c1648\": container with ID starting with ab4cf257e6e0f29ed254052561254039fa1b8a8f9b4ce54fa741917d9a4c1648 not found: ID does not exist" containerID="ab4cf257e6e0f29ed254052561254039fa1b8a8f9b4ce54fa741917d9a4c1648" Feb 16 17:15:18.482492 master-0 kubenswrapper[4167]: E0216 17:15:18.482440 4167 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"85003325a476039d5eb44432fdcf7d2532212a32580f381790355fd21b4f3730\": container with ID starting with 85003325a476039d5eb44432fdcf7d2532212a32580f381790355fd21b4f3730 not found: ID does not exist" containerID="85003325a476039d5eb44432fdcf7d2532212a32580f381790355fd21b4f3730" Feb 16 17:15:18.483028 master-0 kubenswrapper[4167]: E0216 17:15:18.482982 4167 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"fe91129f000124aca4ffcb46fef9c002b10b433ceec06a4c01ffe2fc33ca2b2a\": container with ID starting with fe91129f000124aca4ffcb46fef9c002b10b433ceec06a4c01ffe2fc33ca2b2a not found: ID does not exist" containerID="fe91129f000124aca4ffcb46fef9c002b10b433ceec06a4c01ffe2fc33ca2b2a" Feb 16 17:15:18.483635 master-0 kubenswrapper[4167]: E0216 17:15:18.483586 4167 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"38ea24f9e1f52bb2d156d60e530f0e5be87fcb1b940f2e51d9ccf98bf655afc7\": container with ID starting with 38ea24f9e1f52bb2d156d60e530f0e5be87fcb1b940f2e51d9ccf98bf655afc7 not found: ID does not exist" containerID="38ea24f9e1f52bb2d156d60e530f0e5be87fcb1b940f2e51d9ccf98bf655afc7" Feb 16 17:15:18.484261 master-0 kubenswrapper[4167]: E0216 17:15:18.484198 4167 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"3268564838eb6e6a4f98f7ce91f31bb8894c255d354c86d8cadc7b120d01a6ff\": container with ID starting with 3268564838eb6e6a4f98f7ce91f31bb8894c255d354c86d8cadc7b120d01a6ff not found: ID does not exist" containerID="3268564838eb6e6a4f98f7ce91f31bb8894c255d354c86d8cadc7b120d01a6ff"aggregated/unused_machine_configs_count.json0000640000000000000000000000004215144650247020140 0ustar0000000000000000{"unused_machineconfigs_count":23}config/machineconfigs/rendered-worker-c7ccd6fb94dd6d087e4a528948c79fb2.json0000640000000000000000000004054015144650247024237 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","metadata":{"annotations":{"machineconfiguration.openshift.io/generated-by-controller-version":"0b0569287da3daea19bf47aa298037ccb4cbff98","machineconfiguration.openshift.io/release-image-version":"4.18.32"},"creationTimestamp":"2026-02-16T17:04:52Z","generation":1,"name":"rendered-worker-c7ccd6fb94dd6d087e4a528948c79fb2","ownerReferences":[{"apiVersion":"machineconfiguration.openshift.io/v1","blockOwnerDeletion":true,"controller":true,"kind":"MachineConfigPool","name":"worker","uid":"e7796f79-1f69-4cd6-a99d-2e90f692a258"}],"resourceVersion":"13472","uid":"806864f1-c581-4b69-ab5e-a69a62fd3801"},"spec":{"baseOSExtensionsContainerImage":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee7b795566b8bd3a23d3186c8412e8cc1338556850ecac38c6734c20191fea91","config":{"ignition":{"version":"3.4.0"},"passwd":{"users":null},"storage":{"files":null},"systemd":{"units":[{"contents":"[Unit]\nDescription=Cleans NetworkManager state generated by dracut\n# Removal of this file signals firstboot completion\nConditionPathExists=!/etc/ignition-machine-config-encapsulated.json\n# This is opt-in for some deployment types, and opt-out for others.\nConditionPathExists=/var/lib/mco/nm-clean-initrd-state\nWants=network-pre.target\nBefore=network-pre.target\n\n[Service]\nType=oneshot\n# Remove any existing state possibly generated NM run by dracut. We want NM to\n# consider all profiles autoconnect priority when it starts instead of\n# remembering which profile was a device activated with when NM is run by\n# dracut.\nExecStart=/usr/local/bin/nm-clean-initrd-state.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"NetworkManager-clean-initrd-state.service"},{"dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"ENABLE_PROFILE_UNIX_SOCKET=true\"\n","name":"10-mco-profile-unix-socket.conf"},{"contents":"[Unit]\nAfter=kubelet-dependencies.target\nRequires=kubelet-dependencies.target\n","name":"05-mco-ordering.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"name":"crio.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"docker.socket"},{"contents":"[Unit]\nDescription=The firstboot OS update has completed\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target\n\n[Install]\nWantedBy=default.target\n","enabled":true,"name":"firstboot-osupdate.target"},{"dropins":[{"contents":"[Unit]\nAfter=ovs-configuration.service\nBefore=crio.service\n","name":"01-after-configure-ovs.conf"}],"name":"ipsec.service"},{"contents":"[Unit]\nDescription=Dynamically sets the system reserved for the kubelet\nWants=network-online.target\nAfter=network-online.target firstboot-osupdate.target\nBefore=kubelet-dependencies.target\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nRemainAfterExit=yes\nEnvironmentFile=/etc/node-sizing-enabled.env\nExecStart=/bin/bash /usr/local/sbin/dynamic-system-reserved-calc.sh ${NODE_SIZING_ENABLED} ${SYSTEM_RESERVED_MEMORY} ${SYSTEM_RESERVED_CPU} ${SYSTEM_RESERVED_ES}\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"kubelet-auto-node-size.service"},{"contents":"[Unit]\nDescription=Dependencies necessary to run kubelet\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target network-online.target\nWants=NetworkManager-wait-online.service crio-wipe.service\nWants=rpc-statd.service chrony-wait.service\n","name":"kubelet-dependencies.target"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet\nRequires=crio.service kubelet-dependencies.target\nAfter=kubelet-dependencies.target\nAfter=ostree-finalize-staged.service\n\n[Service]\nType=notify\nExecStartPre=/bin/mkdir --parents /etc/kubernetes/manifests\nExecStartPre=-/usr/sbin/restorecon -ri /var/lib/kubelet/pod-resources /usr/local/bin/kubenswrapper /usr/bin/kubensenter\nEnvironment=\"KUBELET_NODE_IP=0.0.0.0\"\nEnvironmentFile=/etc/os-release\nEnvironmentFile=-/etc/kubernetes/kubelet-workaround\nEnvironmentFile=-/etc/kubernetes/kubelet-env\nEnvironmentFile=/etc/node-sizing.env\n\nExecStart=/usr/local/bin/kubenswrapper \\\n /usr/bin/kubelet \\\n --config=/etc/kubernetes/kubelet.conf \\\n --bootstrap-kubeconfig=/etc/kubernetes/kubeconfig \\\n --kubeconfig=/var/lib/kubelet/kubeconfig \\\n --container-runtime-endpoint=/var/run/crio/crio.sock \\\n --runtime-cgroups=/system.slice/crio.service \\\n --node-labels=node-role.kubernetes.io/worker,node.openshift.io/os_id=${ID} \\\n --node-ip=${KUBELET_NODE_IP} \\\n --minimum-container-ttl-duration=6m0s \\\n --volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec \\\n --cloud-provider= \\\n \\\n --hostname-override=${KUBELET_NODE_NAME} \\\n --provider-id=${KUBELET_PROVIDERID} \\\n --pod-infra-container-image=quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1593b6aac7bb18c1bbb5d41693e8b8c7f0c0410fcc09e15de52d8bd53e356541 \\\n --system-reserved=cpu=${SYSTEM_RESERVED_CPU},memory=${SYSTEM_RESERVED_MEMORY},ephemeral-storage=${SYSTEM_RESERVED_ES} \\\n --v=${KUBELET_LOG_LEVEL}\n\nRestart=always\nRestartSec=10\n\n[Install]\nWantedBy=multi-user.target\n","dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"enabled":true,"name":"kubelet.service"},{"contents":"[Unit]\nDescription=Manages a mount namespace for kubernetes-specific mounts\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nRuntimeDirectory=kubens\nEnvironment=RUNTIME_DIRECTORY=%t/kubens\nEnvironment=BIND_POINT=%t/kubens/mnt\nEnvironment=ENVFILE=%t/kubens/env\n\n# Set up the runtime directory as an unbindable mountpoint\nExecStartPre=bash -c \"findmnt ${RUNTIME_DIRECTORY} || mount --make-unbindable --bind ${RUNTIME_DIRECTORY} ${RUNTIME_DIRECTORY}\"\n# Ensure the bind point exists\nExecStartPre=touch ${BIND_POINT}\n# Use 'unshare' to create the new mountpoint, then 'mount --make-rshared' so it cascades internally\nExecStart=unshare --mount=${BIND_POINT} --propagation slave mount --make-rshared /\n# Finally, set an env pointer for ease-of-use\nExecStartPost=bash -c 'echo \"KUBENSMNT=${BIND_POINT}\" \u003e \"${ENVFILE}\"'\n\n# On stop, a recursive unmount cleans up the namespace and bind-mounted unbindable parent directory\nExecStop=umount -R ${RUNTIME_DIRECTORY}\n\n[Install]\nWantedBy=multi-user.target\n","enabled":false,"name":"kubens.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Firstboot\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# Removal of this file signals firstboot completion\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\nAfter=machine-config-daemon-pull.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\n# Disable existing repos (if any) so that OS extensions would use embedded RPMs only\nExecStartPre=-/usr/bin/sh -c \"sed -i 's/enabled=1/enabled=0/' /etc/yum.repos.d/*.repo\"\n# Run this via podman because we want to use the nmstatectl binary in our container\nExecStart=/usr/bin/podman run --rm --privileged --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42' firstboot-complete-machineconfig --persist-nics\nExecStart=/usr/bin/podman run --rm --privileged --pid=host --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42' firstboot-complete-machineconfig\n[Install]\nRequiredBy=firstboot-osupdate.target\n","enabled":true,"name":"machine-config-daemon-firstboot.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Pull\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# This \"stamp file\" is unlinked when we complete\n# machine-config-daemon-firstboot.service\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\n# Run after crio-wipe so the pulled MCD image is protected against a corrupted storage from a forced shutdown\nWants=crio-wipe.service NetworkManager-wait-online.service\nAfter=crio-wipe.service NetworkManager-wait-online.service network.service\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nExecStartPre=/etc/machine-config-daemon/generate_podman_policy_args.sh\nExecStart=/bin/sh -c \"while ! /usr/bin/podman pull $(cat /tmp/podman_policy_args) --authfile=/var/lib/kubelet/config.json 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42'; do sleep 1; done\"\n\n[Install]\nRequiredBy=machine-config-daemon-firstboot.service\n","enabled":true,"name":"machine-config-daemon-pull.service"},{"contents":"[Unit]\nDescription=Applies per-node NMState network configuration\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service\nBefore=nmstate.service kubelet-dependencies.target ovs-configuration.service node-valid-hostname.service\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/usr/local/bin/nmstate-configuration.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"nmstate-configuration.service"},{"contents":"[Unit]\nDescription=Apply nmstate on-disk state\nDocumentation=man:nmstate.service(8) https://www.nmstate.io\nAfter=NetworkManager-wait-online.service\nBefore=network-online.target\nWants=NetworkManager-wait-online.service\nRequires=NetworkManager.service\n\n[Service]\nType=oneshot\nExecStart=/usr/bin/nmstatectl service\nRemainAfterExit=yes\n\n[Install]\nWantedBy=NetworkManager.service\n","enabled":true,"name":"nmstate.service"},{"contents":"[Unit]\nDescription=Wait for a non-localhost hostname\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nUser=root\nExecStart=/usr/local/bin/mco-hostname --wait\n\n# Wait up to 5min for the node to get a non-localhost name\nTimeoutSec=300\n\n[Install]\n# TODO: Change this to RequiredBy after we fix https://github.com/openshift/machine-config-operator/pull/3865#issuecomment-1746963115\nWantedBy=kubelet-dependencies.target\n","enabled":true,"name":"node-valid-hostname.service"},{"contents":"[Unit]\nDescription=Writes IP address configuration so that kubelet and crio services select a valid node IP\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service firstboot-osupdate.target\nBefore=kubelet-dependencies.target ovs-configuration.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/bin/podman run --rm \\\n --authfile /var/lib/kubelet/config.json \\\n --env 'ENABLE_NODEIP_DEBUG=true' \\\n --net=host \\\n --security-opt label=disable \\\n --volume /etc/systemd/system:/etc/systemd/system \\\n --volume /run/nodeip-configuration:/run/nodeip-configuration \\\n quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:07093043bca0089b3c56d9e5331e68f549541e5661e2a39a260aa534dc9528bd \\\n node-ip \\\n set \\\n --retry-on-failure \\\n --network-type OVNKubernetes \\\n ${NODEIP_HINT:-${KUBELET_NODEIP_HINT:-}}; \\\n do \\\n sleep 5; \\\n done\"\nExecStart=/bin/systemctl daemon-reload\nExecStartPre=/bin/mkdir -p /run/nodeip-configuration\nStandardOutput=journal+console\nStandardError=journal+console\n\nEnvironmentFile=-/etc/default/nodeip-configuration\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"nodeip-configuration.service"},{"enabled":true,"name":"openvswitch.service"},{"contents":"[Unit]\n# Kdump will generate it's initramfs based on the running state when kdump.service run\n# If OVS has already run, the kdump fails to gather a working network config,\n# which prevent network log exports, sush as SSH.\n# See https://issues.redhat.com/browse/OCPBUGS-28239\nAfter=kdump.service\nDescription=Configures OVS with proper host networking configuration\n# This service is used to move a physical NIC into OVS and reconfigure OVS to use the host IP\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=firstboot-osupdate.target\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service nmstate.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nExecStart=/usr/local/bin/configure-ovs.sh OVNKubernetes\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"ovs-configuration.service"},{"dropins":[{"contents":"[Service]\nRestart=always\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /var/lib/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /etc/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /run/openvswitch'\nExecStartPost=-/usr/bin/ovs-appctl vlog/set syslog:info\nExecReload=-/usr/bin/ovs-appctl vlog/set syslog:info\n","name":"10-ovs-vswitchd-restart.conf"}],"name":"ovs-vswitchd.service"},{"dropins":[{"contents":"[Service]\nRestart=always\n","name":"10-ovsdb-restart.conf"}],"enabled":true,"name":"ovsdb-server.service"},{"dropins":[{"contents":"","name":"10-mco-default-env.conf"}],"name":"rpm-ostreed.service"},{"contents":"[Unit]\nDescription=Ensure IKE SA established for existing IPsec connections.\nAfter=ipsec.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\nType=oneshot\nExecStart=/usr/local/bin/ipsec-connect-wait.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=ipsec.service\n","enabled":true,"name":"wait-for-ipsec-connect.service"},{"contents":"[Unit]\nDescription=Ensure primary IP is assigned and usable\nRequires=nmstate.service\nAfter=nmstate.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/local/bin/wait-for-primary-ip.sh; \\\n do \\\n sleep 10; \\\n done\"\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"wait-for-primary-ip.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"zincati.service"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet After Reboot Cleanup\nBefore=kubelet.service\n\n[Service]\nType=oneshot\nExecStart=/bin/rm -f /var/lib/kubelet/cpu_manager_state\nExecStart=/bin/rm -f /var/lib/kubelet/memory_manager_state\nExecStart=-/bin/rm -f /var/lib/kubelet/dra_manager_state\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"kubelet-cleanup.service"}]}},"extensions":[],"fips":false,"kernelArguments":["systemd.unified_cgroup_hierarchy=1","cgroup_no_v1=\"all\"","psi=0"],"kernelType":"default","osImageURL":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4aa42a4b31390d46f924ce2d0c4da772bfbf6a5e1e121bdb0f8b69f989e0a0db"}}config/machineconfigs/rendered-master-ccc1c4b4035b8605635ebee7b29103f5.json0000640000000000000000000004333015144650247024014 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","metadata":{"annotations":{"machineconfiguration.openshift.io/generated-by-controller-version":"0b0569287da3daea19bf47aa298037ccb4cbff98","machineconfiguration.openshift.io/release-image-version":"4.18.32"},"creationTimestamp":"2026-02-16T17:04:57Z","generation":1,"name":"rendered-master-ccc1c4b4035b8605635ebee7b29103f5","ownerReferences":[{"apiVersion":"machineconfiguration.openshift.io/v1","blockOwnerDeletion":true,"controller":true,"kind":"MachineConfigPool","name":"master","uid":"73e10899-7ee9-47b2-8cc6-a9ffda074267"}],"resourceVersion":"13627","uid":"1f1653b8-e7f6-40fe-97a2-fa858cc70cf5"},"spec":{"baseOSExtensionsContainerImage":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee7b795566b8bd3a23d3186c8412e8cc1338556850ecac38c6734c20191fea91","config":{"ignition":{"version":"3.4.0"},"passwd":{"users":null},"storage":{"disks":[{"device":"/dev/vdc","wipeTable":true},{"device":"/dev/vdd","wipeTable":true},{"device":"/dev/vde","wipeTable":true}],"files":null},"systemd":{"units":[{"contents":"[Unit]\nDescription=Cleans NetworkManager state generated by dracut\n# Removal of this file signals firstboot completion\nConditionPathExists=!/etc/ignition-machine-config-encapsulated.json\n# This is opt-in for some deployment types, and opt-out for others.\nConditionPathExists=/var/lib/mco/nm-clean-initrd-state\nWants=network-pre.target\nBefore=network-pre.target\n\n[Service]\nType=oneshot\n# Remove any existing state possibly generated NM run by dracut. We want NM to\n# consider all profiles autoconnect priority when it starts instead of\n# remembering which profile was a device activated with when NM is run by\n# dracut.\nExecStart=/usr/local/bin/nm-clean-initrd-state.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"NetworkManager-clean-initrd-state.service"},{"dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"ENABLE_PROFILE_UNIX_SOCKET=true\"\n","name":"10-mco-profile-unix-socket.conf"},{"contents":"[Unit]\nAfter=kubelet-dependencies.target\nRequires=kubelet-dependencies.target\n","name":"05-mco-ordering.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"name":"crio.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"docker.socket"},{"contents":"[Unit]\nDescription=The firstboot OS update has completed\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target\n\n[Install]\nWantedBy=default.target\n","enabled":true,"name":"firstboot-osupdate.target"},{"dropins":[{"contents":"[Unit]\nAfter=ovs-configuration.service\nBefore=crio.service\n","name":"01-after-configure-ovs.conf"}],"name":"ipsec.service"},{"contents":"[Unit]\nDescription=Dynamically sets the system reserved for the kubelet\nWants=network-online.target\nAfter=network-online.target firstboot-osupdate.target\nBefore=kubelet-dependencies.target\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nRemainAfterExit=yes\nEnvironmentFile=/etc/node-sizing-enabled.env\nExecStart=/bin/bash /usr/local/sbin/dynamic-system-reserved-calc.sh ${NODE_SIZING_ENABLED} ${SYSTEM_RESERVED_MEMORY} ${SYSTEM_RESERVED_CPU} ${SYSTEM_RESERVED_ES}\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"kubelet-auto-node-size.service"},{"contents":"[Unit]\nDescription=Dependencies necessary to run kubelet\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target network-online.target\nWants=NetworkManager-wait-online.service crio-wipe.service\nWants=rpc-statd.service chrony-wait.service\n","name":"kubelet-dependencies.target"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet\nRequires=crio.service kubelet-dependencies.target\nAfter=kubelet-dependencies.target\nAfter=ostree-finalize-staged.service\n\n[Service]\nType=notify\nExecStartPre=/bin/mkdir --parents /etc/kubernetes/manifests\nExecStartPre=-/usr/sbin/restorecon -ri /var/lib/kubelet/pod-resources /usr/local/bin/kubenswrapper /usr/bin/kubensenter\nEnvironment=\"KUBELET_NODE_IP=0.0.0.0\"\nEnvironmentFile=/etc/os-release\nEnvironmentFile=-/etc/kubernetes/kubelet-workaround\nEnvironmentFile=-/etc/kubernetes/kubelet-env\nEnvironmentFile=/etc/node-sizing.env\n\nExecStart=/usr/local/bin/kubenswrapper \\\n /usr/bin/kubelet \\\n --config=/etc/kubernetes/kubelet.conf \\\n --bootstrap-kubeconfig=/etc/kubernetes/kubeconfig \\\n --kubeconfig=/var/lib/kubelet/kubeconfig \\\n --container-runtime-endpoint=/var/run/crio/crio.sock \\\n --runtime-cgroups=/system.slice/crio.service \\\n --node-labels=node-role.kubernetes.io/control-plane,node-role.kubernetes.io/master,node.openshift.io/os_id=${ID} \\\n --node-ip=${KUBELET_NODE_IP} \\\n --minimum-container-ttl-duration=6m0s \\\n --cloud-provider= \\\n --volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec \\\n \\\n --hostname-override=${KUBELET_NODE_NAME} \\\n --provider-id=${KUBELET_PROVIDERID} \\\n --register-with-taints=node-role.kubernetes.io/master=:NoSchedule \\\n --pod-infra-container-image=quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1593b6aac7bb18c1bbb5d41693e8b8c7f0c0410fcc09e15de52d8bd53e356541 \\\n --system-reserved=cpu=${SYSTEM_RESERVED_CPU},memory=${SYSTEM_RESERVED_MEMORY},ephemeral-storage=${SYSTEM_RESERVED_ES} \\\n --v=${KUBELET_LOG_LEVEL}\n\nRestart=always\nRestartSec=10\n\n[Install]\nWantedBy=multi-user.target\n","dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"enabled":true,"name":"kubelet.service"},{"contents":"[Unit]\nDescription=Manages a mount namespace for kubernetes-specific mounts\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nRuntimeDirectory=kubens\nEnvironment=RUNTIME_DIRECTORY=%t/kubens\nEnvironment=BIND_POINT=%t/kubens/mnt\nEnvironment=ENVFILE=%t/kubens/env\n\n# Set up the runtime directory as an unbindable mountpoint\nExecStartPre=bash -c \"findmnt ${RUNTIME_DIRECTORY} || mount --make-unbindable --bind ${RUNTIME_DIRECTORY} ${RUNTIME_DIRECTORY}\"\n# Ensure the bind point exists\nExecStartPre=touch ${BIND_POINT}\n# Use 'unshare' to create the new mountpoint, then 'mount --make-rshared' so it cascades internally\nExecStart=unshare --mount=${BIND_POINT} --propagation slave mount --make-rshared /\n# Finally, set an env pointer for ease-of-use\nExecStartPost=bash -c 'echo \"KUBENSMNT=${BIND_POINT}\" \u003e \"${ENVFILE}\"'\n\n# On stop, a recursive unmount cleans up the namespace and bind-mounted unbindable parent directory\nExecStop=umount -R ${RUNTIME_DIRECTORY}\n\n[Install]\nWantedBy=multi-user.target\n","enabled":false,"name":"kubens.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Firstboot\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# Removal of this file signals firstboot completion\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\nAfter=machine-config-daemon-pull.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\n# Disable existing repos (if any) so that OS extensions would use embedded RPMs only\nExecStartPre=-/usr/bin/sh -c \"sed -i 's/enabled=1/enabled=0/' /etc/yum.repos.d/*.repo\"\n# Run this via podman because we want to use the nmstatectl binary in our container\nExecStart=/usr/bin/podman run --rm --privileged --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42' firstboot-complete-machineconfig --persist-nics\nExecStart=/usr/bin/podman run --rm --privileged --pid=host --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42' firstboot-complete-machineconfig\n[Install]\nRequiredBy=firstboot-osupdate.target\n","enabled":true,"name":"machine-config-daemon-firstboot.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Pull\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# This \"stamp file\" is unlinked when we complete\n# machine-config-daemon-firstboot.service\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\n# Run after crio-wipe so the pulled MCD image is protected against a corrupted storage from a forced shutdown\nWants=crio-wipe.service NetworkManager-wait-online.service\nAfter=crio-wipe.service NetworkManager-wait-online.service network.service\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nExecStartPre=/etc/machine-config-daemon/generate_podman_policy_args.sh\nExecStart=/bin/sh -c \"while ! /usr/bin/podman pull $(cat /tmp/podman_policy_args) --authfile=/var/lib/kubelet/config.json 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42'; do sleep 1; done\"\n\n[Install]\nRequiredBy=machine-config-daemon-firstboot.service\n","enabled":true,"name":"machine-config-daemon-pull.service"},{"contents":"[Unit]\nDescription=Applies per-node NMState network configuration\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service\nBefore=nmstate.service kubelet-dependencies.target ovs-configuration.service node-valid-hostname.service\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/usr/local/bin/nmstate-configuration.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"nmstate-configuration.service"},{"contents":"[Unit]\nDescription=Apply nmstate on-disk state\nDocumentation=man:nmstate.service(8) https://www.nmstate.io\nAfter=NetworkManager-wait-online.service\nBefore=network-online.target\nWants=NetworkManager-wait-online.service\nRequires=NetworkManager.service\n\n[Service]\nType=oneshot\nExecStart=/usr/bin/nmstatectl service\nRemainAfterExit=yes\n\n[Install]\nWantedBy=NetworkManager.service\n","enabled":true,"name":"nmstate.service"},{"contents":"[Unit]\nDescription=Wait for a non-localhost hostname\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nUser=root\nExecStart=/usr/local/bin/mco-hostname --wait\n\n# Wait up to 5min for the node to get a non-localhost name\nTimeoutSec=300\n\n[Install]\n# TODO: Change this to RequiredBy after we fix https://github.com/openshift/machine-config-operator/pull/3865#issuecomment-1746963115\nWantedBy=kubelet-dependencies.target\n","enabled":true,"name":"node-valid-hostname.service"},{"contents":"[Unit]\nDescription=Writes IP address configuration so that kubelet and crio services select a valid node IP\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service firstboot-osupdate.target\nBefore=kubelet-dependencies.target ovs-configuration.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/bin/podman run --rm \\\n --authfile /var/lib/kubelet/config.json \\\n --env 'ENABLE_NODEIP_DEBUG=true' \\\n --net=host \\\n --security-opt label=disable \\\n --volume /etc/systemd/system:/etc/systemd/system \\\n --volume /run/nodeip-configuration:/run/nodeip-configuration \\\n quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:07093043bca0089b3c56d9e5331e68f549541e5661e2a39a260aa534dc9528bd \\\n node-ip \\\n set \\\n --retry-on-failure \\\n --network-type OVNKubernetes \\\n ${NODEIP_HINT:-${KUBELET_NODEIP_HINT:-}}; \\\n do \\\n sleep 5; \\\n done\"\nExecStart=/bin/systemctl daemon-reload\nExecStartPre=/bin/mkdir -p /run/nodeip-configuration\nStandardOutput=journal+console\nStandardError=journal+console\n\nEnvironmentFile=-/etc/default/nodeip-configuration\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"nodeip-configuration.service"},{"enabled":true,"name":"openvswitch.service"},{"contents":"[Unit]\n# Kdump will generate it's initramfs based on the running state when kdump.service run\n# If OVS has already run, the kdump fails to gather a working network config,\n# which prevent network log exports, sush as SSH.\n# See https://issues.redhat.com/browse/OCPBUGS-28239\nAfter=kdump.service\nDescription=Configures OVS with proper host networking configuration\n# This service is used to move a physical NIC into OVS and reconfigure OVS to use the host IP\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=firstboot-osupdate.target\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service nmstate.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nExecStart=/usr/local/bin/configure-ovs.sh OVNKubernetes\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"ovs-configuration.service"},{"dropins":[{"contents":"[Service]\nRestart=always\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /var/lib/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /etc/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /run/openvswitch'\nExecStartPost=-/usr/bin/ovs-appctl vlog/set syslog:info\nExecReload=-/usr/bin/ovs-appctl vlog/set syslog:info\n","name":"10-ovs-vswitchd-restart.conf"}],"name":"ovs-vswitchd.service"},{"dropins":[{"contents":"[Service]\nRestart=always\n","name":"10-ovsdb-restart.conf"}],"enabled":true,"name":"ovsdb-server.service"},{"dropins":[{"contents":"","name":"10-mco-default-env.conf"},{"contents":"# See https://github.com/openshift/machine-config-operator/issues/1897\n[Service]\nNice=10\nIOSchedulingClass=best-effort\nIOSchedulingPriority=6\n","name":"mco-controlplane-nice.conf"}],"name":"rpm-ostreed.service"},{"contents":"[Unit]\nDescription=Ensure IKE SA established for existing IPsec connections.\nAfter=ipsec.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\nType=oneshot\nExecStart=/usr/local/bin/ipsec-connect-wait.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=ipsec.service\n","enabled":true,"name":"wait-for-ipsec-connect.service"},{"contents":"[Unit]\nDescription=Ensure primary IP is assigned and usable\nRequires=nmstate.service\nAfter=nmstate.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/local/bin/wait-for-primary-ip.sh; \\\n do \\\n sleep 10; \\\n done\"\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"wait-for-primary-ip.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"zincati.service"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet After Reboot Cleanup\nBefore=kubelet.service\n\n[Service]\nType=oneshot\nExecStart=/bin/rm -f /var/lib/kubelet/cpu_manager_state\nExecStart=/bin/rm -f /var/lib/kubelet/memory_manager_state\nExecStart=-/bin/rm -f /var/lib/kubelet/dra_manager_state\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"kubelet-cleanup.service"},{"contents":"[Unit]\nDescription=Run dnsmasq to provide local dns for Single Node OpenShift\nBefore=kubelet.service crio.service\nAfter=network.target ovs-configuration.service\n\n[Service]\nTimeoutStartSec=30\nExecStartPre=/usr/local/bin/dnsmasq_config.sh\nExecStart=/usr/sbin/dnsmasq -k\nRestart=always\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"dnsmasq.service"},{"enabled":true,"name":"iscsid.service"},{"contents":"[Unit]\nDescription=Create logical volume with name cinder-volumes.\nAfter=var.mount systemd-udev-settle.service\n\n[Service]\nType=oneshot\nExecCondition=/bin/bash -c '! /usr/sbin/vgdisplay cinder-volumes'\nExecStartPre=/usr/sbin/pvcreate /dev/vdc /dev/vdd /dev/vde\nExecStart=/usr/sbin/vgcreate cinder-volumes /dev/vdc /dev/vdd /dev/vde\nRemainAfterExit=yes\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"lv-cinder-volumes.service"},{"enabled":true,"name":"multipathd.service"}]}},"extensions":[],"fips":false,"kernelArguments":["net.ifnames=0","systemd.unified_cgroup_hierarchy=1","cgroup_no_v1=\"all\"","psi=0"],"kernelType":"default","osImageURL":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4aa42a4b31390d46f924ce2d0c4da772bfbf6a5e1e121bdb0f8b69f989e0a0db"}}config/machineconfigs/rendered-master-4ff3bdc50d696d239efb12817ae47acf.json0000640000000000000000000004322415144650247024257 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","metadata":{"annotations":{"machineconfiguration.openshift.io/generated-by-controller-version":"0b0569287da3daea19bf47aa298037ccb4cbff98","machineconfiguration.openshift.io/release-image-version":"4.18.32"},"creationTimestamp":"2026-02-16T17:04:52Z","generation":1,"name":"rendered-master-4ff3bdc50d696d239efb12817ae47acf","ownerReferences":[{"apiVersion":"machineconfiguration.openshift.io/v1","blockOwnerDeletion":true,"controller":true,"kind":"MachineConfigPool","name":"master","uid":"73e10899-7ee9-47b2-8cc6-a9ffda074267"}],"resourceVersion":"13473","uid":"31efcbad-8dcc-4b55-8875-de9bb978906c"},"spec":{"baseOSExtensionsContainerImage":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee7b795566b8bd3a23d3186c8412e8cc1338556850ecac38c6734c20191fea91","config":{"ignition":{"version":"3.4.0"},"passwd":{"users":null},"storage":{"disks":[{"device":"/dev/vdc","wipeTable":true},{"device":"/dev/vdd","wipeTable":true},{"device":"/dev/vde","wipeTable":true}],"files":null},"systemd":{"units":[{"contents":"[Unit]\nDescription=Cleans NetworkManager state generated by dracut\n# Removal of this file signals firstboot completion\nConditionPathExists=!/etc/ignition-machine-config-encapsulated.json\n# This is opt-in for some deployment types, and opt-out for others.\nConditionPathExists=/var/lib/mco/nm-clean-initrd-state\nWants=network-pre.target\nBefore=network-pre.target\n\n[Service]\nType=oneshot\n# Remove any existing state possibly generated NM run by dracut. We want NM to\n# consider all profiles autoconnect priority when it starts instead of\n# remembering which profile was a device activated with when NM is run by\n# dracut.\nExecStart=/usr/local/bin/nm-clean-initrd-state.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"NetworkManager-clean-initrd-state.service"},{"dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"ENABLE_PROFILE_UNIX_SOCKET=true\"\n","name":"10-mco-profile-unix-socket.conf"},{"contents":"[Unit]\nAfter=kubelet-dependencies.target\nRequires=kubelet-dependencies.target\n","name":"05-mco-ordering.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"name":"crio.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"docker.socket"},{"contents":"[Unit]\nDescription=The firstboot OS update has completed\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target\n\n[Install]\nWantedBy=default.target\n","enabled":true,"name":"firstboot-osupdate.target"},{"dropins":[{"contents":"[Unit]\nAfter=ovs-configuration.service\nBefore=crio.service\n","name":"01-after-configure-ovs.conf"}],"name":"ipsec.service"},{"contents":"[Unit]\nDescription=Dynamically sets the system reserved for the kubelet\nWants=network-online.target\nAfter=network-online.target firstboot-osupdate.target\nBefore=kubelet-dependencies.target\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nRemainAfterExit=yes\nEnvironmentFile=/etc/node-sizing-enabled.env\nExecStart=/bin/bash /usr/local/sbin/dynamic-system-reserved-calc.sh ${NODE_SIZING_ENABLED} ${SYSTEM_RESERVED_MEMORY} ${SYSTEM_RESERVED_CPU} ${SYSTEM_RESERVED_ES}\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"kubelet-auto-node-size.service"},{"contents":"[Unit]\nDescription=Dependencies necessary to run kubelet\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target network-online.target\nWants=NetworkManager-wait-online.service crio-wipe.service\nWants=rpc-statd.service chrony-wait.service\n","name":"kubelet-dependencies.target"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet\nRequires=crio.service kubelet-dependencies.target\nAfter=kubelet-dependencies.target\nAfter=ostree-finalize-staged.service\n\n[Service]\nType=notify\nExecStartPre=/bin/mkdir --parents /etc/kubernetes/manifests\nExecStartPre=-/usr/sbin/restorecon -ri /var/lib/kubelet/pod-resources /usr/local/bin/kubenswrapper /usr/bin/kubensenter\nEnvironment=\"KUBELET_NODE_IP=0.0.0.0\"\nEnvironmentFile=/etc/os-release\nEnvironmentFile=-/etc/kubernetes/kubelet-workaround\nEnvironmentFile=-/etc/kubernetes/kubelet-env\nEnvironmentFile=/etc/node-sizing.env\n\nExecStart=/usr/local/bin/kubenswrapper \\\n /usr/bin/kubelet \\\n --config=/etc/kubernetes/kubelet.conf \\\n --bootstrap-kubeconfig=/etc/kubernetes/kubeconfig \\\n --kubeconfig=/var/lib/kubelet/kubeconfig \\\n --container-runtime-endpoint=/var/run/crio/crio.sock \\\n --runtime-cgroups=/system.slice/crio.service \\\n --node-labels=node-role.kubernetes.io/control-plane,node-role.kubernetes.io/master,node.openshift.io/os_id=${ID} \\\n --node-ip=${KUBELET_NODE_IP} \\\n --minimum-container-ttl-duration=6m0s \\\n --cloud-provider= \\\n --volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec \\\n \\\n --hostname-override=${KUBELET_NODE_NAME} \\\n --provider-id=${KUBELET_PROVIDERID} \\\n --register-with-taints=node-role.kubernetes.io/master=:NoSchedule \\\n --pod-infra-container-image=quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1593b6aac7bb18c1bbb5d41693e8b8c7f0c0410fcc09e15de52d8bd53e356541 \\\n --system-reserved=cpu=${SYSTEM_RESERVED_CPU},memory=${SYSTEM_RESERVED_MEMORY},ephemeral-storage=${SYSTEM_RESERVED_ES} \\\n --v=${KUBELET_LOG_LEVEL}\n\nRestart=always\nRestartSec=10\n\n[Install]\nWantedBy=multi-user.target\n","dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"enabled":true,"name":"kubelet.service"},{"contents":"[Unit]\nDescription=Manages a mount namespace for kubernetes-specific mounts\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nRuntimeDirectory=kubens\nEnvironment=RUNTIME_DIRECTORY=%t/kubens\nEnvironment=BIND_POINT=%t/kubens/mnt\nEnvironment=ENVFILE=%t/kubens/env\n\n# Set up the runtime directory as an unbindable mountpoint\nExecStartPre=bash -c \"findmnt ${RUNTIME_DIRECTORY} || mount --make-unbindable --bind ${RUNTIME_DIRECTORY} ${RUNTIME_DIRECTORY}\"\n# Ensure the bind point exists\nExecStartPre=touch ${BIND_POINT}\n# Use 'unshare' to create the new mountpoint, then 'mount --make-rshared' so it cascades internally\nExecStart=unshare --mount=${BIND_POINT} --propagation slave mount --make-rshared /\n# Finally, set an env pointer for ease-of-use\nExecStartPost=bash -c 'echo \"KUBENSMNT=${BIND_POINT}\" \u003e \"${ENVFILE}\"'\n\n# On stop, a recursive unmount cleans up the namespace and bind-mounted unbindable parent directory\nExecStop=umount -R ${RUNTIME_DIRECTORY}\n\n[Install]\nWantedBy=multi-user.target\n","enabled":false,"name":"kubens.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Firstboot\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# Removal of this file signals firstboot completion\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\nAfter=machine-config-daemon-pull.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\n# Disable existing repos (if any) so that OS extensions would use embedded RPMs only\nExecStartPre=-/usr/bin/sh -c \"sed -i 's/enabled=1/enabled=0/' /etc/yum.repos.d/*.repo\"\n# Run this via podman because we want to use the nmstatectl binary in our container\nExecStart=/usr/bin/podman run --rm --privileged --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42' firstboot-complete-machineconfig --persist-nics\nExecStart=/usr/bin/podman run --rm --privileged --pid=host --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42' firstboot-complete-machineconfig\n[Install]\nRequiredBy=firstboot-osupdate.target\n","enabled":true,"name":"machine-config-daemon-firstboot.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Pull\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# This \"stamp file\" is unlinked when we complete\n# machine-config-daemon-firstboot.service\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\n# Run after crio-wipe so the pulled MCD image is protected against a corrupted storage from a forced shutdown\nWants=crio-wipe.service NetworkManager-wait-online.service\nAfter=crio-wipe.service NetworkManager-wait-online.service network.service\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nExecStartPre=/etc/machine-config-daemon/generate_podman_policy_args.sh\nExecStart=/bin/sh -c \"while ! /usr/bin/podman pull $(cat /tmp/podman_policy_args) --authfile=/var/lib/kubelet/config.json 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42'; do sleep 1; done\"\n\n[Install]\nRequiredBy=machine-config-daemon-firstboot.service\n","enabled":true,"name":"machine-config-daemon-pull.service"},{"contents":"[Unit]\nDescription=Applies per-node NMState network configuration\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service\nBefore=nmstate.service kubelet-dependencies.target ovs-configuration.service node-valid-hostname.service\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/usr/local/bin/nmstate-configuration.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"nmstate-configuration.service"},{"contents":"[Unit]\nDescription=Apply nmstate on-disk state\nDocumentation=man:nmstate.service(8) https://www.nmstate.io\nAfter=NetworkManager-wait-online.service\nBefore=network-online.target\nWants=NetworkManager-wait-online.service\nRequires=NetworkManager.service\n\n[Service]\nType=oneshot\nExecStart=/usr/bin/nmstatectl service\nRemainAfterExit=yes\n\n[Install]\nWantedBy=NetworkManager.service\n","enabled":true,"name":"nmstate.service"},{"contents":"[Unit]\nDescription=Wait for a non-localhost hostname\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nUser=root\nExecStart=/usr/local/bin/mco-hostname --wait\n\n# Wait up to 5min for the node to get a non-localhost name\nTimeoutSec=300\n\n[Install]\n# TODO: Change this to RequiredBy after we fix https://github.com/openshift/machine-config-operator/pull/3865#issuecomment-1746963115\nWantedBy=kubelet-dependencies.target\n","enabled":true,"name":"node-valid-hostname.service"},{"contents":"[Unit]\nDescription=Writes IP address configuration so that kubelet and crio services select a valid node IP\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service firstboot-osupdate.target\nBefore=kubelet-dependencies.target ovs-configuration.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/bin/podman run --rm \\\n --authfile /var/lib/kubelet/config.json \\\n --env 'ENABLE_NODEIP_DEBUG=true' \\\n --net=host \\\n --security-opt label=disable \\\n --volume /etc/systemd/system:/etc/systemd/system \\\n --volume /run/nodeip-configuration:/run/nodeip-configuration \\\n quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:07093043bca0089b3c56d9e5331e68f549541e5661e2a39a260aa534dc9528bd \\\n node-ip \\\n set \\\n --retry-on-failure \\\n --network-type OVNKubernetes \\\n ${NODEIP_HINT:-${KUBELET_NODEIP_HINT:-}}; \\\n do \\\n sleep 5; \\\n done\"\nExecStart=/bin/systemctl daemon-reload\nExecStartPre=/bin/mkdir -p /run/nodeip-configuration\nStandardOutput=journal+console\nStandardError=journal+console\n\nEnvironmentFile=-/etc/default/nodeip-configuration\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"nodeip-configuration.service"},{"enabled":true,"name":"openvswitch.service"},{"contents":"[Unit]\n# Kdump will generate it's initramfs based on the running state when kdump.service run\n# If OVS has already run, the kdump fails to gather a working network config,\n# which prevent network log exports, sush as SSH.\n# See https://issues.redhat.com/browse/OCPBUGS-28239\nAfter=kdump.service\nDescription=Configures OVS with proper host networking configuration\n# This service is used to move a physical NIC into OVS and reconfigure OVS to use the host IP\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=firstboot-osupdate.target\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service nmstate.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nExecStart=/usr/local/bin/configure-ovs.sh OVNKubernetes\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"ovs-configuration.service"},{"dropins":[{"contents":"[Service]\nRestart=always\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /var/lib/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /etc/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /run/openvswitch'\nExecStartPost=-/usr/bin/ovs-appctl vlog/set syslog:info\nExecReload=-/usr/bin/ovs-appctl vlog/set syslog:info\n","name":"10-ovs-vswitchd-restart.conf"}],"name":"ovs-vswitchd.service"},{"dropins":[{"contents":"[Service]\nRestart=always\n","name":"10-ovsdb-restart.conf"}],"enabled":true,"name":"ovsdb-server.service"},{"dropins":[{"contents":"","name":"10-mco-default-env.conf"},{"contents":"# See https://github.com/openshift/machine-config-operator/issues/1897\n[Service]\nNice=10\nIOSchedulingClass=best-effort\nIOSchedulingPriority=6\n","name":"mco-controlplane-nice.conf"}],"name":"rpm-ostreed.service"},{"contents":"[Unit]\nDescription=Ensure IKE SA established for existing IPsec connections.\nAfter=ipsec.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\nType=oneshot\nExecStart=/usr/local/bin/ipsec-connect-wait.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=ipsec.service\n","enabled":true,"name":"wait-for-ipsec-connect.service"},{"contents":"[Unit]\nDescription=Ensure primary IP is assigned and usable\nRequires=nmstate.service\nAfter=nmstate.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/local/bin/wait-for-primary-ip.sh; \\\n do \\\n sleep 10; \\\n done\"\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"wait-for-primary-ip.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"zincati.service"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet After Reboot Cleanup\nBefore=kubelet.service\n\n[Service]\nType=oneshot\nExecStart=/bin/rm -f /var/lib/kubelet/cpu_manager_state\nExecStart=/bin/rm -f /var/lib/kubelet/memory_manager_state\nExecStart=-/bin/rm -f /var/lib/kubelet/dra_manager_state\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"kubelet-cleanup.service"},{"contents":"[Unit]\nDescription=Run dnsmasq to provide local dns for Single Node OpenShift\nBefore=kubelet.service crio.service\nAfter=network.target ovs-configuration.service\n\n[Service]\nTimeoutStartSec=30\nExecStartPre=/usr/local/bin/dnsmasq_config.sh\nExecStart=/usr/sbin/dnsmasq -k\nRestart=always\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"dnsmasq.service"},{"enabled":true,"name":"iscsid.service"},{"contents":"[Unit]\nDescription=Create logical volume with name cinder-volumes.\nAfter=var.mount systemd-udev-settle.service\n\n[Service]\nType=oneshot\nExecCondition=/bin/bash -c '! /usr/sbin/vgdisplay cinder-volumes'\nExecStartPre=/usr/sbin/pvcreate /dev/vdc /dev/vdd /dev/vde\nExecStart=/usr/sbin/vgcreate cinder-volumes /dev/vdc /dev/vdd /dev/vde\nRemainAfterExit=yes\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"lv-cinder-volumes.service"},{"enabled":true,"name":"multipathd.service"}]}},"extensions":[],"fips":false,"kernelArguments":["net.ifnames=0"],"kernelType":"default","osImageURL":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4aa42a4b31390d46f924ce2d0c4da772bfbf6a5e1e121bdb0f8b69f989e0a0db"}}config/clusteroperator/storage.json0000640000000000000000000000346615144650247016322 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"storage","uid":"0ce5b06d-c1c3-41fb-b07e-161860b26a88","resourceVersion":"9474","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"capability.openshift.io/name":"Storage","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:01:34Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:01:34Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:01:34Z","reason":"AsExpected","message":"DefaultStorageClassControllerAvailable: No default StorageClass for this platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:01:34Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T17:01:34Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"","resource":"namespaces","name":"openshift-cluster-csi-drivers"},{"group":"operator.openshift.io","resource":"storages","name":"cluster"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"cluster-storage-operator-role"}],"extension":null}}config/clusteroperator/service-ca.json0000640000000000000000000000340315144650247016666 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"service-ca","uid":"e579a016-8d91-4574-af6c-d888c548e479","resourceVersion":"4760","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:00:26Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:00:33Z","reason":"AsExpected","message":"Progressing: All service-ca-operator deployments updated"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:00:28Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:00:28Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T17:00:25Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"servicecas","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-service-ca-operator"},{"group":"","resource":"namespaces","name":"openshift-service-ca"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-packageserver.json0000640000000000000000000000313315144650247024665 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-packageserver","uid":"ee025990-0955-4d66-8e9a-ce0a03b33dd6","resourceVersion":"17298","generation":1,"creationTimestamp":"2026-02-16T16:54:58Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:01:26Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:14:59Z","reason":"ClusterServiceVersionSucceeded","message":"ClusterServiceVersion openshift-operator-lifecycle-manager/packageserver observed in phase Succeeded"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:14:59Z","message":"Deployed version 0.0.1-snapshot"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:01:26Z","message":"Safe to upgrade"}],"versions":[{"name":"operator","version":"4.18.32"},{"name":"packageserver","version":"0.0.1-snapshot"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"},{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-catalog.json0000640000000000000000000000255615144650247023465 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-catalog","uid":"268789f8-f8aa-43d7-94a1-ca6f012c04b6","resourceVersion":"11619","generation":1,"creationTimestamp":"2026-02-16T16:54:58Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:01:34Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:03:31Z","message":"Deployed 4.18.0-202601171746.p2.g357bb13.assembly.stream.el9-357bb13"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:01:34Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:01:34Z"}],"versions":[{"name":"operator","version":"4.18.32"},{"name":"operator-lifecycle-manager","version":"4.18.0-202601171746.p2.g357bb13.assembly.stream.el9-357bb13"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager.json0000640000000000000000000000264115144650247022050 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager","uid":"4c54c568-3370-402f-8e3d-5403a7ce92fd","resourceVersion":"9136","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:01:26Z","message":"Deployed 4.18.0-202601171746.p2.g357bb13.assembly.stream.el9-357bb13"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:01:26Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:01:26Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:01:26Z"}],"versions":[{"name":"operator","version":"4.18.32"},{"name":"operator-lifecycle-manager","version":"4.18.0-202601171746.p2.g357bb13.assembly.stream.el9-357bb13"}],"relatedObjects":[{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/openshift-samples.json0000640000000000000000000000260515144650247020311 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-samples","uid":"b936d998-9e08-4010-a5b0-61405e149efd","resourceVersion":"12725","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"capability.openshift.io/name":"openshift-samples","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:04:20Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:04:29Z","message":"Samples installation successful at 4.18.32"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:04:20Z","message":"Samples installation successful at 4.18.32"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"samples.operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-samples-operator"},{"group":"template.openshift.io","resource":"templates","namespace":"openshift","name":""},{"group":"image.openshift.io","resource":"imagestreams","namespace":"openshift","name":""}],"extension":null}}config/clusteroperator/openshift-controller-manager.json0000640000000000000000000000346215144650247022442 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-controller-manager","uid":"e86bc762-0388-4dd3-b277-28f0b84dc0cf","resourceVersion":"13801","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:00:26Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:01:46Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:01:26Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:00:29Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T17:00:25Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftcontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-controller-manager-operator"},{"group":"","resource":"namespaces","name":"openshift-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-route-controller-manager"}],"extension":null}}config/clusteroperator/openshift-apiserver.json0000640000000000000000000000552415144650247020650 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-apiserver","uid":"7e0ba513-30a7-46aa-9b08-f21443d541bd","resourceVersion":"14180","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:00:33Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:01:07Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:08:09Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:00:33Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T17:00:32Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"},{"name":"openshift-apiserver","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftapiservers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-apiserver"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"endpoints","namespace":"openshift-etcd","name":"host-etcd-2"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-apiserver","name":""},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.apps.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.authorization.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.build.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.image.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.project.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.quota.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.route.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.security.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.template.openshift.io"}],"extension":null}}config/clusteroperator/olm.json0000640000000000000000000001420515144650247015436 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"olm","uid":"5f7db6f8-34af-46e6-94ec-a2969487ad22","resourceVersion":"14187","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManagerV1","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:00:46Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:01:13Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:01:13Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:00:46Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T17:00:46Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-catalogd"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clustercatalogs.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-catalogd","name":"catalogd-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-catalogd","name":"catalogd-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-catalogd","name":"catalogd-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-catalogd","name":"catalogd-service"},{"group":"apps","resource":"deployments","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-certified-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-community-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-marketplace"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-operators"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":"catalogd-mutating-webhook-configuration"},{"group":"","resource":"namespaces","name":"openshift-operator-controller"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusterextensions.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-operator-controller","name":"operator-controller-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager-metrics-service"},{"group":"apps","resource":"deployments","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"operator.openshift.io","resource":"olms","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-olm-operator"}],"extension":null}}config/clusteroperator/node-tuning.json0000640000000000000000000000342115144650247017074 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"node-tuning","uid":"99585ab4-efed-4310-acc7-3456bd63f10d","resourceVersion":"5929","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:00:47Z","reason":"AsExpected","message":"Cluster has deployed 1/1 \"4.18.32\" operands"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:00:49Z","reason":"AsExpected","message":"Cluster version is \"4.18.32\""},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:00:46Z","reason":"AsExpected","message":"DaemonSet \"tuned\" available"}],"versions":[{"name":"ocp-tuned","version":"4.18.32"},{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-node-tuning-operator"},{"group":"tuned.openshift.io","resource":"profiles","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"tuned.openshift.io","resource":"tuneds","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"apps","resource":"daemonsets","namespace":"openshift-cluster-node-tuning-operator","name":"tuned"},{"group":"performance.openshift.io","resource":"performanceprofiles","name":""}],"extension":null}}config/clusteroperator/network.json0000640000000000000000000003734715144650247016354 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"network","uid":"ee2ed50c-5e35-41a4-b5aa-69d632584ec4","resourceVersion":"14447","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","network.operator.openshift.io/last-seen-state":"{\"DaemonsetStates\":[],\"DeploymentStates\":[],\"StatefulsetStates\":[]}","network.operator.openshift.io/relatedClusterObjects":""},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"ManagementStateDegraded","status":"False","lastTransitionTime":"2026-02-16T16:59:12Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T16:59:01Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T16:59:01Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-16T17:08:31Z","reason":"Deploying","message":"Deployment \"/openshift-network-console/networking-console-plugin\" is not available (awaiting 1 nodes)"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:00:28Z"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"applied-cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"network-attachment-definitions.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ippools.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"overlappingrangeipreservations.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"nodeslicepools.whereabouts.cni.cncf.io"},{"group":"","resource":"namespaces","name":"openshift-multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-ancillary-tools"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-transient"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-group"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-cluster-readers"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"net-attach-def-project"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"default-cni-sysctl-allowlist"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"cni-copy-resources"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"whereabouts-config"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"multus-daemon-config"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus-additional-cni-plugins"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"metrics-daemon-sa"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"metrics-daemon-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"metrics-daemon-sa-rolebinding"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"network-metrics-daemon"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-network"},{"group":"","resource":"services","namespace":"openshift-multus","name":"network-metrics-service"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"","resource":"services","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ac"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-admission-controller-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-admission-controller-webhook"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"multus.openshift.io"},{"group":"apps","resource":"deployments","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-multus-admission-controller"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-multus","name":"prometheus-k8s-rules"},{"group":"","resource":"namespaces","name":"openshift-ovn-kubernetes"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressfirewalls.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressips.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressqoses.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminpolicybasedexternalroutes.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressservices.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"baselineadminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ipamclaims.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"userdefinednetworks.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusteruserdefinednetworks.k8s.ovn.org"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-nodes-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-kube-rbac-proxy"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-kube-rbac-proxy"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-config"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"ovn"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"signer"},{"group":"flowcontrol.apiserver.k8s.io","resource":"flowschemas","name":"openshift-ovn-kubernetes"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-cluster-reader"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-script-lib"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-editor"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-viewer"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"master-rules"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"networking-rules"},{"group":"","resource":"configmaps","namespace":"openshift-config-managed","name":"openshift-network-features"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-control-plane-metrics"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-node"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"","resource":"namespaces","name":"openshift-host-network"},{"group":"","resource":"resourcequotas","namespace":"openshift-host-network","name":"host-network-namespace-quotas"},{"group":"apps","resource":"deployments","namespace":"openshift-ovn-kubernetes","name":"ovnkube-control-plane"},{"group":"apps","resource":"daemonsets","namespace":"openshift-ovn-kubernetes","name":"ovnkube-node"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicies","name":"user-defined-networks-namespace-label"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicybindings","name":"user-defined-networks-namespace-label-binding"},{"group":"","resource":"namespaces","name":"openshift-network-diagnostics"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"kube-system","name":"network-diagnostics"},{"group":"apps","resource":"deployments","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config-managed","name":"openshift-network-public-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config-managed","name":"openshift-network-public-role-binding"},{"group":"","resource":"namespaces","name":"openshift-network-node-identity"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"system:openshift:scc:hostnetwork-v2"},{"group":"","resource":"configmaps","namespace":"openshift-network-node-identity","name":"ovnkube-identity-cm"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"network-node-identity.openshift.io"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-network-operator","name":"openshift-network-operator-ipsec-rules"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-iptables-alerter"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-iptables-alerter"},{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"iptables-alerter-script"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"","resource":"namespaces","name":"openshift-network-console"},{"group":"","resource":"configmaps","namespace":"openshift-network-console","name":"networking-console-plugin"},{"group":"apps","resource":"deployments","namespace":"openshift-network-console","name":"networking-console-plugin"},{"group":"","resource":"services","namespace":"openshift-network-console","name":"networking-console-plugin"},{"group":"console.openshift.io","resource":"consoleplugins","name":"networking-console-plugin"},{"group":"","resource":"namespaces","name":"openshift-network-operator"},{"group":"operator.openshift.io","resource":"networks","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cloud-network-config-controller"}],"extension":null}}config/clusteroperator/monitoring.json0000640000000000000000000000423015144650247017031 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"monitoring","uid":"615e8c59-6578-4d1c-86be-bb6f22d14606","resourceVersion":"14497","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:08:34Z","reason":"RollOutDone","message":"Successfully rolled out the stack."},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:08:34Z","reason":"PrometheusDataPersistenceNotConfigured","message":"Prometheus is running without persistent storage which can lead to data loss during upgrades and cluster disruptions. Please refer to the official documentation to see how to configure storage for Prometheus: https://docs.openshift.com/container-platform/4.18/observability/monitoring/configuring-the-monitoring-stack.html"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:08:34Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:00:53Z"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-monitoring"},{"group":"","resource":"namespaces","name":"openshift-user-workload-monitoring"},{"group":"monitoring.coreos.com","resource":"servicemonitors","name":""},{"group":"monitoring.coreos.com","resource":"podmonitors","name":""},{"group":"monitoring.coreos.com","resource":"prometheusrules","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagers","name":""},{"group":"monitoring.coreos.com","resource":"prometheuses","name":""},{"group":"monitoring.coreos.com","resource":"thanosrulers","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagerconfigs","name":""}],"extension":null}}config/clusteroperator/marketplace.json0000640000000000000000000000313315144650247017135 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"marketplace","uid":"41dcdbeb-ccd7-4742-9a97-7ee133393629","resourceVersion":"6254","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"capability.openshift.io/name":"marketplace","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:00:54Z","reason":"OperatorAvailable","message":"Successfully progressed to release version: 4.18.32"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:00:54Z","reason":"OperatorAvailable","message":"Available release version: 4.18.32"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:00:54Z","reason":"OperatorAvailable","message":"Marketplace is upgradeable"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:00:54Z","reason":"OperatorAvailable","message":"Available release version: 4.18.32"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-marketplace"},{"group":"operators.coreos.com","resource":"catalogsources","namespace":"openshift-marketplace","name":""}],"extension":null}}config/clusteroperator/machine-config.json0000640000000000000000000000554615144650247017526 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-config","uid":"482ff5ca-3e9d-4596-ac84-f242e0f93ba6","resourceVersion":"14198","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-16T17:04:48Z","message":"Working towards 4.18.32"},{"type":"Degraded","status":"True","lastTransitionTime":"2026-02-16T17:04:53Z","reason":"RequiredPoolsFailed","message":"Unable to apply 4.18.32: error during syncRequiredMachineConfigPools: context deadline exceeded"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:04:53Z","reason":"AsExpected","message":"Cluster has deployed []"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:04:53Z","reason":"AsExpected"},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-02-16T17:04:53Z","reason":"AsExpected"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-config-operator"},{"group":"machineconfiguration.openshift.io","resource":"machineconfigpools","name":""},{"group":"machineconfiguration.openshift.io","resource":"controllerconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"kubeletconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"containerruntimeconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"machineconfigs","name":""},{"group":"operator.openshift.io","resource":"machineconfigurations","name":""},{"group":"","resource":"nodes","name":""},{"group":"","resource":"namespaces","name":"openshift-kni-infra"},{"group":"","resource":"namespaces","name":"openshift-openstack-infra"},{"group":"","resource":"namespaces","name":"openshift-ovirt-infra"},{"group":"","resource":"namespaces","name":"openshift-vsphere-infra"},{"group":"","resource":"namespaces","name":"openshift-nutanix-infra"},{"group":"","resource":"namespaces","name":"openshift-cloud-platform-infra"}],"extension":{"lastSyncError":"MachineConfigPool master has not progressed to latest configuration: configuration status for pool master is empty: 0 (ready 0) out of 1 nodes are updating to latest configuration rendered-master-ccc1c4b4035b8605635ebee7b29103f5, retrying","master":"0 (ready 0) out of 1 nodes are updating to latest configuration rendered-master-ccc1c4b4035b8605635ebee7b29103f5","worker":"all 0 nodes are at latest configuration rendered-worker-c7ccd6fb94dd6d087e4a528948c79fb2"}}}config/clusteroperator/machine-approver.json0000640000000000000000000000253215144650247020107 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-approver","uid":"c8f5304c-453e-4d21-ba7d-125b9021b783","resourceVersion":"8791","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:01:22Z","reason":"AsExpected","message":"Cluster Machine Approver is available at 4.18.32"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:01:22Z","reason":"AsExpected"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:01:22Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:01:22Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-machine-approver"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""}],"extension":null}}config/clusteroperator/machine-api.json0000640000000000000000000000371415144650247017025 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-api","uid":"fae5423a-854d-4812-8c0e-7a16406c8a6b","resourceVersion":"11841","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:03:44Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:03:44Z","reason":"AsExpected"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:03:44Z","reason":"AsExpected","message":"Cluster Machine API Operator is in NoOp mode"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:03:44Z"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"machines","namespace":"openshift-machine-api","name":""},{"group":"machine.openshift.io","resource":"machinesets","namespace":"openshift-machine-api","name":""},{"group":"machine.openshift.io","resource":"machinehealthchecks","namespace":"openshift-machine-api","name":""},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-machine-api","name":""},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-operator"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-controllers"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/kube-storage-version-migrator.json0000640000000000000000000000325415144650247022546 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-storage-version-migrator","uid":"17dc16ac-b0f6-4636-8844-da68e0678eb8","resourceVersion":"14038","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:00:26Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:00:34Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:00:34Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:00:26Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T17:00:26Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubestorageversionmigrators","name":"cluster"},{"group":"migration.k8s.io","resource":"storageversionmigrations","name":""},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator"},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator-operator"}],"extension":null}}config/clusteroperator/kube-scheduler.json0000640000000000000000000000414615144650247017554 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-scheduler","uid":"b3677bce-59d6-49a9-973e-c284a65e4cdc","resourceVersion":"14236","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:00:25Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:03:33Z","reason":"AsExpected","message":"NodeInstallerProgressing: 1 node is at revision 4"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:03:33Z","reason":"AsExpected","message":"StaticPodsAvailable: 1 nodes are active; 1 node is at revision 4"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:00:25Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T17:00:25Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.32"},{"name":"kube-scheduler","version":"1.31.14"},{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeschedulers","name":"cluster"},{"group":"config.openshift.io","resource":"schedulers","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler-operator"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""}],"extension":null}}config/clusteroperator/kube-controller-manager.json0000640000000000000000000001112115144650247021360 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-controller-manager","uid":"69410ea4-cb93-4367-8401-e62731705951","resourceVersion":"14548","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:00:33Z","reason":"AsExpected","message":"NodeInstallerDegraded: 1 nodes are failing on revision 2:\nNodeInstallerDegraded: installer: taller revisions to settle for node master-0\nNodeInstallerDegraded: I0216 17:01:35.234528 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0216 17:01:35.234558 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0216 17:01:35.248736 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\nNodeInstallerDegraded: I0216 17:01:45.254520 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\nNodeInstallerDegraded: I0216 17:01:55.820613 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\nNodeInstallerDegraded: W0216 17:02:05.252061 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": dial tcp 172.30.0.1:443: connect: connection refused\nNodeInstallerDegraded: W0216 17:02:15.250548 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": dial tcp 172.30.0.1:443: connect: connection refused\nNodeInstallerDegraded: W0216 17:02:25.251080 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": dial tcp 172.30.0.1:443: connect: connection refused\nNodeInstallerDegraded: W0216 17:02:35.250231 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": dial tcp 172.30.0.1:443: connect: connection refused\nNodeInstallerDegraded: W0216 17:02:35.250822 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": dial tcp 172.30.0.1:443: connect: connection refused\nNodeInstallerDegraded: F0216 17:02:35.250856 1 cmd.go:109] timed out waiting for the condition\nNodeInstallerDegraded: \nNodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-16T17:01:13Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-16T17:00:33Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:00:33Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T17:00:32Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubecontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager-operator"},{"group":"","resource":"namespaces","name":"kube-system"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""},{"group":"","resource":"nodes","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/kube-apiserver.json0000640000000000000000000000530515144650247017574 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-apiserver","uid":"fc2b2c81-11fe-4d35-9fbc-1446a88397c0","resourceVersion":"14065","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:00:19Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-16T17:03:47Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 1; 0 nodes have achieved new revision 4"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:03:37Z","reason":"AsExpected","message":"StaticPodsAvailable: 1 nodes are active; 1 node is at revision 1; 0 nodes have achieved new revision 4"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:00:19Z","reason":"AsExpected","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced."},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-02-16T17:00:19Z","reason":"AsExpected","message":"All is well"}],"versions":[{"name":"raw-internal","version":"4.18.32"},{"name":"operator","version":"4.18.32"},{"name":"kube-apiserver","version":"1.31.14"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeapiservers","name":"cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":""},{"group":"security.openshift.io","resource":"securitycontextconstraints","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":""},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":""},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""},{"group":"apiserver.openshift.io","resource":"apirequestcounts","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/insights.json0000640000000000000000000000534115144650247016500 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"insights","uid":"be017328-7102-4a0b-b0a9-99f46e6abb13","resourceVersion":"14488","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"capability.openshift.io/name":"Insights","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:08:33Z","reason":"AsExpected","message":"Insights works as expected"},{"type":"ClusterTransferAvailable","status":"Unknown","lastTransitionTime":"2026-02-16T17:08:33Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:08:33Z","reason":"AsExpected","message":"Insights works as expected"},{"type":"Disabled","status":"False","lastTransitionTime":"2026-02-16T17:08:33Z","reason":"AsExpected"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:08:33Z","reason":"AsExpected","message":"Monitoring the cluster"},{"type":"RemoteConfigurationAvailable","status":"True","lastTransitionTime":"2026-02-16T17:08:33Z","reason":"AsExpected"},{"type":"RemoteConfigurationValid","status":"True","lastTransitionTime":"2026-02-16T17:08:33Z","reason":"AsExpected"},{"type":"SCAAvailable","status":"Unknown","lastTransitionTime":"2026-02-16T17:08:33Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:08:33Z","reason":"InsightsUpgradeable","message":"Insights operator can be upgraded"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-insights"},{"group":"apps","resource":"deployments","namespace":"openshift-insights","name":"insights-operator"},{"group":"","resource":"secrets","namespace":"openshift-config","name":"pull-secret"},{"group":"","resource":"secrets","namespace":"openshift-config","name":"support"},{"group":"","resource":"serviceaccounts","namespace":"openshift-insights","name":"gather"},{"group":"","resource":"serviceaccounts","namespace":"openshift-insights","name":"operator"},{"group":"","resource":"services","namespace":"openshift-insights","name":"metrics"},{"group":"","resource":"configmaps","namespace":"openshift-insights","name":"service-ca-bundle"},{"group":"operator.openshift.io","resource":"insightsoperators","name":"cluster"}],"extension":{"lastReportTime":null}}}config/clusteroperator/ingress.json0000640000000000000000000000467715144650247016335 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"ingress","uid":"fa856484-f6c9-4b3e-b7f9-e2fbc31a8ab3","resourceVersion":"17252","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"capability.openshift.io/name":"Ingress","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:00:51Z","reason":"IngressAvailable","message":"The \"default\" ingress controller reports Available=True."},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-16T17:14:58Z","reason":"Reconciling","message":"ingresscontroller \"default\" is progressing: IngressControllerProgressing: One or more status conditions indicate progressing: DeploymentRollingOut=True (DeploymentRollingOut: Waiting for router deployment rollout to finish: 0 of 1 updated replica(s) are available...\n)."},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:00:51Z","reason":"IngressNotDegraded","message":"The \"default\" ingress controller reports Degraded=False."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:00:50Z","reason":"Upgradeable"},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-02-16T17:00:50Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.32"},{"name":"ingress-controller","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb"},{"name":"canary-server","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3d21c51712e6e0cdd9c776479f6d1ab55bc1085df5bb5f583e69ee192d11fd3"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-ingress-operator"},{"group":"operator.openshift.io","resource":"ingresscontrollers","namespace":"openshift-ingress-operator","name":""},{"group":"ingress.operator.openshift.io","resource":"dnsrecords","namespace":"openshift-ingress-operator","name":""},{"group":"","resource":"namespaces","name":"openshift-ingress"},{"group":"","resource":"namespaces","name":"openshift-ingress-canary"}],"extension":null}}config/clusteroperator/image-registry.json0000640000000000000000000000405115144650247017575 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"image-registry","uid":"4f239c89-009c-4b73-9336-71550f8793a9","resourceVersion":"14294","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"capability.openshift.io/name":"ImageRegistry","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"False","lastTransitionTime":"2026-02-16T17:07:55Z","reason":"NodeCADaemonNoAvailableReplicas::Removed","message":"Available: The registry is removed\nNodeCADaemonAvailable: The daemon set node-ca does not have available replicas\nImagePrunerAvailable: Pruner CronJob has been created"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-16T17:07:55Z","reason":"NodeCADaemonUnavailable::Removed","message":"Progressing: All registry resources are removed\nNodeCADaemonProgressing: The daemon set node-ca is deploying node pods"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:07:55Z","reason":"Removed","message":"Degraded: The registry is removed"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"imageregistry.operator.openshift.io","resource":"configs","name":"cluster"},{"group":"imageregistry.operator.openshift.io","resource":"imagepruners","name":"cluster"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"system:registry"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"registry-registry-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-image-registry-pruner"},{"group":"","resource":"namespaces","name":"openshift-image-registry"}],"extension":null}}config/clusteroperator/etcd.json0000640000000000000000000000400215144650247015560 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"etcd","uid":"f7f95caf-8203-4890-ba01-85a4c420ca2c","resourceVersion":"14094","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:07:54Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready\nEtcdMembersDegraded: No unhealthy members found"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:07:54Z","reason":"AsExpected","message":"NodeInstallerProgressing: 1 node is at revision 2\nEtcdMembersProgressing: No unstarted etcd members found"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:07:54Z","reason":"AsExpected","message":"StaticPodsAvailable: 1 nodes are active; 1 node is at revision 2\nEtcdMembersAvailable: 1 members are available"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:00:25Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T17:00:25Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.32"},{"name":"operator","version":"4.18.32"},{"name":"etcd","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"etcds","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"namespaces","name":"openshift-etcd"}],"extension":null}}config/clusteroperator/dns.json0000640000000000000000000000401015144650247015424 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"dns","uid":"7bcb7fe6-6901-40dc-8b07-5c6ef7a4a3b4","resourceVersion":"17295","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"False","lastTransitionTime":"2026-02-16T17:14:59Z","reason":"DNSUnavailable","message":"DNS \"default\" is unavailable."},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-16T17:14:59Z","reason":"DNSReportsProgressingIsTrue","message":"DNS \"default\" reports Progressing=True: \"Have 0 available DNS pods, want 1.\""},{"type":"Degraded","status":"True","lastTransitionTime":"2026-02-16T17:14:59Z","reason":"DNSDegraded","message":"DNS default is degraded"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:00:46Z","reason":"DNSUpgradeable","message":"DNS default is upgradeable: DNS Operator can be upgraded"}],"versions":[{"name":"coredns","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8ea13b0cbfe9be0d3d7ea80d50e512af6a453921a553c7c79b566530142b611b"},{"name":"openshift-cli","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e155421620a4ac28a759265f53059b75308fdd1491caeba6a9a34d2fbeab4954"},{"name":"kube-rbac-proxy","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0"},{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-dns-operator"},{"group":"operator.openshift.io","resource":"dnses","name":"default"},{"group":"","resource":"namespaces","name":"openshift-dns"}],"extension":null}}config/clusteroperator/csi-snapshot-controller.json0000640000000000000000000000322015144650247021436 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"csi-snapshot-controller","uid":"d0dbe8e8-4ac5-4e39-8045-d08d3c8e79d2","resourceVersion":"14121","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"capability.openshift.io/name":"CSISnapshot","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:00:32Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:00:37Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:00:37Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:00:33Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T17:00:32Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"},{"name":"csi-snapshot-controller","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"operator.openshift.io","resource":"csisnapshotcontrollers","name":"cluster"}],"extension":null}}config/clusteroperator/control-plane-machine-set.json0000640000000000000000000000263515144650247021623 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"control-plane-machine-set","uid":"01a1bb0a-4eb4-453b-beeb-e57109b463f4","resourceVersion":"8663","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:01:20Z","reason":"AsExpected","message":"cluster operator is available"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:01:20Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:01:20Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:01:20Z","reason":"AsExpected","message":"cluster operator is upgradable"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"controlplanemachinesets","name":""},{"group":"machine.openshift.io","resource":"machines","name":""}],"extension":null}}config/clusteroperator/console.json0000640000000000000000000000530115144650247016306 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"console","uid":"7ecac173-bcc7-480b-90c3-445c16be2d28","resourceVersion":"14539","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"capability.openshift.io/name":"Console","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"True","lastTransitionTime":"2026-02-16T17:07:52Z","reason":"RouteHealth_StatusError","message":"RouteHealthDegraded: route not yet available, https://console-openshift-console.apps.sno.openstack.lab returns '503 Service Unavailable'"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-16T17:08:13Z","reason":"SyncLoopRefresh_InProgress","message":"SyncLoopRefreshProgressing: working toward version 4.18.32, 0 replicas available"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-16T17:08:13Z","reason":"Deployment_InsufficientReplicas::RouteHealth_StatusError","message":"DeploymentAvailable: 0 replicas available for console deployment\nRouteHealthAvailable: route not yet available, https://console-openshift-console.apps.sno.openstack.lab returns '503 Service Unavailable'"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:08:11Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T17:04:18Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"console.openshift.io","resource":"consoleplugins","name":"monitoring-plugin"},{"group":"console.openshift.io","resource":"consoleplugins","name":"networking-console-plugin"},{"group":"operator.openshift.io","resource":"consoles","name":"cluster"},{"group":"config.openshift.io","resource":"consoles","name":"cluster"},{"group":"config.openshift.io","resource":"infrastructures","name":"cluster"},{"group":"config.openshift.io","resource":"proxies","name":"cluster"},{"group":"config.openshift.io","resource":"oauths","name":"cluster"},{"group":"oauth.openshift.io","resource":"oauthclients","name":"console"},{"group":"","resource":"namespaces","name":"openshift-console-operator"},{"group":"","resource":"namespaces","name":"openshift-console"},{"group":"","resource":"configmaps","namespace":"openshift-config-managed","name":"console-public"}],"extension":null}}config/clusteroperator/config-operator.json0000640000000000000000000000311615144650247017744 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"config-operator","uid":"624901c7-e9a0-4b05-9f25-afd19fe713db","resourceVersion":"3842","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:00:25Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:00:25Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:00:25Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:00:25Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T17:00:25Z","reason":"NoData"}],"versions":[{"name":"feature-gates","version":"4.18.32"},{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-operator"}],"extension":null}}config/clusteroperator/cluster-autoscaler.json0000640000000000000000000000266015144650247020472 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster-autoscaler","uid":"6be95c80-0198-401b-9e81-b575923ef812","resourceVersion":"11885","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:01:34Z","reason":"AsExpected","message":"at version 4.18.32"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:03:49Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:03:49Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:01:34Z"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"autoscaling.openshift.io","resource":"machineautoscalers","namespace":"openshift-machine-api","name":""},{"group":"autoscaling.openshift.io","resource":"clusterautoscalers","namespace":"openshift-machine-api","name":""},{"group":"","resource":"namespaces","name":"openshift-machine-api"}],"extension":null}}config/clusteroperator/cloud-credential.json0000640000000000000000000002022315144650247020062 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-credential","uid":"4eed5134-b7b8-4e87-9d9d-2f842d3cbbec","resourceVersion":"9916","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"capability.openshift.io/name":"CloudCredential","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:01:34Z","reason":"AsExpected","message":"All is well"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:01:34Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:01:34Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:01:34Z"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"aws-ebs-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"azure-disk-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"azure-file-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"cloud-credential-operator-gcp-ro-creds"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"cloud-credential-operator-iam-ro"},{"group":"operator.openshift.io","resource":"cloudcredentials","name":"cluster"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ibm-powervs-block-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ibm-vpc-block-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"manila-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-azure-cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-credential-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-aws"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cluster-csi-drivers"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-gcp-ccm"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-gcp-pd-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ibm-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-gcs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-ibmcos"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-ibmcos-powervs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-aws"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-ibmcloud"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-nutanix"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-powervs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-vsphere"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-network"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-nutanix-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-openstack-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-powervs-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vmware-vsphere-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vsphere-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vsphere-problem-detector"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ovirt-csi-driver-operator"}],"extension":null}}config/clusteroperator/cloud-controller-manager.json0000640000000000000000000000440115144650247021543 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-controller-manager","uid":"df6485fe-2bd2-4d3f-8c9b-690c463b7287","resourceVersion":"9715","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"capability.openshift.io/name":"CloudControllerManager","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"TrustedCABundleControllerControllerAvailable","status":"True","lastTransitionTime":"2026-02-16T17:01:38Z","reason":"AsExpected","message":"Trusted CA Bundle Controller works as expected"},{"type":"TrustedCABundleControllerControllerDegraded","status":"False","lastTransitionTime":"2026-02-16T17:01:38Z","reason":"AsExpected","message":"Trusted CA Bundle Controller works as expected"},{"type":"CloudConfigControllerAvailable","status":"True","lastTransitionTime":"2026-02-16T17:01:38Z","reason":"AsExpected","message":"Cloud Config Controller works as expected"},{"type":"CloudConfigControllerDegraded","status":"False","lastTransitionTime":"2026-02-16T17:01:38Z","reason":"AsExpected","message":"Cloud Config Controller works as expected"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:01:39Z","reason":"AsExpected","message":"Cluster Cloud Controller Manager Operator is available at 4.18.32"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:01:39Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:01:39Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:01:39Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager-operator"},{"group":"config.openshift.io","resource":"clusteroperators","name":"cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager"}],"extension":null}}config/clusteroperator/baremetal.json0000640000000000000000000000427015144650247016604 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"baremetal","uid":"41b38793-d1e5-4d34-a61a-1689bc1b270d","resourceVersion":"9348","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"capability.openshift.io/name":"baremetal","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:01:34Z","reason":"WaitingForProvisioningCR"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:01:34Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:01:34Z","reason":"WaitingForProvisioningCR","message":"Waiting for Provisioning CR on BareMetal Platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:01:34Z"},{"type":"Disabled","status":"False","lastTransitionTime":"2026-02-16T17:01:34Z"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"provisioning","name":""},{"group":"metal3.io","resource":"hostfirmwaresettings","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"firmwareschemas","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"preprovisioningimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"bmceventsubscriptions","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostfirmwarecomponents","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"dataimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostupdatepolicies","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/authentication.json0000640000000000000000000001057715144650247017676 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"authentication","uid":"a715bf42-49e1-49c8-8327-3a7b3019e86f","resourceVersion":"14392","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"True","lastTransitionTime":"2026-02-16T17:07:36Z","reason":"IngressStateEndpoints_MissingSubsets::OAuthServerRouteEndpointAccessibleController_SyncError::OAuthServerServiceEndpointAccessibleController_SyncError::OAuthServerServiceEndpointsEndpointAccessibleController_SyncError","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.145.24:443/healthz\": dial tcp 172.30.145.24:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-16T17:04:50Z","reason":"OAuthServerDeployment_NewGeneration::WellKnownReadyController_OAuthMetadataNotYetServed","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: observed generation is 2, desired generation is 3.\nWellKnownReadyControllerProgressing: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-16T17:00:26Z","reason":"OAuthServerDeployment_NoPod::OAuthServerRouteEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::WellKnown_NotReady","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.145.24:443/healthz\": dial tcp 172.30.145.24:443: connect: connection refused\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:00:26Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T17:00:26Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"},{"name":"oauth-apiserver","version":"4.18.32"},{"name":"oauth-openshift","version":"4.18.32_openshift"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"infrastructures","name":"cluster"},{"group":"config.openshift.io","resource":"oauths","name":"cluster"},{"group":"route.openshift.io","resource":"routes","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"services","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-authentication"},{"group":"","resource":"namespaces","name":"openshift-authentication-operator"},{"group":"","resource":"namespaces","name":"openshift-ingress"},{"group":"","resource":"namespaces","name":"openshift-oauth-apiserver"}],"extension":null}}config/running_containers.json0000640000000000000000000001441015144650247015315 0ustar0000000000000000{"images":{"0":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","1":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","10":"sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e","11":"sha256:3bb3c46533b24f1a6a6669117dc888ed8f0c7ae56b34068a4ff2052335e34c4e","12":"sha256:e3d21c51712e6e0cdd9c776479f6d1ab55bc1085df5bb5f583e69ee192d11fd3","13":"sha256:9f2b80358f029728d7f4ce46418bb6859d9ea7365de7b6f97a5f549ed6e77471","14":"sha256:df623c15a78ca969fb8ad134bde911c2047bf82b50244ee8e523763b6587e072","15":"sha256:86d47b2746de823e60068255722d2c0f1ff9d327b2865071a4f2f1e08b1f4ee9","16":"sha256:56dffbd86bfae06921432678caf184b335bf2fc6ac7ee128f48aee396d57ea55","17":"sha256:ae30b3ab740f21c451d0272bceacb99fa34d22bbf2ea22f1e1e18230a156104b","18":"sha256:240701090a5f8e40d4b88fa200cf63dffb11a8e2eae713cf3c629b016c2823b0","19":"sha256:a64a70eb2fef4095ba241021e37c52034c067c57121d6c588f8c7fd3dc24b55f","2":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","20":"sha256:0e446723bbab96c4e4662ff058d5eccba72d0c36d26c7b8b3f07183fa49d3ab9","21":"sha256:e155421620a4ac28a759265f53059b75308fdd1491caeba6a9a34d2fbeab4954","22":"sha256:b41a8ae60c0eafa4a13e6dcd0e79ba63b0d7bd2bdc28aaed434b3bef98a5dc95","23":"sha256:fe683caef773a1963fc13f96afe58892563ea9921db8ac39369e3a9a05ea7181","24":"sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192","25":"sha256:5abe992def861ec075251ae17bbd66fa23bd05bd3701953c0fdcf68a8d161f1e","26":"sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","27":"sha256:e1c8b9784a60860a08bd47935f0767b7b7f8f36c5c0adb7623a31b82c01d4c09","28":"sha256:7b8fb1f11df51c131f5be8ddfc1b1c95ac13481f58d2dcd5a465a4a8341c0f49","29":"sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb","3":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","30":"sha256:9899b0f08b1202d149e16f09616ee7b8f37e3cda642386d93a6d3f63d72a316b","31":"registry.redhat.io/redhat/redhat-operator-index:v4.18","32":"sha256:e391fce0b2e04f22fc089597db9e0671ba7f8b5b3a709151b5f33dd23b262144","33":"sha256:13d06502c0f0a3c73f69bf8d0743718f7cfc46e71f4a12916517ad7e9bff17e1","34":"sha256:a26b20d3ef7b75aeb05acf9be2702f9d478822c43f679ff578811843692b960c","35":"sha256:1faa2081a881db884a86bdfe33fcb6a6af1d14c3e9ee5c44dfe4b09045684e13","36":"sha256:cc03f91dbf08df9907c0ebad30c54a7fa92285b19ec4e440ed762b197378a861","37":"sha256:19c3c8392b72ccf9a518d1d60fab0fd1e58a05b544caa79eb11bb68f00981d9d","38":"sha256:80531a0fe966e1cc0582c581951b09a7a4e42037c106748c44859110361b2c1b","39":"registry.redhat.io/redhat/certified-operator-index:v4.18","4":"sha256:aca57c8abaa83b2d1dce95fa7fe5b9416be70e100957ce48f212e2ec404387bc","40":"sha256:9e96b53e74d1b802c2e63544e4689c9d262e9c996902c6e8a7f3ca34b23fdd50","41":"sha256:aaa92509b71c898caed43ac2b5d3b3fc44fff333855789eb1d7df15f08e91ea3","42":"sha256:99ad83497ea12819957ccba33c807c6e4c5297621db568e5635202cb9cc69f8f","43":"sha256:bbe162375a11ed3810a1081c30dd400f461f2421d5f1e27d8792048bbd216956","44":"sha256:bd8adea550cbbaf16cb9409b31ec8b997320d247f9f30c80608ac1fbf9c7a07e","45":"sha256:5d54bd262ca625a326b01ea2bfd33db10a402c05590e6b710b0959712e1bf30b","46":"sha256:6dd544a8a6b4d08fe0f4fd076109c09cf181302ab6056ec6b2b89d68a52954c5","47":"sha256:3f08586dd67c2d3d21053a044138f1bbedceb0847f1af8c3aa76127d86135a58","48":"sha256:a90d19460fbc705172df7759a3da394930623c6b6974620b79ffa07bab53c51f","49":"sha256:8ea13b0cbfe9be0d3d7ea80d50e512af6a453921a553c7c79b566530142b611b","5":"sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","50":"sha256:f353131d8a1223db7f637c9851016b3a348d80c2b2be663a2db6d01e14ddca88","51":"sha256:bfc52d6ca96f377d53757dc437ca720e860e3e016d16c084bd5f6f2e337d3a1d","52":"sha256:e786e28fbe0b95c4f5723bebc3abde1333b259fd26673716fc5638d88286d8b7","53":"sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963","54":"sha256:2431778975829348e271dc9bf123c7a24c81a52537a61414cd17c8436436078b","55":"sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","56":"sha256:dab7a82d88f90f1ef4ac307b16132d4d573a4fa9080acc3272ca084613bd902a","57":"sha256:abf98e8b78df5cf21c9da051db2827b8c9081cf3ea201bf9017a5d9548dbc73e","58":"sha256:47c1d88223ffb35bb36a4d2bde736fb3e45f08e204519387e0e52e3e3dc00cfb","59":"sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","6":"sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","60":"sha256:d6ab8803bac3ebada13e90d9dd6208301b981488277cdeb847c25ff8002f5a30","61":"sha256:e4d0e747f55d3f773a63180bc4e4820ee5f17efbd45eb1dac9167fbc7520650e","62":"sha256:15c5e645edf257a08c061ad9ae7dab4293104a042b8396181d76dd28f396cebe","63":"sha256:7fccb6e19eb4caa16d32f4cf59670c2c741c98b099d1f12368b85aab3f84dc38","64":"sha256:9cc42212fb15c1f3e6a88acaaa4919c9693be3c6099ea849d28855e231dc9e44","65":"sha256:0871b6c16b38a2eda5d1c89fd75079aff0775224307e940557e6fda6ba229f38","66":"sha256:5c38d58b62290b59d0182b50ce3cfd87fbb7729f3ce6fc06ffa46d9805c7dd78","67":"registry.redhat.io/redhat/community-operator-index:v4.18","68":"sha256:fa28b66298c8b34f2c7b357b012e663e3954cfc7c85aa1e44651a79aeaf8b2a9","69":"sha256:f122c11c2f6a10ca150b136f7291d2e135b3a182d67809aa49727da289787cee","7":"sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","70":"sha256:95e7647e6fda21b94b692f03908e4cd154e3374fca0560229c646fefe2c46730","71":"registry.redhat.io/redhat/redhat-marketplace-index:v4.18","72":"sha256:c1a0aba9ead3a33353dc8a033699dfa4795f4050516677dad6ed4ac664094692","73":"sha256:0100b616991bd8bca68d583e902283aa4cc0d388046437d5d68407190e3fb041","74":"sha256:333e6572029953b4c4676076f0991ee6e5c7d28cbe2887c71b1682f19831d8a1","8":"sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","9":"sha256:52ba78768a24efe94f7f95fe5bdd3c6156919979d5882682e06ae4a8a8d3fb4a"},"containers":{"2026-02":{"0":35,"1":10,"10":3,"11":2,"12":2,"13":2,"14":2,"15":2,"16":2,"17":2,"18":2,"19":2,"2":8,"20":2,"21":2,"22":2,"23":2,"24":2,"25":2,"26":2,"27":1,"28":1,"29":1,"3":6,"30":1,"31":1,"32":1,"33":1,"34":1,"35":1,"36":1,"37":1,"38":1,"39":1,"4":4,"40":1,"41":1,"42":1,"43":1,"44":1,"45":1,"46":1,"47":1,"48":1,"49":1,"5":4,"50":1,"51":1,"52":1,"53":1,"54":1,"55":1,"56":1,"57":1,"58":1,"59":1,"6":3,"60":1,"61":1,"62":1,"63":1,"64":1,"65":1,"66":1,"67":1,"68":1,"69":1,"7":3,"70":1,"71":1,"72":1,"73":1,"74":1,"8":3,"9":3}}}config/pod/openshift-kube-apiserver/kube-apiserver-master-0.json0000640000000000000000000003765415144650247023504 0ustar0000000000000000{"metadata":{"name":"kube-apiserver-master-0","namespace":"openshift-kube-apiserver","uid":"ef9cb618-13ca-4088-a3d4-fb78be3f4bff","resourceVersion":"16416","creationTimestamp":"2026-02-16T17:14:15Z","labels":{"apiserver":"true","app":"openshift-kube-apiserver","revision":"4"},"annotations":{"kubectl.kubernetes.io/default-container":"kube-apiserver","kubernetes.io/config.hash":"10e298020284b0e8ffa6a0bc184059d9","kubernetes.io/config.mirror":"10e298020284b0e8ffa6a0bc184059d9","kubernetes.io/config.seen":"2026-02-16T17:13:50.959645612Z","kubernetes.io/config.source":"file","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"da39ce92-6a7c-4cce-aa8b-3e495e33f616","controller":true}]},"spec":{"volumes":[{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-apiserver-pod-4","type":""}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-apiserver-certs","type":""}},{"name":"audit-dir","hostPath":{"path":"/var/log/kube-apiserver","type":""}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","command":["/usr/bin/timeout","100","/bin/bash","-ec"],"args":["echo \"Fixing audit permissions ...\"\nchmod 0700 /var/log/kube-apiserver \u0026\u0026 touch /var/log/kube-apiserver/audit.log \u0026\u0026 chmod 0600 /var/log/kube-apiserver/*\n\nLOCK=/var/log/kube-apiserver/.lock\necho \"Acquiring exclusive lock ${LOCK} ...\"\n\n# Waiting for 15s max for old kube-apiserver's watch-termination process to exit and remove the lock.\n# Two cases:\n# 1. if kubelet does not start the old and new in parallel (i.e. works as expected), the flock will always succeed without any time.\n# 2. if kubelet does overlap old and new pods for up to 130s, the flock will wait and immediate return when the old finishes.\n#\n# NOTE: We can increase 15s for a bigger expected overlap. But a higher value means less noise about the broken kubelet behaviour, i.e. we hide a bug.\n# NOTE: Do not tweak these timings without considering the livenessProbe initialDelaySeconds\nexec {LOCK_FD}\u003e${LOCK} \u0026\u0026 flock --verbose -w 15 \"${LOCK_FD}\" || {\n echo \"$(date -Iseconds -u) kubelet did not terminate old kube-apiserver before new one\" \u003e\u003e /var/log/kube-apiserver/lock.log\n echo -n \": WARNING: kubelet did not terminate old kube-apiserver before new one.\"\n\n # We failed to acquire exclusive lock, which means there is old kube-apiserver running in system.\n # Since we utilize SO_REUSEPORT, we need to make sure the old kube-apiserver stopped listening.\n #\n # NOTE: This is a fallback for broken kubelet, if you observe this please report a bug.\n echo -n \"Waiting for port 6443 to be released due to likely bug in kubelet or CRI-O \"\n while [ -n \"$(ss -Htan state listening '( sport = 6443 or sport = 6080 )')\" ]; do\n echo -n \".\"\n sleep 1\n (( tries += 1 ))\n if [[ \"${tries}\" -gt 10 ]]; then\n echo \"Timed out waiting for port :6443 and :6080 to be released, this is likely a bug in kubelet or CRI-O\"\n exit 1\n fi\n done\n # This is to make sure the server has terminated independently from the lock.\n # After the port has been freed (requests can be pending and need 60s max).\n sleep 65\n}\n# We cannot hold the lock from the init container to the main container. We release it here. There is no risk, at this point we know we are safe.\nflock -u \"${LOCK_FD}\"\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"audit-dir","mountPath":"/var/log/kube-apiserver"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"kube-apiserver","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","command":["/bin/bash","-ec"],"args":["LOCK=/var/log/kube-apiserver/.lock\n# We should be able to acquire the lock immediatelly. If not, it means the init container has not released it yet and kubelet or CRI-O started container prematurely.\nexec {LOCK_FD}\u003e${LOCK} \u0026\u0026 flock --verbose -w 30 \"${LOCK_FD}\" || {\n echo \"Failed to acquire lock for kube-apiserver. Please check setup container for details. This is likely kubelet or CRI-O bug.\"\n exit 1\n}\nif [ -f /etc/kubernetes/static-pod-certs/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle ...\"\n cp -f /etc/kubernetes/static-pod-certs/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\n\nexec watch-termination --termination-touch-file=/var/log/kube-apiserver/.terminating --termination-log-file=/var/log/kube-apiserver/termination.log --graceful-termination-duration=15s --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-apiserver-cert-syncer-kubeconfig/kubeconfig -- hyperkube kube-apiserver --openshift-config=/etc/kubernetes/static-pod-resources/configmaps/config/config.yaml --advertise-address=${HOST_IP} -v=2 --permit-address-sharing\n"],"ports":[{"hostPort":6443,"containerPort":6443,"protocol":"TCP"}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"STATIC_POD_VERSION","value":"4"},{"name":"HOST_IP","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"status.hostIP"}}},{"name":"GOGC","value":"100"}],"resources":{"requests":{"cpu":"265m","memory":"1Gi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"audit-dir","mountPath":"/var/log/kube-apiserver"}],"livenessProbe":{"httpGet":{"path":"livez?exclude=etcd","port":6443,"scheme":"HTTPS"},"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"readyz","port":6443,"scheme":"HTTPS"},"timeoutSeconds":10,"periodSeconds":5,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"livez","port":6443,"scheme":"HTTPS"},"timeoutSeconds":10,"periodSeconds":5,"successThreshold":1,"failureThreshold":30},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"kube-apiserver-cert-syncer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","command":["cluster-kube-apiserver-operator","cert-syncer"],"args":["--kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-apiserver-cert-syncer-kubeconfig/kubeconfig","--namespace=$(POD_NAMESPACE)","--destination-dir=/etc/kubernetes/static-pod-certs"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-apiserver-cert-regeneration-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","command":["cluster-kube-apiserver-operator","cert-regeneration-controller"],"args":["--kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-apiserver-cert-syncer-kubeconfig/kubeconfig","--namespace=$(POD_NAMESPACE)","-v=2"],"env":[{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-apiserver-insecure-readyz","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","command":["cluster-kube-apiserver-operator","insecure-readyz"],"args":["--insecure-port=6080","--delegate-url=https://localhost:6443/readyz"],"ports":[{"hostPort":6080,"containerPort":6080,"protocol":"TCP"}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-apiserver-check-endpoints","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","command":["cluster-kube-apiserver-operator","check-endpoints"],"args":["--kubeconfig","/etc/kubernetes/static-pod-certs/configmaps/check-endpoints-kubeconfig/kubeconfig","--listen","0.0.0.0:17697","--namespace","$(POD_NAMESPACE)","--v","2"],"ports":[{"name":"check-endpoints","hostPort":17697,"containerPort":17697,"protocol":"TCP"}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":17697,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":17697,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":15,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:18Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:18Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:24Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:24Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:18Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-16T17:14:18Z","initContainerStatuses":[{"name":"setup","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-16T17:13:52Z","finishedAt":"2026-02-16T17:13:52Z","containerID":"cri-o://031351d655133b7eb2314bbf088d80efa45189d1f9252d31e6d06128b3e90f08"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","containerID":"cri-o://031351d655133b7eb2314bbf088d80efa45189d1f9252d31e6d06128b3e90f08","started":false}],"containerStatuses":[{"name":"kube-apiserver","state":{"running":{"startedAt":"2026-02-16T17:13:53Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","containerID":"cri-o://4992c22e831121a95bc649c439bd4c2706d23e304f9780a4ff56be58ca6cb875","started":true},{"name":"kube-apiserver-cert-regeneration-controller","state":{"running":{"startedAt":"2026-02-16T17:13:53Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","containerID":"cri-o://1f9ccdae401f5d6081eacec1d36e73c0010b8afd14d410faf565b70a3ef4d59d","started":true},{"name":"kube-apiserver-cert-syncer","state":{"running":{"startedAt":"2026-02-16T17:13:53Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","containerID":"cri-o://1eea8daa47d9e87380f3482df90e85193de1a1240a1d240c6fe7a9ef3f0312e1","started":true},{"name":"kube-apiserver-check-endpoints","state":{"running":{"startedAt":"2026-02-16T17:14:05Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"W0216 17:13:54.190744 1 cmd.go:257] Using insecure, self-signed certificates\nI0216 17:13:54.191062 1 crypto.go:601] Generating new CA for check-endpoints-signer@1771262034 cert, and key in /tmp/serving-cert-3519256846/serving-signer.crt, /tmp/serving-cert-3519256846/serving-signer.key\nI0216 17:13:54.520708 1 observer_polling.go:159] Starting file observer\nW0216 17:13:54.524637 1 builder.go:272] unable to get owner reference (falling back to namespace): Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-apiserver/pods/kube-apiserver-master-0\": dial tcp [::1]:6443: connect: connection refused\nI0216 17:13:54.524880 1 builder.go:304] check-endpoints version 4.18.0-202601171144.p2.g416eeae.assembly.stream.el9-416eeae-416eeae4e60970f5ab52a833774c7bb60644e6af\nI0216 17:13:54.527766 1 dynamic_serving_content.go:116] \"Loaded a new cert/key pair\" name=\"serving-cert::/tmp/serving-cert-3519256846/tls.crt::/tmp/serving-cert-3519256846/tls.key\"\nF0216 17:14:04.938256 1 cmd.go:182] error initializing delegating authentication: unable to load configmap based request-header-client-ca-file: Get \"https://localhost:6443/api/v1/namespaces/kube-system/configmaps/extension-apiserver-authentication\": net/http: TLS handshake timeout\n","startedAt":"2026-02-16T17:13:54Z","finishedAt":"2026-02-16T17:14:04Z","containerID":"cri-o://15bd44df4287ebd73cf51ab580577f1b0e984e37a690d3b82be46044edeeb30a"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","containerID":"cri-o://861e88422bffb8b290aabc9e4e2f5c409ac08d163d44f75a8570182c8883c793","started":true},{"name":"kube-apiserver-insecure-readyz","state":{"running":{"startedAt":"2026-02-16T17:13:53Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","containerID":"cri-o://25465b580bb48f3a6fb46d8c2d044d08f4836a58f5f20bd9908d153f0df9ce48","started":true}],"qosClass":"Burstable"}}config/pod/openshift-kube-apiserver/installer-4-master-0.json0000640000000000000000000001511215144650247022677 0ustar0000000000000000{"metadata":{"name":"installer-4-master-0","namespace":"openshift-kube-apiserver","uid":"1ea5bf67-1fd1-488a-a440-00bb9a8533d0","resourceVersion":"15197","creationTimestamp":"2026-02-16T17:07:58Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.90/23\"],\"mac_address\":\"0a:58:0a:80:00:5a\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.90/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.90\"\n ],\n \"mac\": \"0a:58:0a:80:00:5a\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-4","uid":"7d8c23d8-2bc7-4e07-b7e7-9823f98f64b0"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","command":["cluster-kube-apiserver-operator","installer"],"args":["-v=2","--revision=4","--namespace=openshift-kube-apiserver","--pod=kube-apiserver-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-apiserver-pod","--configmaps=config","--configmaps=kube-apiserver-cert-syncer-kubeconfig","--optional-configmaps=oauth-metadata","--optional-configmaps=cloud-config","--configmaps=bound-sa-token-signing-certs","--configmaps=etcd-serving-ca","--optional-configmaps=kube-apiserver-server-ca","--configmaps=kubelet-serving-ca","--configmaps=sa-token-signing-certs","--configmaps=kube-apiserver-audit-policies","--secrets=etcd-client","--optional-secrets=encryption-config","--secrets=localhost-recovery-serving-certkey","--secrets=localhost-recovery-client-token","--optional-secrets=webhook-authenticator","--cert-dir=/etc/kubernetes/static-pod-resources/kube-apiserver-certs","--cert-configmaps=aggregator-client-ca","--cert-configmaps=client-ca","--optional-cert-configmaps=trusted-ca-bundle","--cert-configmaps=control-plane-node-kubeconfig","--cert-configmaps=check-endpoints-kubeconfig","--cert-secrets=aggregator-client","--cert-secrets=localhost-serving-cert-certkey","--cert-secrets=service-network-serving-certkey","--cert-secrets=external-loadbalancer-serving-certkey","--cert-secrets=internal-loadbalancer-serving-certkey","--cert-secrets=bound-service-account-signing-key","--cert-secrets=control-plane-node-admin-client-cert-key","--cert-secrets=check-endpoints-client-cert-key","--cert-secrets=kubelet-client","--cert-secrets=node-kubeconfigs","--optional-cert-secrets=user-serving-cert","--optional-cert-secrets=user-serving-cert-000","--optional-cert-secrets=user-serving-cert-001","--optional-cert-secrets=user-serving-cert-002","--optional-cert-secrets=user-serving-cert-003","--optional-cert-secrets=user-serving-cert-004","--optional-cert-secrets=user-serving-cert-005","--optional-cert-secrets=user-serving-cert-006","--optional-cert-secrets=user-serving-cert-007","--optional-cert-secrets=user-serving-cert-008","--optional-cert-secrets=user-serving-cert-009"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"imagePullSecrets":[{"name":"installer-sa-dockercfg-z9qtm"}],"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:19Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:07:58Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:19Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:19Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:07:58Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-16T17:07:58Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":137,"reason":"ContainerStatusUnknown","message":"The container could not be located when the pod was terminated","startedAt":null,"finishedAt":null}},"lastState":{"terminated":{"exitCode":137,"reason":"ContainerStatusUnknown","message":"The container could not be located when the pod was deleted. The container used to be Running","startedAt":null,"finishedAt":null}},"ready":false,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","imageID":"","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}config/pod/openshift-cluster-machine-approver/machine-approver-8569dd85ff-4vxmz.json0000640000000000000000000001662415144650247027057 0ustar0000000000000000{"metadata":{"name":"machine-approver-8569dd85ff-4vxmz","generateName":"machine-approver-8569dd85ff-","namespace":"openshift-cluster-machine-approver","uid":"702322ac-7610-4568-9a68-b6acbd1f0c12","resourceVersion":"16366","creationTimestamp":"2026-02-16T17:01:39Z","labels":{"app":"machine-approver","pod-template-hash":"8569dd85ff"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"machine-approver-8569dd85ff","uid":"f1baa33b-cc58-48a9-a024-6ba587a8afad","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"auth-proxy-config","configMap":{"name":"kube-rbac-proxy","defaultMode":420}},{"name":"machine-approver-tls","secret":{"secretName":"machine-approver-tls","defaultMode":420}},{"name":"config","configMap":{"name":"machine-approver-config","defaultMode":440,"optional":true}},{"name":"kube-api-access-6ftld","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","args":["--secure-listen-address=0.0.0.0:9192","--upstream=http://127.0.0.1:9191/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key","--config-file=/etc/kube-rbac-proxy/config-file.yaml","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305","--logtostderr=true","--v=3"],"ports":[{"name":"https","hostPort":9192,"containerPort":9192,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"auth-proxy-config","mountPath":"/etc/kube-rbac-proxy"},{"name":"machine-approver-tls","mountPath":"/etc/tls/private"},{"name":"kube-api-access-6ftld","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"machine-approver-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e7ac69aff2f28f6b3cbdb166c7dac7a3490167bcd670cd7057bdde1e1e7684d","command":["/usr/bin/machine-approver"],"args":["--config=/var/run/configmaps/config/config.yaml","-v=2","--logtostderr","--leader-elect=true","--leader-elect-lease-duration=137s","--leader-elect-renew-deadline=107s","--leader-elect-retry-period=26s","--leader-elect-resource-namespace=openshift-cluster-machine-approver","--api-group-version=machine.openshift.io/v1beta1","--max-concurrent-reconciles=10"],"env":[{"name":"RELEASE_VERSION","value":"4.18.32"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"kube-api-access-6ftld","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"machine-approver-sa","serviceAccount":"machine-approver-sa","nodeName":"master-0","hostNetwork":true,"securityContext":{},"imagePullSecrets":[{"name":"machine-approver-sa-dockercfg-wnnb7"}],"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:02:47Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:01:39Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:37Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:37Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:01:39Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-16T17:01:39Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-16T17:14:20Z"}},"lastState":{},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://1a8885af29cb94472b23ade7b86cbcb90ba289e387a2780efabf272cfe37dbff","started":true,"volumeMounts":[{"name":"auth-proxy-config","mountPath":"/etc/kube-rbac-proxy"},{"name":"machine-approver-tls","mountPath":"/etc/tls/private"},{"name":"kube-api-access-6ftld","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"machine-approver-controller","state":{"running":{"startedAt":"2026-02-16T17:14:36Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"W0216 17:14:23.024030 1 client_config.go:659] Neither --kubeconfig nor --master was specified. Using the inClusterConfig. This might not work.\nW0216 17:14:23.024339 1 client_config.go:659] Neither --kubeconfig nor --master was specified. Using the inClusterConfig. This might not work.\nI0216 17:14:23.024446 1 main.go:152] setting up manager\nF0216 17:14:23.026435 1 main.go:174] failed to index field spec.signerName: failed to get API group resources: unable to retrieve the complete list of server APIs: certificates.k8s.io/v1: Get \"https://172.30.0.1:443/apis/certificates.k8s.io/v1\": dial tcp 172.30.0.1:443: connect: connection refused\n","startedAt":"2026-02-16T17:14:22Z","finishedAt":"2026-02-16T17:14:23Z","containerID":"cri-o://15f7dbfc42911fc9756e060ae848e6787711a1dbc91f05fce2dd151ae4191fab"}},"ready":true,"restartCount":5,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e7ac69aff2f28f6b3cbdb166c7dac7a3490167bcd670cd7057bdde1e1e7684d","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e7ac69aff2f28f6b3cbdb166c7dac7a3490167bcd670cd7057bdde1e1e7684d","containerID":"cri-o://5a005145926df321f6fea8816a53db69398079fcdc302fcb4d3cf33642812538","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"kube-api-access-6ftld","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/configmaps/kube-system/cluster-config-v1/install-config0000640000000000000000000000155515144650247023225 0ustar0000000000000000apiVersion: v1 baseDomain: xxxxxxxxxxxxx compute: - hyperthreading: Enabled name: worker platform: {} replicas: 0 controlPlane: hyperthreading: Enabled name: master platform: {} replicas: 1 metadata: creationTimestamp: null name: sno networking: clusterNetwork: - cidr: 10.128.0.0/16 hostPrefix: 23 machineNetwork: - cidr: 192.168.32.0/24 networkType: OVNKubernetes serviceNetwork: - 172.30.0.0/16 platform: none: {} publish: External pullSecret: "" sshKey: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt0000640000000000000000000000010115144650247025435 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/openshift-install-manifests/version0000640000000000000000000000000715144650247025144 0ustar0000000000000000v4.18.0config/configmaps/openshift-config/openshift-install-manifests/invoker0000640000000000000000000000001715144650247025135 0ustar0000000000000000agent-installerconfig/configmaps/openshift-config/kube-root-ca.crt/ca.crt0000640000000000000000000000030315144650247022255 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/initial-kube-apiserver-server-ca/ca-bundle.crt0000640000000000000000000000050515144650247026711 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt0000640000000000000000000000010115144650247023414 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt0000640000000000000000000000010115144650247023210 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt0000640000000000000000000000010115144650247025500 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- aggregated/ingress_controllers_certs.json0000640000000000000000000000045715144650247017543 0ustar0000000000000000[{"name":"router-certs-default","namespace":"openshift-ingress","not_before":"2026-02-16T17:00:50Z","not_after":"2028-02-16T17:00:51Z","controllers":[]},{"name":"router-ca","namespace":"openshift-ingress-operator","not_before":"2026-02-16T17:00:49Z","not_after":"2028-02-16T17:00:50Z","controllers":[]}]events/openshift-cluster-version.json0000640000000000000000000002421015144650247016607 0ustar0000000000000000{"items":[{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T16:54:28Z","reason":"LeaderElection","message":"master-0_73539c9d-3bba-44b7-89ff-b14bc727e544 became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T16:54:36Z","reason":"LeaderElection","message":"master-0_73539c9d-3bba-44b7-89ff-b14bc727e544 stopped leading","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T16:54:37Z","reason":"LeaderElection","message":"master-0_f4bed8e0-1512-4e7e-89f2-5e594b410d2a became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T16:54:39Z","reason":"LeaderElection","message":"master-0_f4bed8e0-1512-4e7e-89f2-5e594b410d2a stopped leading","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T16:54:47Z","reason":"ScalingReplicaSet","message":"Scaled up replica set cluster-version-operator-76959b6567 to 1","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T16:54:54Z","reason":"LeaderElection","message":"master-0_a264fcb4-3169-4f76-9871-9f959f017906 became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T16:54:55Z","reason":"LoadPayload","message":"Loading payload version=\"4.18.32\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T16:54:55Z","reason":"RetrievePayload","message":"Retrieving and verifying payload version=\"4.18.32\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T16:54:57Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.32\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\" architecture=\"amd64\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T16:55:28Z","reason":"FailedCreate","message":"Error creating: pods \"cluster-version-operator-76959b6567-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T16:58:50Z","reason":"FailedCreate","message":"Error creating: pods \"cluster-version-operator-76959b6567-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T16:58:52Z","reason":"SuccessfulCreate","message":"Created pod: cluster-version-operator-76959b6567-wnh7l","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T16:58:52Z","reason":"Scheduled","message":"Successfully assigned openshift-cluster-version/cluster-version-operator-76959b6567-wnh7l to master-0","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T16:59:58Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"cluster-version-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:00:33Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"cluster-version-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:00:36Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:00:46Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\" in 9.306s (9.306s including waiting). Image size: 512819769 bytes.","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:00:46Z","reason":"Created","message":"Created container: cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:00:46Z","reason":"Started","message":"Started container cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:00:46Z","reason":"LeaderElection","message":"master-0_7549f6e7-d53d-48e0-8bc8-a8e058ed2750 became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:00:47Z","reason":"LoadPayload","message":"Loading payload version=\"4.18.32\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:00:47Z","reason":"RetrievePayload","message":"Retrieving and verifying payload version=\"4.18.32\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:00:49Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.32\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\" architecture=\"amd64\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:01:00Z","reason":"Killing","message":"Stopping container cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:01:00Z","reason":"SuccessfulDelete","message":"Deleted pod: cluster-version-operator-76959b6567-wnh7l","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:01:00Z","reason":"ScalingReplicaSet","message":"Scaled down replica set cluster-version-operator-76959b6567 to 0 from 1","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:01:01Z","reason":"ScalingReplicaSet","message":"Scaled up replica set cluster-version-operator-649c4f5445 to 1","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:01:01Z","reason":"Scheduled","message":"Successfully assigned openshift-cluster-version/cluster-version-operator-649c4f5445-vt6wb to master-0","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:01:01Z","reason":"Started","message":"Started container cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:01:01Z","reason":"Created","message":"Created container: cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:01:01Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\" already present on machine","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:01:01Z","reason":"LeaderElection","message":"master-0_538c553f-f749-4aec-8ad9-32c8ab1ad21b became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:01:01Z","reason":"SuccessfulCreate","message":"Created pod: cluster-version-operator-649c4f5445-vt6wb","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:01:03Z","reason":"LoadPayload","message":"Loading payload version=\"4.18.32\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:01:03Z","reason":"RetrievePayload","message":"Retrieving and verifying payload version=\"4.18.32\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:01:04Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.32\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\" architecture=\"amd64\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:02:26Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access\" : [failed to fetch token: Post \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-cluster-version/serviceaccounts/default/token\": dial tcp 192.168.32.10:6443: connect: connection refused, failed to sync configmap cache: timed out waiting for the condition]","type":"Warning"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"service-ca\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:14:20Z","reason":"Started","message":"Started container cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:14:20Z","reason":"Created","message":"Created container: cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:14:20Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\" already present on machine","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:14:32Z","reason":"NodeNotReady","message":"Node is not ready","type":"Warning"}]}config/pod/openshift-cluster-version/cluster-version-operator-649c4f5445-vt6wb.json0000640000000000000000000001342115144650247026636 0ustar0000000000000000{"metadata":{"name":"cluster-version-operator-649c4f5445-vt6wb","generateName":"cluster-version-operator-649c4f5445-","namespace":"openshift-cluster-version","uid":"b6ad958f-25e4-40cb-89ec-5da9cb6395c7","resourceVersion":"16410","creationTimestamp":"2026-02-16T17:01:01Z","labels":{"k8s-app":"cluster-version-operator","pod-template-hash":"649c4f5445"},"annotations":{"openshift.io/required-scc":"hostaccess","openshift.io/scc":"hostaccess"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-version-operator-649c4f5445","uid":"2e63d2e5-a070-4d56-8cc3-db8eb3272f20","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"etc-ssl-certs","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"etc-cvo-updatepayloads","hostPath":{"path":"/etc/cvo/updatepayloads","type":""}},{"name":"serving-cert","secret":{"secretName":"cluster-version-operator-serving-cert","defaultMode":420}},{"name":"service-ca","configMap":{"name":"openshift-service-ca.crt","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-version-operator","image":"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","args":["start","--release-image=quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","--enable-auto-update=false","--listen=0.0.0.0:9099","--serving-cert-file=/etc/tls/serving-cert/tls.crt","--serving-key-file=/etc/tls/serving-cert/tls.key","--v=2","--always-enable-capabilities=Ingress"],"env":[{"name":"OPERATOR_IMAGE_VERSION","value":"0.0.1-snapshot"},{"name":"KUBERNETES_SERVICE_PORT","value":"6443"},{"name":"KUBERNETES_SERVICE_HOST","value":"api-int.sno.openstack.lab"},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}},{"name":"CLUSTER_PROFILE","value":"self-managed-high-availability"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-ssl-certs","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"etc-cvo-updatepayloads","readOnly":true,"mountPath":"/etc/cvo/updatepayloads"},{"name":"serving-cert","readOnly":true,"mountPath":"/etc/tls/serving-cert"},{"name":"service-ca","readOnly":true,"mountPath":"/etc/tls/service-ca"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000040000,"runAsNonRoot":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":130,"dnsPolicy":"Default","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"default","serviceAccount":"default","automountServiceAccountToken":false,"nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c6,c5"},"fsGroup":1000040000},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:01:02Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:01:01Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:20Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:20Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:01:01Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-16T17:01:01Z","containerStatuses":[{"name":"cluster-version-operator","state":{"running":{"startedAt":"2026-02-16T17:14:20Z"}},"lastState":{},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","imageID":"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","containerID":"cri-o://69978caa7c6df44b4132b190aa96ee90fadd8b7bb9d61222abed2f640a709a92","started":true,"volumeMounts":[{"name":"etc-ssl-certs","mountPath":"/etc/ssl/certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-cvo-updatepayloads","mountPath":"/etc/cvo/updatepayloads","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"serving-cert","mountPath":"/etc/tls/serving-cert","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca","mountPath":"/etc/tls/service-ca","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/id0000640000000000000000000000004415144650247011032 0ustar00000000000000005cc9bdbc-753a-4614-947c-20d2c71801f3config/version.json0000640000000000000000000001030315144650247013072 0ustar0000000000000000{"metadata":{"name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","resourceVersion":"14257","generation":2,"creationTimestamp":"2026-02-16T16:54:34Z"},"spec":{"clusterID":"5cc9bdbc-753a-4614-947c-20d2c71801f3","channel":"stable-4.18","signatureStores":null},"status":{"desired":{"version":"4.18.32","image":"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","url":"https://access.redhat.com/errata/RHSA-2026:1062","channels":["candidate-4.18","candidate-4.19","candidate-4.20","eus-4.18","fast-4.18","stable-4.18"]},"history":[{"state":"Partial","startedTime":"2026-02-16T16:54:57Z","completionTime":null,"version":"4.18.32","image":"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","verified":false}],"observedGeneration":2,"versionHash":"mWssvFsfzgI=","capabilities":{"enabledCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"],"knownCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"]},"conditions":[{"type":"RetrievedUpdates","status":"True","lastTransitionTime":"2026-02-16T16:54:57Z"},{"type":"Upgradeable","status":"False","lastTransitionTime":"2026-02-16T16:54:57Z","reason":"MultipleReasons","message":"Cluster should not be upgraded between minor versions for multiple reasons: AdminAckRequired,ConsoleDefaultRouteSync_FailedDefaultRouteApply::DownloadsDefaultRouteSync_FailedDefaultRouteApply\n* Kubernetes 1.32 and therefore OpenShift 4.19 remove several APIs which require admin consideration. Please see the knowledge article https://access.redhat.com/articles/7112216 for details and instructions.\n* Cluster operator console should not be upgraded between minor versions: ConsoleDefaultRouteSyncUpgradeable: Internal error occurred: resource quota evaluation timed out\nDownloadsDefaultRouteSyncUpgradeable: Internal error occurred: resource quota evaluation timed out"},{"type":"ImplicitlyEnabledCapabilities","status":"False","lastTransitionTime":"2026-02-16T16:54:57Z","reason":"AsExpected","message":"Capabilities match configured spec"},{"type":"ReleaseAccepted","status":"True","lastTransitionTime":"2026-02-16T16:54:57Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.32\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\" architecture=\"amd64\""},{"type":"Available","status":"False","lastTransitionTime":"2026-02-16T16:54:57Z"},{"type":"Failing","status":"True","lastTransitionTime":"2026-02-16T17:04:04Z","reason":"ClusterOperatorsNotAvailable","message":"Cluster operators authentication, console, image-registry, insights, kube-controller-manager, monitoring, openshift-apiserver are not available"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-16T16:54:57Z","reason":"ClusterOperatorsNotAvailable","message":"Unable to apply 4.18.32: some cluster operators are not available"},{"type":"UpgradeableAdminAckRequired","status":"False","lastTransitionTime":"2026-02-16T17:06:41Z","reason":"AdminAckRequired","message":"Kubernetes 1.32 and therefore OpenShift 4.19 remove several APIs which require admin consideration. Please see the knowledge article https://access.redhat.com/articles/7112216 for details and instructions."},{"type":"UpgradeableClusterOperators","status":"False","lastTransitionTime":"2026-02-16T17:06:41Z","reason":"ConsoleDefaultRouteSync_FailedDefaultRouteApply::DownloadsDefaultRouteSync_FailedDefaultRouteApply","message":"Cluster operator console should not be upgraded between minor versions: ConsoleDefaultRouteSyncUpgradeable: Internal error occurred: resource quota evaluation timed out\nDownloadsDefaultRouteSyncUpgradeable: Internal error occurred: resource quota evaluation timed out"}],"availableUpdates":null}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/edit.json0000640000000000000000000002311515144650247025504 0ustar0000000000000000{"metadata":{"name":"edit","uid":"6630b4f5-185a-4bf5-a8fe-7e676f30682e","resourceVersion":"13049","creationTimestamp":"2026-02-16T16:53:35Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults","rbac.authorization.k8s.io/aggregate-to-admin":"true"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","update","patch","delete"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests"]},{"verbs":["get","list","update","create","watch","patch","delete"],"apiGroups":["helm.openshift.io"],"resources":["projecthelmchartrepositories"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["get","list","watch"],"apiGroups":["metrics.k8s.io"],"resources":["pods","nodes"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-edit":"true"}}]}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/admin.json0000640000000000000000000002614115144650247025651 0ustar0000000000000000{"metadata":{"name":"admin","uid":"ae69e432-2235-46f9-8b6f-98cd281a6162","resourceVersion":"13059","creationTimestamp":"2026-02-16T16:53:35Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","update","patch","delete"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests"]},{"verbs":["get","list","update","create","watch","patch","delete"],"apiGroups":["helm.openshift.io"],"resources":["projecthelmchartrepositories"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["get","list","watch"],"apiGroups":["metrics.k8s.io"],"resources":["pods","nodes"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["watch","list","get"],"apiGroups":["k8s.cni.cncf.io"],"resources":["network-attachment-definitions"]},{"verbs":["*"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindings","roles"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["rbac.authorization.k8s.io"],"resources":["rolebindings","roles"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["localresourceaccessreviews","localsubjectaccessreviews","subjectrulesreviews"]},{"verbs":["create"],"apiGroups":["authorization.k8s.io"],"resources":["localsubjectaccessreviews"]},{"verbs":["delete","get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["resourceaccessreviews","subjectaccessreviews"]},{"verbs":["create"],"apiGroups":["","security.openshift.io"],"resources":["podsecuritypolicyreviews","podsecuritypolicyselfsubjectreviews","podsecuritypolicysubjectreviews"]},{"verbs":["get","list","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindingrestrictions"]},{"verbs":["admin","edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["delete","get","patch","update"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["update"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-admin":"true"}}]}}config/crd/volumesnapshotcontents.snapshot.storage.k8s.io.json0000640000000000000000000005444315144650247023452 0ustar0000000000000000{"metadata":{"name":"volumesnapshotcontents.snapshot.storage.k8s.io","uid":"5dd164b5-c069-4571-be1c-d1abc08bd644","resourceVersion":"4630","generation":1,"creationTimestamp":"2026-02-16T17:00:32Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/955","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"scope":"Cluster","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the\nunderlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system.\nRequired.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on\nthe underlying storage system should be deleted when its bound VolumeSnapshot is deleted.\nSupported values are \"Retain\" and \"Delete\".\n\"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept.\n\"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted.\nFor dynamically provisioned snapshots, this field will automatically be filled in by the\nCSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding\nVolumeSnapshotClass.\nFor pre-existing snapshots, users MUST specify this field when creating the\n VolumeSnapshotContent object.\nRequired.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on\nthe underlying storage system.\nThis MUST be the same as the name returned by the CSI GetPluginName() call for\nthat driver.\nRequired.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned\nor already exists, and just requires a Kubernetes object representation.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on\nthe underlying storage system for which a Kubernetes object representation\nwas (or should be) created.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"snapshotHandle is immutable"}]},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot\nshould be dynamically taken from.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeHandle is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.volumeHandle) || has(self.volumeHandle)","message":"volumeHandle is required once set"},{"rule":"!has(oldSelf.snapshotHandle) || has(self.snapshotHandle)","message":"snapshotHandle is required once set"},{"rule":"(has(self.volumeHandle) \u0026\u0026 !has(self.snapshotHandle)) || (!has(self.volumeHandle) \u0026\u0026 has(self.snapshotHandle))","message":"exactly one of volumeHandle and snapshotHandle must be set"}]},"sourceVolumeMode":{"description":"SourceVolumeMode is the mode of the volume whose snapshot is taken.\nCan be either “Filesystem” or “Block”.\nIf not specified, it indicates the source volume's mode is unknown.\nThis field is immutable.\nThis field is an alpha field.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"sourceVolumeMode is immutable"}]},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be)\ncreated.\nNote that after provisioning, the VolumeSnapshotClass may be deleted or\nrecreated with different set of values, and as such, should not be referenced\npost-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this\nVolumeSnapshotContent object is bound.\nVolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to\nthis VolumeSnapshotContent's name for the bidirectional binding to be valid.\nFor a pre-existing VolumeSnapshotContent object, name and namespace of the\nVolumeSnapshot object MUST be provided for binding to happen.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string\nshould contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2].\nFor example, if the object reference is to a container within a pod, this would take on a value like:\n\"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered\nthe event) or if no container name is specified \"spec.containers[2]\" (container with\nindex 2 in this pod). This syntax is chosen only to have some well-defined way of\nreferencing a part of an object.\nTODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}},"x-kubernetes-map-type":"atomic","x-kubernetes-validations":[{"rule":"has(self.name) \u0026\u0026 has(self.__namespace__)","message":"both spec.volumeSnapshotRef.name and spec.volumeSnapshotRef.namespace must be set"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.sourceVolumeMode) || has(self.sourceVolumeMode)","message":"sourceVolumeMode is required once set"}]},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it indicates the creation time is unknown.\nThe format of this field is a Unix nanoseconds time encoded as an int64.\nOn Unix, the command `date +%s%N` returns the current time in nanoseconds\nsince 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nUpon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system.\nIf not specified, it indicates that dynamic snapshot creation has either failed\nor it is still in progress.","type":"string"},"volumeGroupSnapshotHandle":{"description":"VolumeGroupSnapshotHandle is the CSI \"group_snapshot_id\" of a group snapshot\non the underlying storage system.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshotContent is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshotContent","schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the underlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system. Required.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted. Supported values are \"Retain\" and \"Delete\". \"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept. \"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted. For dynamically provisioned snapshots, this field will automatically be filled in by the CSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding VolumeSnapshotClass. For pre-existing snapshots, users MUST specify this field when creating the VolumeSnapshotContent object. Required.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on the underlying storage system. This MUST be the same as the name returned by the CSI GetPluginName() call for that driver. Required.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned or already exists, and just requires a Kubernetes object representation. This field is immutable after creation. Required.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on the underlying storage system for which a Kubernetes object representation was (or should be) created. This field is immutable.","type":"string"},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot should be dynamically taken from. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be) created. Note that after provisioning, the VolumeSnapshotClass may be deleted or recreated with different set of values, and as such, should not be referenced post-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this VolumeSnapshotContent object is bound. VolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to this VolumeSnapshotContent's name for the bidirectional binding to be valid. For a pre-existing VolumeSnapshotContent object, name and namespace of the VolumeSnapshot object MUST be provided for binding to happen. This field is immutable after creation. Required.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string should contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2]. For example, if the object reference is to a container within a pod, this would take on a value like: \"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered the event) or if no container name is specified \"spec.containers[2]\" (container with index 2 in this pod). This syntax is chosen only to have some well-defined way of referencing a part of an object. TODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}}}}},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it indicates the creation time is unknown. The format of this field is a Unix nanoseconds time encoded as an int64. On Unix, the command `date +%s%N` returns the current time in nanoseconds since 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any. Upon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system. If not specified, it indicates that dynamic snapshot creation has either failed or it is still in progress.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-02-16T17:00:33Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/955"},{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-02-16T17:00:33Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-02-16T17:00:33Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"}],"acceptedNames":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"storedVersions":["v1"]}}config/crd/volumesnapshots.snapshot.storage.k8s.io.json0000640000000000000000000004563015144650247022055 0ustar0000000000000000{"metadata":{"name":"volumesnapshots.snapshot.storage.k8s.io","uid":"714d27ce-0550-4e82-a0bf-95196f80a287","resourceVersion":"4578","generation":1,"creationTimestamp":"2026-02-16T17:00:32Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/814","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"scope":"Namespaced","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time\nsnapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user.\nMore info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots\nRequired.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim\nobject representing the volume from which a snapshot should be created.\nThis PVC is assumed to be in the same namespace as the VolumeSnapshot\nobject.\nThis field should be set if the snapshot does not exists, and needs to be\ncreated.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"persistentVolumeClaimName is immutable"}]},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent\nobject representing an existing volume snapshot.\nThis field should be set if the snapshot already exists and only needs a representation in Kubernetes.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeSnapshotContentName is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.persistentVolumeClaimName) || has(self.persistentVolumeClaimName)","message":"persistentVolumeClaimName is required once set"},{"rule":"!has(oldSelf.volumeSnapshotContentName) || has(self.volumeSnapshotContentName)","message":"volumeSnapshotContentName is required once set"},{"rule":"(has(self.volumeSnapshotContentName) \u0026\u0026 !has(self.persistentVolumeClaimName)) || (!has(self.volumeSnapshotContentName) \u0026\u0026 has(self.persistentVolumeClaimName))","message":"exactly one of volumeSnapshotContentName and persistentVolumeClaimName must be set"}]},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass\nrequested by the VolumeSnapshot.\nVolumeSnapshotClassName may be left nil to indicate that the default\nSnapshotClass should be used.\nA given cluster may have multiple default Volume SnapshotClasses: one\ndefault per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass,\nVolumeSnapshotSource will be checked to figure out what the associated\nCSI Driver is, and the default VolumeSnapshotClass associated with that\nCSI Driver will be used. If more than one VolumeSnapshotClass exist for\na given CSI Driver and more than one have been marked as default,\nCreateSnapshot will fail and generate an event.\nEmpty string is not allowed for this field.","type":"string","x-kubernetes-validations":[{"rule":"size(self) \u003e 0","message":"volumeSnapshotClassName must not be the empty string when set"}]}}},"status":{"description":"status represents the current information of a snapshot.\nConsumers must verify binding between VolumeSnapshot and\nVolumeSnapshotContent objects is successful (by validating that both\nVolumeSnapshot and VolumeSnapshotContent point at each other) before\nusing this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent\nobject to which this VolumeSnapshot object intends to bind to.\nIf not specified, it indicates that the VolumeSnapshot object has not been\nsuccessfully bound to a VolumeSnapshotContent object yet.\nNOTE: To avoid possible security issues, consumers must verify binding between\nVolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that\nboth VolumeSnapshot and VolumeSnapshotContent point at each other) before using\nthis object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nThis field could be helpful to upper level controllers(i.e., application controller)\nto decide whether they should continue on waiting for the snapshot to be created\nbased on the type of error reported.\nThe snapshot controller will keep retrying when an error occurs during the\nsnapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume\nfrom this snapshot.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"volumeGroupSnapshotName":{"description":"VolumeGroupSnapshotName is the name of the VolumeGroupSnapshot of which this\nVolumeSnapshot is a part of.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshot is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshot","schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time snapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user. More info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots Required.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from. This field is immutable after creation. Required.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim object representing the volume from which a snapshot should be created. This PVC is assumed to be in the same namespace as the VolumeSnapshot object. This field should be set if the snapshot does not exists, and needs to be created. This field is immutable.","type":"string"},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent object representing an existing volume snapshot. This field should be set if the snapshot already exists and only needs a representation in Kubernetes. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass requested by the VolumeSnapshot. VolumeSnapshotClassName may be left nil to indicate that the default SnapshotClass should be used. A given cluster may have multiple default Volume SnapshotClasses: one default per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass, VolumeSnapshotSource will be checked to figure out what the associated CSI Driver is, and the default VolumeSnapshotClass associated with that CSI Driver will be used. If more than one VolumeSnapshotClass exist for a given CSI Driver and more than one have been marked as default, CreateSnapshot will fail and generate an event. Empty string is not allowed for this field.","type":"string"}}},"status":{"description":"status represents the current information of a snapshot. Consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent object to which this VolumeSnapshot object intends to bind to. If not specified, it indicates that the VolumeSnapshot object has not been successfully bound to a VolumeSnapshotContent object yet. NOTE: To avoid possible security issues, consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any. This field could be helpful to upper level controllers(i.e., application controller) to decide whether they should continue on waiting for the snapshot to be created based on the type of error reported. The snapshot controller will keep retrying when an error occurs during the snapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume from this snapshot. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-02-16T17:00:32Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-02-16T17:00:32Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"},{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-02-16T17:00:32Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/814"}],"acceptedNames":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"storedVersions":["v1"]}}config/clusteroperator/imageregistry.operator.openshift.io/config/cluster.json0000640000000000000000000000402415144650247026704 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"6897cd27-676b-4b16-a8e0-b586e3c2a951","resourceVersion":"14498","generation":1,"creationTimestamp":"2026-02-16T17:03:56Z","finalizers":["imageregistry.operator.openshift.io/finalizer"]},"spec":{"managementState":"Removed","logLevel":"Normal","operatorLogLevel":"Normal","unsupportedConfigOverrides":null,"observedConfig":null,"proxy":{},"storage":{},"requests":{"read":{"maxWaitInQueue":"0s"},"write":{"maxWaitInQueue":"0s"}},"replicas":1,"rolloutStrategy":"RollingUpdate"},"status":{"observedGeneration":1,"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:08:34Z","reason":"Removed","message":"All registry resources are removed"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:04:28Z","reason":"Removed","message":"The registry is removed"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:04:28Z","reason":"Removed","message":"The registry is removed"},{"type":"Removed","status":"True","lastTransitionTime":"2026-02-16T17:04:28Z","reason":"Removed","message":"The registry is removed"},{"type":"ImageConfigControllerDegraded","status":"False","lastTransitionTime":"2026-02-16T17:04:37Z","reason":"AsExpected"},{"type":"ImageRegistryCertificatesControllerDegraded","status":"False","lastTransitionTime":"2026-02-16T17:04:42Z","reason":"AsExpected"},{"type":"NodeCADaemonAvailable","status":"False","lastTransitionTime":"2026-02-16T17:07:55Z","reason":"NoAvailableReplicas","message":"The daemon set node-ca does not have available replicas"},{"type":"NodeCADaemonProgressing","status":"True","lastTransitionTime":"2026-02-16T17:07:55Z","reason":"Unavailable","message":"The daemon set node-ca is deploying node pods"},{"type":"NodeCADaemonControllerDegraded","status":"False","lastTransitionTime":"2026-02-16T17:07:55Z","reason":"AsExpected"}],"readyReplicas":0,"generations":[{"group":"apps","resource":"daemonsets","namespace":"openshift-image-registry","name":"node-ca","lastGeneration":1,"hash":""}],"storageManaged":false,"storage":{}}}config/node/master-0.json0000640000000000000000000001057715144650247013777 0ustar0000000000000000{"metadata":{"name":"master-0","uid":"da39ce92-6a7c-4cce-aa8b-3e495e33f616","resourceVersion":"16506","creationTimestamp":"2026-02-16T16:58:50Z","labels":{"beta.kubernetes.io/arch":"amd64","beta.kubernetes.io/os":"linux","kubernetes.io/arch":"amd64","kubernetes.io/hostname":"master-0","kubernetes.io/os":"linux","node-role.kubernetes.io/control-plane":"","node-role.kubernetes.io/master":"","node-role.kubernetes.io/worker":"","node.openshift.io/os_id":"rhcos"},"annotations":{"k8s.ovn.org/host-cidrs":"","k8s.ovn.org/l3-gateway-config":"","k8s.ovn.org/node-chassis-id":"","k8s.ovn.org/node-encap-ips":"","k8s.ovn.org/node-id":"","k8s.ovn.org/node-masquerade-subnet":"","k8s.ovn.org/node-primary-ifaddr":"","k8s.ovn.org/node-subnets":"","k8s.ovn.org/node-transit-switch-port-ifaddr":"","k8s.ovn.org/remote-zone-migrated":"","k8s.ovn.org/zone-name":"","machineconfiguration.openshift.io/controlPlaneTopology":"SingleReplica","machineconfiguration.openshift.io/currentConfig":"rendered-master-ccc1c4b4035b8605635ebee7b29103f5","machineconfiguration.openshift.io/desiredConfig":"rendered-master-4ff3bdc50d696d239efb12817ae47acf","machineconfiguration.openshift.io/desiredDrain":"uncordon-rendered-master-4ff3bdc50d696d239efb12817ae47acf","machineconfiguration.openshift.io/lastObservedServerCAAnnotation":"false","machineconfiguration.openshift.io/lastSyncedControllerConfigResourceVersion":"13330","machineconfiguration.openshift.io/reason":"error setting node's state to Working: unable to update node \"\u0026Node{ObjectMeta:{ 0 0001-01-01 00:00:00 +0000 UTC \u003cnil\u003e \u003cnil\u003e map[] map[] [] [] []},Spec:NodeSpec{PodCIDR:,DoNotUseExternalID:,ProviderID:,Unschedulable:false,Taints:[]Taint{},ConfigSource:nil,PodCIDRs:[],},Status:NodeStatus{Capacity:ResourceList{},Allocatable:ResourceList{},Phase:,Conditions:[]NodeCondition{},Addresses:[]NodeAddress{},DaemonEndpoints:NodeDaemonEndpoints{KubeletEndpoint:DaemonEndpoint{Port:0,},},NodeInfo:NodeSystemInfo{MachineID:,SystemUUID:,BootID:,KernelVersion:,OSImage:,ContainerRuntimeVersion:,KubeletVersion:,KubeProxyVersion:,OperatingSystem:,Architecture:,},Images:[]ContainerImage{},VolumesInUse:[],VolumesAttached:[]AttachedVolume{},Config:nil,RuntimeHandlers:[]NodeRuntimeHandler{},Features:nil,},}\": Timeout: request did not complete within requested timeout - context deadline exceeded","machineconfiguration.openshift.io/state":"Degraded","volumes.kubernetes.io/controller-managed-attach-detach":"true"}},"spec":{"taints":[{"key":"UpdateInProgress","effect":"PreferNoSchedule"}]},"status":{"capacity":{"cpu":"16","ephemeral-storage":"209124332Ki","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"49330228Ki","pods":"250"},"allocatable":{"cpu":"15500m","ephemeral-storage":"191655242229","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"48179252Ki","pods":"250"},"conditions":[{"type":"MemoryPressure","status":"False","lastHeartbeatTime":"2026-02-16T17:14:39Z","lastTransitionTime":"2026-02-16T16:58:50Z","reason":"KubeletHasSufficientMemory","message":"kubelet has sufficient memory available"},{"type":"DiskPressure","status":"False","lastHeartbeatTime":"2026-02-16T17:14:39Z","lastTransitionTime":"2026-02-16T16:58:50Z","reason":"KubeletHasNoDiskPressure","message":"kubelet has no disk pressure"},{"type":"PIDPressure","status":"False","lastHeartbeatTime":"2026-02-16T17:14:39Z","lastTransitionTime":"2026-02-16T16:58:50Z","reason":"KubeletHasSufficientPID","message":"kubelet has sufficient PID available"},{"type":"Ready","status":"True","lastHeartbeatTime":"2026-02-16T17:14:39Z","lastTransitionTime":"2026-02-16T17:14:39Z","reason":"KubeletReady","message":"kubelet is posting ready status"}],"addresses":[{"type":"InternalIP","address":"192.168.32.10"},{"type":"Hostname","address":"master-0"}],"daemonEndpoints":{"kubeletEndpoint":{"Port":10250}},"nodeInfo":{"machineID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","systemUUID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","bootID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","kernelVersion":"5.14.0-427.107.1.el9_4.x86_64","osImage":"Red Hat Enterprise Linux CoreOS 418.94.202601202224-0","containerRuntimeVersion":"cri-o://1.31.13-3.rhaos4.18.gite0b87e5.el9","kubeletVersion":"v1.31.14","kubeProxyVersion":"v1.31.14","operatingSystem":"linux","architecture":"amd64"},"runtimeHandlers":[{"name":"crun","features":{"recursiveReadOnlyMounts":true}},{"name":"","features":{"recursiveReadOnlyMounts":true}},{"name":"runc","features":{"recursiveReadOnlyMounts":true}}]}}config/ingress.json0000640000000000000000000000213215144650247013060 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"f43fa63b-74da-41de-9629-9c75e4b8b11e","resourceVersion":"13613","generation":1,"creationTimestamp":"2026-02-16T16:54:29Z"},"spec":{"domain":"apps.sno.openstack.lab","loadBalancer":{"platform":{"type":""}}},"status":{"componentRoutes":[{"namespace":"openshift-authentication","name":"oauth-openshift","defaultHostname":"oauth-openshift.apps.sno.openstack.lab","consumingUsers":["system:serviceaccount:oauth-openshift:authentication-operator"],"currentHostnames":["oauth-openshift.apps.sno.openstack.lab"],"conditions":[{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-16T17:04:57Z","reason":"ErrorReachingOutToService","message":"unexpected error at oauth-openshift.apps.sno.openstack.lab: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:04:35Z","reason":"AsExpected","message":"All is well"}],"relatedObjects":[{"group":"route.openshift.io","resource":"routes","namespace":"openshift-authentication","name":"oauth-openshift"}]}],"defaultPlacement":"ControlPlane"}}config/authentication.json0000640000000000000000000000134315144650247014430 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"5c62b944-313b-4825-81fe-bae19af62452","resourceVersion":"11663","generation":2,"creationTimestamp":"2026-02-16T16:55:01Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f"}]},"spec":{"type":"","oauthMetadata":{"name":""},"webhookTokenAuthenticator":{"kubeConfig":{"name":"webhook-authentication-integrated-oauth"}},"serviceAccountIssuer":""},"status":{"integratedOAuthMetadata":{"name":"oauth-openshift"},"oidcClients":null}}config/pdbs/openshift-operator-lifecycle-manager/packageserver-pdb.json0000640000000000000000000000173615144650247025131 0ustar0000000000000000{"metadata":{"name":"packageserver-pdb","namespace":"openshift-operator-lifecycle-manager","uid":"41386aff-d308-4e12-ad7d-f438b319c08b","resourceVersion":"17221","generation":1,"creationTimestamp":"2026-02-16T16:55:16Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{"selector":{"matchLabels":{"app":"packageserver"}},"maxUnavailable":1},"status":{"observedGeneration":1,"disruptionsAllowed":1,"currentHealthy":1,"desiredHealthy":0,"expectedPods":1,"conditions":[{"type":"DisruptionAllowed","status":"True","observedGeneration":1,"lastTransitionTime":"2026-02-16T17:14:57Z","reason":"SufficientPods","message":""}]}}config/pdbs/openshift-console/downloads.json0000640000000000000000000000107115144650247017770 0ustar0000000000000000{"metadata":{"name":"downloads","namespace":"openshift-console","uid":"d32f7fae-5152-439c-bac0-11391178399f","resourceVersion":"16845","generation":1,"creationTimestamp":"2026-02-16T17:04:18Z"},"spec":{"selector":{"matchLabels":{"app":"console","component":"downloads"}},"maxUnavailable":1},"status":{"observedGeneration":1,"disruptionsAllowed":1,"currentHealthy":1,"desiredHealthy":0,"expectedPods":1,"conditions":[{"type":"DisruptionAllowed","status":"True","observedGeneration":1,"lastTransitionTime":"2026-02-16T17:14:45Z","reason":"SufficientPods","message":""}]}}config/pdbs/openshift-console/console.json0000640000000000000000000000106315144650247017441 0ustar0000000000000000{"metadata":{"name":"console","namespace":"openshift-console","uid":"dd9da217-498c-472d-99a1-a9270e39de12","resourceVersion":"14324","generation":1,"creationTimestamp":"2026-02-16T17:04:18Z"},"spec":{"selector":{"matchLabels":{"app":"console","component":"ui"}},"maxUnavailable":1},"status":{"observedGeneration":1,"disruptionsAllowed":0,"currentHealthy":0,"desiredHealthy":0,"expectedPods":1,"conditions":[{"type":"DisruptionAllowed","status":"False","observedGeneration":1,"lastTransitionTime":"2026-02-16T17:04:18Z","reason":"InsufficientPods","message":""}]}}config/clusteroperator/imageregistry.operator.openshift.io/imagepruner/cluster.json0000640000000000000000000000163115144650247027756 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"d83909f7-62ae-43a8-a4d6-76bdb82abdbb","resourceVersion":"6007","generation":1,"creationTimestamp":"2026-02-16T17:00:50Z"},"spec":{"schedule":"","suspend":false,"keepTagRevisions":3,"successfulJobsHistoryLimit":3,"failedJobsHistoryLimit":3,"ignoreInvalidImageReferences":true,"logLevel":"Normal"},"status":{"observedGeneration":1,"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:00:50Z","reason":"AsExpected","message":"Pruner CronJob has been created"},{"type":"Failed","status":"False","lastTransitionTime":"2026-02-16T17:00:50Z","reason":"Complete","message":"Pruner completed successfully"},{"type":"Scheduled","status":"True","lastTransitionTime":"2026-02-16T17:00:50Z","reason":"Scheduled","message":"The pruner job has been scheduled"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:00:50Z","reason":"AsExpected"}]}}config/oauth.json0000640000000000000000000000114415144650247012530 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"0a00c89a-07e1-4a36-81a9-8811c0e96f17","resourceVersion":"1542","generation":1,"creationTimestamp":"2026-02-16T16:55:14Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f"}]},"spec":{"tokenConfig":{},"templates":{"login":{"name":""},"providerSelection":{"name":""},"error":{"name":""}}},"status":{}}config/mutatingwebhookconfigurations/catalogd-mutating-webhook-configuration.json0000640000000000000000000000533615144650247027506 0ustar0000000000000000{"metadata":{"name":"catalogd-mutating-webhook-configuration","uid":"ba6091cf-5820-45b7-8e6c-1745523863a5","resourceVersion":"6101","generation":2,"creationTimestamp":"2026-02-16T17:00:51Z","annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"inject-metadata-name.olm.operatorframework.io","clientConfig":{"service":{"namespace":"openshift-catalogd","name":"catalogd-service","path":"/mutate-olm-operatorframework-io-v1-clustercatalog","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["olm.operatorframework.io"],"apiVersions":["v1"],"resources":["clustercatalogs"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"],"reinvocationPolicy":"Never","matchConditions":[{"name":"MissingOrIncorrectMetadataNameLabel","expression":"'name' in object.metadata \u0026\u0026 (!has(object.metadata.labels) || !('olm.operatorframework.io/metadata.name' in object.metadata.labels) || object.metadata.labels['olm.operatorframework.io/metadata.name'] != object.metadata.name)"}]}]}config/validatingwebhookconfigurations/prometheusrules.openshift.io.json0000640000000000000000000000511515144650247025740 0ustar0000000000000000{"metadata":{"name":"prometheusrules.openshift.io","uid":"3f84bf30-666a-4473-9e78-35e31771e3bb","resourceVersion":"13491","generation":2,"creationTimestamp":"2026-02-16T17:03:33Z","labels":{"app.kubernetes.io/component":"controller","app.kubernetes.io/managed-by":"cluster-monitoring-operator","app.kubernetes.io/name":"prometheus-operator","app.kubernetes.io/part-of":"openshift-monitoring"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"prometheusrules.openshift.io","clientConfig":{"service":{"namespace":"openshift-monitoring","name":"prometheus-operator-admission-webhook","path":"/admission-prometheusrules/validate","port":8443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["monitoring.coreos.com"],"apiVersions":["v1"],"resources":["prometheusrules"],"scope":"Namespaced"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":5,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/performance-addon-operator.json0000640000000000000000000000552115144650247025304 0ustar0000000000000000{"metadata":{"name":"performance-addon-operator","uid":"96069914-7ca4-49ea-bce6-cbc36431b39a","resourceVersion":"4525","generation":2,"creationTimestamp":"2026-02-16T16:55:25Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"webhooks":[{"name":"vwb.performance.openshift.io","clientConfig":{"service":{"namespace":"openshift-cluster-node-tuning-operator","name":"performance-addon-operator-service","path":"/validate-performance-openshift-io-v2-performanceprofile","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["performance.openshift.io"],"apiVersions":["v2"],"resources":["performanceprofiles"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/network-node-identity.openshift.io.json0000640000000000000000000001075515144650247026743 0ustar0000000000000000{"metadata":{"name":"network-node-identity.openshift.io","uid":"2492c35c-7a7b-47c3-82ec-3c5f9417422b","resourceVersion":"7215","generation":1,"creationTimestamp":"2026-02-16T17:01:08Z","ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"02592f7d-524d-4e79-96f9-b0fd3a82dc66","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"node.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/node","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["nodes/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"pod.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/pod","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["pods/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/multus.openshift.io.json0000640000000000000000000000506715144650247024031 0ustar0000000000000000{"metadata":{"name":"multus.openshift.io","uid":"51d5618e-d0a9-4754-ad82-2af47b19e6e5","resourceVersion":"4526","generation":2,"creationTimestamp":"2026-02-16T16:59:15Z","labels":{"app":"multus-admission-controller"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"02592f7d-524d-4e79-96f9-b0fd3a82dc66","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"multus-validating-config.k8s.io","clientConfig":{"service":{"namespace":"openshift-multus","name":"multus-admission-controller","path":"/validate","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["k8s.cni.cncf.io"],"apiVersions":["v1"],"resources":["network-attachment-definitions"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"NoneOnDryRun","timeoutSeconds":30,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io.json0000640000000000000000000000537215144650247030643 0ustar0000000000000000{"metadata":{"name":"controlplanemachineset.machine.openshift.io","uid":"9d59a756-c378-492a-81e6-91f7da32328c","resourceVersion":"9622","generation":2,"creationTimestamp":"2026-02-16T17:01:37Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"webhooks":[{"name":"controlplanemachineset.machine.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"control-plane-machine-set-operator","path":"/validate-machine-openshift-io-v1-controlplanemachineset","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["machine.openshift.io"],"apiVersions":["v1"],"resources":["controlplanemachinesets"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration.json0000640000000000000000000000500115144650247032114 0ustar0000000000000000{"metadata":{"name":"cluster-baremetal-validating-webhook-configuration","uid":"ea715f71-cbfe-4fd1-bc61-fd956b5e5ec7","resourceVersion":"9352","generation":2,"creationTimestamp":"2026-02-16T17:01:34Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"vprovisioning.kb.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-baremetal-webhook-service","path":"/validate-metal3-io-v1alpha1-provisioning","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["metal3.io"],"apiVersions":["v1alpha1"],"resources":["provisionings"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1","v1beta1"]}]}config/validatingwebhookconfigurations/autoscaling.openshift.io.json0000640000000000000000000001102615144650247025001 0ustar0000000000000000{"metadata":{"name":"autoscaling.openshift.io","uid":"1c3ba408-3aed-4618-946f-78f742554799","resourceVersion":"9360","generation":2,"creationTimestamp":"2026-02-16T17:01:34Z","labels":{"k8s-app":"cluster-autoscaler-operator"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"clusterautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-clusterautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1"],"resources":["clusterautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"machineautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-machineautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1beta1"],"resources":["machineautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io.json0000640000000000000000000000514315144650247026506 0ustar0000000000000000{"metadata":{"name":"alertmanagerconfigs.openshift.io","uid":"187b7739-1eb2-4137-a79e-722ef52e3494","resourceVersion":"13490","generation":2,"creationTimestamp":"2026-02-16T17:03:33Z","labels":{"app.kubernetes.io/component":"controller","app.kubernetes.io/managed-by":"cluster-monitoring-operator","app.kubernetes.io/name":"prometheus-operator","app.kubernetes.io/part-of":"openshift-monitoring"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"alertmanagerconfigs.openshift.io","clientConfig":{"service":{"namespace":"openshift-monitoring","name":"prometheus-operator-admission-webhook","path":"/admission-alertmanagerconfigs/validate","port":8443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["monitoring.coreos.com"],"apiVersions":["v1alpha1"],"resources":["alertmanagerconfigs"],"scope":"Namespaced"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":5,"admissionReviewVersions":["v1"]}]}config/namespaces_with_overlapping_uids.json0000640000000000000000000000000215144650247020204 0ustar0000000000000000[]config/featuregate.json0000640000000000000000000000613615144650247013712 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"bec1ce93-22b3-44df-98c4-b8d44cf6a666","resourceVersion":"644","generation":1,"creationTimestamp":"2026-02-16T16:54:50Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true"}},"spec":{},"status":{"featureGates":[{"version":"4.18.32","enabled":[{"name":"AWSEFSDriverVolumeMetrics"},{"name":"AdminNetworkPolicy"},{"name":"AlibabaPlatform"},{"name":"AzureWorkloadIdentity"},{"name":"BareMetalLoadBalancer"},{"name":"BuildCSIVolumes"},{"name":"ChunkSizeMiB"},{"name":"CloudDualStackNodeIPs"},{"name":"DisableKubeletCloudCredentialProviders"},{"name":"GCPLabelsTags"},{"name":"HardwareSpeed"},{"name":"IngressControllerLBSubnetsAWS"},{"name":"KMSv1"},{"name":"ManagedBootImages"},{"name":"ManagedBootImagesAWS"},{"name":"MultiArchInstallAWS"},{"name":"MultiArchInstallGCP"},{"name":"NetworkDiagnosticsConfig"},{"name":"NetworkLiveMigration"},{"name":"NetworkSegmentation"},{"name":"NewOLM"},{"name":"NodeDisruptionPolicy"},{"name":"OnClusterBuild"},{"name":"PersistentIPsForVirtualization"},{"name":"PrivateHostedZoneAWS"},{"name":"SetEIPForNLBIngressController"},{"name":"StreamingCollectionEncodingToJSON"},{"name":"StreamingCollectionEncodingToProtobuf"},{"name":"VSphereControlPlaneMachineSet"},{"name":"VSphereDriverConfiguration"},{"name":"VSphereMultiVCenters"},{"name":"VSphereStaticIPs"},{"name":"ValidatingAdmissionPolicy"}],"disabled":[{"name":"AWSClusterHostedDNS"},{"name":"AdditionalRoutingCapabilities"},{"name":"AutomatedEtcdBackup"},{"name":"BootcNodeManagement"},{"name":"CSIDriverSharedResource"},{"name":"ClusterAPIInstall"},{"name":"ClusterAPIInstallIBMCloud"},{"name":"ClusterMonitoringConfig"},{"name":"ConsolePluginContentSecurityPolicy"},{"name":"DNSNameResolver"},{"name":"DynamicResourceAllocation"},{"name":"EtcdBackendQuota"},{"name":"EventedPLEG"},{"name":"Example"},{"name":"ExternalOIDC"},{"name":"ExternalOIDCWithUIDAndExtraClaimMappings"},{"name":"GCPClusterHostedDNS"},{"name":"GatewayAPI"},{"name":"ImageStreamImportMode"},{"name":"IngressControllerDynamicConfigurationManager"},{"name":"InsightsConfig"},{"name":"InsightsConfigAPI"},{"name":"InsightsOnDemandDataGather"},{"name":"InsightsRuntimeExtractor"},{"name":"MachineAPIMigration"},{"name":"MachineAPIOperatorDisableMachineHealthCheckController"},{"name":"MachineAPIProviderOpenStack"},{"name":"MachineConfigNodes"},{"name":"MaxUnavailableStatefulSet"},{"name":"MetricsCollectionProfiles"},{"name":"MinimumKubeletVersion"},{"name":"MixedCPUsAllocation"},{"name":"MultiArchInstallAzure"},{"name":"NodeSwap"},{"name":"NutanixMultiSubnets"},{"name":"OVNObservability"},{"name":"OpenShiftPodSecurityAdmission"},{"name":"PinnedImages"},{"name":"PlatformOperators"},{"name":"ProcMountType"},{"name":"RouteAdvertisements"},{"name":"RouteExternalCertificate"},{"name":"ServiceAccountTokenNodeBinding"},{"name":"SignatureStores"},{"name":"SigstoreImageVerification"},{"name":"TranslateStreamCloseWebsocketRequests"},{"name":"UpgradeStatus"},{"name":"UserNamespacesPodSecurityStandards"},{"name":"UserNamespacesSupport"},{"name":"VSphereMultiNetworks"},{"name":"VolumeAttributesClass"},{"name":"VolumeGroupSnapshot"}]}]}}config/machinehealthchecks/openshift-machine-api/machine-api-termination-handler.json0000640000000000000000000000163315144650247027653 0ustar0000000000000000{"apiVersion":"machine.openshift.io/v1beta1","kind":"MachineHealthCheck","metadata":{"annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"creationTimestamp":"2026-02-16T17:03:54Z","generation":1,"labels":{"api":"clusterapi","k8s-app":"termination-handler"},"name":"machine-api-termination-handler","namespace":"openshift-machine-api","ownerReferences":[{"apiVersion":"config.openshift.io/v1","controller":true,"kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f"}],"resourceVersion":"11953","uid":"c7e802b8-d609-46e0-bfb0-6524c305770d"},"spec":{"maxUnhealthy":"100%","nodeStartupTimeout":"0","selector":{"matchLabels":{"machine.openshift.io/interruptible-instance":""}},"unhealthyConditions":[{"status":"True","timeout":"0s","type":"Terminating"}]}}config/apiserver.json0000640000000000000000000000121615144650247013410 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"5a70fcfa-5f0c-4b0b-bdc6-3e720ae1d787","resourceVersion":"727","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","oauth-apiserver.openshift.io/secure-token-storage":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f"}]},"spec":{"servingCerts":{},"clientCA":{"name":""},"encryption":{},"audit":{"profile":"Default"}},"status":{}}config/machineconfigpools/worker.json0000640000000000000000000001013515144650247016570 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-02-16T17:01:34Z","generation":3,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","pools.operator.machineconfiguration.openshift.io/worker":""},"name":"worker","resourceVersion":"13621","uid":"e7796f79-1f69-4cd6-a99d-2e90f692a258"},"spec":{"configuration":{"name":"rendered-worker-c7ccd6fb94dd6d087e4a528948c79fb2","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-worker"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-workers-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-ssh"}]},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"worker"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/worker":""}},"paused":false},"status":{"certExpirys":[{"bundle":"KubeAPIServerServingCAData","expiry":"2036-02-14T16:44:14Z","subject":"CN=admin-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-02-17T16:50:49Z","subject":"CN=kube-csr-signer_@1771261235"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-02-17T16:50:49Z","subject":"CN=kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-02-16T16:50:49Z","subject":"CN=kube-apiserver-to-kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-02-16T16:50:49Z","subject":"CN=kube-control-plane-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2036-02-14T16:50:47Z","subject":"CN=kubelet-bootstrap-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-02-16T17:00:20Z","subject":"CN=openshift-kube-apiserver-operator_node-system-admin-signer@1771261220"}],"conditions":[{"lastTransitionTime":"2026-02-16T17:04:47Z","message":"","reason":"","status":"False","type":"Updating"},{"lastTransitionTime":"2026-02-16T17:04:47Z","message":"","reason":"","status":"False","type":"NodeDegraded"},{"lastTransitionTime":"2026-02-16T17:04:47Z","message":"","reason":"","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-16T17:04:52Z","message":"","reason":"","status":"False","type":"RenderDegraded"},{"lastTransitionTime":"2026-02-16T17:04:47Z","message":"All nodes are updated with MachineConfig rendered-worker-c7ccd6fb94dd6d087e4a528948c79fb2","reason":"","status":"True","type":"Updated"}],"configuration":{"name":"rendered-worker-c7ccd6fb94dd6d087e4a528948c79fb2","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-worker"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-workers-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-ssh"}]},"degradedMachineCount":0,"machineCount":0,"observedGeneration":3,"readyMachineCount":0,"unavailableMachineCount":0,"updatedMachineCount":0}}config/machineconfigpools/master.json0000640000000000000000000000744315144650247016562 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-02-16T17:01:34Z","generation":4,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","operator.machineconfiguration.openshift.io/required-for-upgrade":"","pools.operator.machineconfiguration.openshift.io/master":""},"name":"master","resourceVersion":"13629","uid":"73e10899-7ee9-47b2-8cc6-a9ffda074267"},"spec":{"configuration":{"name":"rendered-master-ccc1c4b4035b8605635ebee7b29103f5","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-master"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-master-dnsmasq-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-masters-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-nable-iscsi"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-netifnames-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-lv-cinder-volumes"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-multipath-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-ssh"}]},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"master"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/master":""}},"paused":false},"status":{"certExpirys":[{"bundle":"KubeAPIServerServingCAData","expiry":"2036-02-14T16:44:14Z","subject":"CN=admin-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-02-17T16:50:49Z","subject":"CN=kube-csr-signer_@1771261235"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-02-17T16:50:49Z","subject":"CN=kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-02-16T16:50:49Z","subject":"CN=kube-apiserver-to-kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-02-16T16:50:49Z","subject":"CN=kube-control-plane-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2036-02-14T16:50:47Z","subject":"CN=kubelet-bootstrap-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-02-16T17:00:20Z","subject":"CN=openshift-kube-apiserver-operator_node-system-admin-signer@1771261220"}],"conditions":[{"lastTransitionTime":"2026-02-16T17:04:47Z","message":"","reason":"","status":"False","type":"Updated"},{"lastTransitionTime":"2026-02-16T17:04:47Z","message":"","reason":"","status":"False","type":"NodeDegraded"},{"lastTransitionTime":"2026-02-16T17:04:47Z","message":"","reason":"","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-16T17:04:52Z","message":"","reason":"","status":"False","type":"RenderDegraded"},{"lastTransitionTime":"2026-02-16T17:04:47Z","message":"All nodes are updating to MachineConfig rendered-master-4ff3bdc50d696d239efb12817ae47acf","reason":"","status":"True","type":"Updating"}],"configuration":{},"degradedMachineCount":0,"machineCount":1,"observedGeneration":3,"readyMachineCount":0,"unavailableMachineCount":0,"updatedMachineCount":0}}config/infrastructure.json0000640000000000000000000000106515144650247014472 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"6a0f538a-aaee-46c5-bb03-9291b6642603","resourceVersion":"537","generation":1,"creationTimestamp":"2026-02-16T16:54:28Z"},"spec":{"cloudConfig":{"name":""},"platformSpec":{"type":"None"}},"status":{"infrastructureName":"xxx-xxxxx","platform":"None","platformStatus":{"type":"None"},"etcdDiscoveryDomain":"","apiServerURL":"https://api.sno.openstack.lab:6443","apiServerInternalURI":"https://api-int.sno.openstack.lab:6443","controlPlaneTopology":"SingleReplica","infrastructureTopology":"SingleReplica","cpuPartitioning":"None"}}config/proxy.json0000640000000000000000000000031315144650247012566 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"96cb4a06-7538-4457-b58d-bf0c79cb7d11","resourceVersion":"554","generation":1,"creationTimestamp":"2026-02-16T16:54:30Z"},"spec":{"trustedCA":{"name":""}},"status":{}}config/image.json0000640000000000000000000000111715144650247012472 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"c68c9cd0-c997-40eb-8d81-0f6604b25bcb","resourceVersion":"1295","generation":1,"creationTimestamp":"2026-02-16T16:55:09Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f"}]},"spec":{"additionalTrustedCA":{"name":""},"registrySources":{},"imageStreamImportMode":""},"status":{}}config/schedulers/cluster.json0000640000000000000000000000052415144650247015233 0ustar0000000000000000{"kind":"Scheduler","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster","uid":"b3f4a23c-2ace-4235-a15c-7da79e1ac3f8","resourceVersion":"559","generation":1,"creationTimestamp":"2026-02-16T16:54:31Z"},"spec":{"policy":{"name":""},"profileCustomizations":{"dynamicResourceAllocation":""},"mastersSchedulable":true},"status":{}}events/openshift-machine-api.json0000640000000000000000000002672515144650247015633 0ustar0000000000000000{"items":[{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:01:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"machine-api-operator-tls\" : secret \"machine-api-operator-tls\" not found","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:02:20Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:02:20Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cert\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:02:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-vkqml\" : [failed to fetch token: Post \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-machine-api/serviceaccounts/machine-api-operator/token\": dial tcp 192.168.32.10:6443: connect: connection refused, failed to sync configmap cache: timed out waiting for the condition]","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:02:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-tbq2b\" : [failed to fetch token: Post \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-machine-api/serviceaccounts/cluster-autoscaler-operator/token\": dial tcp 192.168.32.10:6443: connect: connection refused, failed to sync configmap cache: timed out waiting for the condition]","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:02:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-dzpnw\" : [failed to fetch token: Post \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-machine-api/serviceaccounts/control-plane-machine-set-operator/token\": dial tcp 192.168.32.10:6443: connect: connection refused, failed to sync configmap cache: timed out waiting for the condition]","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:02:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-hh2cd\" : [failed to fetch token: Post \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-machine-api/serviceaccounts/cluster-baremetal-operator/token\": dial tcp 192.168.32.10:6443: connect: connection refused, failed to sync configmap cache: timed out waiting for the condition]","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"images\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"control-plane-machine-set-operator-tls\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"images\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"auth-proxy-config\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"machine-api-operator-tls\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cert\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cluster-baremetal-operator-tls\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:15Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:15Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:16Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:16Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:23Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-hh2cd\" : [object \"openshift-machine-api\"/\"kube-root-ca.crt\" not registered, object \"openshift-machine-api\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:23Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"images\" : object \"openshift-machine-api\"/\"cluster-baremetal-operator-images\" not registered","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:23Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cert\" : object \"openshift-machine-api\"/\"cluster-baremetal-webhook-server-cert\" not registered","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:23Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : object \"openshift-machine-api\"/\"baremetal-kube-rbac-proxy\" not registered","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:25Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"images\" : object \"openshift-machine-api\"/\"machine-api-operator-images\" not registered","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : object \"openshift-machine-api\"/\"kube-rbac-proxy\" not registered","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cluster-baremetal-operator-tls\" : object \"openshift-machine-api\"/\"cluster-baremetal-operator-tls\" not registered","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:27Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"machine-api-operator-tls\" : object \"openshift-machine-api\"/\"machine-api-operator-tls\" not registered","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-vkqml\" : [object \"openshift-machine-api\"/\"kube-root-ca.crt\" not registered, object \"openshift-machine-api\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-dzpnw\" : [object \"openshift-machine-api\"/\"kube-root-ca.crt\" not registered, object \"openshift-machine-api\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:28Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-tbq2b\" : [object \"openshift-machine-api\"/\"kube-root-ca.crt\" not registered, object \"openshift-machine-api\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:33Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:33Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:35Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"control-plane-machine-set-operator-tls\" : object \"openshift-machine-api\"/\"control-plane-machine-set-operator-tls\" not registered","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:35Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"auth-proxy-config\" : object \"openshift-machine-api\"/\"kube-rbac-proxy-cluster-autoscaler-operator\" not registered","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:35Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cert\" : object \"openshift-machine-api\"/\"cluster-autoscaler-operator-cert\" not registered","type":"Warning"}]}config/network.json0000640000000000000000000000117015144650247013100 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"a1431426-a318-4303-a4ad-4558aff6d73c","resourceVersion":"3172","generation":2,"creationTimestamp":"2026-02-16T16:54:30Z"},"spec":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","externalIP":{"policy":{}},"networkDiagnostics":{"mode":"","sourcePlacement":{"nodeSelector":null,"tolerations":null},"targetPlacement":{"nodeSelector":null,"tolerations":null}}},"status":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","clusterNetworkMTU":8900}}