insights-operator/gathers.json0000640000000000000000000003033515144651410015256 0ustar0000000000000000{"status_reports":[{"name":"clusterconfig/authentication","duration_in_ms":18,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_controlplanes","duration_in_ms":28,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_datahubs","duration_in_ms":26,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"workloads","duration_in_ms":7163,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"conditional/conditional_gatherer_rules","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/tsdb_status","duration_in_ms":30,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/api/v1/status/tsdb\": dial tcp 172.30.27.129:9091: connect: connection refused"],"warnings":null,"panic":null},{"name":"clusterconfig/dvo_metrics","duration_in_ms":29,"records_count":0,"errors":null,"warnings":["warning: no service found with label selector name=deployment-validation-operator"],"panic":null},{"name":"clusterconfig/openstack_dataplanenodesets","duration_in_ms":31,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_configs","duration_in_ms":129,"records_count":4,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/service_accounts","duration_in_ms":12604,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig","duration_in_ms":14859,"records_count":146,"errors":["function \"pod_network_connectivity_checks\" failed with an error","function \"tsdb_status\" failed with an error","function \"metrics\" failed with an error","function \"support_secret\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-machine-config-operator/machine-config-daemon-98q6v.json\""],"warnings":null,"panic":null},{"name":"clusterconfig/storage_classes","duration_in_ms":32,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_machine_api_events","duration_in_ms":47,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/aggregated_monitoring_cr_names","duration_in_ms":61,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/node_logs","duration_in_ms":168,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"conditional/remote_configuration","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"conditional/rapid_container_logs","duration_in_ms":0,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"conditional","duration_in_ms":1617,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pod_network_connectivity_checks","duration_in_ms":6,"records_count":0,"errors":["the server could not find the requested resource (get podnetworkconnectivitychecks.controlplane.operator.openshift.io)"],"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkstates","duration_in_ms":20,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image","duration_in_ms":28,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_healthchecks","duration_in_ms":29,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ceph_cluster","duration_in_ms":30,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cluster_apiserver","duration_in_ms":17,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/jaegers","duration_in_ms":6,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_registries","duration_in_ms":32,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/lokistack","duration_in_ms":10,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanedeployments","duration_in_ms":19,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/schedulers","duration_in_ms":26,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/olm_operators","duration_in_ms":32,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_runtime_configs","duration_in_ms":33,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/certificate_signing_requests","duration_in_ms":37,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/crds","duration_in_ms":61,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_pods","duration_in_ms":45,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/overlapping_namespace_uids","duration_in_ms":47,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"workloads/helmchart_info","duration_in_ms":18,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_images","duration_in_ms":79,"records_count":5,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_config","duration_in_ms":17,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkconfigurationpolicies","duration_in_ms":17,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/networks","duration_in_ms":26,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_logging","duration_in_ms":28,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/metrics","duration_in_ms":27,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/federate?match%5B%5D=cluster_installer\u0026match%5B%5D=namespace%3Acontainer_cpu_usage%3Asum\u0026match%5B%5D=namespace%3Acontainer_memory_usage_bytes%3Asum\u0026match%5B%5D=vsphere_node_hw_version_total\u0026match%5B%5D=virt_platform\u0026match%5B%5D=console_helm_installs_total\u0026match%5B%5D=console_helm_upgrades_total\u0026match%5B%5D=console_helm_uninstalls_total\u0026match%5B%5D=openshift_apps_deploymentconfigs_strategy_total\u0026match%5B%5D=etcd_server_slow_apply_total\u0026match%5B%5D=etcd_server_slow_read_indexes_total\u0026match%5B%5D=haproxy_exporter_server_threshold\": dial tcp 172.30.27.129:9091: connect: connection refused"],"warnings":null,"panic":null},{"name":"clusterconfig/number_of_pods_and_netnamespaces_with_sdn_annotations","duration_in_ms":72,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/version","duration_in_ms":71,"records_count":4,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/silenced_alerts","duration_in_ms":1092,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_cluster","duration_in_ms":20,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cost_management_metrics_configs","duration_in_ms":30,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/monitoring_persistent_volumes","duration_in_ms":33,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/clusterroles","duration_in_ms":47,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/install_plans","duration_in_ms":11830,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators_pods_and_events","duration_in_ms":14854,"records_count":50,"errors":["the record with the same name \"config/pod/openshift-machine-config-operator/machine-config-daemon-98q6v.json\" was already recorded and had the fingerprint \"c9dea30d945dbe5739bd92e0b48c625d1b776c69259478fcd8c4b1929bef86c3\", overwriting with the record having fingerprint \"c9dea30d945dbe5739bd92e0b48c625d1b776c69259478fcd8c4b1929bef86c3\""],"warnings":["warning: the record with the same fingerprint \"c9dea30d945dbe5739bd92e0b48c625d1b776c69259478fcd8c4b1929bef86c3\" was already recorded at path \"config/pod/openshift-machine-config-operator/machine-config-daemon-98q6v.json\", recording another one with a different path \"config/pod/openshift-machine-config-operator/machine-config-daemon-98q6v.json\""],"panic":null},{"name":"workloads/workload_info","duration_in_ms":7163,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/oauths","duration_in_ms":28,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/feature_gates","duration_in_ms":28,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_autoscalers","duration_in_ms":35,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_pruners","duration_in_ms":23,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/proxies","duration_in_ms":26,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress","duration_in_ms":26,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machines","duration_in_ms":32,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_config_pools","duration_in_ms":29,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators","duration_in_ms":78,"records_count":34,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/active_alerts","duration_in_ms":1092,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_version","duration_in_ms":32,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/infrastructures","duration_in_ms":31,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pdbs","duration_in_ms":32,"records_count":3,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress_certificates","duration_in_ms":71,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/config_maps","duration_in_ms":75,"records_count":9,"errors":["configmaps \"cluster-monitoring-config\" not found","configmaps \"gateway-mode-config\" not found","configmaps \"insights-config\" not found"],"warnings":["warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt\""],"panic":null},{"name":"clusterconfig/qemu_kubevirt_launcher_logs","duration_in_ms":23,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodes","duration_in_ms":26,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/support_secret","duration_in_ms":28,"records_count":0,"errors":["secrets \"support\" not found"],"warnings":null,"panic":null},{"name":"clusterconfig/validating_webhook_configurations","duration_in_ms":30,"records_count":8,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/mutating_webhook_configurations","duration_in_ms":33,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_sets","duration_in_ms":33,"records_count":0,"errors":null,"warnings":null,"panic":null}],"container_memory_bytes_usage":0,"uptime_seconds":45.328,"is_global_obfuscation_enabled":false}insights-operator/remote-configuration.json0000640000000000000000000000443515144651410017763 0ustar0000000000000000{"conditional_gathering_rules":[{"conditions":[{"alert":{"name":"APIRemovedInNextEUSReleaseInUse"},"type":"alert_is_firing"}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedReload"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedToSendAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"KubePodCrashLooping"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","previous":true,"tail_lines":20}}},{"conditions":[{"alert":{"name":"KubePodNotReady"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},{"conditions":[{"alert":{"name":"PrometheusOperatorSyncFailed"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},{"conditions":[{"alert":{"name":"PrometheusRemoteStorageFailures"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},{"conditions":[{"alert":{"name":"PrometheusTargetSyncFailure"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},{"conditions":[{"alert":{"name":"SamplesImagestreamImportFailing"},"type":"alert_is_firing"}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},{"conditions":[{"alert":{"name":"ThanosRuleQueueIsDroppingAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}}],"container_logs":[],"version":"1.2.0"}insights-operator/conditional-gatherer-rules.json0000640000000000000000000000542715144651410021057 0ustar0000000000000000{"version":"1.2.0","conditional_gathering_rules":[{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"APIRemovedInNextEUSReleaseInUse"}}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},"errors":null,"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedReload"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},"errors":null,"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedToSendAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},"errors":null,"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodCrashLooping"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","tail_lines":20,"previous":true}}},"errors":null,"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodNotReady"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},"errors":null,"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusOperatorSyncFailed"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},"errors":null,"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusRemoteStorageFailures"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},"errors":null,"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusTargetSyncFailure"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},"errors":null,"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"SamplesImagestreamImportFailing"}}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},"errors":null,"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"ThanosRuleQueueIsDroppingAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}},"errors":null,"was_triggered":false}],"endpoint":"https://console.redhat.com/api/gathering/v2/%s/gathering_rules"}config/workload_info.json0000640000000000000000000007147115144651406014255 0ustar0000000000000000{"pods":98,"imageCount":81,"images":{"sha256:7fccb6e19eb4caa16d32f4cf59670c2c741c98b099d1f12368b85aab3f84dc38":{"layerIDs":["sha256:25c75c34b2e2b68ba9245d9cddeb6b8a0887371ed30744064f85241a75704d87","sha256:5db9d3c7522cb0241efc32b4a5c491fdb139b96474578f1985f482a9077a3e8d","sha256:82157bdf6907bbf6a007b19e81e9dcc93ebed443c6d0503551f1976dfab322f0","sha256:e3b9612ef6081de5970c4ba06dc5f385e23706531f6b26f1fc3a68ced95e34a5","sha256:5fa101da323015348e14453e63007cb8fc20061749b0e13f106d12d5d0224bbf"],"repository":"B4CqNeqYE-Zb"},"sha256:e155421620a4ac28a759265f53059b75308fdd1491caeba6a9a34d2fbeab4954":{"layerIDs":["sha256:25c75c34b2e2b68ba9245d9cddeb6b8a0887371ed30744064f85241a75704d87","sha256:5db9d3c7522cb0241efc32b4a5c491fdb139b96474578f1985f482a9077a3e8d","sha256:82157bdf6907bbf6a007b19e81e9dcc93ebed443c6d0503551f1976dfab322f0","sha256:e3b9612ef6081de5970c4ba06dc5f385e23706531f6b26f1fc3a68ced95e34a5"],"repository":"0bgxbrCzyCJo"}},"namespaces":{"0LiT6ZNtbpYL":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:fe683caef773a1963fc13f96afe58892563ea9921db8ac39369e3a9a05ea7181","firstCommand":"N9KxLV2avCo2","firstArg":"BuLIUMMJnyP_"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:bfc52d6ca96f377d53757dc437ca720e860e3e016d16c084bd5f6f2e337d3a1d","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:e786e28fbe0b95c4f5723bebc3abde1333b259fd26673716fc5638d88286d8b7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:5c38d58b62290b59d0182b50ce3cfd87fbb7729f3ce6fc06ffa46d9805c7dd78","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:15c5e645edf257a08c061ad9ae7dab4293104a042b8396181d76dd28f396cebe","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:df623c15a78ca969fb8ad134bde911c2047bf82b50244ee8e523763b6587e072","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:df623c15a78ca969fb8ad134bde911c2047bf82b50244ee8e523763b6587e072","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:fe683caef773a1963fc13f96afe58892563ea9921db8ac39369e3a9a05ea7181","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:bbe162375a11ed3810a1081c30dd400f461f2421d5f1e27d8792048bbd216956","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:80531a0fe966e1cc0582c581951b09a7a4e42037c106748c44859110361b2c1b","firstCommand":"FC0eu9ID58Bm","firstArg":"47DEQpj8HBSa"}]}]},"0h5ohwdJx4S5":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:ae30b3ab740f21c451d0272bceacb99fa34d22bbf2ea22f1e1e18230a156104b","firstCommand":"buSkac1OkQU4","firstArg":"XV1E-c-gSQmZ"}]}]},"2IqVYeidVUxV":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:9cc42212fb15c1f3e6a88acaaa4919c9693be3c6099ea849d28855e231dc9e44","firstCommand":"po5yju59c7HJ"}],"containers":[{"imageID":"sha256:2431778975829348e271dc9bf123c7a24c81a52537a61414cd17c8436436078b","firstCommand":"UcO4la9rqCTe"}]}]},"43Xz0HbE9FHX":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:2b4063aefbb56035efcf6afc17079b35aab0a5cb6975753fbf6e10285b3b7ebe","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:aca57c8abaa83b2d1dce95fa7fe5b9416be70e100957ce48f212e2ec404387bc","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:06dcb25b4ae74ef159663cc2318f84e4665c7889b38ed62940259e5edd2b576f","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:aca57c8abaa83b2d1dce95fa7fe5b9416be70e100957ce48f212e2ec404387bc","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:dab7a82d88f90f1ef4ac307b16132d4d573a4fa9080acc3272ca084613bd902a","firstCommand":"4MEQ8E7-fUvu","firstArg":"mDEjdpyJDBZ4"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:28df36269fc553eb1adba5566d6dfc258a1a74063c4cfe8b5bdd3f202591cf56","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:aca57c8abaa83b2d1dce95fa7fe5b9416be70e100957ce48f212e2ec404387bc","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:3e2f869b1c4f98a628b2e54c1516a0d0c09c760c91e0e1a940cb76149217661b","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:aca57c8abaa83b2d1dce95fa7fe5b9416be70e100957ce48f212e2ec404387bc","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]}]},"47HAKWqp7-jn":{"count":3,"terminalCount":2,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","firstCommand":"N9KxLV2avCo2"}]}]},"4k7XyKW2A17e":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","firstCommand":"930btY2ohuPL","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","firstCommand":"aC8iSHmKHojh","firstArg":"r7zEsGNvlNrk"},{"imageID":"sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","firstCommand":"WFJEBSInAJpw","firstArg":"5gS4z5mOnDuY"},{"imageID":"sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"}]}]},"5fn-sCitjq6a":{"count":3,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:a90d19460fbc705172df7759a3da394930623c6b6974620b79ffa07bab53c51f","firstCommand":"HgS-rIunFHfD","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:a26b20d3ef7b75aeb05acf9be2702f9d478822c43f679ff578811843692b960c","firstArg":"ESRPWfqdsWE1"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:13d06502c0f0a3c73f69bf8d0743718f7cfc46e71f4a12916517ad7e9bff17e1","firstArg":"zO0oxtw_mcI5"}]}]},"5oRWKKS3566n":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:2969828f1fcae82b7ef16d3588046ace3cf51b9ea578658c42475386e0ee1fc7","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"6KbiDGNUd_ub":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"}]}]},"6bLpdRMvgXVP":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:240701090a5f8e40d4b88fa200cf63dffb11a8e2eae713cf3c629b016c2823b0","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"},{"imageID":"sha256:240701090a5f8e40d4b88fa200cf63dffb11a8e2eae713cf3c629b016c2823b0","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]}]},"9dJB3pvMrhr8":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:0871b6c16b38a2eda5d1c89fd75079aff0775224307e940557e6fda6ba229f38","firstCommand":"51QuNwyM-xYf","firstArg":"r7zEsGNvlNrk"}]}]},"AN3N38xANElq":{"count":1,"terminalCount":1,"shapes":[]},"B7nVq7vdWfmk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:a913cef121c9a6c3ddc57b01fc807bb042e5a903489c05f99e6e2da9e6ec0b98","firstCommand":"icTsn2s_EIax"}]}]},"CMkFy_B6OMUO":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5abe992def861ec075251ae17bbd66fa23bd05bd3701953c0fdcf68a8d161f1e","firstCommand":"7aQQEh6Tr2m7","firstArg":"r7zEsGNvlNrk"}]}]},"C_9an18W0cU6":{"count":6,"terminalCount":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"ZS9VAWJDvxuf","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"ArvlNzaZtYpC","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"PPJ_dAh1Wl4S","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"5-ZY-7KtGiOe"}]}]},"EOB8Fqt74gVH":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1faa2081a881db884a86bdfe33fcb6a6af1d14c3e9ee5c44dfe4b09045684e13","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"}]}]},"EyQn00UhCg7z":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e","firstCommand":"bsRjeCtd7lVU","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e","firstCommand":"ZDrZSWYe4Hpn"}]}]},"F-y2qosZEzxd":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5abe992def861ec075251ae17bbd66fa23bd05bd3701953c0fdcf68a8d161f1e","firstCommand":"7aQQEh6Tr2m7","firstArg":"gcNszUTvGLqr"}]}]},"ICyEPw5KVYuy":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8ea13b0cbfe9be0d3d7ea80d50e512af6a453921a553c7c79b566530142b611b","firstCommand":"ijLlFtdBW-Uk","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:e155421620a4ac28a759265f53059b75308fdd1491caeba6a9a34d2fbeab4954","firstCommand":"N9KxLV2avCo2"}]}]},"KETRwZOPBpF9":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:3bb3c46533b24f1a6a6669117dc888ed8f0c7ae56b34068a4ff2052335e34c4e","firstCommand":"buSkac1OkQU4","firstArg":"47DEQpj8HBSa"}]}]},"Kt0qS5G8piJp":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:e3d21c51712e6e0cdd9c776479f6d1ab55bc1085df5bb5f583e69ee192d11fd3","firstCommand":"9RqZYN0XQJuD"}]}]},"LBp1kjMRhgCD":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"M9RntwZOZgi3":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:95e7647e6fda21b94b692f03908e4cd154e3374fca0560229c646fefe2c46730","firstCommand":"k9iHTIyG8PyJ","firstArg":"r7zEsGNvlNrk"}]}]},"MBms5agiSYKb":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d6ab8803bac3ebada13e90d9dd6208301b981488277cdeb847c25ff8002f5a30","firstArg":"zO0oxtw_mcI5"}]}]},"N3z7Gdl4s2xN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:e1c8b9784a60860a08bd47935f0767b7b7f8f36c5c0adb7623a31b82c01d4c09","firstCommand":"vLhjmt4GJVrQ"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"47DEQpj8HBSa"}]}]},"NJ5StnkN7lNJ":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:56dffbd86bfae06921432678caf184b335bf2fc6ac7ee128f48aee396d57ea55","firstCommand":"euUHIZmT1r6w","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:56dffbd86bfae06921432678caf184b335bf2fc6ac7ee128f48aee396d57ea55","firstCommand":"euUHIZmT1r6w"}]}]},"NuNApgGLWU3S":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:0e446723bbab96c4e4662ff058d5eccba72d0c36d26c7b8b3f07183fa49d3ab9","firstCommand":"loDbMsNsNHAN"},{"imageID":"sha256:0e446723bbab96c4e4662ff058d5eccba72d0c36d26c7b8b3f07183fa49d3ab9","firstCommand":"BWdk-C4p4WVi","firstArg":"ov8ZFLf4OaCu"}]}]},"QRCRK87Nh9-g":{"count":4,"terminalCount":3,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","firstCommand":"930btY2ohuPL","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","firstCommand":"N9KxLV2avCo2","firstArg":"OOfnAGgDw729"},{"imageID":"sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","firstCommand":"VvlllczXFX2z","firstArg":"5gS4z5mOnDuY"},{"imageID":"sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","firstCommand":"VvlllczXFX2z","firstArg":"5gS4z5mOnDuY"},{"imageID":"sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","firstCommand":"VvlllczXFX2z","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","firstCommand":"VvlllczXFX2z","firstArg":"Yfg8wToYnj2U"}]}]},"QhwI_DkC7RkW":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"}],"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"}]}]},"RGIC92MKxXzi":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:1e7ac69aff2f28f6b3cbdb166c7dac7a3490167bcd670cd7057bdde1e1e7684d","firstCommand":"RxKEaTc90uWM","firstArg":"r7zEsGNvlNrk"}]}]},"WPOX0dN4tqDv":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:e3d21c51712e6e0cdd9c776479f6d1ab55bc1085df5bb5f583e69ee192d11fd3","firstCommand":"9RqZYN0XQJuD"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"47DEQpj8HBSa"}]}]},"XStfgPOmHYzB":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:e391fce0b2e04f22fc089597db9e0671ba7f8b5b3a709151b5f33dd23b262144","firstCommand":"AiycEq1CClLy","firstArg":"r7zEsGNvlNrk"}]}]},"YgQZCjyI6D9c":{"count":1,"terminalCount":1,"shapes":[]},"cMIdS73ad1cT":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","firstCommand":"09D_XsQaIohy","firstArg":"r7zEsGNvlNrk"}]}]},"cWNZj9dm5f4i":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","firstCommand":"WFJEBSInAJpw","firstArg":"r7zEsGNvlNrk"}]}]},"coRkJ8lvmtSk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb"}]}]},"de1zmznD1F_L":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:f353131d8a1223db7f637c9851016b3a348d80c2b2be663a2db6d01e14ddca88","firstCommand":"rb3iLnl9GmZR","firstArg":"r7zEsGNvlNrk"}]}]},"eCjF12pGOLUF":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:9f2b80358f029728d7f4ce46418bb6859d9ea7365de7b6f97a5f549ed6e77471","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:9f2b80358f029728d7f4ce46418bb6859d9ea7365de7b6f97a5f549ed6e77471","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"}]}]},"ecUe5cl6bPwX":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:bd8adea550cbbaf16cb9409b31ec8b997320d247f9f30c80608ac1fbf9c7a07e","firstCommand":"pgaYl1gqTV2L","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:7b8fb1f11df51c131f5be8ddfc1b1c95ac13481f58d2dcd5a465a4a8341c0f49","firstCommand":"kwBOP3_4oVMx","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:47c1d88223ffb35bb36a4d2bde736fb3e45f08e204519387e0e52e3e3dc00cfb","firstCommand":"buSkac1OkQU4","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:fa28b66298c8b34f2c7b357b012e663e3954cfc7c85aa1e44651a79aeaf8b2a9","firstCommand":"Tt12uskXp-TN","firstArg":"zO0oxtw_mcI5"}]}]},"iAB_cGZtvYGo":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5d54bd262ca625a326b01ea2bfd33db10a402c05590e6b710b0959712e1bf30b","firstCommand":"zT6_GoC4_8OY","firstArg":"r7zEsGNvlNrk"},{"imageID":"sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","firstCommand":"aC8iSHmKHojh","firstArg":"eE7ekwlit3Mq"}]}]},"inQbBSWydCWk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"ioFx0itCFPcs":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:3bb3c46533b24f1a6a6669117dc888ed8f0c7ae56b34068a4ff2052335e34c4e","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:ae30b3ab740f21c451d0272bceacb99fa34d22bbf2ea22f1e1e18230a156104b","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"}],"containers":[{"imageID":"sha256:333e6572029953b4c4676076f0991ee6e5c7d28cbe2887c71b1682f19831d8a1","firstCommand":"bFMn8sKmxXTo","firstArg":"zO0oxtw_mcI5"}]}]},"jmuesrd3LOV1":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","firstCommand":"aDHd4M_0XUOd","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","firstCommand":"wCdwTcAdXQ_H","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","firstCommand":"jXkiIgNfKeEy","firstArg":"zO0oxtw_mcI5"}]}]},"k2lPYOlQaXUX":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:6dd544a8a6b4d08fe0f4fd076109c09cf181302ab6056ec6b2b89d68a52954c5","firstCommand":"XqE_QmN1P920","firstArg":"r7zEsGNvlNrk"}]}]},"n8ih8iFf25K7":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:e155421620a4ac28a759265f53059b75308fdd1491caeba6a9a34d2fbeab4954","firstCommand":"CX8KiHZjJyVD"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e","firstCommand":"N9KxLV2avCo2"}]}]},"nMMaB9HQd060":{"count":12,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:52ba78768a24efe94f7f95fe5bdd3c6156919979d5882682e06ae4a8a8d3fb4a","firstCommand":"NJuOSOguFZRT","firstArg":"3NvCs-dGLEBM"}],"containers":[{"imageID":"sha256:f22dd40cd10354e3512d2065a8dd8c9dcb995ea487c0f661f172c527509123fc","firstArg":"rDQv7paSi7RY"},{"imageID":"sha256:52ba78768a24efe94f7f95fe5bdd3c6156919979d5882682e06ae4a8a8d3fb4a","firstCommand":"NJuOSOguFZRT","firstArg":"nw1jEXz0CN6o"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:abf98e8b78df5cf21c9da051db2827b8c9081cf3ea201bf9017a5d9548dbc73e","firstArg":"TIre9pmD-tbd"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:0100b616991bd8bca68d583e902283aa4cc0d388046437d5d68407190e3fb041","firstArg":"aZFPdeh8u0QY"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:9e96b53e74d1b802c2e63544e4689c9d262e9c996902c6e8a7f3ca34b23fdd50","firstArg":"5wzTZA9Ffwb3"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:c1a0aba9ead3a33353dc8a033699dfa4795f4050516677dad6ed4ac664094692","firstArg":"P0uRYWPWnbxt"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:aaa92509b71c898caed43ac2b5d3b3fc44fff333855789eb1d7df15f08e91ea3","firstCommand":"K8aRMFBO_jyE","firstArg":"vWfRLhDFJlMA"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:a64a70eb2fef4095ba241021e37c52034c067c57121d6c588f8c7fd3dc24b55f","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:a64a70eb2fef4095ba241021e37c52034c067c57121d6c588f8c7fd3dc24b55f","firstCommand":"icTsn2s_EIax","firstArg":"SCcKjYHEPDKM"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:3f08586dd67c2d3d21053a044138f1bbedceb0847f1af8c3aa76127d86135a58","firstArg":"5wzTZA9Ffwb3"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:52ba78768a24efe94f7f95fe5bdd3c6156919979d5882682e06ae4a8a8d3fb4a","firstCommand":"NJuOSOguFZRT","firstArg":"3NvCs-dGLEBM"}],"containers":[{"imageID":"sha256:52ba78768a24efe94f7f95fe5bdd3c6156919979d5882682e06ae4a8a8d3fb4a","firstCommand":"NJuOSOguFZRT","firstArg":"nw1jEXz0CN6o"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:e4d0e747f55d3f773a63180bc4e4820ee5f17efbd45eb1dac9167fbc7520650e","firstArg":"cteiHEtNKHn0"},{"imageID":"sha256:86d47b2746de823e60068255722d2c0f1ff9d327b2865071a4f2f1e08b1f4ee9","firstArg":"bItFNczIfxkG"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:19c3c8392b72ccf9a518d1d60fab0fd1e58a05b544caa79eb11bb68f00981d9d","firstArg":"e1V8mDIYJ-Es"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:99ad83497ea12819957ccba33c807c6e4c5297621db568e5635202cb9cc69f8f","firstArg":"Sr6QxZ9vlnXv"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:52ba78768a24efe94f7f95fe5bdd3c6156919979d5882682e06ae4a8a8d3fb4a","firstArg":"ZaBBgxOjhLhc"},{"imageID":"sha256:9899b0f08b1202d149e16f09616ee7b8f37e3cda642386d93a6d3f63d72a316b","firstCommand":"oudKofjVo8ML"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:abf98e8b78df5cf21c9da051db2827b8c9081cf3ea201bf9017a5d9548dbc73e","firstArg":"TIre9pmD-tbd"},{"imageID":"sha256:86d47b2746de823e60068255722d2c0f1ff9d327b2865071a4f2f1e08b1f4ee9","firstArg":"qLdxkguDGeRy"}]}]},"nO8YkKLJMsaW":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:b41a8ae60c0eafa4a13e6dcd0e79ba63b0d7bd2bdc28aaed434b3bef98a5dc95","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:b41a8ae60c0eafa4a13e6dcd0e79ba63b0d7bd2bdc28aaed434b3bef98a5dc95","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","firstCommand":"VvlllczXFX2z","firstArg":"47DEQpj8HBSa"}]}]},"nTf6g7hF1YMN":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cc03f91dbf08df9907c0ebad30c54a7fa92285b19ec4e440ed762b197378a861","firstArg":"8DZ1gO9Xqn6d"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:fc2817e5b16d83dac91d1a274fb93521165953e9bdc28f3073b127eacc5a534e","firstCommand":"icTsn2s_EIax"}]}]},"oNeg9VIL3k3N":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:f122c11c2f6a10ca150b136f7291d2e135b3a182d67809aa49727da289787cee","firstCommand":"oNeg9VIL3k3N","firstArg":"r7zEsGNvlNrk"}]}]},"p1tmSwFC_Q2L":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c8164cc9e16e8be9ea18be73c9df5041af326ed6b3059faff08f76e568cf4dc2","firstCommand":"F_KbBzFD2M2X"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:7fccb6e19eb4caa16d32f4cf59670c2c741c98b099d1f12368b85aab3f84dc38","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"}]}]},"pepxDbsB4SPa":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","firstCommand":"VvlllczXFX2z","firstArg":"r7zEsGNvlNrk"}]}]},"q1TpN3EUiKjG":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","firstCommand":"FATPL2W-sitV","firstArg":"r7zEsGNvlNrk"}]}]},"vDGHaQt8x6K_":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","firstArg":"zO0oxtw_mcI5"}]}]}}}machine-config-server_current.log0000640000000000000000000003063115144651377034450 0ustar0000000000000000config/pod/openshift-machine-config-operator/logs/machine-config-server-2ws9r2026-02-16T17:24:05.216562478Z I0216 17:24:05.215967 1 start.go:40] Version: bc9f50bf (0b0569287da3daea19bf47aa298037ccb4cbff98) 2026-02-16T17:24:05.285871908Z W0216 17:24:05.285751 1 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.ConfigMap: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-machine-config-operator/configmaps?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2026-02-16T17:24:05.285935540Z W0216 17:24:05.285871 1 reflector.go:561] github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: failed to list *v1.MachineConfigPool: Get "https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigpools?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2026-02-16T17:24:05.285935540Z W0216 17:24:05.285887 1 reflector.go:561] github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: failed to list *v1.MachineConfig: Get "https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigs?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2026-02-16T17:24:05.286078364Z W0216 17:24:05.286021 1 reflector.go:561] github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: failed to list *v1.ControllerConfig: Get "https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/controllerconfigs?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2026-02-16T17:24:05.288583720Z E0216 17:24:05.288266 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-machine-config-operator/configmaps?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2026-02-16T17:24:05.288583720Z E0216 17:24:05.288287 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: Failed to watch *v1.MachineConfigPool: failed to list *v1.MachineConfigPool: Get \"https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigpools?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2026-02-16T17:24:05.288583720Z E0216 17:24:05.288301 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: Failed to watch *v1.MachineConfig: failed to list *v1.MachineConfig: Get \"https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigs?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2026-02-16T17:24:05.288583720Z E0216 17:24:05.288312 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: Failed to watch *v1.ControllerConfig: failed to list *v1.ControllerConfig: Get \"https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/controllerconfigs?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2026-02-16T17:24:06.282368327Z W0216 17:24:06.282311 1 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.ConfigMap: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-machine-config-operator/configmaps?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2026-02-16T17:24:06.282399688Z E0216 17:24:06.282373 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-machine-config-operator/configmaps?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2026-02-16T17:24:06.357678767Z W0216 17:24:06.357560 1 reflector.go:561] github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: failed to list *v1.MachineConfigPool: Get "https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigpools?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2026-02-16T17:24:06.357678767Z E0216 17:24:06.357636 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: Failed to watch *v1.MachineConfigPool: failed to list *v1.MachineConfigPool: Get \"https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigpools?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2026-02-16T17:24:06.586575575Z W0216 17:24:06.586447 1 reflector.go:561] github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: failed to list *v1.ControllerConfig: Get "https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/controllerconfigs?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2026-02-16T17:24:06.586575575Z E0216 17:24:06.586499 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: Failed to watch *v1.ControllerConfig: failed to list *v1.ControllerConfig: Get \"https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/controllerconfigs?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2026-02-16T17:24:06.625150929Z W0216 17:24:06.625070 1 reflector.go:561] github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: failed to list *v1.MachineConfig: Get "https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigs?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2026-02-16T17:24:06.625150929Z E0216 17:24:06.625133 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: Failed to watch *v1.MachineConfig: failed to list *v1.MachineConfig: Get \"https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigs?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2026-02-16T17:24:08.316890250Z W0216 17:24:08.316819 1 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.ConfigMap: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-machine-config-operator/configmaps?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2026-02-16T17:24:08.317023094Z E0216 17:24:08.316999 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-machine-config-operator/configmaps?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2026-02-16T17:24:09.132749044Z W0216 17:24:09.132685 1 reflector.go:561] github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: failed to list *v1.MachineConfigPool: Get "https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigpools?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2026-02-16T17:24:09.132870137Z E0216 17:24:09.132855 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: Failed to watch *v1.MachineConfigPool: failed to list *v1.MachineConfigPool: Get \"https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigpools?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2026-02-16T17:24:09.731751397Z W0216 17:24:09.731638 1 reflector.go:561] github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: failed to list *v1.MachineConfig: Get "https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigs?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2026-02-16T17:24:09.731751397Z E0216 17:24:09.731711 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: Failed to watch *v1.MachineConfig: failed to list *v1.MachineConfig: Get \"https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigs?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2026-02-16T17:24:09.743696445Z W0216 17:24:09.743580 1 reflector.go:561] github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: failed to list *v1.ControllerConfig: Get "https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/controllerconfigs?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2026-02-16T17:24:09.743696445Z E0216 17:24:09.743672 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: Failed to watch *v1.ControllerConfig: failed to list *v1.ControllerConfig: Get \"https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/controllerconfigs?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2026-02-16T17:24:12.507678767Z W0216 17:24:12.507625 1 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.ConfigMap: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-machine-config-operator/configmaps?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2026-02-16T17:24:12.507702767Z E0216 17:24:12.507678 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-machine-config-operator/configmaps?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2026-02-16T17:24:13.317738155Z W0216 17:24:13.317671 1 reflector.go:561] github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: failed to list *v1.ControllerConfig: Get "https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/controllerconfigs?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2026-02-16T17:24:13.317738155Z E0216 17:24:13.317721 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: Failed to watch *v1.ControllerConfig: failed to list *v1.ControllerConfig: Get \"https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/controllerconfigs?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2026-02-16T17:24:13.437779163Z W0216 17:24:13.437676 1 reflector.go:561] github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: failed to list *v1.MachineConfig: Get "https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigs?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2026-02-16T17:24:13.437779163Z E0216 17:24:13.437765 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: Failed to watch *v1.MachineConfig: failed to list *v1.MachineConfig: Get \"https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigs?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2026-02-16T17:24:22.875056188Z I0216 17:24:22.874658 1 start.go:51] Launching server with tls min version: VersionTLS12 & cipher suites [TLS_AES_128_GCM_SHA256 TLS_AES_256_GCM_SHA384 TLS_CHACHA20_POLY1305_SHA256 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256] 2026-02-16T17:24:22.875056188Z I0216 17:24:22.874781 1 api.go:67] Launching server on :22624 2026-02-16T17:24:22.875056188Z I0216 17:24:22.874815 1 api.go:67] Launching server on :22623 config/pod/openshift-machine-config-operator/machine-config-server-2ws9r.json0000640000000000000000000001275015144651377026040 0ustar0000000000000000{"metadata":{"name":"machine-config-server-2ws9r","generateName":"machine-config-server-","namespace":"openshift-machine-config-operator","uid":"9c48005e-c4df-4332-87fc-ec028f2c6921","resourceVersion":"20049","creationTimestamp":"2026-02-16T17:04:39Z","labels":{"controller-revision-hash":"59bb645b5b","k8s-app":"machine-config-server","pod-template-generation":"1"},"annotations":{"openshift.io/required-scc":"hostnetwork","openshift.io/scc":"hostnetwork"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"DaemonSet","name":"machine-config-server","uid":"86cbdba4-8fe9-4249-a677-8aeecfffcfc8","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"node-bootstrap-token","secret":{"secretName":"node-bootstrapper-token","defaultMode":420}},{"name":"certs","secret":{"secretName":"machine-config-server-tls","defaultMode":420}},{"name":"kube-api-access-gvw4s","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"machine-config-server","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","command":["/usr/bin/machine-config-server"],"args":["start","--apiserver-url=https://api-int.sno.openstack.lab:6443","--payload-version=4.18.32","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12"],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"certs","mountPath":"/etc/ssl/mcs"},{"name":"node-bootstrap-token","mountPath":"/etc/mcs/bootstrap-token"},{"name":"kube-api-access-gvw4s","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000330000,"runAsNonRoot":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"machine-config-server","serviceAccount":"machine-config-server","nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c18,c12"},"supplementalGroups":[1000330000],"fsGroup":1000330000},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchFields":[{"key":"metadata.name","operator":"In","values":["master-0"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/etcd","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/disk-pressure","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/pid-pressure","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unschedulable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:04:40Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:04:39Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:04Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:04Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:04:39Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-16T17:04:39Z","containerStatuses":[{"name":"machine-config-server","state":{"running":{"startedAt":"2026-02-16T17:24:04Z"}},"lastState":{},"ready":true,"restartCount":6,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","containerID":"cri-o://cb93d3c07e79dc89e2c740b26ef5760ed3fcc03c325b8d5c4d2f875f9c26ff59","started":true,"volumeMounts":[{"name":"certs","mountPath":"/etc/ssl/mcs"},{"name":"node-bootstrap-token","mountPath":"/etc/mcs/bootstrap-token"},{"name":"kube-api-access-gvw4s","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-rbac-proxy_current.log0000640000000000000000000000202415144651377035240 0ustar0000000000000000config/pod/openshift-machine-config-operator/logs/machine-config-operator-84976bb859-rsnqc2026-02-16T17:24:41.616215533Z W0216 17:24:41.614832 1 deprecated.go:66] 2026-02-16T17:24:41.616215533Z ==== Removed Flag Warning ====================== 2026-02-16T17:24:41.616215533Z 2026-02-16T17:24:41.616215533Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-02-16T17:24:41.616215533Z 2026-02-16T17:24:41.616215533Z =============================================== 2026-02-16T17:24:41.616215533Z 2026-02-16T17:24:41.616215533Z I0216 17:24:41.614982 1 kube-rbac-proxy.go:530] Reading config file: /etc/kube-rbac-proxy/config-file.yaml 2026-02-16T17:24:41.616215533Z I0216 17:24:41.615609 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-02-16T17:24:41.616819289Z I0216 17:24:41.616786 1 kube-rbac-proxy.go:347] Reading certificate files 2026-02-16T17:24:41.617410934Z I0216 17:24:41.617114 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:9001 2026-02-16T17:24:41.617759994Z I0216 17:24:41.617730 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:9001 machine-config-operator_current.log0000640000000000000000000000151315144651377036730 0ustar0000000000000000config/pod/openshift-machine-config-operator/logs/machine-config-operator-84976bb859-rsnqc2026-02-16T17:24:40.081361590Z I0216 17:24:40.079946 1 start.go:52] Version: 4.18.32 (Raw: bc9f50bf, Hash: 0b0569287da3daea19bf47aa298037ccb4cbff98) 2026-02-16T17:24:40.081361590Z I0216 17:24:40.080122 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-16T17:24:40.081361590Z I0216 17:24:40.080770 1 metrics.go:92] Registering Prometheus metrics 2026-02-16T17:24:40.081361590Z I0216 17:24:40.080798 1 metrics.go:99] Starting metrics listener on 127.0.0.1:8797 2026-02-16T17:24:40.123399873Z I0216 17:24:40.120787 1 leaderelection.go:254] attempting to acquire leader lease openshift-machine-config-operator/machine-config... config/pod/openshift-machine-config-operator/machine-config-operator-84976bb859-rsnqc.json0000640000000000000000000001634415144651377030001 0ustar0000000000000000{"metadata":{"name":"machine-config-operator-84976bb859-rsnqc","generateName":"machine-config-operator-84976bb859-","namespace":"openshift-machine-config-operator","uid":"f3c7d762-e2fe-49ca-ade5-3982d91ec2a2","resourceVersion":"21162","creationTimestamp":"2026-02-16T17:01:26Z","labels":{"k8s-app":"machine-config-operator","pod-template-hash":"84976bb859"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.57/23\"],\"mac_address\":\"0a:58:0a:80:00:39\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.57/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.57\"\n ],\n \"mac\": \"0a:58:0a:80:00:39\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"machine-config-operator-84976bb859","uid":"f3f4cb6b-61f1-4bf8-8e16-51b564351706","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"images","configMap":{"name":"machine-config-operator-images","defaultMode":420}},{"name":"proxy-tls","secret":{"secretName":"mco-proxy-tls","defaultMode":420}},{"name":"auth-proxy-config","configMap":{"name":"kube-rbac-proxy","defaultMode":420}},{"name":"kube-api-access-8p2jz","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"machine-config-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","args":["start","--images-json=/etc/mco/images/images.json","--payload-version=4.18.32","--operator-image=quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42"],"env":[{"name":"RELEASE_VERSION","value":"4.18.32"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"images","mountPath":"/etc/mco/images"},{"name":"kube-api-access-8p2jz","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]}}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","args":["--secure-listen-address=0.0.0.0:9001","--config-file=/etc/kube-rbac-proxy/config-file.yaml","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305","--upstream=http://127.0.0.1:8797","--logtostderr=true","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key"],"ports":[{"name":"metrics","containerPort":9001,"protocol":"TCP"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"proxy-tls","mountPath":"/etc/tls/private"},{"name":"auth-proxy-config","mountPath":"/etc/kube-rbac-proxy"},{"name":"kube-api-access-8p2jz","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]}}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"machine-config-operator","serviceAccount":"machine-config-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c18,c12"},"runAsUser":65534,"runAsNonRoot":true},"imagePullSecrets":[{"name":"machine-config-operator-dockercfg-q2gzj"}],"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:42Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:01:26Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:42Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:42Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:01:26Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.57","podIPs":[{"ip":"10.128.0.57"}],"startTime":"2026-02-16T17:01:26Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-16T17:24:41Z"}},"lastState":{},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://717645bb987494832c9768cf9fa5cbad41ba1347bf648f7f0d38903e01d526e9","started":true,"volumeMounts":[{"name":"proxy-tls","mountPath":"/etc/tls/private"},{"name":"auth-proxy-config","mountPath":"/etc/kube-rbac-proxy"},{"name":"kube-api-access-8p2jz","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"machine-config-operator","state":{"running":{"startedAt":"2026-02-16T17:24:39Z"}},"lastState":{},"ready":true,"restartCount":4,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","containerID":"cri-o://2b4b0ac4882fdf9369ca2a731bae47a08335ff02d2c599cd90d41d3bd58128bc","started":true,"volumeMounts":[{"name":"images","mountPath":"/etc/mco/images"},{"name":"kube-api-access-8p2jz","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-rbac-proxy_current.log0000640000000000000000000000202415144651377033146 0ustar0000000000000000config/pod/openshift-machine-config-operator/logs/machine-config-daemon-98q6v2026-02-16T17:24:04.880082603Z W0216 17:24:04.879801 4897 deprecated.go:66] 2026-02-16T17:24:04.880082603Z ==== Removed Flag Warning ====================== 2026-02-16T17:24:04.880082603Z 2026-02-16T17:24:04.880082603Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-02-16T17:24:04.880082603Z 2026-02-16T17:24:04.880082603Z =============================================== 2026-02-16T17:24:04.880082603Z 2026-02-16T17:24:04.880325720Z I0216 17:24:04.880316 4897 kube-rbac-proxy.go:530] Reading config file: /etc/kube-rbac-proxy/config-file.yaml 2026-02-16T17:24:04.885268121Z I0216 17:24:04.885217 4897 kube-rbac-proxy.go:233] Valid token audiences: 2026-02-16T17:24:04.886640257Z I0216 17:24:04.886584 4897 kube-rbac-proxy.go:347] Reading certificate files 2026-02-16T17:24:04.886950826Z I0216 17:24:04.886925 4897 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:9001 2026-02-16T17:24:04.889345229Z I0216 17:24:04.889317 4897 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:9001 machine-config-daemon_current.log0000640000000000000000000003432715144651377034257 0ustar0000000000000000config/pod/openshift-machine-config-operator/logs/machine-config-daemon-98q6v2026-02-16T17:24:00.709171734Z I0216 17:24:00.708631 4223 start.go:68] Version: bc9f50bf (0b0569287da3daea19bf47aa298037ccb4cbff98) 2026-02-16T17:24:00.709437681Z I0216 17:24:00.709410 4223 update.go:2731] Running: mount --rbind /run/secrets /rootfs/run/secrets 2026-02-16T17:24:00.720698390Z I0216 17:24:00.720653 4223 update.go:2731] Running: mount --rbind /usr/bin /rootfs/run/machine-config-daemon-bin 2026-02-16T17:24:00.725137578Z I0216 17:24:00.725095 4223 daemon.go:521] using appropriate binary for source=rhel-9 target=rhel-9 2026-02-16T17:24:00.949315061Z I0216 17:24:00.949214 4223 daemon.go:574] Invoking re-exec /run/bin/machine-config-daemon 2026-02-16T17:24:01.000594162Z I0216 17:24:01.000484 4223 start.go:68] Version: bc9f50bf (0b0569287da3daea19bf47aa298037ccb4cbff98) 2026-02-16T17:24:01.001103926Z I0216 17:24:01.001053 4223 update.go:2731] Running: systemctl daemon-reload 2026-02-16T17:24:02.067284025Z I0216 17:24:02.067129 4223 rpm-ostree.go:56] Enabled workaround for bug 2111817 2026-02-16T17:24:02.068501288Z I0216 17:24:02.068428 4223 image_manager_helper.go:194] Linking rpm-ostree authfile to /etc/mco/internal-registry-pull-secret.json 2026-02-16T17:24:02.533167296Z I0216 17:24:02.532303 4223 daemon.go:324] Booted osImageURL: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4aa42a4b31390d46f924ce2d0c4da772bfbf6a5e1e121bdb0f8b69f989e0a0db (418.94.202601202224-0) f509ac9d3b0d3444bb0449cbb3c07f0a75ec4ed035a308158a844fa9f78e4eaa 2026-02-16T17:24:02.535076837Z I0216 17:24:02.535030 4223 start.go:134] overriding kubernetes api to https://api-int.sno.openstack.lab:6443 2026-02-16T17:24:02.536225797Z I0216 17:24:02.536196 4223 metrics.go:92] Registering Prometheus metrics 2026-02-16T17:24:02.536358191Z I0216 17:24:02.536342 4223 metrics.go:99] Starting metrics listener on 127.0.0.1:8797 2026-02-16T17:24:02.551755799Z I0216 17:24:02.551701 4223 simple_featuregate_reader.go:171] Starting feature-gate-detector 2026-02-16T17:24:02.553626659Z I0216 17:24:02.553586 4223 writer.go:87] NodeWriter initialized with credentials from /var/lib/kubelet/kubeconfig 2026-02-16T17:24:02.570268671Z I0216 17:24:02.570159 4223 start.go:219] FeatureGates initialized: knownFeatureGates=[AWSEFSDriverVolumeMetrics AdminNetworkPolicy AlibabaPlatform AzureWorkloadIdentity BareMetalLoadBalancer BuildCSIVolumes ChunkSizeMiB CloudDualStackNodeIPs DisableKubeletCloudCredentialProviders GCPLabelsTags HardwareSpeed IngressControllerLBSubnetsAWS KMSv1 ManagedBootImages ManagedBootImagesAWS MultiArchInstallAWS MultiArchInstallGCP NetworkDiagnosticsConfig NetworkLiveMigration NetworkSegmentation NewOLM NodeDisruptionPolicy OnClusterBuild PersistentIPsForVirtualization PrivateHostedZoneAWS SetEIPForNLBIngressController StreamingCollectionEncodingToJSON StreamingCollectionEncodingToProtobuf VSphereControlPlaneMachineSet VSphereDriverConfiguration VSphereMultiVCenters VSphereStaticIPs ValidatingAdmissionPolicy AWSClusterHostedDNS AdditionalRoutingCapabilities AutomatedEtcdBackup BootcNodeManagement CSIDriverSharedResource ClusterAPIInstall ClusterAPIInstallIBMCloud ClusterMonitoringConfig ConsolePluginContentSecurityPolicy DNSNameResolver DynamicResourceAllocation EtcdBackendQuota EventedPLEG Example ExternalOIDC ExternalOIDCWithUIDAndExtraClaimMappings GCPClusterHostedDNS GatewayAPI ImageStreamImportMode IngressControllerDynamicConfigurationManager InsightsConfig InsightsConfigAPI InsightsOnDemandDataGather InsightsRuntimeExtractor MachineAPIMigration MachineAPIOperatorDisableMachineHealthCheckController MachineAPIProviderOpenStack MachineConfigNodes MaxUnavailableStatefulSet MetricsCollectionProfiles MinimumKubeletVersion MixedCPUsAllocation MultiArchInstallAzure NodeSwap NutanixMultiSubnets OVNObservability OpenShiftPodSecurityAdmission PinnedImages PlatformOperators ProcMountType RouteAdvertisements RouteExternalCertificate ServiceAccountTokenNodeBinding SignatureStores SigstoreImageVerification TranslateStreamCloseWebsocketRequests UpgradeStatus UserNamespacesPodSecurityStandards UserNamespacesSupport VSphereMultiNetworks VolumeAttributesClass VolumeGroupSnapshot] 2026-02-16T17:24:02.570268671Z I0216 17:24:02.570224 4223 update.go:2776] "Starting to manage node: master-0" 2026-02-16T17:24:02.570366624Z I0216 17:24:02.570178 4223 event.go:377] Event(v1.ObjectReference{Kind:"Node", Namespace:"openshift-machine-config-operator", Name:"master-0", UID:"da39ce92-6a7c-4cce-aa8b-3e495e33f616", APIVersion:"v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'FeatureGatesInitialized' FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{"AWSEFSDriverVolumeMetrics", "AdminNetworkPolicy", "AlibabaPlatform", "AzureWorkloadIdentity", "BareMetalLoadBalancer", "BuildCSIVolumes", "ChunkSizeMiB", "CloudDualStackNodeIPs", "DisableKubeletCloudCredentialProviders", "GCPLabelsTags", "HardwareSpeed", "IngressControllerLBSubnetsAWS", "KMSv1", "ManagedBootImages", "ManagedBootImagesAWS", "MultiArchInstallAWS", "MultiArchInstallGCP", "NetworkDiagnosticsConfig", "NetworkLiveMigration", "NetworkSegmentation", "NewOLM", "NodeDisruptionPolicy", "OnClusterBuild", "PersistentIPsForVirtualization", "PrivateHostedZoneAWS", "SetEIPForNLBIngressController", "StreamingCollectionEncodingToJSON", "StreamingCollectionEncodingToProtobuf", "VSphereControlPlaneMachineSet", "VSphereDriverConfiguration", "VSphereMultiVCenters", "VSphereStaticIPs", "ValidatingAdmissionPolicy"}, Disabled:[]v1.FeatureGateName{"AWSClusterHostedDNS", "AdditionalRoutingCapabilities", "AutomatedEtcdBackup", "BootcNodeManagement", "CSIDriverSharedResource", "ClusterAPIInstall", "ClusterAPIInstallIBMCloud", "ClusterMonitoringConfig", "ConsolePluginContentSecurityPolicy", "DNSNameResolver", "DynamicResourceAllocation", "EtcdBackendQuota", "EventedPLEG", "Example", "ExternalOIDC", "ExternalOIDCWithUIDAndExtraClaimMappings", "GCPClusterHostedDNS", "GatewayAPI", "ImageStreamImportMode", "IngressControllerDynamicConfigurationManager", "InsightsConfig", "InsightsConfigAPI", "InsightsOnDemandDataGather", "InsightsRuntimeExtractor", "MachineAPIMigration", "MachineAPIOperatorDisableMachineHealthCheckController", "MachineAPIProviderOpenStack", "MachineConfigNodes", "MaxUnavailableStatefulSet", "MetricsCollectionProfiles", "MinimumKubeletVersion", "MixedCPUsAllocation", "MultiArchInstallAzure", "NodeSwap", "NutanixMultiSubnets", "OVNObservability", "OpenShiftPodSecurityAdmission", "PinnedImages", "PlatformOperators", "ProcMountType", "RouteAdvertisements", "RouteExternalCertificate", "ServiceAccountTokenNodeBinding", "SignatureStores", "SigstoreImageVerification", "TranslateStreamCloseWebsocketRequests", "UpgradeStatus", "UserNamespacesPodSecurityStandards", "UserNamespacesSupport", "VSphereMultiNetworks", "VolumeAttributesClass", "VolumeGroupSnapshot"}} 2026-02-16T17:24:02.574847383Z I0216 17:24:02.574804 4223 image_manager_helper.go:92] Running captured: rpm-ostree status 2026-02-16T17:24:02.624747688Z I0216 17:24:02.624674 4223 daemon.go:1764] State: idle 2026-02-16T17:24:02.624747688Z Deployments: 2026-02-16T17:24:02.624747688Z * ostree-unverified-registry:quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4aa42a4b31390d46f924ce2d0c4da772bfbf6a5e1e121bdb0f8b69f989e0a0db 2026-02-16T17:24:02.624747688Z Digest: sha256:4aa42a4b31390d46f924ce2d0c4da772bfbf6a5e1e121bdb0f8b69f989e0a0db 2026-02-16T17:24:02.624747688Z Version: 418.94.202601202224-0 (2026-01-20T22:28:53Z) 2026-02-16T17:24:02.624747688Z 2026-02-16T17:24:02.624747688Z ostree-unverified-registry:quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4aa42a4b31390d46f924ce2d0c4da772bfbf6a5e1e121bdb0f8b69f989e0a0db 2026-02-16T17:24:02.624747688Z Digest: sha256:4aa42a4b31390d46f924ce2d0c4da772bfbf6a5e1e121bdb0f8b69f989e0a0db 2026-02-16T17:24:02.624747688Z Version: 418.94.202601202224-0 (2026-01-20T22:28:53Z) 2026-02-16T17:24:02.625725564Z I0216 17:24:02.625656 4223 coreos.go:53] CoreOS aleph version: mtime=2022-08-01 23:42:11 +0000 UTC 2026-02-16T17:24:02.625725564Z { 2026-02-16T17:24:02.625725564Z "container-image": { 2026-02-16T17:24:02.625725564Z "image-digest": "sha256:8b9dae65133b42e82fbe59cba45f3769df203e177e821790a3fba596474c8370", 2026-02-16T17:24:02.625725564Z "image-labels": { 2026-02-16T17:24:02.625725564Z "containers.bootc": "1", 2026-02-16T17:24:02.625725564Z "coreos-assembler.image-config-checksum": "b444a32e2801642f1e41777fd51fa53304496c58a3a6b15e5964a1f86f866507", 2026-02-16T17:24:02.625725564Z "coreos-assembler.image-input-checksum": "47a6ab48a64d2ff2fdbd9651bd7c821497073a07592a6ce507e0dfeadf4c7504", 2026-02-16T17:24:02.625725564Z "io.openshift.build.version-display-names": "machine-os=Red Hat Enterprise Linux CoreOS", 2026-02-16T17:24:02.625725564Z "io.openshift.build.versions": "machine-os=418.94.202511191518-0", 2026-02-16T17:24:02.625725564Z "org.opencontainers.image.revision": "e221971a4bbfc9cb9b57c4d99b700b8e8ef9fb76", 2026-02-16T17:24:02.625725564Z "org.opencontainers.image.source": "https://github.com/openshift/os", 2026-02-16T17:24:02.625725564Z "org.opencontainers.image.version": "418.94.202511191518-0", 2026-02-16T17:24:02.625725564Z "ostree.bootable": "true", 2026-02-16T17:24:02.625725564Z "ostree.commit": "bbdd07d3be544d0ba69dab968c61ceb3c3cb8a98ef4880c66660203fe895f683", 2026-02-16T17:24:02.625725564Z "ostree.final-diffid": "sha256:12787d84fa137cd5649a9005efe98ec9d05ea46245fdc50aecb7dd007f2035b1", 2026-02-16T17:24:02.625725564Z "ostree.linux": "5.14.0-427.100.1.el9_4.x86_64", 2026-02-16T17:24:02.625725564Z "rpmostree.inputhash": "22d9a49c206a6adf1b0d62a260f1bc6ff84d278419009d7956d11de6ff9f7f09" 2026-02-16T17:24:02.625725564Z }, 2026-02-16T17:24:02.625725564Z "image-name": "oci-archive:/rhcos-418.94.202511191518-0-ostree.x86_64.ociarchive" 2026-02-16T17:24:02.625725564Z }, 2026-02-16T17:24:02.625725564Z "osbuild-version": "147", 2026-02-16T17:24:02.625725564Z "ostree-commit": "bbdd07d3be544d0ba69dab968c61ceb3c3cb8a98ef4880c66660203fe895f683", 2026-02-16T17:24:02.625725564Z "ref": "docker://ostree-image-signed:oci-archive:/rhcos-418.94.202511191518-0-ostree.x86_64.ociarchive", 2026-02-16T17:24:02.625725564Z "version": "418.94.202511191518-0" 2026-02-16T17:24:02.625725564Z } 2026-02-16T17:24:02.625792755Z I0216 17:24:02.625761 4223 coreos.go:70] Ignition provisioning: time=2026-02-16T16:57:44Z 2026-02-16T17:24:02.625792755Z I0216 17:24:02.625776 4223 image_manager_helper.go:92] Running captured: journalctl --list-boots 2026-02-16T17:24:02.635327108Z I0216 17:24:02.635268 4223 daemon.go:1773] journalctl --list-boots: 2026-02-16T17:24:02.635327108Z IDX BOOT ID FIRST ENTRY LAST ENTRY 2026-02-16T17:24:02.635327108Z -2 4b8043a619a942c4a3ddd330b8dbba91 Mon 2026-02-16 16:57:31 UTC Mon 2026-02-16 17:13:13 UTC 2026-02-16T17:24:02.635327108Z -1 16009b8c65114dd49a27539c3ce647e4 Mon 2026-02-16 17:13:26 UTC Mon 2026-02-16 17:22:55 UTC 2026-02-16T17:24:02.635327108Z 0 bff30cf771da4e66994013ec1ab42f05 Mon 2026-02-16 17:23:08 UTC Mon 2026-02-16 17:24:02 UTC 2026-02-16T17:24:02.635327108Z I0216 17:24:02.635294 4223 image_manager_helper.go:92] Running captured: systemctl list-units --state=failed --no-legend 2026-02-16T17:24:02.644298327Z I0216 17:24:02.644220 4223 daemon.go:1789] systemd service state: OK 2026-02-16T17:24:02.644298327Z I0216 17:24:02.644281 4223 daemon.go:1361] Starting MachineConfigDaemon 2026-02-16T17:24:02.644367779Z I0216 17:24:02.644342 4223 daemon.go:1368] Enabling Kubelet Healthz Monitor 2026-02-16T17:24:02.786465972Z I0216 17:24:02.786403 4223 daemon.go:2873] Found 0 requested local packages in the booted deployment 2026-02-16T17:24:03.559202550Z I0216 17:24:03.559085 4223 daemon.go:707] Detected Rebooting Annotation, applying MCN. 2026-02-16T17:24:03.576088998Z I0216 17:24:03.575971 4223 daemon.go:655] Node master-0 is part of the control plane 2026-02-16T17:24:03.630522894Z I0216 17:24:03.630411 4223 daemon.go:1938] Running: /run/machine-config-daemon-bin/nmstatectl persist-nic-names --root / --kargs-out /tmp/nmstate-kargs618629991 --cleanup 2026-02-16T17:24:03.681823756Z [2026-02-16T17:24:03Z INFO nmstatectl] Nmstate version: 2.2.56 2026-02-16T17:24:03.685859683Z 2026-02-16T17:24:03.685887564Z [2026-02-16T17:24:03Z INFO nmstatectl::persist_nic] systemd predictable network interface name is disabled by kernel argument `net.ifnames=0`, will do nothing 2026-02-16T17:24:03.695285703Z I0216 17:24:03.694775 4223 daemon.go:1600] Previous boot ostree-finalize-staged.service appears successful 2026-02-16T17:24:03.695285703Z I0216 17:24:03.695232 4223 daemon.go:1723] Current config: rendered-master-4ff3bdc50d696d239efb12817ae47acf 2026-02-16T17:24:03.695285703Z I0216 17:24:03.695244 4223 daemon.go:1724] Desired config: rendered-master-ccc1c4b4035b8605635ebee7b29103f5 2026-02-16T17:24:03.695285703Z I0216 17:24:03.695279 4223 daemon.go:1732] state: Working 2026-02-16T17:24:03.695327794Z I0216 17:24:03.695319 4223 update.go:2731] Running: rpm-ostree cleanup -r 2026-02-16T17:24:05.186199592Z Bootloader updated; bootconfig swap: yes; bootversion: boot.1.1, deployment count change: -1 2026-02-16T17:24:12.890186762Z I0216 17:24:12.889834 4223 update.go:2776] "Disk currentConfig \"rendered-master-ccc1c4b4035b8605635ebee7b29103f5\" overrides node's currentConfig annotation \"rendered-master-4ff3bdc50d696d239efb12817ae47acf\"" 2026-02-16T17:24:12.894714973Z I0216 17:24:12.894677 4223 daemon.go:2136] Validating against current config rendered-master-ccc1c4b4035b8605635ebee7b29103f5 2026-02-16T17:24:12.895819982Z I0216 17:24:12.895788 4223 daemon.go:2048] SSH key location ("/home/core/.ssh/authorized_keys.d/ignition") up-to-date! 2026-02-16T17:24:12.895819982Z I0216 17:24:12.895807 4223 image_manager_helper.go:92] Running captured: rpm-ostree kargs 2026-02-16T17:24:12.994147683Z I0216 17:24:12.994090 4223 update.go:2776] "Validated on-disk state" 2026-02-16T17:24:12.998470828Z I0216 17:24:12.998435 4223 daemon.go:2238] Completing update to target MachineConfig: rendered-master-ccc1c4b4035b8605635ebee7b29103f5 2026-02-16T17:25:02.787193467Z I0216 17:25:02.787124 4223 certificate_writer.go:294] Certificate was synced from controllerconfig resourceVersion 13330 config/pod/openshift-machine-config-operator/machine-config-daemon-98q6v.json0000640000000000000000000001513115144651377025700 0ustar0000000000000000{"metadata":{"name":"machine-config-daemon-98q6v","generateName":"machine-config-daemon-","namespace":"openshift-machine-config-operator","uid":"648abb6c-9c81-4e5c-b5f1-3b7eb254f743","resourceVersion":"20067","creationTimestamp":"2026-02-16T17:01:37Z","labels":{"controller-revision-hash":"845cfbc69","k8s-app":"machine-config-daemon","pod-template-generation":"1"},"annotations":{"openshift.io/required-scc":"privileged","openshift.io/scc":"privileged"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"DaemonSet","name":"machine-config-daemon","uid":"f6991e47-5624-45b2-b26f-381e82c403c4","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"rootfs","hostPath":{"path":"/","type":""}},{"name":"proxy-tls","secret":{"secretName":"proxy-tls","defaultMode":420}},{"name":"mcd-auth-proxy-config","configMap":{"name":"kube-rbac-proxy","defaultMode":420}},{"name":"kube-api-access-sx92x","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"machine-config-daemon","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","command":["/usr/bin/machine-config-daemon"],"args":["start","--payload-version=4.18.32"],"ports":[{"name":"health","hostPort":8798,"containerPort":8798,"protocol":"TCP"}],"env":[{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"rootfs","mountPath":"/rootfs","mountPropagation":"HostToContainer"},{"name":"kube-api-access-sx92x","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/health","port":8798,"host":"127.0.0.1","scheme":"HTTP"},"initialDelaySeconds":120,"timeoutSeconds":1,"periodSeconds":30,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"readOnlyRootFilesystem":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","args":["--secure-listen-address=0.0.0.0:9001","--config-file=/etc/kube-rbac-proxy/config-file.yaml","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12","--upstream=http://127.0.0.1:8797","--logtostderr=true","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key"],"ports":[{"name":"metrics","hostPort":9001,"containerPort":9001,"protocol":"TCP"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"proxy-tls","mountPath":"/etc/tls/private"},{"name":"mcd-auth-proxy-config","mountPath":"/etc/kube-rbac-proxy"},{"name":"kube-api-access-sx92x","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":600,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux"},"serviceAccountName":"machine-config-daemon","serviceAccount":"machine-config-daemon","nodeName":"master-0","hostNetwork":true,"hostPID":true,"securityContext":{},"imagePullSecrets":[{"name":"machine-config-daemon-dockercfg-q5h8t"}],"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchFields":[{"key":"metadata.name","operator":"In","values":["master-0"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:01:38Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:01:37Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:05Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:05Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:01:37Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-16T17:01:37Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-16T17:24:04Z"}},"lastState":{"waiting":{}},"ready":true,"restartCount":4,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://6cecafebb45d039f14c8f3d96b4b79a656530a60ef10f08074d586e7599a3da6","started":true,"volumeMounts":[{"name":"proxy-tls","mountPath":"/etc/tls/private"},{"name":"mcd-auth-proxy-config","mountPath":"/etc/kube-rbac-proxy"},{"name":"kube-api-access-sx92x","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"machine-config-daemon","state":{"running":{"startedAt":"2026-02-16T17:24:00Z"}},"lastState":{},"ready":true,"restartCount":7,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","containerID":"cri-o://36ecb052054e20edf5b4f7071d4d0da2f770afa6a294fc15e380d4c171f3c6ba","started":true,"volumeMounts":[{"name":"rootfs","mountPath":"/rootfs"},{"name":"kube-api-access-sx92x","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-rbac-proxy_current.log0000640000000000000000000000224515144651377035501 0ustar0000000000000000config/pod/openshift-machine-config-operator/logs/machine-config-controller-686c884b4d-ksx482026-02-16T17:24:41.732949494Z W0216 17:24:41.732758 1 deprecated.go:66] 2026-02-16T17:24:41.732949494Z ==== Removed Flag Warning ====================== 2026-02-16T17:24:41.732949494Z 2026-02-16T17:24:41.732949494Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-02-16T17:24:41.732949494Z 2026-02-16T17:24:41.732949494Z =============================================== 2026-02-16T17:24:41.732949494Z 2026-02-16T17:24:41.732949494Z I0216 17:24:41.732899 1 kube-rbac-proxy.go:530] Reading config file: /etc/kube-rbac-proxy/config-file.yaml 2026-02-16T17:24:41.733550820Z I0216 17:24:41.733516 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-02-16T17:24:41.734742761Z I0216 17:24:41.734708 1 kube-rbac-proxy.go:347] Reading certificate files 2026-02-16T17:24:41.735843510Z I0216 17:24:41.735276 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:9001 2026-02-16T17:24:41.736298343Z I0216 17:24:41.736281 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:9001 2026-02-16T17:25:10.868979846Z I0216 17:25:10.868858 1 log.go:245] http: proxy error: dial tcp 127.0.0.1:8797: connect: connection refused machine-config-controller_current.log0000640000000000000000000000113715144651377037516 0ustar0000000000000000config/pod/openshift-machine-config-operator/logs/machine-config-controller-686c884b4d-ksx482026-02-16T17:24:40.333887827Z I0216 17:24:40.332528 1 start.go:61] Version: bc9f50bf (0b0569287da3daea19bf47aa298037ccb4cbff98) 2026-02-16T17:24:40.333887827Z I0216 17:24:40.332713 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-16T17:24:40.367699052Z I0216 17:24:40.367643 1 leaderelection.go:254] attempting to acquire leader lease openshift-machine-config-operator/machine-config-controller... config/pod/openshift-machine-config-operator/machine-config-controller-686c884b4d-ksx48.json0000640000000000000000000001650615144651377030235 0ustar0000000000000000{"metadata":{"name":"machine-config-controller-686c884b4d-ksx48","generateName":"machine-config-controller-686c884b4d-","namespace":"openshift-machine-config-operator","uid":"c8729b1a-e365-4cf7-8a05-91a9987dabe9","resourceVersion":"21138","creationTimestamp":"2026-02-16T17:01:41Z","labels":{"k8s-app":"machine-config-controller","pod-template-hash":"686c884b4d"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.69/23\"],\"mac_address\":\"0a:58:0a:80:00:45\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.69/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.69\"\n ],\n \"mac\": \"0a:58:0a:80:00:45\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"machine-config-controller-686c884b4d","uid":"9cb57978-da2f-4279-ac57-77d28723fb09","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"proxy-tls","secret":{"secretName":"mcc-proxy-tls","defaultMode":420}},{"name":"mcc-auth-proxy-config","configMap":{"name":"kube-rbac-proxy","defaultMode":420}},{"name":"kube-api-access-hmj52","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"machine-config-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","command":["/usr/bin/machine-config-controller"],"args":["start","--resourcelock-namespace=openshift-machine-config-operator","--v=2","--payload-version=4.18.32"],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"kube-api-access-hmj52","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000330000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","args":["--secure-listen-address=0.0.0.0:9001","--config-file=/etc/kube-rbac-proxy/config-file.yaml","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12","--upstream=http://127.0.0.1:8797","--logtostderr=true","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key"],"ports":[{"name":"metrics","containerPort":9001,"protocol":"TCP"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"proxy-tls","mountPath":"/etc/tls/private"},{"name":"mcc-auth-proxy-config","mountPath":"/etc/kube-rbac-proxy"},{"name":"kube-api-access-hmj52","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000330000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"machine-config-controller","serviceAccount":"machine-config-controller","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c18,c12"},"fsGroup":1000330000,"seccompProfile":{"type":"RuntimeDefault"}},"imagePullSecrets":[{"name":"machine-config-controller-dockercfg-t46bw"}],"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:42Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:01:41Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:42Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:42Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:01:41Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.69","podIPs":[{"ip":"10.128.0.69"}],"startTime":"2026-02-16T17:01:41Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-16T17:24:41Z"}},"lastState":{},"ready":true,"restartCount":4,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://750c6c47c2a0f7d18fed5aa1739a44fcf378989e9e431e43e7a1d0c010d85004","started":true,"volumeMounts":[{"name":"proxy-tls","mountPath":"/etc/tls/private"},{"name":"mcc-auth-proxy-config","mountPath":"/etc/kube-rbac-proxy"},{"name":"kube-api-access-hmj52","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"machine-config-controller","state":{"running":{"startedAt":"2026-02-16T17:24:39Z"}},"lastState":{},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","containerID":"cri-o://c28c121ed28e2598a88750cd1d6b60a6a881fcbd8dd1a747605290f14e4dfc47","started":true,"volumeMounts":[{"name":"kube-api-access-hmj52","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-rbac-proxy-crio_current.log0000640000000000000000000000225215144651377034472 0ustar0000000000000000config/pod/openshift-machine-config-operator/logs/kube-rbac-proxy-crio-master-02026-02-16T17:23:35.663536518Z W0216 17:23:35.663174 1 deprecated.go:66] 2026-02-16T17:23:35.663536518Z ==== Removed Flag Warning ====================== 2026-02-16T17:23:35.663536518Z 2026-02-16T17:23:35.663536518Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-02-16T17:23:35.663536518Z 2026-02-16T17:23:35.663536518Z =============================================== 2026-02-16T17:23:35.663536518Z 2026-02-16T17:23:35.663536518Z I0216 17:23:35.663475 1 kube-rbac-proxy.go:530] Reading config file: /etc/kubernetes/crio-metrics-proxy.cfg 2026-02-16T17:23:35.668880440Z I0216 17:23:35.668845 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-02-16T17:23:35.671793887Z I0216 17:23:35.671640 1 dynamic_cafile_content.go:160] "Starting controller" name="client-ca::/etc/kubernetes/kubelet-ca.crt" 2026-02-16T17:23:35.673407940Z I0216 17:23:35.673377 1 kube-rbac-proxy.go:347] Reading certificate files 2026-02-16T17:23:35.676780790Z I0216 17:23:35.676673 1 kube-rbac-proxy.go:395] Starting TCP socket on :9637 2026-02-16T17:23:35.678858165Z I0216 17:23:35.678822 1 kube-rbac-proxy.go:402] Listening securely on :9637 config/pod/openshift-machine-config-operator/logs/kube-rbac-proxy-crio-master-0/setup_current.log0000640000000000000000000000012615144651377031743 0ustar00000000000000002026-02-16T17:23:34.003453768Z Waiting for kubelet key and certificate to be availableconfig/pod/openshift-machine-config-operator/kube-rbac-proxy-crio-master-0.json0000640000000000000000000001300615144651377026266 0ustar0000000000000000{"metadata":{"name":"kube-rbac-proxy-crio-master-0","namespace":"openshift-machine-config-operator","uid":"295dd2cc-4b35-40bc-959c-aa8ad90fc453","resourceVersion":"20109","creationTimestamp":"2026-02-16T16:59:02Z","annotations":{"kubernetes.io/config.hash":"b3322fd3717f4aec0d8f54ec7862c07e","kubernetes.io/config.mirror":"b3322fd3717f4aec0d8f54ec7862c07e","kubernetes.io/config.seen":"2026-02-16T16:58:16.617766285Z","kubernetes.io/config.source":"file","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"da39ce92-6a7c-4cce-aa8b-3e495e33f616","controller":true}]},"spec":{"volumes":[{"name":"etc-kube","hostPath":{"path":"/etc/kubernetes","type":""}},{"name":"var-lib-kubelet","hostPath":{"path":"/var/lib/kubelet","type":""}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","command":["/bin/bash","-ec"],"args":["echo -n \"Waiting for kubelet key and certificate to be available\"\nwhile [ -n \"$(test -e /var/lib/kubelet/pki/kubelet-server-current.pem)\" ] ; do\n echo -n \".\"\n sleep 1\n (( tries += 1 ))\n if [[ \"${tries}\" -gt 10 ]]; then\n echo \"Timed out waiting for kubelet key and cert.\"\n exit 1\n fi\ndone\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"var-lib-kubelet","mountPath":"/var","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"kube-rbac-proxy-crio","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","args":["--secure-listen-address=:9637","--config-file=/etc/kubernetes/crio-metrics-proxy.cfg","--client-ca-file=/etc/kubernetes/kubelet-ca.crt","--logtostderr=true","--kubeconfig=/var/lib/kubelet/kubeconfig","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12","--upstream=http://127.0.0.1:9537","--tls-cert-file=/var/lib/kubelet/pki/kubelet-server-current.pem","--tls-private-key-file=/var/lib/kubelet/pki/kubelet-server-current.pem"],"ports":[{"hostPort":9637,"containerPort":9637,"protocol":"TCP"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-kube","readOnly":true,"mountPath":"/etc/kubernetes","mountPropagation":"HostToContainer"},{"name":"var-lib-kubelet","readOnly":true,"mountPath":"/var/lib/kubelet","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:03Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:03Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:03Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:03Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:03Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-16T17:24:03Z","initContainerStatuses":[{"name":"setup","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-16T17:23:33Z","finishedAt":"2026-02-16T17:23:34Z","containerID":"cri-o://024918b99b0960332808509aca9a4a206a98049b3cbbd79cb59ca43d40614ee8"}},"lastState":{},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://024918b99b0960332808509aca9a4a206a98049b3cbbd79cb59ca43d40614ee8","started":false}],"containerStatuses":[{"name":"kube-rbac-proxy-crio","state":{"running":{"startedAt":"2026-02-16T17:23:35Z"}},"lastState":{},"ready":true,"restartCount":7,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://5fa8b867f6c7632908fe33e45a5de76207c3a49f016816d7a95a271132f5f9bc","started":true}],"qosClass":"Burstable"}}cluster-policy-controller_current.log0000640000000000000000000003102615144651377034227 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-02-16T17:23:59.879317389Z I0216 17:23:59.878870 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-16T17:23:59.882982687Z I0216 17:23:59.879937 1 observer_polling.go:159] Starting file observer 2026-02-16T17:23:59.882982687Z I0216 17:23:59.880524 1 builder.go:298] cluster-policy-controller version 4.18.0-202601190115.p2.g5fd8525.assembly.stream.el9-5fd8525-5fd852525909ce6eab52972ba9ce8fcf56528eb9 2026-02-16T17:23:59.882982687Z I0216 17:23:59.881106 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.crt::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.key" 2026-02-16T17:24:00.310084827Z I0216 17:24:00.309983 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-02-16T17:24:00.316940819Z I0216 17:24:00.316874 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-02-16T17:24:00.316940819Z I0216 17:24:00.316904 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-02-16T17:24:00.316987191Z I0216 17:24:00.316934 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-02-16T17:24:00.316987191Z I0216 17:24:00.316944 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-02-16T17:24:00.323782761Z I0216 17:24:00.323717 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-16T17:24:00.323782761Z W0216 17:24:00.323739 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-16T17:24:00.323782761Z W0216 17:24:00.323744 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-16T17:24:00.323782761Z W0216 17:24:00.323747 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-16T17:24:00.323782761Z W0216 17:24:00.323752 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-16T17:24:00.323782761Z W0216 17:24:00.323755 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-16T17:24:00.323782761Z W0216 17:24:00.323758 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-16T17:24:00.323828072Z I0216 17:24:00.323767 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-02-16T17:24:00.325999290Z I0216 17:24:00.325934 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-16T17:24:00.325999290Z I0216 17:24:00.325961 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-16T17:24:00.326042331Z I0216 17:24:00.326015 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-16T17:24:00.326208485Z I0216 17:24:00.326167 1 builder.go:439] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-16T17:24:00.326325419Z I0216 17:24:00.326280 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.crt::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.key" certDetail="\"system:admin\" [client] groups=[system:masters] issuer=\"kube-control-plane-signer\" (2026-02-16 16:50:49 +0000 UTC to 2027-02-16 16:50:50 +0000 UTC (now=2026-02-16 17:24:00.326227076 +0000 UTC))" 2026-02-16T17:24:00.326375990Z I0216 17:24:00.326359 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.crt::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.key" 2026-02-16T17:24:00.326434602Z I0216 17:24:00.326407 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771262640\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771262640\" (2026-02-16 16:23:59 +0000 UTC to 2027-02-16 16:23:59 +0000 UTC (now=2026-02-16 17:24:00.3263852 +0000 UTC))" 2026-02-16T17:24:00.326434602Z I0216 17:24:00.326428 1 secure_serving.go:213] Serving securely on 127.0.0.1:10357 2026-02-16T17:24:00.326480683Z I0216 17:24:00.326450 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-02-16T17:24:00.326480683Z I0216 17:24:00.326474 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-16T17:24:00.326537124Z I0216 17:24:00.326502 1 leaderelection.go:254] attempting to acquire leader lease kube-system/cluster-policy-controller-lock... 2026-02-16T17:24:00.327244513Z I0216 17:24:00.327179 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T17:24:00.327244513Z I0216 17:24:00.327186 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-16T17:24:00.327244513Z I0216 17:24:00.327217 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T17:24:00.329055761Z I0216 17:24:00.329005 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T17:24:00.329423681Z I0216 17:24:00.329383 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T17:24:00.330085738Z I0216 17:24:00.330023 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T17:24:00.427597578Z I0216 17:24:00.427537 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-16T17:24:00.427694540Z I0216 17:24:00.427652 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T17:24:00.427694540Z I0216 17:24:00.427672 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T17:24:00.427935607Z I0216 17:24:00.427897 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-16 16:50:47 +0000 UTC to 2026-02-17 16:50:47 +0000 UTC (now=2026-02-16 17:24:00.427864855 +0000 UTC))" 2026-02-16T17:24:00.428075710Z I0216 17:24:00.428056 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.crt::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.key" certDetail="\"system:admin\" [client] groups=[system:masters] issuer=\"kube-control-plane-signer\" (2026-02-16 16:50:49 +0000 UTC to 2027-02-16 16:50:50 +0000 UTC (now=2026-02-16 17:24:00.428041149 +0000 UTC))" 2026-02-16T17:24:00.428198694Z I0216 17:24:00.428181 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771262640\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771262640\" (2026-02-16 16:23:59 +0000 UTC to 2027-02-16 16:23:59 +0000 UTC (now=2026-02-16 17:24:00.428164913 +0000 UTC))" 2026-02-16T17:24:00.428405839Z I0216 17:24:00.428379 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-02-16 16:44:14 +0000 UTC to 2036-02-14 16:44:14 +0000 UTC (now=2026-02-16 17:24:00.428363748 +0000 UTC))" 2026-02-16T17:24:00.428418729Z I0216 17:24:00.428412 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-02-16 16:50:49 +0000 UTC to 2026-02-17 16:50:49 +0000 UTC (now=2026-02-16 17:24:00.428400689 +0000 UTC))" 2026-02-16T17:24:00.428444140Z I0216 17:24:00.428429 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-02-16 16:50:49 +0000 UTC to 2027-02-16 16:50:49 +0000 UTC (now=2026-02-16 17:24:00.428418039 +0000 UTC))" 2026-02-16T17:24:00.428451700Z I0216 17:24:00.428446 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-02-16 16:50:49 +0000 UTC to 2027-02-16 16:50:49 +0000 UTC (now=2026-02-16 17:24:00.4284386 +0000 UTC))" 2026-02-16T17:24:00.428472791Z I0216 17:24:00.428458 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-02-16 16:50:47 +0000 UTC to 2036-02-14 16:50:47 +0000 UTC (now=2026-02-16 17:24:00.42845065 +0000 UTC))" 2026-02-16T17:24:00.428480321Z I0216 17:24:00.428473 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-csr-signer_@1771261235\" [] issuer=\"kubelet-signer\" (2026-02-16 17:00:34 +0000 UTC to 2026-02-17 16:50:49 +0000 UTC (now=2026-02-16 17:24:00.428465971 +0000 UTC))" 2026-02-16T17:24:00.428499792Z I0216 17:24:00.428485 1 tlsconfig.go:181] "Loaded client CA" index=6 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"openshift-kube-apiserver-operator_node-system-admin-signer@1771261220\" [] issuer=\"\" (2026-02-16 17:00:19 +0000 UTC to 2027-02-16 17:00:20 +0000 UTC (now=2026-02-16 17:24:00.428477791 +0000 UTC))" 2026-02-16T17:24:00.428507662Z I0216 17:24:00.428500 1 tlsconfig.go:181] "Loaded client CA" index=7 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-16 16:50:47 +0000 UTC to 2026-02-17 16:50:47 +0000 UTC (now=2026-02-16 17:24:00.428493101 +0000 UTC))" 2026-02-16T17:24:00.428602194Z I0216 17:24:00.428588 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.crt::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.key" certDetail="\"system:admin\" [client] groups=[system:masters] issuer=\"kube-control-plane-signer\" (2026-02-16 16:50:49 +0000 UTC to 2027-02-16 16:50:50 +0000 UTC (now=2026-02-16 17:24:00.428579254 +0000 UTC))" 2026-02-16T17:24:00.428702207Z I0216 17:24:00.428687 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771262640\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771262640\" (2026-02-16 16:23:59 +0000 UTC to 2027-02-16 16:23:59 +0000 UTC (now=2026-02-16 17:24:00.428678206 +0000 UTC))" kube-controller-manager_current.log0000640000000000000000000006017215144651377033613 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-02-16T17:24:40.498173977Z I0216 17:24:40.498104 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/catalog-operator-588944557d" duration="62.132µs" 2026-02-16T17:24:40.509022565Z I0216 17:24:40.508985 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-dns-operator/dns-operator-86b8869b79" duration="8.488745ms" 2026-02-16T17:24:40.509139488Z I0216 17:24:40.509125 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-dns-operator/dns-operator-86b8869b79" duration="46.911µs" 2026-02-16T17:24:40.545415748Z I0216 17:24:40.544679 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-745bd8d89b" duration="59.092µs" 2026-02-16T17:24:40.589010353Z I0216 17:24:40.588915 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-console/downloads-dcd7b7d95" duration="42.011µs" 2026-02-16T17:24:40.625530880Z I0216 17:24:40.625483 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/package-server-manager-5c696dbdcd" duration="61.851µs" 2026-02-16T17:24:41.786285366Z I0216 17:24:41.786191 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-controller-manager/controller-manager-7fc9897cf8" duration="56.981µs" 2026-02-16T17:24:42.673721256Z I0216 17:24:42.670079 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-olm-operator/cluster-olm-operator-55b69c6c48" duration="43.691µs" 2026-02-16T17:24:42.910089595Z I0216 17:24:42.910029 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-storage-operator/csi-snapshot-controller-operator-7b87b97578" duration="10.073906ms" 2026-02-16T17:24:42.910114776Z I0216 17:24:42.910081 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-storage-operator/csi-snapshot-controller-operator-7b87b97578" duration="26.231µs" 2026-02-16T17:24:42.964047174Z I0216 17:24:42.963997 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-kube-controller-manager-operator/kube-controller-manager-operator-78ff47c7c5" duration="8.802803ms" 2026-02-16T17:24:42.964076335Z I0216 17:24:42.964067 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-kube-controller-manager-operator/kube-controller-manager-operator-78ff47c7c5" duration="42.541µs" 2026-02-16T17:24:43.004398102Z I0216 17:24:43.003639 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-apiserver/apiserver-fc4bf7f79" duration="52.241µs" 2026-02-16T17:24:43.112140956Z I0216 17:24:43.112078 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-autoscaler-operator-67fd9768b5" duration="39.631939ms" 2026-02-16T17:24:43.113888662Z I0216 17:24:43.113851 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-autoscaler-operator-67fd9768b5" duration="37.301µs" 2026-02-16T17:24:43.170776948Z I0216 17:24:43.170721 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-console-operator/console-operator-7777d5cc66" duration="42.081µs" 2026-02-16T17:24:43.254843474Z I0216 17:24:43.254681 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-ff6c9b66" duration="22.917367ms" 2026-02-16T17:24:43.254843474Z I0216 17:24:43.254762 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-ff6c9b66" duration="35.541µs" 2026-02-16T17:24:43.363739068Z I0216 17:24:43.363590 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/openshift-state-metrics-546cc7d765" duration="42.129506ms" 2026-02-16T17:24:43.368405272Z I0216 17:24:43.364420 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/openshift-state-metrics-546cc7d765" duration="79.982µs" 2026-02-16T17:24:43.865217457Z I0216 17:24:43.865144 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-authentication/oauth-openshift-64f85b8fc9" duration="53.131µs" 2026-02-16T17:24:44.162174321Z I0216 17:24:44.162107 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-config-operator/openshift-config-operator-7c6bdb986f" duration="49.922µs" 2026-02-16T17:24:44.181378509Z I0216 17:24:44.181314 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-7485d55966" duration="67.889207ms" 2026-02-16T17:24:44.181447721Z I0216 17:24:44.181424 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-7485d55966" duration="52.122µs" 2026-02-16T17:24:44.244725927Z I0216 17:24:44.244208 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/machine-api-operator-bd7dd5c46" duration="15.986904ms" 2026-02-16T17:24:44.245149758Z I0216 17:24:44.245130 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/machine-api-operator-bd7dd5c46" duration="52.782µs" 2026-02-16T17:24:44.279329213Z I0216 17:24:44.276810 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-apiserver-operator/openshift-apiserver-operator-6d4655d9cf" duration="17.622206ms" 2026-02-16T17:24:44.279329213Z I0216 17:24:44.276960 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-apiserver-operator/openshift-apiserver-operator-6d4655d9cf" duration="64.482µs" 2026-02-16T17:24:44.355356367Z I0216 17:24:44.355303 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-686c884b4d" duration="13.869317ms" 2026-02-16T17:24:44.355517541Z I0216 17:24:44.355498 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-686c884b4d" duration="73.712µs" 2026-02-16T17:24:44.397505453Z I0216 17:24:44.397456 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-image-registry/cluster-image-registry-operator-96c8c64b8" duration="11.507055ms" 2026-02-16T17:24:44.397767850Z I0216 17:24:44.397746 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-image-registry/cluster-image-registry-operator-96c8c64b8" duration="54.501µs" 2026-02-16T17:24:44.416355742Z I0216 17:24:44.416298 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-console/console-599b567ff7" duration="74.892µs" 2026-02-16T17:24:44.460714267Z I0216 17:24:44.459330 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-controller-manager/controller-manager-7fc9897cf8" duration="14.286938ms" 2026-02-16T17:24:44.460760978Z I0216 17:24:44.460734 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-controller-manager/controller-manager-7fc9897cf8" duration="29.661µs" 2026-02-16T17:24:44.477808689Z I0216 17:24:44.477750 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-service-ca/service-ca-676cd8b9b5" duration="9.565723ms" 2026-02-16T17:24:44.478613920Z I0216 17:24:44.477838 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-service-ca/service-ca-676cd8b9b5" duration="41.651µs" 2026-02-16T17:24:44.502538854Z I0216 17:24:44.502481 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-oauth-apiserver/apiserver-66788cb45c" duration="40.131µs" 2026-02-16T17:24:44.540309074Z I0216 17:24:44.537816 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-operator-84976bb859" duration="9.646106ms" 2026-02-16T17:24:44.540309074Z I0216 17:24:44.537915 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-operator-84976bb859" duration="57.972µs" 2026-02-16T17:24:44.551284115Z I0216 17:24:44.551076 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-catalogd/catalogd-controller-manager-67bc7c997f" duration="66.942µs" 2026-02-16T17:24:44.581302470Z I0216 17:24:44.580788 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-kube-storage-version-migrator-operator/kube-storage-version-migrator-operator-cd5474998" duration="9.995135ms" 2026-02-16T17:24:44.581302470Z I0216 17:24:44.580880 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-kube-storage-version-migrator-operator/kube-storage-version-migrator-operator-cd5474998" duration="44.521µs" 2026-02-16T17:24:44.625305895Z I0216 17:24:44.624799 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/kube-state-metrics-7cc9598d54" duration="15.721676ms" 2026-02-16T17:24:44.625305895Z I0216 17:24:44.624941 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/kube-state-metrics-7cc9598d54" duration="94.772µs" 2026-02-16T17:24:44.656305656Z I0216 17:24:44.653437 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/telemeter-client-6bbd87b65b" duration="18.640094ms" 2026-02-16T17:24:44.656305656Z I0216 17:24:44.653563 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/telemeter-client-6bbd87b65b" duration="69.062µs" 2026-02-16T17:24:44.675908445Z I0216 17:24:44.675847 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-kube-apiserver-operator/kube-apiserver-operator-54984b6678" duration="8.943597ms" 2026-02-16T17:24:44.675933736Z I0216 17:24:44.675917 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-kube-apiserver-operator/kube-apiserver-operator-54984b6678" duration="33.491µs" 2026-02-16T17:24:44.702829748Z I0216 17:24:44.702782 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-oauth-apiserver/apiserver-66788cb45c" duration="56.481µs" 2026-02-16T17:24:44.725767995Z I0216 17:24:44.725711 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-console-operator/console-operator-7777d5cc66" duration="9.83757ms" 2026-02-16T17:24:44.729284518Z I0216 17:24:44.725832 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-console-operator/console-operator-7777d5cc66" duration="65.132µs" 2026-02-16T17:24:44.744343907Z I0216 17:24:44.744241 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-apiserver/apiserver-fc4bf7f79" duration="50.921µs" 2026-02-16T17:24:44.856206658Z I0216 17:24:44.855660 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-baremetal-operator-7bc947fc7d" duration="16.370843ms" 2026-02-16T17:24:44.857508283Z I0216 17:24:44.857247 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-baremetal-operator-7bc947fc7d" duration="44.332µs" 2026-02-16T17:24:44.863642065Z I0216 17:24:44.863463 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/thanos-querier-64bf6cdbbc" duration="103.523µs" 2026-02-16T17:24:44.901318433Z I0216 17:24:44.898566 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-olm-operator/cluster-olm-operator-55b69c6c48" duration="11.592947ms" 2026-02-16T17:24:44.901318433Z I0216 17:24:44.898617 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-olm-operator/cluster-olm-operator-55b69c6c48" duration="24.17µs" 2026-02-16T17:24:44.928292617Z I0216 17:24:44.927369 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-etcd-operator/etcd-operator-67bf55ccdd" duration="13.365514ms" 2026-02-16T17:24:44.928292617Z I0216 17:24:44.927456 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-etcd-operator/etcd-operator-67bf55ccdd" duration="56.192µs" 2026-02-16T17:24:44.951003569Z I0216 17:24:44.950923 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-marketplace/marketplace-operator-6cc5b65c6b" duration="9.301806ms" 2026-02-16T17:24:44.951073820Z I0216 17:24:44.951050 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-marketplace/marketplace-operator-6cc5b65c6b" duration="67.232µs" 2026-02-16T17:24:44.965086512Z I0216 17:24:44.964998 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-config-operator/openshift-config-operator-7c6bdb986f" duration="49.971µs" 2026-02-16T17:24:44.997301915Z I0216 17:24:44.993466 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-samples-operator/cluster-samples-operator-f8cbff74c" duration="9.963644ms" 2026-02-16T17:24:44.997301915Z I0216 17:24:44.993621 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-samples-operator/cluster-samples-operator-f8cbff74c" duration="50.691µs" 2026-02-16T17:24:45.011299065Z I0216 17:24:45.011049 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-cb4f7b4cf" duration="7.915829ms" 2026-02-16T17:24:45.011299065Z I0216 17:24:45.011151 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-cb4f7b4cf" duration="45.871µs" 2026-02-16T17:24:45.034809708Z I0216 17:24:45.034730 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress-operator/ingress-operator-c588d8cb4" duration="9.164922ms" 2026-02-16T17:24:45.035364612Z I0216 17:24:45.035310 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress-operator/ingress-operator-c588d8cb4" duration="88.393µs" 2026-02-16T17:24:45.653461520Z I0216 17:24:45.653369 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-controller/operator-controller-controller-manager-85c9b89969" duration="14.868974ms" 2026-02-16T17:24:45.653529502Z I0216 17:24:45.653496 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-controller/operator-controller-controller-manager-85c9b89969" duration="73.182µs" 2026-02-16T17:24:45.934888452Z I0216 17:24:45.933400 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-console/downloads-dcd7b7d95" duration="48.100744ms" 2026-02-16T17:24:45.934888452Z I0216 17:24:45.933502 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-console/downloads-dcd7b7d95" duration="59.922µs" 2026-02-16T17:24:46.069320222Z I0216 17:24:46.067320 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/thanos-querier-64bf6cdbbc" duration="24.563061ms" 2026-02-16T17:24:46.069320222Z I0216 17:24:46.067642 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/thanos-querier-64bf6cdbbc" duration="128.103µs" 2026-02-16T17:24:46.127166234Z I0216 17:24:46.125180 1 replica_set.go:477] "pod will be enqueued after a while for availability check" logger="replicaset-controller" duration=5 kind="ReplicaSet" pod="openshift-catalogd/catalogd-controller-manager-67bc7c997f-mn6cr" 2026-02-16T17:24:46.136875311Z I0216 17:24:46.136796 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-catalogd/catalogd-controller-manager-67bc7c997f" duration="11.047852ms" 2026-02-16T17:24:46.137419745Z I0216 17:24:46.137387 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-catalogd/catalogd-controller-manager-67bc7c997f" duration="64.711µs" 2026-02-16T17:24:46.145907120Z I0216 17:24:46.145755 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-oauth-apiserver/apiserver-66788cb45c" duration="75.132µs" 2026-02-16T17:24:46.178683858Z I0216 17:24:46.178604 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-authentication/oauth-openshift-64f85b8fc9" duration="14.071863ms" 2026-02-16T17:24:46.178723809Z I0216 17:24:46.178699 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-authentication/oauth-openshift-64f85b8fc9" duration="57.091µs" 2026-02-16T17:24:46.476645178Z I0216 17:24:46.476554 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-oauth-apiserver/apiserver-66788cb45c" duration="15.996103ms" 2026-02-16T17:24:46.477687656Z I0216 17:24:46.477619 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-oauth-apiserver/apiserver-66788cb45c" duration="92.753µs" 2026-02-16T17:24:47.740360153Z E0216 17:24:47.740168 1 resource_quota_controller.go:446] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, metrics.k8s.io/v1beta1: stale GroupVersion discovery: metrics.k8s.io/v1beta1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1" logger="UnhandledError" 2026-02-16T17:24:48.080905280Z I0216 17:24:48.080857 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-config-operator/openshift-config-operator-7c6bdb986f" duration="11.860634ms" 2026-02-16T17:24:48.080951611Z I0216 17:24:48.080919 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-config-operator/openshift-config-operator-7c6bdb986f" duration="30.191µs" 2026-02-16T17:24:48.229637289Z I0216 17:24:48.229493 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-apiserver/apiserver-fc4bf7f79" duration="196.716µs" 2026-02-16T17:24:48.496348550Z I0216 17:24:48.494756 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-apiserver/apiserver-fc4bf7f79" duration="20.104383ms" 2026-02-16T17:24:48.496348550Z I0216 17:24:48.494820 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-apiserver/apiserver-fc4bf7f79" duration="35.271µs" 2026-02-16T17:24:48.697379323Z I0216 17:24:48.697303 1 garbagecollector.go:826] "failed to discover some groups" logger="garbage-collector-controller" groups="" 2026-02-16T17:24:48.697587269Z I0216 17:24:48.697540 1 garbagecollector.go:232] "syncing garbage collector with updated resources from discovery" logger="garbage-collector-controller" attempt=1 diff="added: [oauth.openshift.io/v1, Resource=oauthaccesstokens oauth.openshift.io/v1, Resource=oauthauthorizetokens oauth.openshift.io/v1, Resource=oauthclientauthorizations oauth.openshift.io/v1, Resource=oauthclients oauth.openshift.io/v1, Resource=useroauthaccesstokens security.openshift.io/v1, Resource=rangeallocations security.openshift.io/v1, Resource=securitycontextconstraints user.openshift.io/v1, Resource=groups user.openshift.io/v1, Resource=identities user.openshift.io/v1, Resource=users], removed: []" 2026-02-16T17:24:48.705345974Z I0216 17:24:48.705303 1 shared_informer.go:313] Waiting for caches to sync for garbage collector 2026-02-16T17:24:48.708687913Z I0216 17:24:48.708639 1 reflector.go:368] Caches populated for *v1.RangeAllocation from github.com/openshift/client-go@v0.0.0-20241001162912-da6d55e4611f/security/informers/externalversions/factory.go:125 2026-02-16T17:24:48.708687913Z I0216 17:24:48.708673 1 reflector.go:368] Caches populated for *v1.UserOAuthAccessToken from github.com/openshift/client-go@v0.0.0-20241001162912-da6d55e4611f/oauth/informers/externalversions/factory.go:125 2026-02-16T17:24:48.709810783Z I0216 17:24:48.709755 1 reflector.go:368] Caches populated for *v1.SecurityContextConstraints from github.com/openshift/client-go@v0.0.0-20241001162912-da6d55e4611f/security/informers/externalversions/factory.go:125 2026-02-16T17:24:48.806288597Z I0216 17:24:48.806207 1 shared_informer.go:320] Caches are synced for garbage collector 2026-02-16T17:24:48.806334719Z I0216 17:24:48.806245 1 garbagecollector.go:281] "synced garbage collector" logger="garbage-collector-controller" 2026-02-16T17:24:51.489838049Z I0216 17:24:51.489719 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-catalogd/catalogd-controller-manager-67bc7c997f" duration="352.096994ms" 2026-02-16T17:24:51.490373854Z I0216 17:24:51.489901 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-catalogd/catalogd-controller-manager-67bc7c997f" duration="113.333µs" 2026-02-16T17:24:51.765802977Z I0216 17:24:51.765741 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-catalogd/catalogd-controller-manager" err="Operation cannot be fulfilled on deployments.apps \"catalogd-controller-manager\": the object has been modified; please apply your changes to the latest version and try again" cluster-policy-controller_previous.log0000640000000000000000000000230315144651377034415 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-02-16T17:23:34.871892818Z I0216 17:23:34.871630 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-16T17:23:34.874829266Z I0216 17:23:34.874754 1 observer_polling.go:159] Starting file observer 2026-02-16T17:23:34.912839595Z I0216 17:23:34.912723 1 builder.go:298] cluster-policy-controller version 4.18.0-202601190115.p2.g5fd8525.assembly.stream.el9-5fd8525-5fd852525909ce6eab52972ba9ce8fcf56528eb9 2026-02-16T17:23:34.920742635Z I0216 17:23:34.920605 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.crt::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.key" 2026-02-16T17:23:59.108463121Z I0216 17:23:59.108366 1 cmd.go:138] Received SIGTERM or SIGINT signal, shutting down controller. 2026-02-16T17:23:59.551518755Z F0216 17:23:59.551439 1 cmd.go:179] failed checking apiserver connectivity: client rate limiter Wait returned an error: context canceled kube-controller-manager_previous.log0000640000000000000000000003171115144651377034002 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-02-16T17:23:36.323189874Z I0216 17:23:36.323179 1 flags.go:64] FLAG: --requestheader-allowed-names="[]" 2026-02-16T17:23:36.323189874Z I0216 17:23:36.323186 1 flags.go:64] FLAG: --requestheader-client-ca-file="" 2026-02-16T17:23:36.323209454Z I0216 17:23:36.323189 1 flags.go:64] FLAG: --requestheader-extra-headers-prefix="[x-remote-extra-]" 2026-02-16T17:23:36.323209454Z I0216 17:23:36.323195 1 flags.go:64] FLAG: --requestheader-group-headers="[x-remote-group]" 2026-02-16T17:23:36.323209454Z I0216 17:23:36.323200 1 flags.go:64] FLAG: --requestheader-username-headers="[x-remote-user]" 2026-02-16T17:23:36.323209454Z I0216 17:23:36.323205 1 flags.go:64] FLAG: --resource-quota-sync-period="5m0s" 2026-02-16T17:23:36.323221695Z I0216 17:23:36.323209 1 flags.go:64] FLAG: --root-ca-file="/etc/kubernetes/secrets/kube-apiserver-complete-server-ca-bundle.crt" 2026-02-16T17:23:36.323221695Z I0216 17:23:36.323213 1 flags.go:64] FLAG: --route-reconciliation-period="10s" 2026-02-16T17:23:36.323221695Z I0216 17:23:36.323217 1 flags.go:64] FLAG: --secondary-node-eviction-rate="0.01" 2026-02-16T17:23:36.323233405Z I0216 17:23:36.323221 1 flags.go:64] FLAG: --secure-port="10257" 2026-02-16T17:23:36.323233405Z I0216 17:23:36.323225 1 flags.go:64] FLAG: --service-account-private-key-file="/etc/kubernetes/secrets/service-account.key" 2026-02-16T17:23:36.323233405Z I0216 17:23:36.323229 1 flags.go:64] FLAG: --service-cluster-ip-range="172.30.0.0/16" 2026-02-16T17:23:36.323244725Z I0216 17:23:36.323233 1 flags.go:64] FLAG: --show-hidden-metrics-for-version="" 2026-02-16T17:23:36.323244725Z I0216 17:23:36.323237 1 flags.go:64] FLAG: --terminated-pod-gc-threshold="12500" 2026-02-16T17:23:36.323283956Z I0216 17:23:36.323241 1 flags.go:64] FLAG: --tls-cert-file="" 2026-02-16T17:23:36.323283956Z I0216 17:23:36.323265 1 flags.go:64] FLAG: --tls-cipher-suites="[]" 2026-02-16T17:23:36.323283956Z I0216 17:23:36.323271 1 flags.go:64] FLAG: --tls-min-version="" 2026-02-16T17:23:36.323283956Z I0216 17:23:36.323274 1 flags.go:64] FLAG: --tls-private-key-file="" 2026-02-16T17:23:36.323296657Z I0216 17:23:36.323278 1 flags.go:64] FLAG: --tls-sni-cert-key="[]" 2026-02-16T17:23:36.323296657Z I0216 17:23:36.323290 1 flags.go:64] FLAG: --unhealthy-zone-threshold="0.55" 2026-02-16T17:23:36.323307597Z I0216 17:23:36.323294 1 flags.go:64] FLAG: --unsupported-kube-api-over-localhost="false" 2026-02-16T17:23:36.323307597Z I0216 17:23:36.323298 1 flags.go:64] FLAG: --use-service-account-credentials="true" 2026-02-16T17:23:36.323307597Z I0216 17:23:36.323302 1 flags.go:64] FLAG: --v="2" 2026-02-16T17:23:36.323319117Z I0216 17:23:36.323307 1 flags.go:64] FLAG: --version="false" 2026-02-16T17:23:36.323319117Z I0216 17:23:36.323312 1 flags.go:64] FLAG: --vmodule="" 2026-02-16T17:23:36.323534153Z W0216 17:23:36.323497 1 feature_gate.go:330] unrecognized feature gate: SignatureStores 2026-02-16T17:23:36.323534153Z W0216 17:23:36.323512 1 feature_gate.go:330] unrecognized feature gate: MachineConfigNodes 2026-02-16T17:23:36.323534153Z W0216 17:23:36.323516 1 feature_gate.go:330] unrecognized feature gate: ClusterMonitoringConfig 2026-02-16T17:23:36.323534153Z W0216 17:23:36.323520 1 feature_gate.go:330] unrecognized feature gate: HardwareSpeed 2026-02-16T17:23:36.323534153Z W0216 17:23:36.323525 1 feature_gate.go:330] unrecognized feature gate: VSphereDriverConfiguration 2026-02-16T17:23:36.323534153Z W0216 17:23:36.323530 1 feature_gate.go:351] Setting deprecated feature gate KMSv1=true. It will be removed in a future release. 2026-02-16T17:23:36.323560784Z W0216 17:23:36.323534 1 feature_gate.go:330] unrecognized feature gate: BuildCSIVolumes 2026-02-16T17:23:36.323560784Z W0216 17:23:36.323538 1 feature_gate.go:330] unrecognized feature gate: MachineAPIMigration 2026-02-16T17:23:36.323560784Z W0216 17:23:36.323541 1 feature_gate.go:330] unrecognized feature gate: NetworkDiagnosticsConfig 2026-02-16T17:23:36.323560784Z W0216 17:23:36.323544 1 feature_gate.go:330] unrecognized feature gate: BootcNodeManagement 2026-02-16T17:23:36.323560784Z W0216 17:23:36.323548 1 feature_gate.go:330] unrecognized feature gate: MinimumKubeletVersion 2026-02-16T17:23:36.323560784Z W0216 17:23:36.323551 1 feature_gate.go:330] unrecognized feature gate: ExternalOIDCWithUIDAndExtraClaimMappings 2026-02-16T17:23:36.323560784Z W0216 17:23:36.323554 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallAWS 2026-02-16T17:23:36.323574594Z W0216 17:23:36.323559 1 feature_gate.go:353] Setting GA feature gate DisableKubeletCloudCredentialProviders=true. It will be removed in a future release. 2026-02-16T17:23:36.323574594Z W0216 17:23:36.323563 1 feature_gate.go:330] unrecognized feature gate: VSphereControlPlaneMachineSet 2026-02-16T17:23:36.323574594Z W0216 17:23:36.323567 1 feature_gate.go:330] unrecognized feature gate: PersistentIPsForVirtualization 2026-02-16T17:23:36.323574594Z W0216 17:23:36.323570 1 feature_gate.go:330] unrecognized feature gate: OnClusterBuild 2026-02-16T17:23:36.323586684Z W0216 17:23:36.323574 1 feature_gate.go:330] unrecognized feature gate: NutanixMultiSubnets 2026-02-16T17:23:36.323586684Z W0216 17:23:36.323578 1 feature_gate.go:330] unrecognized feature gate: PinnedImages 2026-02-16T17:23:36.323586684Z W0216 17:23:36.323581 1 feature_gate.go:330] unrecognized feature gate: PrivateHostedZoneAWS 2026-02-16T17:23:36.323598485Z W0216 17:23:36.323585 1 feature_gate.go:330] unrecognized feature gate: UpgradeStatus 2026-02-16T17:23:36.323598485Z W0216 17:23:36.323589 1 feature_gate.go:330] unrecognized feature gate: InsightsOnDemandDataGather 2026-02-16T17:23:36.323598485Z W0216 17:23:36.323592 1 feature_gate.go:330] unrecognized feature gate: DNSNameResolver 2026-02-16T17:23:36.323598485Z W0216 17:23:36.323595 1 feature_gate.go:330] unrecognized feature gate: InsightsRuntimeExtractor 2026-02-16T17:23:36.323610825Z W0216 17:23:36.323599 1 feature_gate.go:330] unrecognized feature gate: NewOLM 2026-02-16T17:23:36.323610825Z W0216 17:23:36.323602 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallGCP 2026-02-16T17:23:36.323610825Z W0216 17:23:36.323605 1 feature_gate.go:330] unrecognized feature gate: NetworkLiveMigration 2026-02-16T17:23:36.323622725Z W0216 17:23:36.323608 1 feature_gate.go:330] unrecognized feature gate: IngressControllerDynamicConfigurationManager 2026-02-16T17:23:36.323622725Z W0216 17:23:36.323613 1 feature_gate.go:330] unrecognized feature gate: SetEIPForNLBIngressController 2026-02-16T17:23:36.323622725Z W0216 17:23:36.323617 1 feature_gate.go:330] unrecognized feature gate: SigstoreImageVerification 2026-02-16T17:23:36.323635016Z W0216 17:23:36.323620 1 feature_gate.go:330] unrecognized feature gate: AWSClusterHostedDNS 2026-02-16T17:23:36.323635016Z W0216 17:23:36.323624 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallAzure 2026-02-16T17:23:36.323635016Z W0216 17:23:36.323627 1 feature_gate.go:330] unrecognized feature gate: OVNObservability 2026-02-16T17:23:36.323635016Z W0216 17:23:36.323631 1 feature_gate.go:330] unrecognized feature gate: AdminNetworkPolicy 2026-02-16T17:23:36.323651926Z W0216 17:23:36.323635 1 feature_gate.go:330] unrecognized feature gate: AWSEFSDriverVolumeMetrics 2026-02-16T17:23:36.323651926Z W0216 17:23:36.323638 1 feature_gate.go:330] unrecognized feature gate: VolumeGroupSnapshot 2026-02-16T17:23:36.323651926Z W0216 17:23:36.323641 1 feature_gate.go:330] unrecognized feature gate: PlatformOperators 2026-02-16T17:23:36.323651926Z W0216 17:23:36.323645 1 feature_gate.go:330] unrecognized feature gate: GCPClusterHostedDNS 2026-02-16T17:23:36.323651926Z W0216 17:23:36.323648 1 feature_gate.go:330] unrecognized feature gate: ImageStreamImportMode 2026-02-16T17:23:36.323664616Z W0216 17:23:36.323651 1 feature_gate.go:330] unrecognized feature gate: ChunkSizeMiB 2026-02-16T17:23:36.323664616Z W0216 17:23:36.323656 1 feature_gate.go:353] Setting GA feature gate CloudDualStackNodeIPs=true. It will be removed in a future release. 2026-02-16T17:23:36.323664616Z W0216 17:23:36.323660 1 feature_gate.go:330] unrecognized feature gate: AzureWorkloadIdentity 2026-02-16T17:23:36.323676177Z W0216 17:23:36.323664 1 feature_gate.go:330] unrecognized feature gate: ManagedBootImages 2026-02-16T17:23:36.323676177Z W0216 17:23:36.323667 1 feature_gate.go:330] unrecognized feature gate: AdditionalRoutingCapabilities 2026-02-16T17:23:36.323676177Z W0216 17:23:36.323671 1 feature_gate.go:330] unrecognized feature gate: CSIDriverSharedResource 2026-02-16T17:23:36.323687877Z W0216 17:23:36.323674 1 feature_gate.go:330] unrecognized feature gate: OpenShiftPodSecurityAdmission 2026-02-16T17:23:36.323687877Z W0216 17:23:36.323678 1 feature_gate.go:330] unrecognized feature gate: AutomatedEtcdBackup 2026-02-16T17:23:36.323687877Z W0216 17:23:36.323681 1 feature_gate.go:330] unrecognized feature gate: MetricsCollectionProfiles 2026-02-16T17:23:36.323687877Z W0216 17:23:36.323685 1 feature_gate.go:330] unrecognized feature gate: MixedCPUsAllocation 2026-02-16T17:23:36.323699977Z W0216 17:23:36.323688 1 feature_gate.go:330] unrecognized feature gate: BareMetalLoadBalancer 2026-02-16T17:23:36.323699977Z W0216 17:23:36.323691 1 feature_gate.go:330] unrecognized feature gate: MachineAPIOperatorDisableMachineHealthCheckController 2026-02-16T17:23:36.323699977Z W0216 17:23:36.323695 1 feature_gate.go:330] unrecognized feature gate: ExternalOIDC 2026-02-16T17:23:36.323711608Z W0216 17:23:36.323698 1 feature_gate.go:330] unrecognized feature gate: VSphereMultiVCenters 2026-02-16T17:23:36.323711608Z W0216 17:23:36.323702 1 feature_gate.go:330] unrecognized feature gate: GatewayAPI 2026-02-16T17:23:36.323711608Z W0216 17:23:36.323705 1 feature_gate.go:330] unrecognized feature gate: EtcdBackendQuota 2026-02-16T17:23:36.323711608Z W0216 17:23:36.323708 1 feature_gate.go:330] unrecognized feature gate: ClusterAPIInstall 2026-02-16T17:23:36.323723668Z W0216 17:23:36.323712 1 feature_gate.go:330] unrecognized feature gate: MachineAPIProviderOpenStack 2026-02-16T17:23:36.323723668Z W0216 17:23:36.323716 1 feature_gate.go:330] unrecognized feature gate: ManagedBootImagesAWS 2026-02-16T17:23:36.323723668Z W0216 17:23:36.323719 1 feature_gate.go:330] unrecognized feature gate: InsightsConfig 2026-02-16T17:23:36.323758549Z W0216 17:23:36.323723 1 feature_gate.go:330] unrecognized feature gate: VSphereStaticIPs 2026-02-16T17:23:36.323758549Z W0216 17:23:36.323731 1 feature_gate.go:353] Setting GA feature gate ValidatingAdmissionPolicy=true. It will be removed in a future release. 2026-02-16T17:23:36.323758549Z W0216 17:23:36.323734 1 feature_gate.go:330] unrecognized feature gate: Example 2026-02-16T17:23:36.323758549Z W0216 17:23:36.323738 1 feature_gate.go:330] unrecognized feature gate: InsightsConfigAPI 2026-02-16T17:23:36.323758549Z W0216 17:23:36.323741 1 feature_gate.go:330] unrecognized feature gate: ConsolePluginContentSecurityPolicy 2026-02-16T17:23:36.323758549Z W0216 17:23:36.323745 1 feature_gate.go:330] unrecognized feature gate: ClusterAPIInstallIBMCloud 2026-02-16T17:23:36.323758549Z W0216 17:23:36.323748 1 feature_gate.go:330] unrecognized feature gate: NodeDisruptionPolicy 2026-02-16T17:23:36.323758549Z W0216 17:23:36.323752 1 feature_gate.go:330] unrecognized feature gate: RouteAdvertisements 2026-02-16T17:23:36.323758549Z W0216 17:23:36.323755 1 feature_gate.go:330] unrecognized feature gate: GCPLabelsTags 2026-02-16T17:23:36.323772889Z W0216 17:23:36.323759 1 feature_gate.go:330] unrecognized feature gate: AlibabaPlatform 2026-02-16T17:23:36.323772889Z W0216 17:23:36.323763 1 feature_gate.go:330] unrecognized feature gate: VSphereMultiNetworks 2026-02-16T17:23:36.323772889Z W0216 17:23:36.323766 1 feature_gate.go:330] unrecognized feature gate: NetworkSegmentation 2026-02-16T17:23:36.323772889Z W0216 17:23:36.323769 1 feature_gate.go:330] unrecognized feature gate: IngressControllerLBSubnetsAWS 2026-02-16T17:23:37.049467858Z I0216 17:23:37.049368 1 serving.go:380] Generated self-signed cert (/var/run/kubernetes/kube-controller-manager.crt, /var/run/kubernetes/kube-controller-manager.key) 2026-02-16T17:23:37.052524689Z I0216 17:23:37.052460 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/kubernetes/kube-controller-manager.crt::/var/run/kubernetes/kube-controller-manager.key" 2026-02-16T17:23:47.756413663Z E0216 17:23:47.756295 1 run.go:72] "command failed" err="unable to load configmap based request-header-client-ca-file: Get \"https://localhost:6443/api/v1/namespaces/kube-system/configmaps/extension-apiserver-authentication\": net/http: TLS handshake timeout" config/pod/kube-system/bootstrap-kube-controller-manager-master-0.json0000640000000000000000000002766715144651377024651 0ustar0000000000000000{"metadata":{"name":"bootstrap-kube-controller-manager-master-0","namespace":"kube-system","uid":"67aa7027-5cfd-41e1-9f0a-cb3a00bd09ba","resourceVersion":"20077","creationTimestamp":"2026-02-16T16:59:40Z","labels":{"openshift.io/component":"controller-manager","openshift.io/control-plane":"true"},"annotations":{"kubernetes.io/config.hash":"80420f2e7c3cdda71f7d0d6ccbe6f9f3","kubernetes.io/config.mirror":"80420f2e7c3cdda71f7d0d6ccbe6f9f3","kubernetes.io/config.seen":"2026-02-16T16:58:16.617803795Z","kubernetes.io/config.source":"file","openshift.io/run-level":"0","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"da39ce92-6a7c-4cce-aa8b-3e495e33f616","controller":true}]},"spec":{"volumes":[{"name":"secrets","hostPath":{"path":"/etc/kubernetes/bootstrap-secrets","type":""}},{"name":"etc-kubernetes-cloud","hostPath":{"path":"/etc/kubernetes/cloud","type":""}},{"name":"config","hostPath":{"path":"/etc/kubernetes/bootstrap-configs","type":""}},{"name":"ssl-certs-host","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"logs","hostPath":{"path":"/var/log/bootstrap-control-plane","type":""}}],"containers":[{"name":"kube-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","command":["hyperkube","kube-controller-manager"],"args":["--openshift-config=/etc/kubernetes/config/kube-controller-manager-config.yaml","--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--v=2","--allocate-node-cidrs=false","--authentication-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--cert-dir=/var/run/kubernetes","--cloud-provider=external","--cluster-cidr=10.128.0.0/16","--cluster-signing-cert-file=/etc/kubernetes/secrets/kubelet-signer.crt","--cluster-signing-duration=720h","--cluster-signing-key-file=/etc/kubernetes/secrets/kubelet-signer.key","--controllers=*","--controllers=-bootstrapsigner","--controllers=-tokencleaner","--controllers=-ttl","--enable-dynamic-provisioning=true","--feature-gates=AWSClusterHostedDNS=false","--feature-gates=AWSEFSDriverVolumeMetrics=true","--feature-gates=AdditionalRoutingCapabilities=false","--feature-gates=AdminNetworkPolicy=true","--feature-gates=AlibabaPlatform=true","--feature-gates=AutomatedEtcdBackup=false","--feature-gates=AzureWorkloadIdentity=true","--feature-gates=BareMetalLoadBalancer=true","--feature-gates=BootcNodeManagement=false","--feature-gates=BuildCSIVolumes=true","--feature-gates=CSIDriverSharedResource=false","--feature-gates=ChunkSizeMiB=true","--feature-gates=CloudDualStackNodeIPs=true","--feature-gates=ClusterAPIInstall=false","--feature-gates=ClusterAPIInstallIBMCloud=false","--feature-gates=ClusterMonitoringConfig=false","--feature-gates=ConsolePluginContentSecurityPolicy=false","--feature-gates=DNSNameResolver=false","--feature-gates=DisableKubeletCloudCredentialProviders=true","--feature-gates=DynamicResourceAllocation=false","--feature-gates=EtcdBackendQuota=false","--feature-gates=EventedPLEG=false","--feature-gates=Example=false","--feature-gates=ExternalOIDC=false","--feature-gates=ExternalOIDCWithUIDAndExtraClaimMappings=false","--feature-gates=GCPClusterHostedDNS=false","--feature-gates=GCPLabelsTags=true","--feature-gates=GatewayAPI=false","--feature-gates=HardwareSpeed=true","--feature-gates=ImageStreamImportMode=false","--feature-gates=IngressControllerDynamicConfigurationManager=false","--feature-gates=IngressControllerLBSubnetsAWS=true","--feature-gates=InsightsConfig=false","--feature-gates=InsightsConfigAPI=false","--feature-gates=InsightsOnDemandDataGather=false","--feature-gates=InsightsRuntimeExtractor=false","--feature-gates=KMSv1=true","--feature-gates=MachineAPIMigration=false","--feature-gates=MachineAPIOperatorDisableMachineHealthCheckController=false","--feature-gates=MachineAPIProviderOpenStack=false","--feature-gates=MachineConfigNodes=false","--feature-gates=ManagedBootImages=true","--feature-gates=ManagedBootImagesAWS=true","--feature-gates=MaxUnavailableStatefulSet=false","--feature-gates=MetricsCollectionProfiles=false","--feature-gates=MinimumKubeletVersion=false","--feature-gates=MixedCPUsAllocation=false","--feature-gates=MultiArchInstallAWS=true","--feature-gates=MultiArchInstallAzure=false","--feature-gates=MultiArchInstallGCP=true","--feature-gates=NetworkDiagnosticsConfig=true","--feature-gates=NetworkLiveMigration=true","--feature-gates=NetworkSegmentation=true","--feature-gates=NewOLM=true","--feature-gates=NodeDisruptionPolicy=true","--feature-gates=NodeSwap=false","--feature-gates=NutanixMultiSubnets=false","--feature-gates=OVNObservability=false","--feature-gates=OnClusterBuild=true","--feature-gates=OpenShiftPodSecurityAdmission=false","--feature-gates=PersistentIPsForVirtualization=true","--feature-gates=PinnedImages=false","--feature-gates=PlatformOperators=false","--feature-gates=PrivateHostedZoneAWS=true","--feature-gates=ProcMountType=false","--feature-gates=RouteAdvertisements=false","--feature-gates=RouteExternalCertificate=false","--feature-gates=ServiceAccountTokenNodeBinding=false","--feature-gates=SetEIPForNLBIngressController=true","--feature-gates=SignatureStores=false","--feature-gates=SigstoreImageVerification=false","--feature-gates=StreamingCollectionEncodingToJSON=true","--feature-gates=StreamingCollectionEncodingToProtobuf=true","--feature-gates=TranslateStreamCloseWebsocketRequests=false","--feature-gates=UpgradeStatus=false","--feature-gates=UserNamespacesPodSecurityStandards=false","--feature-gates=UserNamespacesSupport=false","--feature-gates=VSphereControlPlaneMachineSet=true","--feature-gates=VSphereDriverConfiguration=true","--feature-gates=VSphereMultiNetworks=false","--feature-gates=VSphereMultiVCenters=true","--feature-gates=VSphereStaticIPs=true","--feature-gates=ValidatingAdmissionPolicy=true","--feature-gates=VolumeAttributesClass=false","--feature-gates=VolumeGroupSnapshot=false","--flex-volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec","--kube-api-burst=300","--kube-api-qps=150","--leader-elect-renew-deadline=12s","--leader-elect-resource-lock=leases","--leader-elect-retry-period=3s","--leader-elect=true","--pv-recycler-pod-template-filepath-hostpath=","--pv-recycler-pod-template-filepath-nfs=","--root-ca-file=/etc/kubernetes/secrets/kube-apiserver-complete-server-ca-bundle.crt","--secure-port=10257","--service-account-private-key-file=/etc/kubernetes/secrets/service-account.key","--service-cluster-ip-range=172.30.0.0/16","--use-service-account-credentials=true"],"ports":[{"hostPort":10257,"containerPort":10257,"protocol":"TCP"}],"resources":{"requests":{"cpu":"60m","memory":"200Mi"}},"volumeMounts":[{"name":"ssl-certs-host","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"etc-kubernetes-cloud","readOnly":true,"mountPath":"/etc/kubernetes/cloud"},{"name":"config","readOnly":true,"mountPath":"/etc/kubernetes/config"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"timeoutSeconds":3,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"},{"name":"cluster-policy-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5d54bd262ca625a326b01ea2bfd33db10a402c05590e6b710b0959712e1bf30b","command":["cluster-policy-controller","start"],"args":["--config=/etc/kubernetes/config/cluster-policy-controller-config.yaml","--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--namespace=$(POD_NAMESPACE)","--v=2"],"ports":[{"hostPort":10357,"containerPort":10357,"protocol":"TCP"}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"200Mi"}},"volumeMounts":[{"name":"ssl-certs-host","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"etc-kubernetes-cloud","readOnly":true,"mountPath":"/etc/kubernetes/cloud"},{"name":"config","readOnly":true,"mountPath":"/etc/kubernetes/config"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"timeoutSeconds":3,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priority":0,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:03Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:03Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:10Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:10Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:03Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-16T17:24:03Z","containerStatuses":[{"name":"cluster-policy-controller","state":{"running":{"startedAt":"2026-02-16T17:23:59Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","startedAt":"2026-02-16T17:23:34Z","finishedAt":"2026-02-16T17:23:59Z","containerID":"cri-o://95e6dcc1eaac7663dc235705bd5f762414f0d18a15d00f92c6da3b036fb26838"}},"ready":true,"restartCount":4,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5d54bd262ca625a326b01ea2bfd33db10a402c05590e6b710b0959712e1bf30b","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5d54bd262ca625a326b01ea2bfd33db10a402c05590e6b710b0959712e1bf30b","containerID":"cri-o://0b777450b82ef32f087a9da43a997829f093f7fa4784d74b7528b198ad989c4b","started":true},{"name":"kube-controller-manager","state":{"running":{"startedAt":"2026-02-16T17:23:58Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","startedAt":"2026-02-16T17:23:36Z","finishedAt":"2026-02-16T17:23:47Z","containerID":"cri-o://ac596da9ba2aef67b1e91be250c648d0d94ad9e7ab12065e2f256126b855cff0"}},"ready":true,"restartCount":11,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","containerID":"cri-o://c75fa4ecf6988458954826cf05f6b61fe6e9ae7d0edc07d67e6f06f41e48bcdc","started":true}],"qosClass":"Burstable"}}kube-controller-manager-operator_current.log0000640000000000000000000001020415144651377044400 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-78ff47c7c5-txr5k2026-02-16T17:24:40.561314419Z I0216 17:24:40.561168 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-16T17:24:40.561522395Z I0216 17:24:40.561493 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-16T17:24:40.562286425Z I0216 17:24:40.562227 1 observer_polling.go:159] Starting file observer 2026-02-16T17:24:40.606061584Z I0216 17:24:40.606012 1 builder.go:304] kube-controller-manager-operator version 4.18.0-202601161039.p2.g9a9a437.assembly.stream.el9-9a9a437-9a9a437f2342dc9bba7844298b955d5f9bbc76bb 2026-02-16T17:24:41.805503755Z I0216 17:24:41.805458 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-16T17:24:41.805503755Z W0216 17:24:41.805482 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-16T17:24:41.805503755Z W0216 17:24:41.805488 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-16T17:24:41.805503755Z W0216 17:24:41.805495 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-16T17:24:41.805503755Z W0216 17:24:41.805498 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-16T17:24:41.805535856Z W0216 17:24:41.805501 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-16T17:24:41.805535856Z W0216 17:24:41.805504 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-16T17:24:42.259914048Z I0216 17:24:42.258735 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-16T17:24:42.259914048Z I0216 17:24:42.259362 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-16T17:24:42.259914048Z I0216 17:24:42.259582 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-controller-manager-operator/kube-controller-manager-operator-lock... 2026-02-16T17:24:42.259914048Z I0216 17:24:42.259795 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-16T17:24:42.259914048Z I0216 17:24:42.259812 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-16T17:24:42.259914048Z I0216 17:24:42.259840 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-16T17:24:42.260076682Z I0216 17:24:42.259949 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-16T17:24:42.260076682Z I0216 17:24:42.260044 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-16T17:24:42.260076682Z I0216 17:24:42.260051 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T17:24:42.260076682Z I0216 17:24:42.260066 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-16T17:24:42.260076682Z I0216 17:24:42.260071 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T17:24:42.360528152Z I0216 17:24:42.360467 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-16T17:24:42.360621185Z I0216 17:24:42.360596 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T17:24:42.361185420Z I0216 17:24:42.361156 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file kube-controller-manager-operator-78ff47c7c5-txr5k.json0000640000000000000000000001417115144651377033521 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator{"metadata":{"name":"kube-controller-manager-operator-78ff47c7c5-txr5k","generateName":"kube-controller-manager-operator-78ff47c7c5-","namespace":"openshift-kube-controller-manager-operator","uid":"442600dc-09b2-4fee-9f89-777296b2ee40","resourceVersion":"21055","creationTimestamp":"2026-02-16T16:58:52Z","labels":{"app":"kube-controller-manager-operator","pod-template-hash":"78ff47c7c5"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.22/23\"],\"mac_address\":\"0a:58:0a:80:00:16\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.22/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.22\"\n ],\n \"mac\": \"0a:58:0a:80:00:16\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-controller-manager-operator-78ff47c7c5","uid":"6960d573-0bb7-4821-9218-8aece9786f83","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","command":["cluster-kube-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39"},{"name":"CLUSTER_POLICY_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5d54bd262ca625a326b01ea2bfd33db10a402c05590e6b710b0959712e1bf30b"},{"name":"TOOLS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ffa02bd6af0b44d4955aba57f727e13671f503393926be6d8965e31dcfcd6e3c"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-controller-manager-operator","serviceAccount":"kube-controller-manager-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:40Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T16:59:56Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:40Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:40Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T16:59:56Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.22","podIPs":[{"ip":"10.128.0.22"}],"startTime":"2026-02-16T16:59:56Z","containerStatuses":[{"name":"kube-controller-manager-operator","state":{"running":{"startedAt":"2026-02-16T17:24:40Z"}},"lastState":{},"ready":true,"restartCount":5,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","containerID":"cri-o://1e1c74ee4022c9c9d130c2efb7fc45ddb103ba4b3e1c45124e46e2fbd13251d2","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-controller-manager/logs/installer-2-master-0/installer_current.log0000640000000000000000000000015615144651377031012 0ustar0000000000000000unable to retrieve container logs for cri-o://2c53a58c131794a80fa1c0999460553c2cc95a04f4d47697c0e7fb42de126acfconfig/pod/openshift-kube-controller-manager/installer-2-master-0.json0000640000000000000000000001706315144651377024504 0ustar0000000000000000{"metadata":{"name":"installer-2-master-0","namespace":"openshift-kube-controller-manager","uid":"5d39ed24-4301-4cea-8a42-a08f4ba8b479","resourceVersion":"15064","creationTimestamp":"2026-02-16T17:01:32Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.62/23\"],\"mac_address\":\"0a:58:0a:80:00:3e\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.62/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.62\"\n ],\n \"mac\": \"0a:58:0a:80:00:3e\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-2","uid":"979391f6-5a5f-4ab8-aac8-85d39fba0581"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","command":["cluster-kube-controller-manager-operator","installer"],"args":["-v=2","--revision=2","--namespace=openshift-kube-controller-manager","--pod=kube-controller-manager-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-controller-manager-pod","--configmaps=config","--configmaps=cluster-policy-controller-config","--configmaps=controller-manager-kubeconfig","--optional-configmaps=cloud-config","--configmaps=kube-controller-cert-syncer-kubeconfig","--configmaps=serviceaccount-ca","--configmaps=service-ca","--configmaps=recycler-config","--secrets=service-account-private-key","--optional-secrets=serving-cert","--secrets=localhost-recovery-client-token","--cert-dir=/etc/kubernetes/static-pod-resources/kube-controller-manager-certs","--cert-configmaps=aggregator-client-ca","--cert-configmaps=client-ca","--optional-cert-configmaps=trusted-ca-bundle","--cert-secrets=kube-controller-manager-client-cert-key","--cert-secrets=csr-signer"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"imagePullSecrets":[{"name":"installer-sa-dockercfg-qlqr4"}],"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:02:39Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:01:33Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:02:37Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:02:37Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:01:33Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-16T17:01:33Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"taller revisions to settle for node master-0\nI0216 17:01:35.234528 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0216 17:01:35.234558 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0216 17:01:35.248736 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\nI0216 17:01:45.254520 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\nI0216 17:01:55.820613 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\nW0216 17:02:05.252061 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": dial tcp 172.30.0.1:443: connect: connection refused\nW0216 17:02:15.250548 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": dial tcp 172.30.0.1:443: connect: connection refused\nW0216 17:02:25.251080 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": dial tcp 172.30.0.1:443: connect: connection refused\nW0216 17:02:35.250231 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": dial tcp 172.30.0.1:443: connect: connection refused\nW0216 17:02:35.250822 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": dial tcp 172.30.0.1:443: connect: connection refused\nF0216 17:02:35.250856 1 cmd.go:109] timed out waiting for the condition\n","startedAt":"2026-02-16T17:01:34Z","finishedAt":"2026-02-16T17:02:35Z","containerID":"cri-o://2c53a58c131794a80fa1c0999460553c2cc95a04f4d47697c0e7fb42de126acf"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","containerID":"cri-o://2c53a58c131794a80fa1c0999460553c2cc95a04f4d47697c0e7fb42de126acf","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}config/pod/openshift-image-registry/node-ca-xv2wv.json0000640000000000000000000001145115144651377021526 0ustar0000000000000000{"metadata":{"name":"node-ca-xv2wv","generateName":"node-ca-","namespace":"openshift-image-registry","uid":"810a2275-fae5-45df-a3b8-92860451d33b","resourceVersion":"20114","creationTimestamp":"2026-02-16T17:08:26Z","labels":{"controller-revision-hash":"59598b9cbd","name":"node-ca","pod-template-generation":"1"},"annotations":{"openshift.io/required-scc":"privileged","openshift.io/scc":"privileged"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"DaemonSet","name":"node-ca","uid":"23692882-f912-4e9b-b00a-513060d28d0e","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"host","hostPath":{"path":"/etc/docker/certs.d","type":""}},{"name":"serviceca","configMap":{"name":"image-registry-certificates","defaultMode":420}},{"name":"kube-api-access-ktgm7","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"node-ca","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fc2817e5b16d83dac91d1a274fb93521165953e9bdc28f3073b127eacc5a534e","command":["/bin/sh","-c","trap 'jobs -p | xargs -r kill; echo shutting down node-ca; exit 0' TERM\nwhile [ true ];\ndo\n for f in $(ls /tmp/serviceca); do\n echo $f\n ca_file_path=\"/tmp/serviceca/${f}\"\n f=$(echo $f | sed -r 's/(.*)\\.\\./\\1:/')\n reg_dir_path=\"/etc/docker/certs.d/${f}\"\n if [ -e \"${reg_dir_path}\" ]; then\n cp -u $ca_file_path $reg_dir_path/ca.crt\n else\n mkdir $reg_dir_path\n cp $ca_file_path $reg_dir_path/ca.crt\n fi\n done\n for d in $(ls /etc/docker/certs.d); do\n echo $d\n dp=$(echo $d | sed -r 's/(.*):/\\1\\.\\./')\n reg_conf_path=\"/tmp/serviceca/${dp}\"\n if [ ! -e \"${reg_conf_path}\" ]; then\n rm -rf /etc/docker/certs.d/$d\n fi\n done\n sleep 60 \u0026 wait ${!}\ndone\n"],"resources":{"requests":{"cpu":"10m","memory":"10Mi"}},"volumeMounts":[{"name":"serviceca","mountPath":"/tmp/serviceca"},{"name":"host","mountPath":"/etc/docker/certs.d"},{"name":"kube-api-access-ktgm7","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":1001,"runAsGroup":0,"runAsNonRoot":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux"},"serviceAccountName":"node-ca","serviceAccount":"node-ca","nodeName":"master-0","hostNetwork":true,"securityContext":{},"imagePullSecrets":[{"name":"node-ca-dockercfg-gvwqd"}],"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchFields":[{"key":"metadata.name","operator":"In","values":["master-0"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:17:02Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:16:56Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:04Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:04Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:16:56Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-16T17:16:56Z","containerStatuses":[{"name":"node-ca","state":{"running":{"startedAt":"2026-02-16T17:24:04Z"}},"lastState":{},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fc2817e5b16d83dac91d1a274fb93521165953e9bdc28f3073b127eacc5a534e","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fc2817e5b16d83dac91d1a274fb93521165953e9bdc28f3073b127eacc5a534e","containerID":"cri-o://cd1dcc6663f82674b6b55e23585951122210f13a603a2fe83780585ba9cdbbde","started":true,"volumeMounts":[{"name":"serviceca","mountPath":"/tmp/serviceca"},{"name":"host","mountPath":"/etc/docker/certs.d"},{"name":"kube-api-access-ktgm7","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}cluster-image-registry-operator_current.log0000640000000000000000000000153215144651377040500 0ustar0000000000000000config/pod/openshift-image-registry/logs/cluster-image-registry-operator-96c8c64b8-zwwnk2026-02-16T17:24:41.356548667Z Overwriting root TLS certificate authority trust store 2026-02-16T17:24:42.167358877Z I0216 17:24:42.166500 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-16T17:24:42.167358877Z I0216 17:24:42.167164 1 observer_polling.go:159] Starting file observer 2026-02-16T17:24:42.679150370Z I0216 17:24:42.679095 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-16T17:24:42.679494139Z I0216 17:24:42.679455 1 leaderelection.go:254] attempting to acquire leader lease openshift-image-registry/openshift-master-controllers... config/pod/openshift-image-registry/cluster-image-registry-operator-96c8c64b8-zwwnk.json0000640000000000000000000001550515144651377030006 0ustar0000000000000000{"metadata":{"name":"cluster-image-registry-operator-96c8c64b8-zwwnk","generateName":"cluster-image-registry-operator-96c8c64b8-","namespace":"openshift-image-registry","uid":"5dfc09be-2f60-4420-8d3a-6b00b1d3e6fd","resourceVersion":"21143","creationTimestamp":"2026-02-16T16:58:50Z","labels":{"name":"cluster-image-registry-operator","pod-template-hash":"96c8c64b8"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.10/23\"],\"mac_address\":\"0a:58:0a:80:00:0a\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.10/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.10\"\n ],\n \"mac\": \"0a:58:0a:80:00:0a\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-image-registry-operator-96c8c64b8","uid":"3506fa5b-7484-4b05-984a-e67001726ff6","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"image-registry-operator-tls","secret":{"secretName":"image-registry-operator-tls","defaultMode":420}},{"name":"trusted-ca","configMap":{"name":"trusted-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420,"optional":true}},{"name":"bound-sa-token","projected":{"sources":[{"serviceAccountToken":{"audience":"openshift","expirationSeconds":3600,"path":"token"}}],"defaultMode":420}},{"name":"kube-api-access-b5mwd","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-image-registry-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc03f91dbf08df9907c0ebad30c54a7fa92285b19ec4e440ed762b197378a861","args":["--files=/var/run/configmaps/trusted-ca/tls-ca-bundle.pem","--files=/etc/secrets/tls.crt","--files=/etc/secrets/tls.key"],"ports":[{"name":"metrics","containerPort":60000,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.32"},{"name":"WATCH_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"OPERATOR_NAME","value":"cluster-image-registry-operator"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc03f91dbf08df9907c0ebad30c54a7fa92285b19ec4e440ed762b197378a861"},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fc2817e5b16d83dac91d1a274fb93521165953e9bdc28f3073b127eacc5a534e"},{"name":"IMAGE_PRUNER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e155421620a4ac28a759265f53059b75308fdd1491caeba6a9a34d2fbeab4954"},{"name":"AZURE_ENVIRONMENT_FILEPATH","value":"/tmp/azurestackcloud.json"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"trusted-ca","mountPath":"/var/run/configmaps/trusted-ca/"},{"name":"image-registry-operator-tls","mountPath":"/etc/secrets"},{"name":"bound-sa-token","readOnly":true,"mountPath":"/var/run/secrets/openshift/serviceaccount"},{"name":"kube-api-access-b5mwd","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000340000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-image-registry-operator","serviceAccount":"cluster-image-registry-operator","nodeName":"master-0","shareProcessNamespace":false,"securityContext":{"seLinuxOptions":{"level":"s0:c18,c17"},"fsGroup":1000340000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:42Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T16:59:56Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:42Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:42Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T16:59:56Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.10","podIPs":[{"ip":"10.128.0.10"}],"startTime":"2026-02-16T16:59:56Z","containerStatuses":[{"name":"cluster-image-registry-operator","state":{"running":{"startedAt":"2026-02-16T17:24:41Z"}},"lastState":{},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc03f91dbf08df9907c0ebad30c54a7fa92285b19ec4e440ed762b197378a861","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc03f91dbf08df9907c0ebad30c54a7fa92285b19ec4e440ed762b197378a861","containerID":"cri-o://b7252a3b5a750d239c071ff4651336c60de818afdfbefc5c473f12a275c4460c","started":true,"volumeMounts":[{"name":"trusted-ca","mountPath":"/var/run/configmaps/trusted-ca/"},{"name":"image-registry-operator-tls","mountPath":"/etc/secrets"},{"name":"bound-sa-token","mountPath":"/var/run/secrets/openshift/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-b5mwd","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-console/logs/downloads-dcd7b7d95-dhhfh/download-server_current.log0000640000000000000000000000126515144651377027736 0ustar00000000000000002026-02-16T17:24:45.868371701Z ::ffff:10.128.0.2 - - [16/Feb/2026 17:24:45] "GET / HTTP/1.1" 200 - 2026-02-16T17:24:45.868371701Z ::ffff:10.128.0.2 - - [16/Feb/2026 17:24:45] "GET / HTTP/1.1" 200 - 2026-02-16T17:24:45.869812369Z ::ffff:10.128.0.2 - - [16/Feb/2026 17:24:45] "GET / HTTP/1.1" 200 - 2026-02-16T17:24:55.864344587Z ::ffff:10.128.0.2 - - [16/Feb/2026 17:24:55] "GET / HTTP/1.1" 200 - 2026-02-16T17:24:55.864876831Z ::ffff:10.128.0.2 - - [16/Feb/2026 17:24:55] "GET / HTTP/1.1" 200 - 2026-02-16T17:25:05.874829419Z ::ffff:10.128.0.2 - - [16/Feb/2026 17:25:05] "GET / HTTP/1.1" 200 - 2026-02-16T17:25:05.875150558Z ::ffff:10.128.0.2 - - [16/Feb/2026 17:25:05] "GET / HTTP/1.1" 200 - config/pod/openshift-console/downloads-dcd7b7d95-dhhfh.json0000640000000000000000000002262215144651377022305 0ustar0000000000000000{"metadata":{"name":"downloads-dcd7b7d95-dhhfh","generateName":"downloads-dcd7b7d95-","namespace":"openshift-console","uid":"08a90dc5-b0d8-4aad-a002-736492b6c1a9","resourceVersion":"21257","creationTimestamp":"2026-02-16T17:04:18Z","labels":{"app":"console","component":"downloads","pod-template-hash":"dcd7b7d95"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.80/23\"],\"mac_address\":\"0a:58:0a:80:00:50\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.80/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.80\"\n ],\n \"mac\": \"0a:58:0a:80:00:50\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"downloads-dcd7b7d95","uid":"5f0f80be-7d01-432a-bd6d-5e2dc76febb1","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"kube-api-access-p6xfw","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"download-server","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7fccb6e19eb4caa16d32f4cf59670c2c741c98b099d1f12368b85aab3f84dc38","command":["/bin/sh"],"args":["-c","cat \u003c\u003cEOF \u003e\u003e/tmp/serve.py\nimport errno, http.server, os, re, signal, socket, sys, tarfile, tempfile, threading, time, zipfile\n\nsignal.signal(signal.SIGTERM, lambda signum, frame: sys.exit(0))\n\ndef write_index(path, message):\n with open(path, 'wb') as f:\n f.write('\\n'.join([\n '\u003c!doctype html\u003e',\n '\u003chtml lang=\"en\"\u003e',\n '\u003chead\u003e',\n ' \u003cmeta charset=\"utf-8\"\u003e',\n '\u003c/head\u003e',\n '\u003cbody\u003e',\n ' {}'.format(message),\n '\u003c/body\u003e',\n '\u003c/html\u003e',\n '',\n ]).encode('utf-8'))\n\n# Launch multiple listeners as threads\nclass Thread(threading.Thread):\n def __init__(self, i, socket):\n threading.Thread.__init__(self)\n self.i = i\n self.socket = socket\n self.daemon = True\n self.start()\n\n def run(self):\n server = http.server.SimpleHTTPRequestHandler\n server.server_version = \"OpenShift Downloads Server\"\n server.sys_version = \"\"\n httpd = http.server.HTTPServer(addr, server, False)\n\n # Prevent the HTTP server from re-binding every handler.\n # https://stackoverflow.com/questions/46210672/\n httpd.socket = self.socket\n httpd.server_bind = self.server_close = lambda self: None\n\n httpd.serve_forever()\n\ntemp_dir = tempfile.mkdtemp()\nprint('serving from {}'.format(temp_dir))\nos.chdir(temp_dir)\nfor arch in ['amd64', 'arm64', 'ppc64le', 's390x']:\n os.mkdir(arch)\ncontent = ['\u003ca href=\"oc-license\"\u003elicense\u003c/a\u003e']\nos.symlink('/usr/share/openshift/LICENSE', 'oc-license')\n\nfor arch, operating_system, path in [\n ('amd64', 'linux', '/usr/share/openshift/linux_amd64/oc'),\n ('amd64', 'mac', '/usr/share/openshift/mac/oc'),\n ('amd64', 'windows', '/usr/share/openshift/windows/oc.exe'),\n ('arm64', 'linux', '/usr/share/openshift/linux_arm64/oc'),\n ('arm64', 'mac', '/usr/share/openshift/mac_arm64/oc'),\n ('ppc64le', 'linux', '/usr/share/openshift/linux_ppc64le/oc'),\n ('s390x', 'linux', '/usr/share/openshift/linux_s390x/oc'),\n ]:\n basename = os.path.basename(path)\n target_path = os.path.join(arch, operating_system, basename)\n os.mkdir(os.path.join(arch, operating_system))\n os.symlink(path, target_path)\n base_root, _ = os.path.splitext(basename)\n archive_path_root = os.path.join(arch, operating_system, base_root)\n with tarfile.open('{}.tar'.format(archive_path_root), 'w') as tar:\n tar.add(path, basename)\n with zipfile.ZipFile('{}.zip'.format(archive_path_root), 'w') as zip:\n zip.write(path, basename)\n content.append(\n '\u003ca href=\"{0}\"\u003eoc ({1} {2})\u003c/a\u003e (\u003ca href=\"{3}.tar\"\u003etar\u003c/a\u003e \u003ca href=\"{3}.zip\"\u003ezip\u003c/a\u003e)'.format(\n target_path, arch, operating_system, archive_path_root\n )\n )\n\nfor root, directories, filenames in os.walk(temp_dir):\n root_link = os.path.relpath(temp_dir, os.path.join(root, 'child')).replace(os.path.sep, '/')\n for directory in directories:\n write_index(\n path=os.path.join(root, directory, 'index.html'),\n message='\u003cp\u003eDirectory listings are disabled. See \u003ca href=\"{}\"\u003ehere\u003c/a\u003e for available content.\u003c/p\u003e'.format(root_link),\n )\n\nwrite_index(\n path=os.path.join(temp_dir, 'index.html'),\n message='\\n'.join(\n ['\u003cul\u003e'] +\n [' \u003cli\u003e{}\u003c/li\u003e'.format(entry) for entry in content] +\n ['\u003c/ul\u003e']\n ),\n)\n\n# Create socket\n# IPv6 should handle IPv4 passively so long as it is not bound to a\n# specific address or set to IPv6_ONLY\n# https://stackoverflow.com/questions/25817848/python-3-does-http-server-support-ipv6\ntry:\n addr = ('::', 8080)\n sock = socket.socket(socket.AF_INET6, socket.SOCK_STREAM)\nexcept socket.error as err:\n # errno.EAFNOSUPPORT is \"socket.error: [Errno 97] Address family not supported by protocol\"\n # When IPv6 is disabled, socket will bind using IPv4.\n if err.errno == errno.EAFNOSUPPORT:\n addr = ('', 8080)\n sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)\n else:\n raise \nsock.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)\nsock.bind(addr)\nsock.listen(5)\n\n[Thread(i, socket=sock) for i in range(100)]\ntime.sleep(9e9)\nEOF\nexec python3 /tmp/serve.py\n"],"ports":[{"name":"http","containerPort":8080,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"kube-api-access-p6xfw","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/","port":8080,"scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/","port":8080,"scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000700000,"readOnlyRootFilesystem":false,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":0,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"default","serviceAccount":"default","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c26,c25"},"runAsNonRoot":true,"fsGroup":1000700000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:39Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:04:18Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:45Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:45Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:04:18Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.80","podIPs":[{"ip":"10.128.0.80"}],"startTime":"2026-02-16T17:04:18Z","containerStatuses":[{"name":"download-server","state":{"running":{"startedAt":"2026-02-16T17:24:38Z"}},"lastState":{},"ready":true,"restartCount":4,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7fccb6e19eb4caa16d32f4cf59670c2c741c98b099d1f12368b85aab3f84dc38","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7fccb6e19eb4caa16d32f4cf59670c2c741c98b099d1f12368b85aab3f84dc38","containerID":"cri-o://9b5a3d8bb8914d0a1d77974dc5c1fdfaec5ff3feff38532fa756e475a530a18f","started":true,"volumeMounts":[{"name":"kube-api-access-p6xfw","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-console/logs/console-599b567ff7-nrcpr/console_current.log0000640000000000000000000000073115144651377025736 0ustar00000000000000002026-02-16T17:24:41.728687581Z I0216 17:24:41.728610 1 main.go:217] The following console plugins are enabled: 2026-02-16T17:24:41.728687581Z I0216 17:24:41.728634 1 main.go:219] - monitoring-plugin 2026-02-16T17:24:41.728687581Z I0216 17:24:41.728638 1 main.go:219] - networking-console-plugin 2026-02-16T17:24:41.728687581Z W0216 17:24:41.728655 1 authoptions.go:112] Flag inactivity-timeout is set to less then 300 seconds and will be ignored! config/pod/openshift-console/console-599b567ff7-nrcpr.json0000640000000000000000000001777115144651377021772 0ustar0000000000000000{"metadata":{"name":"console-599b567ff7-nrcpr","generateName":"console-599b567ff7-","namespace":"openshift-console","uid":"ed3d89d0-bc00-482e-a656-7fdf4646ab0a","resourceVersion":"21148","creationTimestamp":"2026-02-16T17:08:35Z","labels":{"app":"console","component":"ui","pod-template-hash":"599b567ff7"},"annotations":{"console.openshift.io/authn-ca-trust-config-version":"12192","console.openshift.io/console-config-version":"14510","console.openshift.io/image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8164cc9e16e8be9ea18be73c9df5041af326ed6b3059faff08f76e568cf4dc2","console.openshift.io/infrastructure-config-version":"537","console.openshift.io/oauth-secret-version":"12214","console.openshift.io/proxy-config-version":"554","console.openshift.io/service-ca-config-version":"14197","console.openshift.io/trusted-ca-config-version":"14208","k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.13/23\"],\"mac_address\":\"0a:58:0a:80:00:0d\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.13/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.13\"\n ],\n \"mac\": \"0a:58:0a:80:00:0d\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"console-599b567ff7","uid":"da6e5501-6d99-40ef-8af7-36dcadc36283","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"console-serving-cert","secret":{"secretName":"console-serving-cert","defaultMode":420}},{"name":"console-oauth-config","secret":{"secretName":"console-oauth-config","defaultMode":420}},{"name":"console-config","configMap":{"name":"console-config","defaultMode":420}},{"name":"service-ca","configMap":{"name":"service-ca","defaultMode":420}},{"name":"trusted-ca-bundle","configMap":{"name":"trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420}},{"name":"oauth-serving-cert","configMap":{"name":"oauth-serving-cert","defaultMode":420}},{"name":"kube-api-access-st6bv","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"console","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8164cc9e16e8be9ea18be73c9df5041af326ed6b3059faff08f76e568cf4dc2","command":["/opt/bridge/bin/bridge","--public-dir=/opt/bridge/static","--config=/var/console-config/console-config.yaml","--service-ca-file=/var/service-ca/service-ca.crt","--v=2"],"ports":[{"name":"https","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"100Mi"}},"volumeMounts":[{"name":"console-serving-cert","readOnly":true,"mountPath":"/var/serving-cert"},{"name":"console-oauth-config","readOnly":true,"mountPath":"/var/oauth-config"},{"name":"console-config","readOnly":true,"mountPath":"/var/console-config"},{"name":"service-ca","readOnly":true,"mountPath":"/var/service-ca"},{"name":"trusted-ca-bundle","readOnly":true,"mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"oauth-serving-cert","readOnly":true,"mountPath":"/var/oauth-serving-cert"},{"name":"kube-api-access-st6bv","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/health","port":8443,"scheme":"HTTPS"},"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":1},"readinessProbe":{"httpGet":{"path":"/health","port":8443,"scheme":"HTTPS"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"/health","port":8443,"scheme":"HTTPS"},"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":30},"lifecycle":{"preStop":{"exec":{"command":["sleep","25"]}}},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000700000,"readOnlyRootFilesystem":false,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":40,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"console","serviceAccount":"console","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c26,c25"},"runAsNonRoot":true,"fsGroup":1000700000,"seccompProfile":{"type":"RuntimeDefault"}},"imagePullSecrets":[{"name":"console-dockercfg-sk6rc"}],"affinity":{},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:42Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:16:56Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:03Z","reason":"ContainersNotReady","message":"containers with unready status: [console]"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:03Z","reason":"ContainersNotReady","message":"containers with unready status: [console]"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:16:56Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.13","podIPs":[{"ip":"10.128.0.13"}],"startTime":"2026-02-16T17:16:56Z","containerStatuses":[{"name":"console","state":{"running":{"startedAt":"2026-02-16T17:24:41Z"}},"lastState":{},"ready":false,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8164cc9e16e8be9ea18be73c9df5041af326ed6b3059faff08f76e568cf4dc2","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8164cc9e16e8be9ea18be73c9df5041af326ed6b3059faff08f76e568cf4dc2","containerID":"cri-o://a6d8d66468455600a88bcb9dd3e219d233baab7041ba8c82c91c8eda93212ca9","started":false,"volumeMounts":[{"name":"console-serving-cert","mountPath":"/var/serving-cert","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"console-oauth-config","mountPath":"/var/oauth-config","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"console-config","mountPath":"/var/console-config","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca","mountPath":"/var/service-ca","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"trusted-ca-bundle","mountPath":"/etc/pki/ca-trust/extracted/pem","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"oauth-serving-cert","mountPath":"/var/oauth-serving-cert","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-st6bv","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}console-operator_current.log0000640000000000000000000000776115144651377033026 0ustar0000000000000000config/pod/openshift-console-operator/logs/console-operator-7777d5cc66-64vhv2026-02-16T17:24:41.748990929Z I0216 17:24:41.748787 1 cmd.go:250] Using service-serving-cert provided certificates 2026-02-16T17:24:41.749137873Z I0216 17:24:41.748979 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-16T17:24:41.749330228Z I0216 17:24:41.749292 1 observer_polling.go:159] Starting file observer 2026-02-16T17:24:42.259985160Z I0216 17:24:42.259249 1 builder.go:298] console-operator version - 2026-02-16T17:24:42.859563707Z I0216 17:24:42.859505 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-16T17:24:42.859563707Z W0216 17:24:42.859534 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-16T17:24:42.859563707Z W0216 17:24:42.859538 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-16T17:24:42.859563707Z W0216 17:24:42.859542 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-16T17:24:42.859563707Z W0216 17:24:42.859546 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-16T17:24:42.859563707Z W0216 17:24:42.859549 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-16T17:24:42.859563707Z W0216 17:24:42.859551 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-16T17:24:42.900005618Z I0216 17:24:42.899837 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-16T17:24:42.900005618Z I0216 17:24:42.899877 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-16T17:24:42.900005618Z I0216 17:24:42.899864 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-16T17:24:42.900005618Z I0216 17:24:42.899903 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T17:24:42.900005618Z I0216 17:24:42.899899 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-16T17:24:42.900005618Z I0216 17:24:42.899964 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T17:24:42.903977803Z I0216 17:24:42.902577 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-16T17:24:42.904859697Z I0216 17:24:42.904070 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-16T17:24:42.904859697Z I0216 17:24:42.904129 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-16T17:24:42.914324267Z I0216 17:24:42.914157 1 builder.go:439] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-16T17:24:42.921576189Z I0216 17:24:42.921520 1 leaderelection.go:254] attempting to acquire leader lease openshift-console-operator/console-operator-lock... 2026-02-16T17:24:43.000283373Z I0216 17:24:43.000203 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-16T17:24:43.000362056Z I0216 17:24:43.000343 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T17:24:43.001194928Z I0216 17:24:43.001145 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file config/pod/openshift-console-operator/console-operator-7777d5cc66-64vhv.json0000640000000000000000000001464015144651377025266 0ustar0000000000000000{"metadata":{"name":"console-operator-7777d5cc66-64vhv","generateName":"console-operator-7777d5cc66-","namespace":"openshift-console-operator","uid":"0517b180-00ee-47fe-a8e7-36a3931b7e72","resourceVersion":"21191","creationTimestamp":"2026-02-16T17:03:56Z","labels":{"name":"console-operator","pod-template-hash":"7777d5cc66"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.78/23\"],\"mac_address\":\"0a:58:0a:80:00:4e\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.78/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.78\"\n ],\n \"mac\": \"0a:58:0a:80:00:4e\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"console-operator-7777d5cc66","uid":"ce651338-bf30-4891-ac02-a7cc586845c4","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config","configMap":{"name":"console-operator-config","defaultMode":420}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"trusted-ca","configMap":{"name":"trusted-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420}},{"name":"kube-api-access-sbrtz","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"console-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:95e7647e6fda21b94b692f03908e4cd154e3374fca0560229c646fefe2c46730","command":["console","operator"],"args":["--config=/var/run/configmaps/config/controller-config.yaml"],"ports":[{"name":"metrics","containerPort":60000,"protocol":"TCP"}],"env":[{"name":"CONSOLE_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8164cc9e16e8be9ea18be73c9df5041af326ed6b3059faff08f76e568cf4dc2"},{"name":"DOWNLOADS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7fccb6e19eb4caa16d32f4cf59670c2c741c98b099d1f12368b85aab3f84dc38"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"},{"name":"OPERATOR_NAME","value":"console-operator"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"100Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca","mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"kube-api-access-sbrtz","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000710000,"readOnlyRootFilesystem":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"console-operator","serviceAccount":"console-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c27,c4"},"runAsNonRoot":true,"fsGroup":1000710000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:42Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:03:56Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:43Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:43Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:03:56Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.78","podIPs":[{"ip":"10.128.0.78"}],"startTime":"2026-02-16T17:03:56Z","containerStatuses":[{"name":"console-operator","state":{"running":{"startedAt":"2026-02-16T17:24:41Z"}},"lastState":{},"ready":true,"restartCount":5,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:95e7647e6fda21b94b692f03908e4cd154e3374fca0560229c646fefe2c46730","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:95e7647e6fda21b94b692f03908e4cd154e3374fca0560229c646fefe2c46730","containerID":"cri-o://69f967fe7238c4553b8c0afacb15108edf2da475f9d3aceaf275de25407a33b4","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca","mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"kube-api-access-sbrtz","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-oauth-apiserver/logs/apiserver-66788cb45c-dp9bc/oauth-apiserver_current.log0000640000000000000000000005037515144651377031300 0ustar00000000000000002026-02-16T17:24:42.921602170Z I0216 17:24:42.921593 1 flags.go:64] FLAG: --storage-backend="" 2026-02-16T17:24:42.921623541Z I0216 17:24:42.921614 1 flags.go:64] FLAG: --storage-initialization-timeout="1m0s" 2026-02-16T17:24:42.921644481Z I0216 17:24:42.921636 1 flags.go:64] FLAG: --storage-media-type="application/json" 2026-02-16T17:24:42.921666092Z I0216 17:24:42.921656 1 flags.go:64] FLAG: --strict-transport-security-directives="[]" 2026-02-16T17:24:42.921687132Z I0216 17:24:42.921678 1 flags.go:64] FLAG: --tls-cert-file="/var/run/secrets/serving-cert/tls.crt" 2026-02-16T17:24:42.921714813Z I0216 17:24:42.921699 1 flags.go:64] FLAG: --tls-cipher-suites="[TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256]" 2026-02-16T17:24:42.921737114Z I0216 17:24:42.921727 1 flags.go:64] FLAG: --tls-min-version="VersionTLS12" 2026-02-16T17:24:42.921789515Z I0216 17:24:42.921779 1 flags.go:64] FLAG: --tls-private-key-file="/var/run/secrets/serving-cert/tls.key" 2026-02-16T17:24:42.921823306Z I0216 17:24:42.921803 1 flags.go:64] FLAG: --tls-sni-cert-key="[]" 2026-02-16T17:24:42.921845406Z I0216 17:24:42.921837 1 flags.go:64] FLAG: --tracing-config-file="" 2026-02-16T17:24:42.921866417Z I0216 17:24:42.921858 1 flags.go:64] FLAG: --v="2" 2026-02-16T17:24:42.921887657Z I0216 17:24:42.921879 1 flags.go:64] FLAG: --vmodule="" 2026-02-16T17:24:42.921908358Z I0216 17:24:42.921900 1 flags.go:64] FLAG: --watch-cache="true" 2026-02-16T17:24:42.921929799Z I0216 17:24:42.921920 1 flags.go:64] FLAG: --watch-cache-sizes="[]" 2026-02-16T17:24:42.921991770Z W0216 17:24:42.921981 1 registry.go:345] setting componentGlobalsRegistry in SetFallback. We recommend calling componentGlobalsRegistry.Set() right after parsing flags to avoid using feature gates before their final values are set by the flags. 2026-02-16T17:24:42.922027581Z I0216 17:24:42.922014 1 registry.go:379] setting kube:feature gate emulation version to 1.31 2026-02-16T17:24:42.947722592Z I0216 17:24:42.947301 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-16T17:24:43.932209761Z I0216 17:24:43.929300 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-02-16T17:24:43.932209761Z I0216 17:24:43.931289 1 audit.go:340] Using audit backend: ignoreErrors 2026-02-16T17:24:43.936790873Z I0216 17:24:43.935749 1 shared_informer.go:313] Waiting for caches to sync for *generic.policySource[*k8s.io/api/admissionregistration/v1.ValidatingAdmissionPolicy,*k8s.io/api/admissionregistration/v1.ValidatingAdmissionPolicyBinding,k8s.io/apiserver/pkg/admission/plugin/policy/validating.Validator] 2026-02-16T17:24:43.942922685Z I0216 17:24:43.938114 1 plugins.go:157] Loaded 2 mutating admission controller(s) successfully in the following order: NamespaceLifecycle,MutatingAdmissionWebhook. 2026-02-16T17:24:43.942922685Z I0216 17:24:43.938130 1 plugins.go:160] Loaded 2 validating admission controller(s) successfully in the following order: ValidatingAdmissionPolicy,ValidatingAdmissionWebhook. 2026-02-16T17:24:43.942922685Z I0216 17:24:43.938447 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-02-16T17:24:43.942922685Z I0216 17:24:43.938458 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-02-16T17:24:43.942922685Z I0216 17:24:43.938469 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-02-16T17:24:43.942922685Z I0216 17:24:43.938474 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-02-16T17:24:43.959837743Z I0216 17:24:43.959781 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-16T17:24:43.959837743Z I0216 17:24:43.959819 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-16T17:24:43.959896155Z I0216 17:24:43.959849 1 store.go:1641] "Monitoring resource count at path" resource="oauthclients.oauth.openshift.io" path="//oauth/clients" 2026-02-16T17:24:43.976857194Z I0216 17:24:43.976667 1 store.go:1641] "Monitoring resource count at path" resource="oauthauthorizetokens.oauth.openshift.io" path="//oauth/authorizetokens" 2026-02-16T17:24:43.995316032Z I0216 17:24:43.994944 1 store.go:1641] "Monitoring resource count at path" resource="oauthaccesstokens.oauth.openshift.io" path="//oauth/accesstokens" 2026-02-16T17:24:44.014160832Z I0216 17:24:44.009783 1 store.go:1641] "Monitoring resource count at path" resource="oauthclientauthorizations.oauth.openshift.io" path="//oauth/clientauthorizations" 2026-02-16T17:24:44.014160832Z I0216 17:24:44.012663 1 handler.go:286] Adding GroupVersion oauth.openshift.io v1 to ResourceManager 2026-02-16T17:24:44.018189818Z I0216 17:24:44.017550 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-02-16T17:24:44.018189818Z I0216 17:24:44.017572 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-02-16T17:24:44.027963337Z I0216 17:24:44.026846 1 store.go:1641] "Monitoring resource count at path" resource="users.user.openshift.io" path="//users" 2026-02-16T17:24:44.033313169Z I0216 17:24:44.032411 1 store.go:1641] "Monitoring resource count at path" resource="identities.user.openshift.io" path="//useridentities" 2026-02-16T17:24:44.040332205Z I0216 17:24:44.039146 1 store.go:1641] "Monitoring resource count at path" resource="groups.user.openshift.io" path="//groups" 2026-02-16T17:24:44.040741555Z I0216 17:24:44.040712 1 handler.go:286] Adding GroupVersion user.openshift.io v1 to ResourceManager 2026-02-16T17:24:44.040971151Z I0216 17:24:44.040945 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-02-16T17:24:44.040971151Z I0216 17:24:44.040962 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-02-16T17:24:44.063197930Z I0216 17:24:44.062909 1 cacher.go:463] cacher (users.user.openshift.io): initialized 2026-02-16T17:24:44.063197930Z I0216 17:24:44.062927 1 cacher.go:463] cacher (oauthauthorizetokens.oauth.openshift.io): initialized 2026-02-16T17:24:44.063197930Z I0216 17:24:44.062941 1 reflector.go:368] Caches populated for *user.User from storage/cacher.go:/users 2026-02-16T17:24:44.063197930Z I0216 17:24:44.062946 1 reflector.go:368] Caches populated for *oauth.OAuthAuthorizeToken from storage/cacher.go:/oauth/authorizetokens 2026-02-16T17:24:44.063197930Z I0216 17:24:44.063188 1 cacher.go:463] cacher (oauthaccesstokens.oauth.openshift.io): initialized 2026-02-16T17:24:44.063242801Z I0216 17:24:44.063201 1 reflector.go:368] Caches populated for *oauth.OAuthAccessToken from storage/cacher.go:/oauth/accesstokens 2026-02-16T17:24:44.066558859Z I0216 17:24:44.063269 1 cacher.go:463] cacher (groups.user.openshift.io): initialized 2026-02-16T17:24:44.066558859Z I0216 17:24:44.063303 1 reflector.go:368] Caches populated for *user.Group from storage/cacher.go:/groups 2026-02-16T17:24:44.066558859Z I0216 17:24:44.063394 1 cacher.go:463] cacher (oauthclientauthorizations.oauth.openshift.io): initialized 2026-02-16T17:24:44.066558859Z I0216 17:24:44.063415 1 reflector.go:368] Caches populated for *oauth.OAuthClientAuthorization from storage/cacher.go:/oauth/clientauthorizations 2026-02-16T17:24:44.066558859Z I0216 17:24:44.063427 1 cacher.go:463] cacher (identities.user.openshift.io): initialized 2026-02-16T17:24:44.066558859Z I0216 17:24:44.063450 1 reflector.go:368] Caches populated for *user.Identity from storage/cacher.go:/useridentities 2026-02-16T17:24:44.066558859Z I0216 17:24:44.063620 1 cacher.go:463] cacher (oauthclients.oauth.openshift.io): initialized 2026-02-16T17:24:44.066558859Z I0216 17:24:44.063634 1 reflector.go:368] Caches populated for *oauth.OAuthClient from storage/cacher.go:/oauth/clients 2026-02-16T17:24:44.229597176Z I0216 17:24:44.227822 1 genericapiserver.go:570] "[graceful-termination] using HTTP Server shutdown timeout" shutdownTimeout="2s" 2026-02-16T17:24:44.229597176Z I0216 17:24:44.228134 1 genericapiserver.go:538] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-02-16T17:24:44.245060226Z I0216 17:24:44.245008 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"api.openshift-oauth-apiserver.svc\" [serving] validServingFor=[api.openshift-oauth-apiserver.svc,api.openshift-oauth-apiserver.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771261227\" (2026-02-16 17:00:46 +0000 UTC to 2028-02-16 17:00:47 +0000 UTC (now=2026-02-16 17:24:44.244970593 +0000 UTC))" 2026-02-16T17:24:44.246237097Z I0216 17:24:44.246204 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771262683\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771262683\" (2026-02-16 16:24:42 +0000 UTC to 2029-02-16 16:24:42 +0000 UTC (now=2026-02-16 17:24:44.245139708 +0000 UTC))" 2026-02-16T17:24:44.246269838Z I0216 17:24:44.246234 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-16T17:24:44.246325039Z I0216 17:24:44.246281 1 genericapiserver.go:693] [graceful-termination] waiting for shutdown to be initiated 2026-02-16T17:24:44.246325039Z I0216 17:24:44.246312 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-16T17:24:44.246325039Z I0216 17:24:44.246320 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-16T17:24:44.246368430Z I0216 17:24:44.246347 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-16T17:24:44.246505384Z I0216 17:24:44.246483 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-16T17:24:44.246966576Z I0216 17:24:44.246940 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-16T17:24:44.247000757Z I0216 17:24:44.246966 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T17:24:44.247000757Z I0216 17:24:44.246984 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-16T17:24:44.247000757Z I0216 17:24:44.246990 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T17:24:44.249923925Z I0216 17:24:44.249597 1 reflector.go:368] Caches populated for *v1.ValidatingAdmissionPolicyBinding from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T17:24:44.250368106Z I0216 17:24:44.250320 1 reflector.go:368] Caches populated for *v1.ValidatingAdmissionPolicy from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T17:24:44.251034244Z I0216 17:24:44.250817 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T17:24:44.251034244Z I0216 17:24:44.251026 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T17:24:44.251399424Z I0216 17:24:44.251373 1 reflector.go:368] Caches populated for *v1.MutatingWebhookConfiguration from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T17:24:44.251718572Z I0216 17:24:44.251667 1 reflector.go:368] Caches populated for *v1.ValidatingWebhookConfiguration from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T17:24:44.251813935Z I0216 17:24:44.251784 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T17:24:44.257093824Z I0216 17:24:44.256950 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T17:24:44.265056245Z I0216 17:24:44.264993 1 reflector.go:368] Caches populated for *v1.Group from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T17:24:44.265246270Z I0216 17:24:44.265137 1 reflector.go:368] Caches populated for *v1.OAuthClient from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T17:24:44.336317572Z I0216 17:24:44.336261 1 shared_informer.go:320] Caches are synced for *generic.policySource[*k8s.io/api/admissionregistration/v1.ValidatingAdmissionPolicy,*k8s.io/api/admissionregistration/v1.ValidatingAdmissionPolicyBinding,k8s.io/apiserver/pkg/admission/plugin/policy/validating.Validator] 2026-02-16T17:24:44.336317572Z I0216 17:24:44.336291 1 policy_source.go:224] refreshing policies 2026-02-16T17:24:44.347327454Z I0216 17:24:44.347267 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T17:24:44.347327454Z I0216 17:24:44.347321 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-16T17:24:44.349546973Z I0216 17:24:44.347410 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T17:24:44.349546973Z I0216 17:24:44.347596 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-16 16:50:47 +0000 UTC to 2026-02-17 16:50:47 +0000 UTC (now=2026-02-16 17:24:44.34755216 +0000 UTC))" 2026-02-16T17:24:44.349546973Z I0216 17:24:44.347765 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"api.openshift-oauth-apiserver.svc\" [serving] validServingFor=[api.openshift-oauth-apiserver.svc,api.openshift-oauth-apiserver.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771261227\" (2026-02-16 17:00:46 +0000 UTC to 2028-02-16 17:00:47 +0000 UTC (now=2026-02-16 17:24:44.347748365 +0000 UTC))" 2026-02-16T17:24:44.349546973Z I0216 17:24:44.347880 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771262683\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771262683\" (2026-02-16 16:24:42 +0000 UTC to 2029-02-16 16:24:42 +0000 UTC (now=2026-02-16 17:24:44.347865728 +0000 UTC))" 2026-02-16T17:24:44.349546973Z I0216 17:24:44.348148 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-02-16 16:44:14 +0000 UTC to 2036-02-14 16:44:14 +0000 UTC (now=2026-02-16 17:24:44.348132465 +0000 UTC))" 2026-02-16T17:24:44.349546973Z I0216 17:24:44.348167 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-02-16 16:50:49 +0000 UTC to 2026-02-17 16:50:49 +0000 UTC (now=2026-02-16 17:24:44.348156586 +0000 UTC))" 2026-02-16T17:24:44.349546973Z I0216 17:24:44.348182 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-02-16 16:50:49 +0000 UTC to 2027-02-16 16:50:49 +0000 UTC (now=2026-02-16 17:24:44.348171726 +0000 UTC))" 2026-02-16T17:24:44.349546973Z I0216 17:24:44.348197 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-02-16 16:50:49 +0000 UTC to 2027-02-16 16:50:49 +0000 UTC (now=2026-02-16 17:24:44.348187127 +0000 UTC))" 2026-02-16T17:24:44.349546973Z I0216 17:24:44.348211 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-02-16 16:50:47 +0000 UTC to 2036-02-14 16:50:47 +0000 UTC (now=2026-02-16 17:24:44.348201477 +0000 UTC))" 2026-02-16T17:24:44.349546973Z I0216 17:24:44.348227 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-csr-signer_@1771261235\" [] issuer=\"kubelet-signer\" (2026-02-16 17:00:34 +0000 UTC to 2026-02-17 16:50:49 +0000 UTC (now=2026-02-16 17:24:44.348216417 +0000 UTC))" 2026-02-16T17:24:44.349546973Z I0216 17:24:44.348242 1 tlsconfig.go:181] "Loaded client CA" index=6 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"openshift-kube-apiserver-operator_node-system-admin-signer@1771261220\" [] issuer=\"\" (2026-02-16 17:00:19 +0000 UTC to 2027-02-16 17:00:20 +0000 UTC (now=2026-02-16 17:24:44.348231758 +0000 UTC))" 2026-02-16T17:24:44.349546973Z I0216 17:24:44.348290 1 tlsconfig.go:181] "Loaded client CA" index=7 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-16 16:50:47 +0000 UTC to 2026-02-17 16:50:47 +0000 UTC (now=2026-02-16 17:24:44.348254158 +0000 UTC))" 2026-02-16T17:24:44.349546973Z I0216 17:24:44.348415 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"api.openshift-oauth-apiserver.svc\" [serving] validServingFor=[api.openshift-oauth-apiserver.svc,api.openshift-oauth-apiserver.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771261227\" (2026-02-16 17:00:46 +0000 UTC to 2028-02-16 17:00:47 +0000 UTC (now=2026-02-16 17:24:44.348403942 +0000 UTC))" 2026-02-16T17:24:44.349546973Z I0216 17:24:44.348503 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771262683\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771262683\" (2026-02-16 16:24:42 +0000 UTC to 2029-02-16 16:24:42 +0000 UTC (now=2026-02-16 17:24:44.348494155 +0000 UTC))" 2026-02-16T17:24:44.350595890Z I0216 17:24:44.350543 1 policy_source.go:419] informer started for config.openshift.io/v1, Kind=Infrastructure 2026-02-16T17:24:44.353429485Z I0216 17:24:44.353212 1 reflector.go:368] Caches populated for config.openshift.io/v1, Resource=infrastructures from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T17:24:45.399720711Z I0216 17:24:45.399607 1 policy_source.go:224] refreshing policies config/pod/openshift-oauth-apiserver/apiserver-66788cb45c-dp9bc.json0000640000000000000000000002542415144651377023641 0ustar0000000000000000{"metadata":{"name":"apiserver-66788cb45c-dp9bc","generateName":"apiserver-66788cb45c-","namespace":"openshift-oauth-apiserver","uid":"7390ccc6-dfbe-4f51-960c-7628f49bffb7","resourceVersion":"21280","creationTimestamp":"2026-02-16T17:00:50Z","labels":{"apiserver":"true","app":"openshift-oauth-apiserver","oauth-apiserver-anti-affinity":"true","pod-template-hash":"66788cb45c","revision":"1"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.35/23\"],\"mac_address\":\"0a:58:0a:80:00:23\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.35/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.35\"\n ],\n \"mac\": \"0a:58:0a:80:00:23\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","operator.openshift.io/dep-openshift-oauth-apiserver.etcd-client.secret":"dfz49A==","operator.openshift.io/dep-openshift-oauth-apiserver.etcd-serving-ca.configmap":"za6WWg=="},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"apiserver-66788cb45c","uid":"8f67abc1-f338-4fd8-b2ce-ce8e23643967","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"audit-policies","configMap":{"name":"audit-1","defaultMode":420}},{"name":"etcd-client","secret":{"secretName":"etcd-client","defaultMode":420}},{"name":"etcd-serving-ca","configMap":{"name":"etcd-serving-ca","defaultMode":420}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420}},{"name":"trusted-ca-bundle","configMap":{"name":"trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420,"optional":true}},{"name":"encryption-config","secret":{"secretName":"encryption-config-1","defaultMode":420,"optional":true}},{"name":"audit-dir","hostPath":{"path":"/var/log/oauth-apiserver","type":""}},{"name":"kube-api-access-5v65g","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"initContainers":[{"name":"fix-audit-permissions","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192","command":["sh","-c","chmod 0700 /var/log/oauth-apiserver \u0026\u0026 touch /var/log/oauth-apiserver/audit.log \u0026\u0026 chmod 0600 /var/log/oauth-apiserver/*"],"resources":{"requests":{"cpu":"15m","memory":"50Mi"}},"volumeMounts":[{"name":"audit-dir","mountPath":"/var/log/oauth-apiserver"},{"name":"kube-api-access-5v65g","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"containers":[{"name":"oauth-apiserver","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192","command":["/bin/bash","-ec"],"args":["if [ -s /var/run/configmaps/trusted-ca-bundle/tls-ca-bundle.pem ]; then\n echo \"Copying system trust bundle\"\n cp -f /var/run/configmaps/trusted-ca-bundle/tls-ca-bundle.pem /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\nexec oauth-apiserver start \\\n --secure-port=8443 \\\n --audit-log-path=/var/log/oauth-apiserver/audit.log \\\n --audit-log-format=json \\\n --audit-log-maxsize=100 \\\n --audit-log-maxbackup=10 \\\n --audit-policy-file=/var/run/configmaps/audit/policy.yaml \\\n --etcd-cafile=/var/run/configmaps/etcd-serving-ca/ca-bundle.crt \\\n --etcd-keyfile=/var/run/secrets/etcd-client/tls.key \\\n --etcd-certfile=/var/run/secrets/etcd-client/tls.crt \\\n --etcd-healthcheck-timeout=9s \\\n --etcd-readycheck-timeout=9s \\\n --shutdown-delay-duration=50s \\\n --shutdown-send-retry-after=true \\\n --tls-private-key-file=/var/run/secrets/serving-cert/tls.key \\\n --tls-cert-file=/var/run/secrets/serving-cert/tls.crt \\\n --enable-priority-and-fairness=false \\\n --api-audiences=https://kubernetes.default.svc \\\n --cors-allowed-origins='//127\\.0\\.0\\.1(:|$)' \\\n --cors-allowed-origins='//localhost(:|$)' \\\n --etcd-servers=https://192.168.32.10:2379 \\\n --tls-cipher-suites=TLS_AES_128_GCM_SHA256 \\\n --tls-cipher-suites=TLS_AES_256_GCM_SHA384 \\\n --tls-cipher-suites=TLS_CHACHA20_POLY1305_SHA256 \\\n --tls-cipher-suites=TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 \\\n --tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 \\\n --tls-cipher-suites=TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 \\\n --tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 \\\n --tls-cipher-suites=TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --tls-cipher-suites=TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --tls-min-version=VersionTLS12 \\\n --v=2\n"],"ports":[{"containerPort":8443,"protocol":"TCP"}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"150m","memory":"200Mi"}},"volumeMounts":[{"name":"audit-policies","mountPath":"/var/run/configmaps/audit"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"etcd-serving-ca","mountPath":"/var/run/configmaps/etcd-serving-ca"},{"name":"trusted-ca-bundle","mountPath":"/var/run/configmaps/trusted-ca-bundle"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"encryption-config","mountPath":"/var/run/secrets/encryption-config"},{"name":"audit-dir","mountPath":"/var/log/oauth-apiserver"},{"name":"kube-api-access-5v65g","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"livez?exclude=etcd","port":8443,"scheme":"HTTPS"},"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"readyz?exclude=etcd\u0026exclude=etcd-readiness","port":8443,"scheme":"HTTPS"},"timeoutSeconds":10,"periodSeconds":5,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"livez","port":8443,"scheme":"HTTPS"},"timeoutSeconds":10,"periodSeconds":5,"successThreshold":1,"failureThreshold":30},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Always","terminationGracePeriodSeconds":120,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"oauth-apiserver-sa","serviceAccount":"oauth-apiserver-sa","nodeName":"master-0","securityContext":{},"affinity":{"podAntiAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":[{"labelSelector":{"matchLabels":{"apiserver":"true","app":"openshift-oauth-apiserver","oauth-apiserver-anti-affinity":"true"}},"topologyKey":"kubernetes.io/hostname"}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:41Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:00:59Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:46Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:46Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:00:50Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.35","podIPs":[{"ip":"10.128.0.35"}],"startTime":"2026-02-16T17:00:50Z","initContainerStatuses":[{"name":"fix-audit-permissions","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-16T17:24:40Z","finishedAt":"2026-02-16T17:24:40Z","containerID":"cri-o://61e65136a27c6937678b8e2e384b0fc72dcb7462c295a7a9917cecd78feaa38c"}},"lastState":{},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192","containerID":"cri-o://61e65136a27c6937678b8e2e384b0fc72dcb7462c295a7a9917cecd78feaa38c","started":false,"volumeMounts":[{"name":"audit-dir","mountPath":"/var/log/oauth-apiserver"},{"name":"kube-api-access-5v65g","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"containerStatuses":[{"name":"oauth-apiserver","state":{"running":{"startedAt":"2026-02-16T17:24:42Z"}},"lastState":{},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192","containerID":"cri-o://5938229d66e6b3b90cd4c997365a6c7f42e4c6c6811c8535131fc5297d3eebba","started":true,"volumeMounts":[{"name":"audit-policies","mountPath":"/var/run/configmaps/audit"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"etcd-serving-ca","mountPath":"/var/run/configmaps/etcd-serving-ca"},{"name":"trusted-ca-bundle","mountPath":"/var/run/configmaps/trusted-ca-bundle"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"encryption-config","mountPath":"/var/run/secrets/encryption-config"},{"name":"audit-dir","mountPath":"/var/log/oauth-apiserver"},{"name":"kube-api-access-5v65g","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-ingress/logs/router-default-864ddd5f56-pm4rt/router_current.log0000640000000000000000000002254515144651377027123 0ustar00000000000000002026-02-16T17:24:39.082486039Z [-]has-synced failed: Router not synced 2026-02-16T17:24:40.085325085Z I0216 17:24:40.082878 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:24:40.085325085Z [-]backend-http failed: backend reported failure 2026-02-16T17:24:40.085325085Z [-]has-synced failed: Router not synced 2026-02-16T17:24:41.088368686Z I0216 17:24:41.087963 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:24:41.088368686Z [-]backend-http failed: backend reported failure 2026-02-16T17:24:41.088368686Z [-]has-synced failed: Router not synced 2026-02-16T17:24:42.081897404Z I0216 17:24:42.081828 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:24:42.081897404Z [-]backend-http failed: backend reported failure 2026-02-16T17:24:42.081897404Z [-]has-synced failed: Router not synced 2026-02-16T17:24:43.081920945Z I0216 17:24:43.081859 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:24:43.081920945Z [-]backend-http failed: backend reported failure 2026-02-16T17:24:43.081920945Z [-]has-synced failed: Router not synced 2026-02-16T17:24:43.732313678Z W0216 17:24:43.729377 1 reflector.go:547] github.com/openshift/router/pkg/router/controller/factory/factory.go:124: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-16T17:24:43.732313678Z E0216 17:24:43.729422 1 reflector.go:150] github.com/openshift/router/pkg/router/controller/factory/factory.go:124: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-16T17:24:44.084505204Z I0216 17:24:44.084244 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:24:44.084505204Z [-]backend-http failed: backend reported failure 2026-02-16T17:24:44.084505204Z [-]has-synced failed: Router not synced 2026-02-16T17:24:45.082180922Z I0216 17:24:45.082120 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:24:45.082180922Z [-]backend-http failed: backend reported failure 2026-02-16T17:24:45.082180922Z [-]has-synced failed: Router not synced 2026-02-16T17:24:46.083197930Z I0216 17:24:46.083146 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:24:46.083197930Z [-]backend-http failed: backend reported failure 2026-02-16T17:24:46.083197930Z [-]has-synced failed: Router not synced 2026-02-16T17:24:47.082996705Z I0216 17:24:47.082901 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:24:47.082996705Z [-]backend-http failed: backend reported failure 2026-02-16T17:24:47.082996705Z [-]has-synced failed: Router not synced 2026-02-16T17:24:48.083069628Z I0216 17:24:48.082782 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:24:48.083069628Z [-]backend-http failed: backend reported failure 2026-02-16T17:24:48.083069628Z [-]has-synced failed: Router not synced 2026-02-16T17:24:49.083020535Z I0216 17:24:49.082312 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:24:49.083020535Z [-]backend-http failed: backend reported failure 2026-02-16T17:24:49.083020535Z [-]has-synced failed: Router not synced 2026-02-16T17:24:50.082924763Z I0216 17:24:50.082835 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:24:50.082924763Z [-]backend-http failed: backend reported failure 2026-02-16T17:24:50.082924763Z [-]has-synced failed: Router not synced 2026-02-16T17:24:51.083648743Z I0216 17:24:51.083500 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:24:51.083648743Z [-]backend-http failed: backend reported failure 2026-02-16T17:24:51.083648743Z [-]has-synced failed: Router not synced 2026-02-16T17:24:52.082846462Z I0216 17:24:52.082769 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:24:52.082846462Z [-]backend-http failed: backend reported failure 2026-02-16T17:24:52.082846462Z [-]has-synced failed: Router not synced 2026-02-16T17:24:53.083100109Z I0216 17:24:53.082983 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:24:53.083100109Z [-]backend-http failed: backend reported failure 2026-02-16T17:24:53.083100109Z [-]has-synced failed: Router not synced 2026-02-16T17:24:54.087988749Z I0216 17:24:54.086068 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:24:54.087988749Z [-]backend-http failed: backend reported failure 2026-02-16T17:24:54.087988749Z [-]has-synced failed: Router not synced 2026-02-16T17:24:55.082700370Z I0216 17:24:55.082633 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:24:55.082700370Z [-]backend-http failed: backend reported failure 2026-02-16T17:24:55.082700370Z [-]has-synced failed: Router not synced 2026-02-16T17:24:56.081747494Z I0216 17:24:56.081670 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:24:56.081747494Z [-]backend-http failed: backend reported failure 2026-02-16T17:24:56.081747494Z [-]has-synced failed: Router not synced 2026-02-16T17:24:57.081849417Z I0216 17:24:57.081793 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:24:57.081849417Z [-]backend-http failed: backend reported failure 2026-02-16T17:24:57.081849417Z [-]has-synced failed: Router not synced 2026-02-16T17:24:58.083299926Z I0216 17:24:58.082718 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:24:58.083299926Z [-]backend-http failed: backend reported failure 2026-02-16T17:24:58.083299926Z [-]has-synced failed: Router not synced 2026-02-16T17:24:59.083060270Z I0216 17:24:59.082947 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:24:59.083060270Z [-]backend-http failed: backend reported failure 2026-02-16T17:24:59.083060270Z [-]has-synced failed: Router not synced 2026-02-16T17:25:00.083136242Z I0216 17:25:00.083076 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:25:00.083136242Z [-]backend-http failed: backend reported failure 2026-02-16T17:25:00.083136242Z [-]has-synced failed: Router not synced 2026-02-16T17:25:01.083189774Z I0216 17:25:01.083121 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:25:01.083189774Z [-]backend-http failed: backend reported failure 2026-02-16T17:25:01.083189774Z [-]has-synced failed: Router not synced 2026-02-16T17:25:02.123318558Z I0216 17:25:02.122773 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:25:02.123318558Z [-]backend-http failed: backend reported failure 2026-02-16T17:25:02.123318558Z [-]has-synced failed: Router not synced 2026-02-16T17:25:02.336387190Z E0216 17:25:02.336334 1 haproxy.go:418] can't scrape HAProxy: dial unix /var/lib/haproxy/run/haproxy.sock: connect: no such file or directory 2026-02-16T17:25:03.082921508Z I0216 17:25:03.082818 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:25:03.082921508Z [-]backend-http failed: backend reported failure 2026-02-16T17:25:03.082921508Z [-]has-synced failed: Router not synced 2026-02-16T17:25:04.082458716Z I0216 17:25:04.082339 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:25:04.082458716Z [-]backend-http failed: backend reported failure 2026-02-16T17:25:04.082458716Z [-]has-synced failed: Router not synced 2026-02-16T17:25:05.082746935Z I0216 17:25:05.082673 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:25:05.082746935Z [-]backend-http failed: backend reported failure 2026-02-16T17:25:05.082746935Z [-]has-synced failed: Router not synced 2026-02-16T17:25:06.082444947Z I0216 17:25:06.082329 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:25:06.082444947Z [-]backend-http failed: backend reported failure 2026-02-16T17:25:06.082444947Z [-]has-synced failed: Router not synced 2026-02-16T17:25:07.082481348Z I0216 17:25:07.082387 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:25:07.082481348Z [-]backend-http failed: backend reported failure 2026-02-16T17:25:07.082481348Z [-]has-synced failed: Router not synced 2026-02-16T17:25:08.081705608Z I0216 17:25:08.081585 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:25:08.081705608Z [-]backend-http failed: backend reported failure 2026-02-16T17:25:08.081705608Z [-]has-synced failed: Router not synced 2026-02-16T17:25:09.082807388Z I0216 17:25:09.082694 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:25:09.082807388Z [-]backend-http failed: backend reported failure 2026-02-16T17:25:09.082807388Z [-]has-synced failed: Router not synced 2026-02-16T17:25:10.082849139Z I0216 17:25:10.082752 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:25:10.082849139Z [-]backend-http failed: backend reported failure 2026-02-16T17:25:10.082849139Z [-]has-synced failed: Router not synced 2026-02-16T17:25:11.082559831Z I0216 17:25:11.082460 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T17:25:11.082559831Z [-]backend-http failed: backend reported failure 2026-02-16T17:25:11.082559831Z [-]has-synced failed: Router not synced config/pod/openshift-ingress/router-default-864ddd5f56-pm4rt.json0000640000000000000000000002057315144651377023264 0ustar0000000000000000{"metadata":{"name":"router-default-864ddd5f56-pm4rt","generateName":"router-default-864ddd5f56-","namespace":"openshift-ingress","uid":"f0b1ebd3-1068-4624-9b6d-3e9f45ded76a","resourceVersion":"18828","creationTimestamp":"2026-02-16T17:00:51Z","labels":{"ingresscontroller.operator.openshift.io/deployment-ingresscontroller":"default","ingresscontroller.operator.openshift.io/hash":"575d6c6cf5","pod-template-hash":"864ddd5f56"},"annotations":{"openshift.io/required-scc":"hostnetwork","openshift.io/scc":"hostnetwork"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"router-default-864ddd5f56","uid":"1fede488-17fa-4630-99b0-06876d9acdba","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"default-certificate","secret":{"secretName":"router-certs-default","defaultMode":420}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"defaultMode":420,"optional":false}},{"name":"stats-auth","secret":{"secretName":"router-stats-default","defaultMode":420}},{"name":"metrics-certs","secret":{"secretName":"router-metrics-certs-default","defaultMode":420}},{"name":"kube-api-access-94kdz","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"router","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb","ports":[{"name":"http","hostPort":80,"containerPort":80,"protocol":"TCP"},{"name":"https","hostPort":443,"containerPort":443,"protocol":"TCP"},{"name":"metrics","hostPort":1936,"containerPort":1936,"protocol":"TCP"}],"env":[{"name":"DEFAULT_CERTIFICATE_DIR","value":"/etc/pki/tls/private"},{"name":"DEFAULT_DESTINATION_CA_PATH","value":"/var/run/configmaps/service-ca/service-ca.crt"},{"name":"RELOAD_INTERVAL","value":"5s"},{"name":"ROUTER_ALLOW_WILDCARD_ROUTES","value":"false"},{"name":"ROUTER_CANONICAL_HOSTNAME","value":"router-default.apps.sno.openstack.lab"},{"name":"ROUTER_CIPHERS","value":"ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384"},{"name":"ROUTER_CIPHERSUITES","value":"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256"},{"name":"ROUTER_DISABLE_HTTP2","value":"true"},{"name":"ROUTER_DISABLE_NAMESPACE_OWNERSHIP_CHECK","value":"false"},{"name":"ROUTER_DOMAIN","value":"apps.sno.openstack.lab"},{"name":"ROUTER_IDLE_CLOSE_ON_RESPONSE","value":"true"},{"name":"ROUTER_LOAD_BALANCE_ALGORITHM","value":"random"},{"name":"ROUTER_METRICS_TLS_CERT_FILE","value":"/etc/pki/tls/metrics-certs/tls.crt"},{"name":"ROUTER_METRICS_TLS_KEY_FILE","value":"/etc/pki/tls/metrics-certs/tls.key"},{"name":"ROUTER_METRICS_TYPE","value":"haproxy"},{"name":"ROUTER_SERVICE_HTTPS_PORT","value":"443"},{"name":"ROUTER_SERVICE_HTTP_PORT","value":"80"},{"name":"ROUTER_SERVICE_NAME","value":"default"},{"name":"ROUTER_SERVICE_NAMESPACE","value":"openshift-ingress"},{"name":"ROUTER_SET_FORWARDED_HEADERS","value":"append"},{"name":"ROUTER_TCP_BALANCE_SCHEME","value":"source"},{"name":"ROUTER_THREADS","value":"4"},{"name":"SSL_MIN_VERSION","value":"TLSv1.2"},{"name":"STATS_PASSWORD_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsPassword"},{"name":"STATS_PORT","value":"1936"},{"name":"STATS_USERNAME_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsUsername"}],"resources":{"requests":{"cpu":"100m","memory":"256Mi"}},"volumeMounts":[{"name":"default-certificate","readOnly":true,"mountPath":"/etc/pki/tls/private"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca"},{"name":"stats-auth","readOnly":true,"mountPath":"/var/lib/haproxy/conf/metrics-auth"},{"name":"metrics-certs","readOnly":true,"mountPath":"/etc/pki/tls/metrics-certs"},{"name":"kube-api-access-94kdz","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3,"terminationGracePeriodSeconds":10},"readinessProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":1,"successThreshold":1,"failureThreshold":120},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000660000,"runAsNonRoot":true,"readOnlyRootFilesystem":false,"allowPrivilegeEscalation":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":3600,"dnsPolicy":"ClusterFirstWithHostNet","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"router","serviceAccount":"router","nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c26,c5"},"supplementalGroups":[1000660000],"fsGroup":1000660000},"schedulerName":"default-scheduler","tolerations":[{"key":"kubernetes.io/e2e-evict-taint-key","operator":"Equal","value":"evictTaintVal","effect":"NoExecute"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority","topologySpreadConstraints":[{"maxSkew":1,"topologyKey":"topology.kubernetes.io/zone","whenUnsatisfiable":"ScheduleAnyway","labelSelector":{"matchExpressions":[{"key":"ingresscontroller.operator.openshift.io/hash","operator":"In","values":["575d6c6cf5"]}]}}]},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:03:32Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:03:28Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:03Z","reason":"ContainersNotReady","message":"containers with unready status: [router]"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:03Z","reason":"ContainersNotReady","message":"containers with unready status: [router]"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:03:28Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-16T17:03:28Z","containerStatuses":[{"name":"router","state":{"running":{"startedAt":"2026-02-16T17:24:04Z"}},"lastState":{},"ready":false,"restartCount":4,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb","containerID":"cri-o://5dd538a7a8b2b6b668185eb3d2b049d0f216c57823a67d1ea32767d9a474a2d9","started":false,"volumeMounts":[{"name":"default-certificate","mountPath":"/etc/pki/tls/private","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca-bundle","mountPath":"/var/run/configmaps/service-ca","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"stats-auth","mountPath":"/var/lib/haproxy/conf/metrics-auth","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"metrics-certs","mountPath":"/etc/pki/tls/metrics-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-94kdz","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}authentication-operator_current.log0000640000000000000000000003253315144651377037213 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-755d954778-lf4cb2026-02-16T17:24:38.329056848Z Copying system trust bundle 2026-02-16T17:24:39.061069952Z W0216 17:24:39.059964 1 cmd.go:167] Unable to read initial content of "/tmp/terminate": open /tmp/terminate: no such file or directory 2026-02-16T17:24:39.061069952Z I0216 17:24:39.060545 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-16T17:24:39.061069952Z I0216 17:24:39.060569 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-16T17:24:39.061596146Z I0216 17:24:39.061430 1 observer_polling.go:159] Starting file observer 2026-02-16T17:24:39.061798161Z I0216 17:24:39.061760 1 observer_polling.go:159] Starting file observer 2026-02-16T17:24:39.165401505Z I0216 17:24:39.164892 1 builder.go:304] cluster-authentication-operator version - 2026-02-16T17:24:39.174318611Z I0216 17:24:39.174216 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-16T17:24:40.173258773Z I0216 17:24:40.172926 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-02-16T17:24:40.207625663Z I0216 17:24:40.207556 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-02-16T17:24:40.207625663Z I0216 17:24:40.207574 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-02-16T17:24:40.207625663Z I0216 17:24:40.207590 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-02-16T17:24:40.207625663Z I0216 17:24:40.207595 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-02-16T17:24:40.217356411Z I0216 17:24:40.217170 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-02-16T17:24:40.217356411Z I0216 17:24:40.217221 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-16T17:24:40.217356411Z W0216 17:24:40.217253 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-16T17:24:40.217356411Z W0216 17:24:40.217274 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-16T17:24:40.217356411Z W0216 17:24:40.217285 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-16T17:24:40.217356411Z W0216 17:24:40.217290 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-16T17:24:40.217356411Z W0216 17:24:40.217295 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-16T17:24:40.217356411Z W0216 17:24:40.217303 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-16T17:24:40.242931388Z I0216 17:24:40.242404 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-16T17:24:40.242931388Z I0216 17:24:40.242722 1 leaderelection.go:254] attempting to acquire leader lease openshift-authentication-operator/cluster-authentication-operator-lock... 2026-02-16T17:24:40.242931388Z I0216 17:24:40.242786 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771261227\" (2026-02-16 17:00:32 +0000 UTC to 2028-02-16 17:00:33 +0000 UTC (now=2026-02-16 17:24:40.242760124 +0000 UTC))" 2026-02-16T17:24:40.242931388Z I0216 17:24:40.242908 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771262680\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771262679\" (2026-02-16 16:24:39 +0000 UTC to 2027-02-16 16:24:39 +0000 UTC (now=2026-02-16 17:24:40.242882987 +0000 UTC))" 2026-02-16T17:24:40.242931388Z I0216 17:24:40.242922 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-16T17:24:40.242978000Z I0216 17:24:40.242939 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-16T17:24:40.242978000Z I0216 17:24:40.242956 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-16T17:24:40.242978000Z I0216 17:24:40.242960 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-16T17:24:40.243032321Z I0216 17:24:40.242988 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-16T17:24:40.243032321Z I0216 17:24:40.243001 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T17:24:40.243032321Z I0216 17:24:40.243019 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-16T17:24:40.243032321Z I0216 17:24:40.243024 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T17:24:40.243044561Z I0216 17:24:40.242940 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-02-16T17:24:40.243810762Z I0216 17:24:40.243058 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-16T17:24:40.243810762Z I0216 17:24:40.243163 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-16T17:24:40.243810762Z I0216 17:24:40.243171 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-16T17:24:40.248892666Z I0216 17:24:40.248613 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/authentication/request/headerrequest/requestheader_controller.go:175 2026-02-16T17:24:40.248892666Z I0216 17:24:40.248628 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2026-02-16T17:24:40.249099782Z I0216 17:24:40.249063 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2026-02-16T17:24:40.343427600Z I0216 17:24:40.343353 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T17:24:40.343470981Z I0216 17:24:40.343426 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-16T17:24:40.344894408Z I0216 17:24:40.343527 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T17:24:40.344894408Z I0216 17:24:40.343729 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-16 16:50:47 +0000 UTC to 2026-02-17 16:50:47 +0000 UTC (now=2026-02-16 17:24:40.343694557 +0000 UTC))" 2026-02-16T17:24:40.344894408Z I0216 17:24:40.343919 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771261227\" (2026-02-16 17:00:32 +0000 UTC to 2028-02-16 17:00:33 +0000 UTC (now=2026-02-16 17:24:40.343897382 +0000 UTC))" 2026-02-16T17:24:40.344894408Z I0216 17:24:40.344055 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771262680\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771262679\" (2026-02-16 16:24:39 +0000 UTC to 2027-02-16 16:24:39 +0000 UTC (now=2026-02-16 17:24:40.344036786 +0000 UTC))" 2026-02-16T17:24:40.344894408Z I0216 17:24:40.344193 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-02-16 16:44:14 +0000 UTC to 2036-02-14 16:44:14 +0000 UTC (now=2026-02-16 17:24:40.344176519 +0000 UTC))" 2026-02-16T17:24:40.344894408Z I0216 17:24:40.344214 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-02-16 16:50:49 +0000 UTC to 2026-02-17 16:50:49 +0000 UTC (now=2026-02-16 17:24:40.34420063 +0000 UTC))" 2026-02-16T17:24:40.344894408Z I0216 17:24:40.344230 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-02-16 16:50:49 +0000 UTC to 2027-02-16 16:50:49 +0000 UTC (now=2026-02-16 17:24:40.344219201 +0000 UTC))" 2026-02-16T17:24:40.344894408Z I0216 17:24:40.344258 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-02-16 16:50:49 +0000 UTC to 2027-02-16 16:50:49 +0000 UTC (now=2026-02-16 17:24:40.344244011 +0000 UTC))" 2026-02-16T17:24:40.344894408Z I0216 17:24:40.344305 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-02-16 16:50:47 +0000 UTC to 2036-02-14 16:50:47 +0000 UTC (now=2026-02-16 17:24:40.344286772 +0000 UTC))" 2026-02-16T17:24:40.344894408Z I0216 17:24:40.344320 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-csr-signer_@1771261235\" [] issuer=\"kubelet-signer\" (2026-02-16 17:00:34 +0000 UTC to 2026-02-17 16:50:49 +0000 UTC (now=2026-02-16 17:24:40.344311023 +0000 UTC))" 2026-02-16T17:24:40.344894408Z I0216 17:24:40.344335 1 tlsconfig.go:181] "Loaded client CA" index=6 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"openshift-kube-apiserver-operator_node-system-admin-signer@1771261220\" [] issuer=\"\" (2026-02-16 17:00:19 +0000 UTC to 2027-02-16 17:00:20 +0000 UTC (now=2026-02-16 17:24:40.344325223 +0000 UTC))" 2026-02-16T17:24:40.344894408Z I0216 17:24:40.344352 1 tlsconfig.go:181] "Loaded client CA" index=7 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-16 16:50:47 +0000 UTC to 2026-02-17 16:50:47 +0000 UTC (now=2026-02-16 17:24:40.344343134 +0000 UTC))" 2026-02-16T17:24:40.344894408Z I0216 17:24:40.344491 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771261227\" (2026-02-16 17:00:32 +0000 UTC to 2028-02-16 17:00:33 +0000 UTC (now=2026-02-16 17:24:40.344475087 +0000 UTC))" 2026-02-16T17:24:40.344894408Z I0216 17:24:40.344817 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771262680\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771262679\" (2026-02-16 16:24:39 +0000 UTC to 2027-02-16 16:24:39 +0000 UTC (now=2026-02-16 17:24:40.344801966 +0000 UTC))" config/pod/openshift-authentication-operator/authentication-operator-755d954778-lf4cb.json0000640000000000000000000001555715144651377030113 0ustar0000000000000000{"metadata":{"name":"authentication-operator-755d954778-lf4cb","generateName":"authentication-operator-755d954778-","namespace":"openshift-authentication-operator","uid":"9aa57eb4-c511-4ab8-a5d7-385e1ed9ee41","resourceVersion":"20918","creationTimestamp":"2026-02-16T16:58:51Z","labels":{"app":"authentication-operator","pod-template-hash":"755d954778"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.9/23\"],\"mac_address\":\"0a:58:0a:80:00:09\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.9/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.9\"\n ],\n \"mac\": \"0a:58:0a:80:00:09\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"authentication-operator-755d954778","uid":"5d6928a6-110c-41ae-bbee-2ebfc9fdea03","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config","configMap":{"name":"authentication-operator-config","defaultMode":440}},{"name":"trusted-ca-bundle","configMap":{"name":"trusted-ca-bundle","defaultMode":420,"optional":true}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","defaultMode":420,"optional":true}},{"name":"kube-api-access-f42cr","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"authentication-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963","command":["/bin/bash","-ec"],"args":["if [ -s /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\nexec authentication-operator operator --config=/var/run/configmaps/config/operator-config.yaml --v=2 --terminate-on-files=/var/run/configmaps/trusted-ca-bundle/ca-bundle.crt --terminate-on-files=/tmp/terminate\n"],"env":[{"name":"IMAGE_OAUTH_SERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2969828f1fcae82b7ef16d3588046ace3cf51b9ea578658c42475386e0ee1fc7"},{"name":"IMAGE_OAUTH_APISERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"},{"name":"OPERAND_OAUTH_SERVER_IMAGE_VERSION","value":"4.18.32_openshift"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"20m","memory":"200Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/trusted-ca-bundle"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca-bundle"},{"name":"kube-api-access-f42cr","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]},"runAsUser":0,"readOnlyRootFilesystem":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"authentication-operator","serviceAccount":"authentication-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c16,c0"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:39Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T16:59:56Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:39Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:39Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T16:59:56Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.9","podIPs":[{"ip":"10.128.0.9"}],"startTime":"2026-02-16T16:59:56Z","containerStatuses":[{"name":"authentication-operator","state":{"running":{"startedAt":"2026-02-16T17:24:38Z"}},"lastState":{},"ready":true,"restartCount":5,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963","containerID":"cri-o://52e211f6fe9eecc39bef491d00f5d519d919eca17814e7bbb20d74a61eb055b7","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","mountPath":"/var/run/configmaps/trusted-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca-bundle","mountPath":"/var/run/configmaps/service-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-f42cr","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}oauth-openshift_current.log0000640000000000000000000003611415144651377032361 0ustar0000000000000000config/pod/openshift-authentication/logs/oauth-openshift-64f85b8fc9-n9msn2026-02-16T17:24:40.807283263Z Copying system trust bundle 2026-02-16T17:24:41.389365406Z I0216 17:24:41.389131 1 dynamic_serving_content.go:113] "Loaded a new cert/key pair" name="serving-cert::/var/config/system/secrets/v4-0-config-system-serving-cert/tls.crt::/var/config/system/secrets/v4-0-config-system-serving-cert/tls.key" 2026-02-16T17:24:41.389846958Z I0216 17:24:41.389677 1 dynamic_serving_content.go:113] "Loaded a new cert/key pair" name="sni-serving-cert::/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab::/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab" 2026-02-16T17:24:41.670428838Z I0216 17:24:41.670344 1 audit.go:340] Using audit backend: ignoreErrors 2026-02-16T17:24:41.801763166Z I0216 17:24:41.796654 1 requestheader_controller.go:244] Loaded a new request header values for RequestHeaderAuthRequestController 2026-02-16T17:24:42.276311252Z I0216 17:24:42.273946 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-02-16T17:24:42.276311252Z I0216 17:24:42.273974 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-02-16T17:24:42.276311252Z I0216 17:24:42.273999 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-02-16T17:24:42.276311252Z I0216 17:24:42.274006 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-02-16T17:24:42.287309934Z I0216 17:24:42.287236 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-16T17:24:42.289295666Z I0216 17:24:42.287521 1 genericapiserver.go:528] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-02-16T17:24:42.673434878Z I0216 17:24:42.673178 1 tlsconfig.go:200] "Loaded serving cert" certName="serving-cert::/var/config/system/secrets/v4-0-config-system-serving-cert/tls.crt::/var/config/system/secrets/v4-0-config-system-serving-cert/tls.key" certDetail="\"oauth-openshift.openshift-authentication.svc\" [serving] validServingFor=[oauth-openshift.openshift-authentication.svc,oauth-openshift.openshift-authentication.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771261227\" (2026-02-16 17:00:51 +0000 UTC to 2028-02-16 17:00:52 +0000 UTC (now=2026-02-16 17:24:42.67313778 +0000 UTC))" 2026-02-16T17:24:42.673434878Z I0216 17:24:42.673324 1 named_certificates.go:53] "Loaded SNI cert" index=1 certName="sni-serving-cert::/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab::/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab" certDetail="\"*.apps.sno.openstack.lab\" [serving] validServingFor=[*.apps.sno.openstack.lab] issuer=\"ingress-operator@1771261250\" (2026-02-16 17:00:50 +0000 UTC to 2028-02-16 17:00:51 +0000 UTC (now=2026-02-16 17:24:42.673304475 +0000 UTC))" 2026-02-16T17:24:42.673434878Z I0216 17:24:42.673417 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771262681\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771262681\" (2026-02-16 16:24:41 +0000 UTC to 2027-02-16 16:24:41 +0000 UTC (now=2026-02-16 17:24:42.673407788 +0000 UTC))" 2026-02-16T17:24:42.673477039Z I0216 17:24:42.673432 1 secure_serving.go:213] Serving securely on [::]:6443 2026-02-16T17:24:42.673477039Z I0216 17:24:42.673455 1 genericapiserver.go:681] [graceful-termination] waiting for shutdown to be initiated 2026-02-16T17:24:42.673485070Z I0216 17:24:42.673479 1 requestheader_controller.go:169] Starting RequestHeaderAuthRequestController 2026-02-16T17:24:42.673492560Z I0216 17:24:42.673485 1 shared_informer.go:311] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-16T17:24:42.674196909Z I0216 17:24:42.673526 1 dynamic_serving_content.go:132] "Starting controller" name="serving-cert::/var/config/system/secrets/v4-0-config-system-serving-cert/tls.crt::/var/config/system/secrets/v4-0-config-system-serving-cert/tls.key" 2026-02-16T17:24:42.674196909Z I0216 17:24:42.673613 1 configmap_cafile_content.go:202] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-16T17:24:42.674196909Z I0216 17:24:42.673618 1 shared_informer.go:311] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T17:24:42.674196909Z I0216 17:24:42.673631 1 configmap_cafile_content.go:202] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-16T17:24:42.674196909Z I0216 17:24:42.673635 1 shared_informer.go:311] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T17:24:42.674196909Z I0216 17:24:42.673773 1 dynamic_serving_content.go:132] "Starting controller" name="sni-serving-cert::/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab::/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab" 2026-02-16T17:24:42.674196909Z I0216 17:24:42.673849 1 tlsconfig.go:240] "Starting DynamicServingCertificateController" 2026-02-16T17:24:42.680305460Z W0216 17:24:42.679692 1 reflector.go:539] k8s.io/client-go@v0.29.2/tools/cache/reflector.go:229: failed to list *v1.Group: the server is currently unable to handle the request (get groups.user.openshift.io) 2026-02-16T17:24:42.680305460Z E0216 17:24:42.679740 1 reflector.go:147] k8s.io/client-go@v0.29.2/tools/cache/reflector.go:229: Failed to watch *v1.Group: failed to list *v1.Group: the server is currently unable to handle the request (get groups.user.openshift.io) 2026-02-16T17:24:42.680305460Z I0216 17:24:42.679755 1 reflector.go:351] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.29.2/tools/cache/reflector.go:229 2026-02-16T17:24:42.680305460Z I0216 17:24:42.679781 1 reflector.go:351] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.29.2/tools/cache/reflector.go:229 2026-02-16T17:24:42.680305460Z I0216 17:24:42.680134 1 reflector.go:351] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.29.2/tools/cache/reflector.go:229 2026-02-16T17:24:42.775303306Z I0216 17:24:42.774425 1 shared_informer.go:318] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T17:24:42.775303306Z I0216 17:24:42.774459 1 shared_informer.go:318] Caches are synced for RequestHeaderAuthRequestController 2026-02-16T17:24:42.775303306Z I0216 17:24:42.774506 1 shared_informer.go:318] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T17:24:42.775303306Z I0216 17:24:42.774692 1 tlsconfig.go:178] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-16 16:50:47 +0000 UTC to 2026-02-17 16:50:47 +0000 UTC (now=2026-02-16 17:24:42.774660659 +0000 UTC))" 2026-02-16T17:24:42.775303306Z I0216 17:24:42.774867 1 tlsconfig.go:200] "Loaded serving cert" certName="serving-cert::/var/config/system/secrets/v4-0-config-system-serving-cert/tls.crt::/var/config/system/secrets/v4-0-config-system-serving-cert/tls.key" certDetail="\"oauth-openshift.openshift-authentication.svc\" [serving] validServingFor=[oauth-openshift.openshift-authentication.svc,oauth-openshift.openshift-authentication.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771261227\" (2026-02-16 17:00:51 +0000 UTC to 2028-02-16 17:00:52 +0000 UTC (now=2026-02-16 17:24:42.774847344 +0000 UTC))" 2026-02-16T17:24:42.775303306Z I0216 17:24:42.775027 1 named_certificates.go:53] "Loaded SNI cert" index=1 certName="sni-serving-cert::/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab::/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab" certDetail="\"*.apps.sno.openstack.lab\" [serving] validServingFor=[*.apps.sno.openstack.lab] issuer=\"ingress-operator@1771261250\" (2026-02-16 17:00:50 +0000 UTC to 2028-02-16 17:00:51 +0000 UTC (now=2026-02-16 17:24:42.775002138 +0000 UTC))" 2026-02-16T17:24:42.775303306Z I0216 17:24:42.775147 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771262681\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771262681\" (2026-02-16 16:24:41 +0000 UTC to 2027-02-16 16:24:41 +0000 UTC (now=2026-02-16 17:24:42.775133371 +0000 UTC))" 2026-02-16T17:24:42.775361027Z I0216 17:24:42.775309 1 tlsconfig.go:178] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-02-16 16:44:14 +0000 UTC to 2036-02-14 16:44:14 +0000 UTC (now=2026-02-16 17:24:42.775292906 +0000 UTC))" 2026-02-16T17:24:42.775361027Z I0216 17:24:42.775331 1 tlsconfig.go:178] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-02-16 16:50:49 +0000 UTC to 2026-02-17 16:50:49 +0000 UTC (now=2026-02-16 17:24:42.775318586 +0000 UTC))" 2026-02-16T17:24:42.775361027Z I0216 17:24:42.775348 1 tlsconfig.go:178] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-02-16 16:50:49 +0000 UTC to 2027-02-16 16:50:49 +0000 UTC (now=2026-02-16 17:24:42.775336837 +0000 UTC))" 2026-02-16T17:24:42.775370588Z I0216 17:24:42.775360 1 tlsconfig.go:178] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-02-16 16:50:49 +0000 UTC to 2027-02-16 16:50:49 +0000 UTC (now=2026-02-16 17:24:42.775352427 +0000 UTC))" 2026-02-16T17:24:42.775377908Z I0216 17:24:42.775372 1 tlsconfig.go:178] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-02-16 16:50:47 +0000 UTC to 2036-02-14 16:50:47 +0000 UTC (now=2026-02-16 17:24:42.775364908 +0000 UTC))" 2026-02-16T17:24:42.778352267Z I0216 17:24:42.775383 1 tlsconfig.go:178] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-csr-signer_@1771261235\" [] issuer=\"kubelet-signer\" (2026-02-16 17:00:34 +0000 UTC to 2026-02-17 16:50:49 +0000 UTC (now=2026-02-16 17:24:42.775376568 +0000 UTC))" 2026-02-16T17:24:42.778352267Z I0216 17:24:42.775402 1 tlsconfig.go:178] "Loaded client CA" index=6 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"openshift-kube-apiserver-operator_node-system-admin-signer@1771261220\" [] issuer=\"\" (2026-02-16 17:00:19 +0000 UTC to 2027-02-16 17:00:20 +0000 UTC (now=2026-02-16 17:24:42.775393428 +0000 UTC))" 2026-02-16T17:24:42.778352267Z I0216 17:24:42.775413 1 tlsconfig.go:178] "Loaded client CA" index=7 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-16 16:50:47 +0000 UTC to 2026-02-17 16:50:47 +0000 UTC (now=2026-02-16 17:24:42.775405889 +0000 UTC))" 2026-02-16T17:24:42.778352267Z I0216 17:24:42.775531 1 tlsconfig.go:200] "Loaded serving cert" certName="serving-cert::/var/config/system/secrets/v4-0-config-system-serving-cert/tls.crt::/var/config/system/secrets/v4-0-config-system-serving-cert/tls.key" certDetail="\"oauth-openshift.openshift-authentication.svc\" [serving] validServingFor=[oauth-openshift.openshift-authentication.svc,oauth-openshift.openshift-authentication.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771261227\" (2026-02-16 17:00:51 +0000 UTC to 2028-02-16 17:00:52 +0000 UTC (now=2026-02-16 17:24:42.775513211 +0000 UTC))" 2026-02-16T17:24:42.778352267Z I0216 17:24:42.775638 1 named_certificates.go:53] "Loaded SNI cert" index=1 certName="sni-serving-cert::/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab::/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab" certDetail="\"*.apps.sno.openstack.lab\" [serving] validServingFor=[*.apps.sno.openstack.lab] issuer=\"ingress-operator@1771261250\" (2026-02-16 17:00:50 +0000 UTC to 2028-02-16 17:00:51 +0000 UTC (now=2026-02-16 17:24:42.775624474 +0000 UTC))" 2026-02-16T17:24:42.778352267Z I0216 17:24:42.775728 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771262681\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771262681\" (2026-02-16 16:24:41 +0000 UTC to 2027-02-16 16:24:41 +0000 UTC (now=2026-02-16 17:24:42.775718917 +0000 UTC))" 2026-02-16T17:24:43.894632806Z W0216 17:24:43.894550 1 reflector.go:539] k8s.io/client-go@v0.29.2/tools/cache/reflector.go:229: failed to list *v1.Group: the server is currently unable to handle the request (get groups.user.openshift.io) 2026-02-16T17:24:43.894632806Z E0216 17:24:43.894603 1 reflector.go:147] k8s.io/client-go@v0.29.2/tools/cache/reflector.go:229: Failed to watch *v1.Group: failed to list *v1.Group: the server is currently unable to handle the request (get groups.user.openshift.io) 2026-02-16T17:24:46.273306474Z W0216 17:24:46.273216 1 reflector.go:539] k8s.io/client-go@v0.29.2/tools/cache/reflector.go:229: failed to list *v1.Group: the server is currently unable to handle the request (get groups.user.openshift.io) 2026-02-16T17:24:46.273306474Z E0216 17:24:46.273281 1 reflector.go:147] k8s.io/client-go@v0.29.2/tools/cache/reflector.go:229: Failed to watch *v1.Group: failed to list *v1.Group: the server is currently unable to handle the request (get groups.user.openshift.io) 2026-02-16T17:24:49.548321037Z I0216 17:24:49.548217 1 reflector.go:351] Caches populated for *v1.Group from k8s.io/client-go@v0.29.2/tools/cache/reflector.go:229 config/pod/openshift-authentication/oauth-openshift-64f85b8fc9-n9msn.json0000640000000000000000000002534115144651377025005 0ustar0000000000000000{"metadata":{"name":"oauth-openshift-64f85b8fc9-n9msn","generateName":"oauth-openshift-64f85b8fc9-","namespace":"openshift-authentication","uid":"2be9d55c-a4ec-48cd-93d2-0a1dced745a8","resourceVersion":"21275","creationTimestamp":"2026-02-16T17:08:27Z","labels":{"app":"oauth-openshift","oauth-openshift-anti-affinity":"true","pod-template-hash":"64f85b8fc9"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.33/23\"],\"mac_address\":\"0a:58:0a:80:00:21\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.33/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.33\"\n ],\n \"mac\": \"0a:58:0a:80:00:21\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","operator.openshift.io/bootstrap-user-exists":"true","operator.openshift.io/rvs-hash":"qS3mM7tklSEjvhnl4gKOHyxws9lbaDXQ1toUJGFEzWhlgkJsPtOVI8qHxaMt_emvQQ3Xad_5zovcmQHQEf7YUA"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"oauth-openshift-64f85b8fc9","uid":"0e5cc9b9-0228-4fec-8d25-084a29438ae1","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"audit-policies","configMap":{"name":"audit","defaultMode":420}},{"name":"audit-dir","hostPath":{"path":"/var/log/oauth-server","type":""}},{"name":"v4-0-config-system-session","secret":{"secretName":"v4-0-config-system-session","defaultMode":420}},{"name":"v4-0-config-system-cliconfig","configMap":{"name":"v4-0-config-system-cliconfig","defaultMode":420}},{"name":"v4-0-config-system-serving-cert","secret":{"secretName":"v4-0-config-system-serving-cert","defaultMode":420}},{"name":"v4-0-config-system-service-ca","configMap":{"name":"v4-0-config-system-service-ca","defaultMode":420}},{"name":"v4-0-config-system-router-certs","secret":{"secretName":"v4-0-config-system-router-certs","defaultMode":420}},{"name":"v4-0-config-system-ocp-branding-template","secret":{"secretName":"v4-0-config-system-ocp-branding-template","defaultMode":420}},{"name":"v4-0-config-user-template-login","secret":{"secretName":"v4-0-config-user-template-login","defaultMode":420,"optional":true}},{"name":"v4-0-config-user-template-provider-selection","secret":{"secretName":"v4-0-config-user-template-provider-selection","defaultMode":420,"optional":true}},{"name":"v4-0-config-user-template-error","secret":{"secretName":"v4-0-config-user-template-error","defaultMode":420,"optional":true}},{"name":"v4-0-config-system-trusted-ca-bundle","configMap":{"name":"v4-0-config-system-trusted-ca-bundle","defaultMode":420,"optional":true}},{"name":"kube-api-access-7mrkc","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"oauth-openshift","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2969828f1fcae82b7ef16d3588046ace3cf51b9ea578658c42475386e0ee1fc7","command":["/bin/bash","-ec"],"args":["if [ -s /var/config/system/configmaps/v4-0-config-system-trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /var/config/system/configmaps/v4-0-config-system-trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\nexec oauth-server osinserver \\\n--config=/var/config/system/configmaps/v4-0-config-system-cliconfig/v4-0-config-system-cliconfig \\\n--v=2 \\\n--audit-log-format=json \\\n--audit-log-maxbackup=10 \\\n--audit-log-maxsize=100 \\\n--audit-log-path=/var/log/oauth-server/audit.log \\\n--audit-policy-file=/var/run/configmaps/audit/audit.yaml\n"],"ports":[{"name":"https","containerPort":6443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"audit-policies","mountPath":"/var/run/configmaps/audit"},{"name":"audit-dir","mountPath":"/var/log/oauth-server"},{"name":"v4-0-config-system-session","readOnly":true,"mountPath":"/var/config/system/secrets/v4-0-config-system-session"},{"name":"v4-0-config-system-cliconfig","readOnly":true,"mountPath":"/var/config/system/configmaps/v4-0-config-system-cliconfig"},{"name":"v4-0-config-system-serving-cert","readOnly":true,"mountPath":"/var/config/system/secrets/v4-0-config-system-serving-cert"},{"name":"v4-0-config-system-service-ca","readOnly":true,"mountPath":"/var/config/system/configmaps/v4-0-config-system-service-ca"},{"name":"v4-0-config-system-router-certs","readOnly":true,"mountPath":"/var/config/system/secrets/v4-0-config-system-router-certs"},{"name":"v4-0-config-system-ocp-branding-template","readOnly":true,"mountPath":"/var/config/system/secrets/v4-0-config-system-ocp-branding-template"},{"name":"v4-0-config-user-template-login","readOnly":true,"mountPath":"/var/config/user/template/secret/v4-0-config-user-template-login"},{"name":"v4-0-config-user-template-provider-selection","readOnly":true,"mountPath":"/var/config/user/template/secret/v4-0-config-user-template-provider-selection"},{"name":"v4-0-config-user-template-error","readOnly":true,"mountPath":"/var/config/user/template/secret/v4-0-config-user-template-error"},{"name":"v4-0-config-system-trusted-ca-bundle","readOnly":true,"mountPath":"/var/config/system/configmaps/v4-0-config-system-trusted-ca-bundle"},{"name":"kube-api-access-7mrkc","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":6443,"scheme":"HTTPS"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/healthz","port":6443,"scheme":"HTTPS"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"lifecycle":{"preStop":{"exec":{"command":["sleep","25"]}}},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0,"readOnlyRootFilesystem":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":40,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"oauth-openshift","serviceAccount":"oauth-openshift","nodeName":"master-0","securityContext":{},"imagePullSecrets":[{"name":"oauth-openshift-dockercfg-nkhdh"}],"affinity":{"podAntiAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":[{"labelSelector":{"matchLabels":{"app":"oauth-openshift","oauth-openshift-anti-affinity":"true"}},"topologyKey":"kubernetes.io/hostname"}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:42Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:16:56Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:46Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:46Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:16:56Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.33","podIPs":[{"ip":"10.128.0.33"}],"startTime":"2026-02-16T17:16:56Z","containerStatuses":[{"name":"oauth-openshift","state":{"running":{"startedAt":"2026-02-16T17:24:40Z"}},"lastState":{},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2969828f1fcae82b7ef16d3588046ace3cf51b9ea578658c42475386e0ee1fc7","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2969828f1fcae82b7ef16d3588046ace3cf51b9ea578658c42475386e0ee1fc7","containerID":"cri-o://24810449690d5775751417ebd8694b4596d66b3a929f6ba3ed10b3bf89940dc8","started":true,"volumeMounts":[{"name":"audit-policies","mountPath":"/var/run/configmaps/audit"},{"name":"audit-dir","mountPath":"/var/log/oauth-server"},{"name":"v4-0-config-system-session","mountPath":"/var/config/system/secrets/v4-0-config-system-session","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"v4-0-config-system-cliconfig","mountPath":"/var/config/system/configmaps/v4-0-config-system-cliconfig","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"v4-0-config-system-serving-cert","mountPath":"/var/config/system/secrets/v4-0-config-system-serving-cert","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"v4-0-config-system-service-ca","mountPath":"/var/config/system/configmaps/v4-0-config-system-service-ca","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"v4-0-config-system-router-certs","mountPath":"/var/config/system/secrets/v4-0-config-system-router-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"v4-0-config-system-ocp-branding-template","mountPath":"/var/config/system/secrets/v4-0-config-system-ocp-branding-template","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"v4-0-config-user-template-login","mountPath":"/var/config/user/template/secret/v4-0-config-user-template-login","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"v4-0-config-user-template-provider-selection","mountPath":"/var/config/user/template/secret/v4-0-config-user-template-provider-selection","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"v4-0-config-user-template-error","mountPath":"/var/config/user/template/secret/v4-0-config-user-template-error","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"v4-0-config-system-trusted-ca-bundle","mountPath":"/var/config/system/configmaps/v4-0-config-system-trusted-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-7mrkc","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}events/openshift-machine-config-operator.json0000640000000000000000000022132015144651377020151 0ustar0000000000000000{"items":[{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T16:58:49Z","reason":"BackOff","message":"Back-off restarting failed container kube-rbac-proxy-crio in pod kube-rbac-proxy-crio-master-0_openshift-machine-config-operator(b3322fd3717f4aec0d8f54ec7862c07e)","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T16:59:02Z","reason":"Created","message":"Created container: kube-rbac-proxy-crio","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T16:59:02Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T16:59:03Z","reason":"Started","message":"Started container kube-rbac-proxy-crio","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:25Z","reason":"ScalingReplicaSet","message":"Scaled up replica set machine-config-operator-84976bb859 to 1","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:26Z","reason":"Scheduled","message":"Successfully assigned openshift-machine-config-operator/machine-config-operator-84976bb859-rsnqc to master-0","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:26Z","reason":"SuccessfulCreate","message":"Created pod: machine-config-operator-84976bb859-rsnqc","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:31Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.57/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:33Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:33Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:33Z","reason":"Created","message":"Created container: machine-config-operator","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:33Z","reason":"Started","message":"Started container machine-config-operator","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:34Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/machine-config-daemon-events -n default because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:34Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:34Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:34Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/machine-config-daemon-events because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:34Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/machine-config-daemon because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:34Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/mcd-prometheus-k8s -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:34Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/machine-config-daemon -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:34Z","reason":"SecretCreated","message":"Created Secret/master-user-data-managed -n openshift-machine-api because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:34Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:34Z","reason":"SecretCreated","message":"Created Secret/worker-user-data-managed -n openshift-machine-api because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:35Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/mcd-prometheus-k8s -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:35Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/machine-config-daemon -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:35Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/machine-config-daemon-events -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:36Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/machine-config-daemon because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:36Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/machine-config-daemon -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:36Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-rbac-proxy -n openshift-machine-config-operator:\ncause by changes in data.config-file.yaml","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:37Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:37Z","reason":"Scheduled","message":"Successfully assigned openshift-machine-config-operator/machine-config-daemon-98q6v to master-0","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:37Z","reason":"SuccessfulCreate","message":"Created pod: machine-config-daemon-98q6v","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:37Z","reason":"ValidatingAdmissionPolicyCreated","message":"Created ValidatingAdmissionPolicy.admissionregistration.k8s.io/mcn-guards because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:37Z","reason":"ValidatingAdmissionPolicyBindingCreated","message":"Created ValidatingAdmissionPolicyBinding.admissionregistration.k8s.io/mcn-guards-binding because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:38Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:38Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:38Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:38Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:38Z","reason":"Created","message":"Created container: machine-config-daemon","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:38Z","reason":"Started","message":"Started container machine-config-daemon","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:39Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/mcc-prometheus-k8s -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:39Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/machine-config-controller-events -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:39Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/machine-config-controller-events -n default because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:39Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/mcc-prometheus-k8s -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:39Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/machine-config-controller-events because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:39Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/machine-config-controller because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:40Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/machine-os-puller -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:40Z","reason":"ValidatingAdmissionPolicyCreated","message":"Created ValidatingAdmissionPolicy.admissionregistration.k8s.io/managed-bootimages-platform-check because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:40Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/machine-config-controller because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:40Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/machine-config-controller -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:40Z","reason":"ValidatingAdmissionPolicyCreated","message":"Created ValidatingAdmissionPolicy.admissionregistration.k8s.io/machine-configuration-guards because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:40Z","reason":"ValidatingAdmissionPolicyCreated","message":"Created ValidatingAdmissionPolicy.admissionregistration.k8s.io/custom-machine-config-pool-selector because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:40Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/machine-os-puller-binding -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:41Z","reason":"ScalingReplicaSet","message":"Scaled up replica set machine-config-controller-686c884b4d to 1","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:41Z","reason":"SuccessfulCreate","message":"Created pod: machine-config-controller-686c884b4d-ksx48","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:41Z","reason":"ValidatingAdmissionPolicyBindingCreated","message":"Created ValidatingAdmissionPolicyBinding.admissionregistration.k8s.io/machine-configuration-guards-binding because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:41Z","reason":"Scheduled","message":"Successfully assigned openshift-machine-config-operator/machine-config-controller-686c884b4d-ksx48 to master-0","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:41Z","reason":"ValidatingAdmissionPolicyBindingCreated","message":"Created ValidatingAdmissionPolicyBinding.admissionregistration.k8s.io/managed-bootimages-platform-check-binding because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:01:41Z","reason":"ValidatingAdmissionPolicyBindingCreated","message":"Created ValidatingAdmissionPolicyBinding.admissionregistration.k8s.io/custom-machine-config-pool-selector-binding because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:02:20Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"proxy-tls\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:02:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-hmj52\" : [failed to fetch token: Post \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-machine-config-operator/serviceaccounts/machine-config-controller/token\": dial tcp 192.168.32.10:6443: connect: connection refused, failed to sync configmap cache: timed out waiting for the condition]","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:02:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-8p2jz\" : [failed to fetch token: Post \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-machine-config-operator/serviceaccounts/machine-config-operator/token\": dial tcp 192.168.32.10:6443: connect: connection refused, failed to sync configmap cache: timed out waiting for the condition]","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"mcc-auth-proxy-config\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"proxy-tls\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"proxy-tls\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"mcd-auth-proxy-config\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"images\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-sx92x\" : [failed to fetch token: Post \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-machine-config-operator/serviceaccounts/machine-config-daemon/token\": dial tcp 192.168.32.10:6443: connect: connection refused, failed to sync configmap cache: timed out waiting for the condition]","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"auth-proxy-config\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:02:47Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:02:47Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.69/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:02:47Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:02:47Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:03:28Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:38Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/machine-config-server because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:38Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/machine-config-server because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:38Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system-bootstrap-node-renewal because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:38Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/machine-config-server -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:38Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/node-bootstrapper -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:38Z","reason":"SecretCreated","message":"Created Secret/node-bootstrapper-token -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:39Z","reason":"Scheduled","message":"Successfully assigned openshift-machine-config-operator/machine-config-server-2ws9r to master-0","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:39Z","reason":"SuccessfulCreate","message":"Created pod: machine-config-server-2ws9r","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:40Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:40Z","reason":"Created","message":"Created container: machine-config-server","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:40Z","reason":"Started","message":"Started container machine-config-server","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:41Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/machine-os-builder because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:41Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/machine-os-builder-events because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:41Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/machine-os-builder because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:41Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/machine-os-builder-events -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:41Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/machine-os-builder-events -n default because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:41Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/machine-os-builder -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:41Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/machine-os-builder-anyuid because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:42Z","reason":"RenderedConfigGenerated","message":"rendered-worker-634061234a51a4316df7a29b146c37b3 successfully generated (release version: 4.18.32, controller version: 0b0569287da3daea19bf47aa298037ccb4cbff98)","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:42Z","reason":"RenderedConfigGenerated","message":"rendered-master-f9bbc0c2cf4b5177e99dbf2979cd47a4 successfully generated (release version: 4.18.32, controller version: 0b0569287da3daea19bf47aa298037ccb4cbff98)","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:43Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-rbac-proxy -n openshift-machine-config-operator:\ncause by changes in data.config-file.yaml","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:45Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"http://127.0.0.1:8798/health\": dial tcp 127.0.0.1:8798: connect: connection refused","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:45Z","reason":"Killing","message":"Container machine-config-daemon failed liveness probe, will be restarted","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:48Z","reason":"OperatorVersionChanged","message":"clusteroperator/machine-config started a version change from [] to [{operator 4.18.32} {operator-image quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42}]","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:52Z","reason":"RenderedConfigGenerated","message":"rendered-master-4ff3bdc50d696d239efb12817ae47acf successfully generated (release version: 4.18.32, controller version: 0b0569287da3daea19bf47aa298037ccb4cbff98)","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:52Z","reason":"RenderedConfigGenerated","message":"rendered-worker-c7ccd6fb94dd6d087e4a528948c79fb2 successfully generated (release version: 4.18.32, controller version: 0b0569287da3daea19bf47aa298037ccb4cbff98)","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:53Z","reason":"OperatorDegraded: RequiredPoolsFailed","message":"Unable to apply 4.18.32: error during syncRequiredMachineConfigPools: context deadline exceeded","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:54Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:55Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:55Z","reason":"Created","message":"Created container: machine-config-daemon","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:57Z","reason":"RenderedConfigGenerated","message":"rendered-master-ccc1c4b4035b8605635ebee7b29103f5 successfully generated (release version: 4.18.32, controller version: 0b0569287da3daea19bf47aa298037ccb4cbff98)","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:57Z","reason":"AnnotationChange","message":"Node master-0 now has machineconfiguration.openshift.io/desiredConfig=rendered-master-ccc1c4b4035b8605635ebee7b29103f5","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:57Z","reason":"AnnotationChange","message":"Node master-0 now has machineconfiguration.openshift.io/currentConfig=rendered-master-ccc1c4b4035b8605635ebee7b29103f5","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:57Z","reason":"AnnotationChange","message":"Node master-0 now has machineconfiguration.openshift.io/state=Done","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:57Z","reason":"AnnotationChange","message":"Node master-0 now has machineconfiguration.openshift.io/reason=missing MachineConfig rendered-master-ccc1c4b4035b8605635ebee7b29103f5\nmachineconfig.machineconfiguration.openshift.io \"rendered-master-ccc1c4b4035b8605635ebee7b29103f5\" not found","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:57Z","reason":"SetDesiredConfig","message":"Targeted node master-0 to MachineConfig: rendered-master-4ff3bdc50d696d239efb12817ae47acf","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:04:57Z","reason":"AnnotationChange","message":"Node master-0 now has machineconfiguration.openshift.io/desiredConfig=rendered-master-4ff3bdc50d696d239efb12817ae47acf","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:07:15Z","reason":"ProbeError","message":"Liveness probe error: Get \"http://127.0.0.1:8798/health\": dial tcp 127.0.0.1:8798: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:07:34Z","reason":"OperatorDegraded: MachineConfigPoolsFailed","message":"Unable to apply 4.18.32: the server was unable to return a response in the time allotted, but may still be processing the request (get machineconfigpools.machineconfiguration.openshift.io master)","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:07:51Z","reason":"Started","message":"Started container machine-config-controller","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:07:51Z","reason":"Created","message":"Created container: machine-config-controller","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:07:51Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:07:59Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-rbac-proxy -n openshift-machine-config-operator:\ncause by changes in data.config-file.yaml","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:08:16Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:08:17Z","reason":"BootResync","message":"Booting node master-0, currentConfig rendered-master-ccc1c4b4035b8605635ebee7b29103f5, desiredConfig rendered-master-4ff3bdc50d696d239efb12817ae47acf","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:08:17Z","reason":"AddSigtermProtection","message":"Adding SIGTERM protection","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:08:17Z","reason":"Drain","message":"Drain not required, skipping","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:13:51Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:13:52Z","reason":"Started","message":"Started container setup","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:13:52Z","reason":"Created","message":"Created container: setup","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:13:53Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:13:53Z","reason":"Started","message":"Started container kube-rbac-proxy-crio","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:13:53Z","reason":"Created","message":"Created container: kube-rbac-proxy-crio","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:15Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:16Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:19Z","reason":"Started","message":"Started container machine-config-server","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:19Z","reason":"Created","message":"Created container: machine-config-server","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:19Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:20Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:20Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:20Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:23Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:32Z","reason":"NodeNotReady","message":"Node is not ready","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:32Z","reason":"NodeNotReady","message":"Node is not ready","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:32Z","reason":"NodeNotReady","message":"Node is not ready","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:33Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:33Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:35Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"proxy-tls\" : object \"openshift-machine-config-operator\"/\"mco-proxy-tls\" not registered","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:35Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"proxy-tls\" : object \"openshift-machine-config-operator\"/\"mcc-proxy-tls\" not registered","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:35Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"images\" : object \"openshift-machine-config-operator\"/\"machine-config-operator-images\" not registered","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:54Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.69/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:54Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.57/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:55Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:55Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:57Z","reason":"Created","message":"Created container: machine-config-operator","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:57Z","reason":"Created","message":"Created container: machine-config-controller","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:57Z","reason":"Started","message":"Started container machine-config-controller","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:57Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:57Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:57Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:57Z","reason":"Started","message":"Started container machine-config-operator","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:58Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:14:58Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:17:47Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:17:47Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:17:47Z","reason":"ProbeError","message":"Liveness probe error: Get \"http://127.0.0.1:8798/health\": dial tcp 127.0.0.1:8798: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:17:47Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"http://127.0.0.1:8798/health\": dial tcp 127.0.0.1:8798: connect: connection refused","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:17:47Z","reason":"Killing","message":"Container machine-config-daemon failed liveness probe, will be restarted","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:17:48Z","reason":"Started","message":"Started container machine-config-daemon","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:17:48Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:17:48Z","reason":"Created","message":"Created container: machine-config-daemon","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:17:52Z","reason":"AnnotationChange","message":"Node master-0 now has machineconfiguration.openshift.io/desiredConfig=rendered-master-ccc1c4b4035b8605635ebee7b29103f5","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:17:52Z","reason":"SetDesiredConfig","message":"Targeted node master-0 to MachineConfig: rendered-master-ccc1c4b4035b8605635ebee7b29103f5","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:17:59Z","reason":"ConfigDriftMonitorStarted","message":"Config Drift Monitor started, watching against rendered-master-4ff3bdc50d696d239efb12817ae47acf","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:17:59Z","reason":"AnnotationChange","message":"Node master-0 now has machineconfiguration.openshift.io/state=Done","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:17:59Z","reason":"AnnotationChange","message":"Node master-0 now has machineconfiguration.openshift.io/currentConfig=rendered-master-4ff3bdc50d696d239efb12817ae47acf","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:17:59Z","reason":"AnnotationChange","message":"Node master-0 now has machineconfiguration.openshift.io/reason=","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:17:59Z","reason":"NodeDone","message":"Setting node master-0, currentConfig rendered-master-4ff3bdc50d696d239efb12817ae47acf to Done","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:17:59Z","reason":"Uncordon","message":"Update completed for config rendered-master-4ff3bdc50d696d239efb12817ae47acf and node has been uncordoned","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:18:00Z","reason":"Drain","message":"Drain not required, skipping","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:18:00Z","reason":"AddSigtermProtection","message":"Adding SIGTERM protection","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:18:00Z","reason":"AnnotationChange","message":"Node master-0 now has machineconfiguration.openshift.io/state=Working","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:18:00Z","reason":"ConfigDriftMonitorStopped","message":"Config Drift Monitor stopped","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:18:35Z","reason":"OSUpgradeSkipped","message":"OS upgrade skipped; new MachineConfig (rendered-master-ccc1c4b4035b8605635ebee7b29103f5) has same OS image (quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4aa42a4b31390d46f924ce2d0c4da772bfbf6a5e1e121bdb0f8b69f989e0a0db) as old MachineConfig (rendered-master-4ff3bdc50d696d239efb12817ae47acf)","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:18:35Z","reason":"OSUpdateStarted","message":"Changing kernel arguments","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:18:40Z","reason":"Reboot","message":"Node will reboot into config rendered-master-ccc1c4b4035b8605635ebee7b29103f5","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:18:40Z","reason":"RemoveSigtermProtection","message":"Removing SIGTERM protection","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:23:33Z","reason":"Created","message":"Created container: setup","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:23:33Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:23:33Z","reason":"Started","message":"Started container setup","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:23:34Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:23:35Z","reason":"Created","message":"Created container: kube-rbac-proxy-crio","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:23:35Z","reason":"Started","message":"Started container kube-rbac-proxy-crio","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:23:57Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:23:57Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:23:59Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"proxy-tls\" : object \"openshift-machine-config-operator\"/\"mcc-proxy-tls\" not registered","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:24:02Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:24:04Z","reason":"Started","message":"Started container machine-config-server","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:24:04Z","reason":"Created","message":"Created container: machine-config-server","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:24:04Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:24:04Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:24:04Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:24:04Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:24:17Z","reason":"NodeNotReady","message":"Node is not ready","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:24:17Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:24:17Z","reason":"NodeNotReady","message":"Node is not ready","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:24:17Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:24:17Z","reason":"NodeNotReady","message":"Node is not ready","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:24:19Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"proxy-tls\" : object \"openshift-machine-config-operator\"/\"mcc-proxy-tls\" not registered","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:24:19Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"proxy-tls\" : object \"openshift-machine-config-operator\"/\"mco-proxy-tls\" not registered","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:24:19Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"images\" : object \"openshift-machine-config-operator\"/\"machine-config-operator-images\" not registered","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:24:38Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.57/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:24:38Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.69/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:24:39Z","reason":"Created","message":"Created container: machine-config-controller","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:24:39Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:24:39Z","reason":"Started","message":"Started container machine-config-operator","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:24:39Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:24:39Z","reason":"Started","message":"Started container machine-config-controller","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:24:39Z","reason":"Created","message":"Created container: machine-config-operator","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:24:39Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:24:40Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:24:41Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:24:41Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2026-02-16T17:24:41Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"}]}events/openshift-kube-controller-manager-operator.json0000640000000000000000000020322415144651377022024 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T16:55:13Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-controller-manager-operator-78ff47c7c5 to 1","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T16:55:23Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-78ff47c7c5-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T16:58:50Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-78ff47c7c5-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T16:58:52Z","reason":"SuccessfulCreate","message":"Created pod: kube-controller-manager-operator-78ff47c7c5-txr5k","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T16:58:52Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T16:59:56Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-controller-manager-operator/kube-controller-manager-operator-78ff47c7c5-txr5k to master-0","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T16:59:58Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_kube-controller-manager-operator-78ff47c7c5-txr5k_openshift-kube-controller-manager-operator_442600dc-09b2-4fee-9f89-777296b2ee40_0(22c631e15f175386fc7bc2946d5bbdc67e8b6c0891aab2689fbf461e266b07ab): error adding pod openshift-kube-controller-manager-operator_kube-controller-manager-operator-78ff47c7c5-txr5k to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"22c631e15f175386fc7bc2946d5bbdc67e8b6c0891aab2689fbf461e266b07ab\" Netns:\"/var/run/netns/04d428b0-1e00-46ad-8b1a-2b3539456e9e\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-kube-controller-manager-operator;K8S_POD_NAME=kube-controller-manager-operator-78ff47c7c5-txr5k;K8S_POD_INFRA_CONTAINER_ID=22c631e15f175386fc7bc2946d5bbdc67e8b6c0891aab2689fbf461e266b07ab;K8S_POD_UID=442600dc-09b2-4fee-9f89-777296b2ee40\" Path:\"\" ERRORED: error configuring pod [openshift-kube-controller-manager-operator/kube-controller-manager-operator-78ff47c7c5-txr5k] networking: [openshift-kube-controller-manager-operator/kube-controller-manager-operator-78ff47c7c5-txr5k/442600dc-09b2-4fee-9f89-777296b2ee40:ovn-kubernetes]: error adding container to network \"ovn-kubernetes\": failed to send CNI request: Post \"http://dummy/\": dial unix /var/run/ovn-kubernetes/cni//ovn-cni-server.sock: connect: connection refused\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:06Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_kube-controller-manager-operator-78ff47c7c5-txr5k_openshift-kube-controller-manager-operator_442600dc-09b2-4fee-9f89-777296b2ee40_0(ae8301f683e0c2e7dd3e78dd17a0392299d3335bf1d839dd7b9e85e118c390a5): error adding pod openshift-kube-controller-manager-operator_kube-controller-manager-operator-78ff47c7c5-txr5k to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"ae8301f683e0c2e7dd3e78dd17a0392299d3335bf1d839dd7b9e85e118c390a5\" Netns:\"/var/run/netns/8f141194-0e04-4abe-834a-0112db25606b\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-kube-controller-manager-operator;K8S_POD_NAME=kube-controller-manager-operator-78ff47c7c5-txr5k;K8S_POD_INFRA_CONTAINER_ID=ae8301f683e0c2e7dd3e78dd17a0392299d3335bf1d839dd7b9e85e118c390a5;K8S_POD_UID=442600dc-09b2-4fee-9f89-777296b2ee40\" Path:\"\" ERRORED: error configuring pod [openshift-kube-controller-manager-operator/kube-controller-manager-operator-78ff47c7c5-txr5k] networking: [openshift-kube-controller-manager-operator/kube-controller-manager-operator-78ff47c7c5-txr5k/442600dc-09b2-4fee-9f89-777296b2ee40:ovn-kubernetes]: error adding container to network \"ovn-kubernetes\": failed to send CNI request: Post \"http://dummy/\": dial unix /var/run/ovn-kubernetes/cni//ovn-cni-server.sock: connect: connection refused\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:23Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.22/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:24Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:29Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39\" in 4.69s (4.69s including waiting). Image size: 503717987 bytes.","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:29Z","reason":"Started","message":"Started container kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:29Z","reason":"Created","message":"Created container: kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:32Z","reason":"LeaderElection","message":"kube-controller-manager-operator-78ff47c7c5-txr5k_96d36150-9913-4567-abf6-585f70bb3d55 became leader","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:32Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-controller-manager version \"raw-internal\" changed from \"\" to \"4.18.32\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:32Z","reason":"CABundleUpdateRequired","message":"\"csr-controller-signer-ca\" in \"openshift-kube-controller-manager-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:32Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"\" \"nodes\" \"\" \"\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"} {\"\" \"nodes\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.32\"}]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"All is well\" to \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\",Progressing changed from Unknown to False (\"All is well\"),Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; \"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:34Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:34Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:34Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"extendedArguments\": map[string]any{\n+ \t\t\"cluster-cidr\": []any{string(\"10.128.0.0/16\")},\n+ \t\t\"cluster-name\": []any{string(\"sno-gsjck\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")},\n+ \t},\n+ \t\"featureGates\": []any{\n+ \t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"),\n+ \t\tstring(\"DisableKubeletCloudCredentialProviders=true\"),\n+ \t\tstring(\"GCPLabelsTags=true\"), string(\"HardwareSpeed=true\"),\n+ \t\tstring(\"IngressControllerLBSubnetsAWS=true\"), string(\"KMSv1=true\"),\n+ \t\tstring(\"ManagedBootImages=true\"), string(\"ManagedBootImagesAWS=true\"),\n+ \t\tstring(\"MultiArchInstallAWS=true\"), ...,\n+ \t},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:34Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:35Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; \" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:35Z","reason":"TargetUpdateRequired","message":"\"csr-signer\" in \"openshift-kube-controller-manager-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:36Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:36Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-controller-manager because it changed","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:36Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-controller-manager-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:36Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/csr-controller-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:36Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:38Z","reason":"ObservedConfigWriteError","message":"Failed to write observed config: Operation cannot be fulfilled on kubecontrollermanagers.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:39Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated featureGates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:39Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:39Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:39Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated extendedArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:39Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:39Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:39Z","reason":"ObserveServiceCAConfigMap","message":"observed change in config","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:41Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubecontrollermanagers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:42Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"extendedArguments\": map[string]any{\n+ \t\t\"cluster-cidr\": []any{string(\"10.128.0.0/16\")},\n+ \t\t\"cluster-name\": []any{string(\"sno-gsjck\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")},\n+ \t},\n+ \t\"featureGates\": []any{\n+ \t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"),\n+ \t\tstring(\"DisableKubeletCloudCredentialProviders=true\"),\n+ \t\tstring(\"GCPLabelsTags=true\"), string(\"HardwareSpeed=true\"),\n+ \t\tstring(\"IngressControllerLBSubnetsAWS=true\"), string(\"KMSv1=true\"),\n+ \t\tstring(\"ManagedBootImages=true\"), string(\"ManagedBootImagesAWS=true\"),\n+ \t\tstring(\"MultiArchInstallAWS=true\"), ...,\n+ \t},\n+ \t\"serviceServingCert\": map[string]any{\n+ \t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resources/configmaps/service-ca/ca-bundle.crt\"),\n+ \t},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:42Z","reason":"ConfigMissing","message":"no observedConfig","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:43Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-controller-manager -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:44Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubecontrollermanagers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\" to \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:45Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:47Z","reason":"ServiceCreated","message":"Created Service/kube-controller-manager -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:48Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/kube-controller-manager-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:50Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/pv-recycler-controller -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:50Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-controller-manager-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:50Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:51Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:52Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:52Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:52Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:52Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\\nGarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.22:54522-\u003e172.30.0.10:53: read: connection refused\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:53Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\\nGarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.22:54522-\u003e172.30.0.10:53: read: connection refused\" to \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:00:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:00Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:06Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:08Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:09Z","reason":"SecretCreated","message":"Created Secret/serving-cert-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:10Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:10Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:11Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:11Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/cluster-policy-controller-config has changed,required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"InstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:11Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:13Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:13Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:13Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:15Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:21Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:24Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:25Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:26Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:27Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"required configmap/cluster-policy-controller-config has changed,required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:33Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:01:45Z","reason":"SATokenSignerControllerStuck","message":"unexpected addresses: 192.168.32.10","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:02:26Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access\" : [failed to fetch token: Post \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-kube-controller-manager-operator/serviceaccounts/kube-controller-manager-operator/token\": dial tcp 192.168.32.10:6443: connect: connection refused, failed to sync configmap cache: timed out waiting for the condition]","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:03:22Z","reason":"BackOff","message":"Back-off restarting failed container kube-controller-manager-operator in pod kube-controller-manager-operator-78ff47c7c5-txr5k_openshift-kube-controller-manager-operator(442600dc-09b2-4fee-9f89-777296b2ee40)","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:03:37Z","reason":"Started","message":"Started container kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:03:37Z","reason":"Created","message":"Created container: kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:03:37Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:08:32Z","reason":"LeaderElection","message":"kube-controller-manager-operator-78ff47c7c5-txr5k_0c08c62a-ec39-4a47-982d-6004e7bef898 became leader","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:08:32Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:08:36Z","reason":"SATokenSignerControllerOK","message":"found expected kube-apiserver endpoints","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:08:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeInstallerDegraded: 1 nodes are failing on revision 2:\\nNodeInstallerDegraded: installer: taller revisions to settle for node master-0\\nNodeInstallerDegraded: I0216 17:01:35.234528 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I0216 17:01:35.234558 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I0216 17:01:35.248736 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\\nNodeInstallerDegraded: I0216 17:01:45.254520 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\\nNodeInstallerDegraded: I0216 17:01:55.820613 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\\nNodeInstallerDegraded: W0216 17:02:05.252061 1 cmd.go:470] Error getting installer pods on current node master-0: Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\\\": dial tcp 172.30.0.1:443: connect: connection refused\\nNodeInstallerDegraded: W0216 17:02:15.250548 1 cmd.go:470] Error getting installer pods on current node master-0: Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\\\": dial tcp 172.30.0.1:443: connect: connection refused\\nNodeInstallerDegraded: W0216 17:02:25.251080 1 cmd.go:470] Error getting installer pods on current node master-0: Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\\\": dial tcp 172.30.0.1:443: connect: connection refused\\nNodeInstallerDegraded: W0216 17:02:35.250231 1 cmd.go:470] Error getting installer pods on current node master-0: Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\\\": dial tcp 172.30.0.1:443: connect: connection refused\\nNodeInstallerDegraded: W0216 17:02:35.250822 1 cmd.go:470] Error getting installer pods on current node master-0: Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\\\": dial tcp 172.30.0.1:443: connect: connection refused\\nNodeInstallerDegraded: F0216 17:02:35.250856 1 cmd.go:109] timed out waiting for the condition\\nNodeInstallerDegraded: \\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:08:37Z","reason":"InstallerPodFailed","message":"installer errors: installer: taller revisions to settle for node master-0\nI0216 17:01:35.234528 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0216 17:01:35.234558 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0216 17:01:35.248736 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\nI0216 17:01:45.254520 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\nI0216 17:01:55.820613 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\nW0216 17:02:05.252061 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": dial tcp 172.30.0.1:443: connect: connection refused\nW0216 17:02:15.250548 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": dial tcp 172.30.0.1:443: connect: connection refused\nW0216 17:02:25.251080 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": dial tcp 172.30.0.1:443: connect: connection refused\nW0216 17:02:35.250231 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": dial tcp 172.30.0.1:443: connect: connection refused\nW0216 17:02:35.250822 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": dial tcp 172.30.0.1:443: connect: connection refused\nF0216 17:02:35.250856 1 cmd.go:109] timed out waiting for the condition\n","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:08:38Z","reason":"SecretCreated","message":"Created Secret/next-service-account-private-key -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:14:14Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:14:28Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access\" : object \"openshift-kube-controller-manager-operator\"/\"kube-root-ca.crt\" not registered","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:14:33Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:14:35Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : object \"openshift-kube-controller-manager-operator\"/\"kube-controller-manager-operator-serving-cert\" not registered","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:14:35Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : object \"openshift-kube-controller-manager-operator\"/\"kube-controller-manager-operator-config\" not registered","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:14:54Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.22/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:23:57Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:24:11Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access\" : object \"openshift-kube-controller-manager-operator\"/\"kube-root-ca.crt\" not registered","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:24:17Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:24:19Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : object \"openshift-kube-controller-manager-operator\"/\"kube-controller-manager-operator-serving-cert\" not registered","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:24:19Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : object \"openshift-kube-controller-manager-operator\"/\"kube-controller-manager-operator-config\" not registered","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T17:24:38Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.22/23] from ovn-kubernetes","type":"Normal"}]}events/openshift-kube-controller-manager.json0000640000000000000000000000437415144651377020200 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-16T17:01:17Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.45/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-16T17:01:17Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-16T17:01:18Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-16T17:01:18Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-16T17:01:30Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-16T17:01:34Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.62/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-16T17:01:34Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-16T17:01:34Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-16T17:01:34Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-16T17:02:26Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access\" : [failed to fetch token: Post \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-kube-controller-manager/serviceaccounts/installer-sa/token\": dial tcp 192.168.32.10:6443: connect: connection refused, failed to sync configmap cache: timed out waiting for the condition]","type":"Warning"}]}events/openshift-image-registry.json0000640000000000000000000003337115144651377016410 0ustar0000000000000000{"items":[{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T16:55:28Z","reason":"ScalingReplicaSet","message":"Scaled up replica set cluster-image-registry-operator-96c8c64b8 to 1","type":"Normal"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T16:55:29Z","reason":"FailedCreate","message":"Error creating: pods \"cluster-image-registry-operator-96c8c64b8-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T16:58:48Z","reason":"FailedCreate","message":"Error creating: pods \"cluster-image-registry-operator-96c8c64b8-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T16:58:50Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T16:58:50Z","reason":"SuccessfulCreate","message":"Created pod: cluster-image-registry-operator-96c8c64b8-zwwnk","type":"Normal"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T16:59:56Z","reason":"Scheduled","message":"Successfully assigned openshift-image-registry/cluster-image-registry-operator-96c8c64b8-zwwnk to master-0","type":"Normal"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:00:28Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"image-registry-operator-tls\" : secret \"image-registry-operator-tls\" not found","type":"Warning"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:00:35Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"image-registry-operator-tls\" : secret \"image-registry-operator-tls\" not found","type":"Warning"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:00:46Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.10/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:00:46Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc03f91dbf08df9907c0ebad30c54a7fa92285b19ec4e440ed762b197378a861\"","type":"Normal"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:00:49Z","reason":"Started","message":"Started container cluster-image-registry-operator","type":"Normal"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:00:49Z","reason":"Created","message":"Created container: cluster-image-registry-operator","type":"Normal"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:00:49Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc03f91dbf08df9907c0ebad30c54a7fa92285b19ec4e440ed762b197378a861\" in 3.589s (3.589s including waiting). Image size: 543577525 bytes.","type":"Normal"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:00:50Z","reason":"LeaderElection","message":"cluster-image-registry-operator-96c8c64b8-zwwnk_cf094955-2733-454d-a7bd-a8f8eed191ed became leader","type":"Normal"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:00:50Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:02:20Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"image-registry-operator-tls\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:02:28Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"bound-sa-token\" : failed to fetch token: Post \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-image-registry/serviceaccounts/cluster-image-registry-operator/token\": dial tcp 192.168.32.10:6443: connect: connection refused","type":"Warning"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:02:28Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-b5mwd\" : [failed to fetch token: Post \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-image-registry/serviceaccounts/cluster-image-registry-operator/token\": dial tcp 192.168.32.10:6443: connect: connection refused, failed to sync configmap cache: timed out waiting for the condition]","type":"Warning"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"trusted-ca\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:07:55Z","reason":"DaemonSetUpdated","message":"Updated DaemonSet.apps/node-ca -n openshift-image-registry because it changed","type":"Normal"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:08:26Z","reason":"SuccessfulCreate","message":"Created pod: node-ca-xv2wv","type":"Normal"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:14:14Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:14:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"image-registry-operator-tls\" : object \"openshift-image-registry\"/\"image-registry-operator-tls\" not registered","type":"Warning"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:14:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-b5mwd\" : [object \"openshift-image-registry\"/\"kube-root-ca.crt\" not registered, object \"openshift-image-registry\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:14:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"trusted-ca\" : object \"openshift-image-registry\"/\"trusted-ca\" not registered","type":"Warning"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:14:32Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:14:35Z","reason":"Created","message":"Created container: cluster-image-registry-operator","type":"Normal"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:14:35Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc03f91dbf08df9907c0ebad30c54a7fa92285b19ec4e440ed762b197378a861\" already present on machine","type":"Normal"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:14:35Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.10/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:16:56Z","reason":"Scheduled","message":"Successfully assigned openshift-image-registry/node-ca-xv2wv to master-0","type":"Normal"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:16:57Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fc2817e5b16d83dac91d1a274fb93521165953e9bdc28f3073b127eacc5a534e\"","type":"Normal"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:17:01Z","reason":"Created","message":"Created container: node-ca","type":"Normal"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:17:01Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fc2817e5b16d83dac91d1a274fb93521165953e9bdc28f3073b127eacc5a534e\" in 3.961s (3.961s including waiting). Image size: 476466823 bytes.","type":"Normal"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:17:01Z","reason":"Started","message":"Started container node-ca","type":"Normal"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:23:57Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:24:04Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fc2817e5b16d83dac91d1a274fb93521165953e9bdc28f3073b127eacc5a534e\" already present on machine","type":"Normal"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:24:04Z","reason":"Started","message":"Started container node-ca","type":"Normal"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:24:04Z","reason":"Created","message":"Created container: node-ca","type":"Normal"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:24:17Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:24:17Z","reason":"NodeNotReady","message":"Node is not ready","type":"Warning"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:24:19Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"image-registry-operator-tls\" : object \"openshift-image-registry\"/\"image-registry-operator-tls\" not registered","type":"Warning"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:24:19Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"trusted-ca\" : object \"openshift-image-registry\"/\"trusted-ca\" not registered","type":"Warning"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:24:39Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.10/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:24:39Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc03f91dbf08df9907c0ebad30c54a7fa92285b19ec4e440ed762b197378a861\" already present on machine","type":"Normal"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:24:41Z","reason":"Started","message":"Started container cluster-image-registry-operator","type":"Normal"},{"namespace":"openshift-image-registry","lastTimestamp":"2026-02-16T17:24:41Z","reason":"Created","message":"Created container: cluster-image-registry-operator","type":"Normal"}]}events/openshift-console.json0000640000000000000000000003526115144651377015122 0ustar0000000000000000{"items":[{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:04:18Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:04:18Z","reason":"ScalingReplicaSet","message":"Scaled up replica set downloads-dcd7b7d95 to 1","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:04:18Z","reason":"SuccessfulCreate","message":"Created pod: downloads-dcd7b7d95-dhhfh","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:04:18Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:04:18Z","reason":"Scheduled","message":"Successfully assigned openshift-console/downloads-dcd7b7d95-dhhfh to master-0","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:04:19Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.80/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:04:19Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7fccb6e19eb4caa16d32f4cf59670c2c741c98b099d1f12368b85aab3f84dc38\"","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:04:55Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7fccb6e19eb4caa16d32f4cf59670c2c741c98b099d1f12368b85aab3f84dc38\" in 35.292s (35.292s including waiting). Image size: 2890715256 bytes.","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:04:55Z","reason":"Started","message":"Started container download-server","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:04:55Z","reason":"Created","message":"Created container: download-server","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:04:56Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"http://10.128.0.80:8080/\": dial tcp 10.128.0.80:8080: connect: connection refused","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:04:56Z","reason":"ProbeError","message":"Readiness probe error: Get \"http://10.128.0.80:8080/\": dial tcp 10.128.0.80:8080: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:08:26Z","reason":"SuccessfulCreate","message":"Created pod: console-d585cf8d9-slttc","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:08:26Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:08:26Z","reason":"ScalingReplicaSet","message":"Scaled up replica set console-d585cf8d9 to 1","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:08:27Z","reason":"SuccessfulCreate","message":"Created pod: console-5b8dffb75d-kxct8","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:08:27Z","reason":"ScalingReplicaSet","message":"Scaled up replica set console-5b8dffb75d to 1","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:08:33Z","reason":"ScalingReplicaSet","message":"Scaled up replica set console-795746f87c to 1 from 0","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:08:33Z","reason":"ScalingReplicaSet","message":"Scaled down replica set console-d585cf8d9 to 0 from 1","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:08:33Z","reason":"SuccessfulDelete","message":"Deleted pod: console-d585cf8d9-slttc","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:08:33Z","reason":"SuccessfulCreate","message":"Created pod: console-795746f87c-qdv9c","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:08:35Z","reason":"SuccessfulCreate","message":"Created pod: console-599b567ff7-nrcpr","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:08:35Z","reason":"ScalingReplicaSet","message":"Scaled down replica set console-5b8dffb75d to 0 from 1","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:08:35Z","reason":"SuccessfulDelete","message":"Deleted pod: console-5b8dffb75d-kxct8","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:08:35Z","reason":"ScalingReplicaSet","message":"Scaled up replica set console-599b567ff7 to 1 from 0","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:14:15Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:14:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-p6xfw\" : [object \"openshift-console\"/\"kube-root-ca.crt\" not registered, object \"openshift-console\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:14:33Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:14:35Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.80/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:14:36Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7fccb6e19eb4caa16d32f4cf59670c2c741c98b099d1f12368b85aab3f84dc38\" already present on machine","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:14:36Z","reason":"Created","message":"Created container: download-server","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:14:36Z","reason":"Started","message":"Started container download-server","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:14:37Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"http://10.128.0.80:8080/\": dial tcp 10.128.0.80:8080: connect: connection refused","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:14:37Z","reason":"ProbeError","message":"Readiness probe error: Get \"http://10.128.0.80:8080/\": dial tcp 10.128.0.80:8080: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:16:56Z","reason":"Scheduled","message":"Successfully assigned openshift-console/console-599b567ff7-nrcpr to master-0","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:16:56Z","reason":"Scheduled","message":"Successfully assigned openshift-console/console-795746f87c-qdv9c to master-0","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:16:57Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.29/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:16:57Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.13/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:16:57Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8164cc9e16e8be9ea18be73c9df5041af326ed6b3059faff08f76e568cf4dc2\"","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:16:58Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8164cc9e16e8be9ea18be73c9df5041af326ed6b3059faff08f76e568cf4dc2\"","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:17:01Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8164cc9e16e8be9ea18be73c9df5041af326ed6b3059faff08f76e568cf4dc2\" in 3.784s (3.784s including waiting). Image size: 628694305 bytes.","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:17:01Z","reason":"Started","message":"Started container console","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:17:01Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8164cc9e16e8be9ea18be73c9df5041af326ed6b3059faff08f76e568cf4dc2\" in 3.574s (3.574s including waiting). Image size: 628694305 bytes.","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:17:01Z","reason":"Created","message":"Created container: console","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:17:01Z","reason":"Started","message":"Started container console","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:17:01Z","reason":"Created","message":"Created container: console","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:17:07Z","reason":"ScalingReplicaSet","message":"Scaled down replica set console-795746f87c to 0 from 1","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:17:07Z","reason":"SuccessfulDelete","message":"Deleted pod: console-795746f87c-qdv9c","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:17:09Z","reason":"Killing","message":"Stopping container console","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:23:57Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:23:57Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:23:59Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"console-oauth-config\" : object \"openshift-console\"/\"console-oauth-config\" not registered","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:23:59Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"oauth-serving-cert\" : object \"openshift-console\"/\"oauth-serving-cert\" not registered","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:24:05Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"console-serving-cert\" : object \"openshift-console\"/\"console-serving-cert\" not registered","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:24:05Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"trusted-ca-bundle\" : object \"openshift-console\"/\"trusted-ca-bundle\" not registered","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:24:05Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"oauth-serving-cert\" : object \"openshift-console\"/\"oauth-serving-cert\" not registered","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:24:05Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:24:05Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"console-config\" : object \"openshift-console\"/\"console-config\" not registered","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:24:06Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-st6bv\" : [object \"openshift-console\"/\"kube-root-ca.crt\" not registered, object \"openshift-console\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:24:07Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"console-oauth-config\" : object \"openshift-console\"/\"console-oauth-config\" not registered","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:24:07Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"service-ca\" : object \"openshift-console\"/\"service-ca\" not registered","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:24:17Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:24:19Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-p6xfw\" : [object \"openshift-console\"/\"kube-root-ca.crt\" not registered, object \"openshift-console\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:24:36Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7fccb6e19eb4caa16d32f4cf59670c2c741c98b099d1f12368b85aab3f84dc38\" already present on machine","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:24:36Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.80/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:24:38Z","reason":"Created","message":"Created container: download-server","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:24:38Z","reason":"Started","message":"Started container download-server","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2026-02-16T17:24:39Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.13/23] from ovn-kubernetes","type":"Normal"}]}events/openshift-console-operator.json0000640000000000000000000011603415144651377016751 0ustar0000000000000000{"items":[{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:03:56Z","reason":"SuccessfulCreate","message":"Created pod: console-operator-7777d5cc66-64vhv","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:03:56Z","reason":"Scheduled","message":"Successfully assigned openshift-console-operator/console-operator-7777d5cc66-64vhv to master-0","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:03:56Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:95e7647e6fda21b94b692f03908e4cd154e3374fca0560229c646fefe2c46730\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:03:56Z","reason":"ScalingReplicaSet","message":"Scaled up replica set console-operator-7777d5cc66 to 1","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:03:56Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.78/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:03:59Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:95e7647e6fda21b94b692f03908e4cd154e3374fca0560229c646fefe2c46730\" in 2.394s (2.394s including waiting). Image size: 507065596 bytes.","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:06Z","reason":"BackOff","message":"Back-off restarting failed container console-operator in pod console-operator-7777d5cc66-64vhv_openshift-console-operator(0517b180-00ee-47fe-a8e7-36a3931b7e72)","type":"Warning"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:18Z","reason":"LeaderElection","message":"console-operator-7777d5cc66-64vhv_0f2d464d-6deb-481c-b12b-7445436bf227 became leader","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:18Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:95e7647e6fda21b94b692f03908e4cd154e3374fca0560229c646fefe2c46730\" already present on machine","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded set to False (\"All is well\"),Progressing set to False (\"All is well\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [] to [{\"operator.openshift.io\" \"consoles\" \"\" \"cluster\"} {\"config.openshift.io\" \"consoles\" \"\" \"cluster\"} {\"config.openshift.io\" \"infrastructures\" \"\" \"cluster\"} {\"config.openshift.io\" \"proxies\" \"\" \"cluster\"} {\"config.openshift.io\" \"oauths\" \"\" \"cluster\"} {\"oauth.openshift.io\" \"oauthclients\" \"\" \"console\"} {\"\" \"namespaces\" \"\" \"openshift-console-operator\"} {\"\" \"namespaces\" \"\" \"openshift-console\"} {\"\" \"configmaps\" \"openshift-config-managed\" \"console-public\"}],status.versions changed from [] to [{\"operator\" \"4.18.32\"}]","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:18Z","reason":"PodDisruptionBudgetCreated","message":"Created PodDisruptionBudget.policy/console -n openshift-console because it was missing","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:18Z","reason":"PodDisruptionBudgetCreated","message":"Created PodDisruptionBudget.policy/downloads -n openshift-console because it was missing","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:18Z","reason":"OperatorVersionChanged","message":"clusteroperator/console version \"operator\" changed from \"\" to \"4.18.32\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:18Z","reason":"DeploymentCreated","message":"Created Deployment.apps/downloads -n openshift-console because it was missing","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:18Z","reason":"FastControllerResync","message":"Controller \"HealthCheckController\" resync interval is set to 30s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:18Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:18Z","reason":"Created","message":"Created container: console-operator","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:18Z","reason":"Started","message":"Started container console-operator","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/default-ingress-cert -n openshift-console because it was missing","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/oauth-serving-cert -n openshift-console because it was missing","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:20Z","reason":"ServiceCreated","message":"Created Service/downloads -n openshift-console because it was missing","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:20Z","reason":"SecretCreated","message":"Created Secret/console-oauth-config -n openshift-console because it was missing","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:20Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"All is well\" to \"OAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:20Z","reason":"ServiceCreated","message":"Created Service/console -n openshift-console because it was missing","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:27Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/downloads -n openshift-console because it changed","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:29Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"OAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\" to \"OAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"OAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\" to \"OAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:35Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"OAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\" to \"OAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\",Upgradeable changed from True to False (\"DownloadsDefaultRouteSyncUpgradeable: Internal error occurred: resource quota evaluation timed out\")","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"OAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\" to \"OAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nConsoleDefaultRouteSyncDegraded: timed out waiting for the condition\",Upgradeable message changed from \"DownloadsDefaultRouteSyncUpgradeable: Internal error occurred: resource quota evaluation timed out\" to \"ConsoleDefaultRouteSyncUpgradeable: timed out waiting for the condition\\nDownloadsDefaultRouteSyncUpgradeable: Internal error occurred: resource quota evaluation timed out\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:47Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: status.relatedObjects changed from [{\"operator.openshift.io\" \"consoles\" \"\" \"cluster\"} {\"config.openshift.io\" \"consoles\" \"\" \"cluster\"} {\"config.openshift.io\" \"infrastructures\" \"\" \"cluster\"} {\"config.openshift.io\" \"proxies\" \"\" \"cluster\"} {\"config.openshift.io\" \"oauths\" \"\" \"cluster\"} {\"oauth.openshift.io\" \"oauthclients\" \"\" \"console\"} {\"\" \"namespaces\" \"\" \"openshift-console-operator\"} {\"\" \"namespaces\" \"\" \"openshift-console\"} {\"\" \"configmaps\" \"openshift-config-managed\" \"console-public\"}] to [{\"console.openshift.io\" \"consoleplugins\" \"\" \"monitoring-plugin\"} {\"operator.openshift.io\" \"consoles\" \"\" \"cluster\"} {\"config.openshift.io\" \"consoles\" \"\" \"cluster\"} {\"config.openshift.io\" \"infrastructures\" \"\" \"cluster\"} {\"config.openshift.io\" \"proxies\" \"\" \"cluster\"} {\"config.openshift.io\" \"oauths\" \"\" \"cluster\"} {\"oauth.openshift.io\" \"oauthclients\" \"\" \"console\"} {\"\" \"namespaces\" \"\" \"openshift-console-operator\"} {\"\" \"namespaces\" \"\" \"openshift-console\"} {\"\" \"configmaps\" \"openshift-config-managed\" \"console-public\"}]","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:04:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"OAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nConsoleDefaultRouteSyncDegraded: timed out waiting for the condition\" to \"OAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nConsoleDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\",Upgradeable message changed from \"ConsoleDefaultRouteSyncUpgradeable: timed out waiting for the condition\\nDownloadsDefaultRouteSyncUpgradeable: Internal error occurred: resource quota evaluation timed out\" to \"ConsoleDefaultRouteSyncUpgradeable: Internal error occurred: resource quota evaluation timed out\\nDownloadsDefaultRouteSyncUpgradeable: Internal error occurred: resource quota evaluation timed out\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:07:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded changed from False to True (\"ConsoleDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\")","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:07:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"ConsoleDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\" to \"ConsoleDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nDownloadsDeploymentSyncDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get deployments.apps downloads)\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:07:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"ConsoleDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\" to \"ConsoleDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nPDBSyncDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get poddisruptionbudgets.policy console)\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:07:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"ConsoleDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nDownloadsDeploymentSyncDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get deployments.apps downloads)\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\" to \"ConsoleDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nDownloadsDeploymentSyncDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get deployments.apps downloads)\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nPDBSyncDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get poddisruptionbudgets.policy downloads)\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:07:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"ConsoleDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nPDBSyncDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get poddisruptionbudgets.policy console)\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\" to \"ConsoleDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:08:00Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"ConsoleDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nDownloadsDeploymentSyncDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get deployments.apps downloads)\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nPDBSyncDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get poddisruptionbudgets.policy downloads)\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\" to \"ConsoleDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nDownloadsDeploymentSyncDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get deployments.apps downloads)\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:08:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"ConsoleDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nDownloadsDeploymentSyncDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get deployments.apps downloads)\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\" to \"ConsoleDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:08:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"ConsoleDefaultRouteSyncDegraded: no ingress for host console-openshift-console.apps.sno.openstack.lab in route console in namespace openshift-console\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\" to \"DownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nOAuthClientsControllerDegraded: no ingress for host console-openshift-console.apps.sno.openstack.lab in route console in namespace openshift-console\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\",Upgradeable message changed from \"ConsoleDefaultRouteSyncUpgradeable: no ingress for host console-openshift-console.apps.sno.openstack.lab in route console in namespace openshift-console\\nDownloadsDefaultRouteSyncUpgradeable: Internal error occurred: resource quota evaluation timed out\" to \"DownloadsDefaultRouteSyncUpgradeable: Internal error occurred: resource quota evaluation timed out\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:08:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"ConsoleDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\" to \"ConsoleDefaultRouteSyncDegraded: no ingress for host console-openshift-console.apps.sno.openstack.lab in route console in namespace openshift-console\\nDownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\",Upgradeable message changed from \"ConsoleDefaultRouteSyncUpgradeable: Internal error occurred: resource quota evaluation timed out\\nDownloadsDefaultRouteSyncUpgradeable: Internal error occurred: resource quota evaluation timed out\" to \"ConsoleDefaultRouteSyncUpgradeable: no ingress for host console-openshift-console.apps.sno.openstack.lab in route console in namespace openshift-console\\nDownloadsDefaultRouteSyncUpgradeable: Internal error occurred: resource quota evaluation timed out\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:08:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"DownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\" to \"DownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: no ingress for host console-openshift-console.apps.sno.openstack.lab in route console in namespace openshift-console\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:08:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"DownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nOAuthClientsControllerDegraded: no ingress for host console-openshift-console.apps.sno.openstack.lab in route console in namespace openshift-console\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\" to \"DownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: route.route.openshift.io \\\"console\\\" not found\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:08:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"DownloadsDefaultRouteSyncDegraded: Internal error occurred: resource quota evaluation timed out\\nRouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: no ingress for host console-openshift-console.apps.sno.openstack.lab in route console in namespace openshift-console\" to \"RouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: no ingress for host console-openshift-console.apps.sno.openstack.lab in route console in namespace openshift-console\",Upgradeable changed from False to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:08:11Z","reason":"ConfigMapCreated","message":"Created ConfigMap/console-config -n openshift-console because it was missing","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:08:12Z","reason":"DeploymentCreated","message":"Created Deployment.apps/console -n openshift-console because it was missing","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:08:12Z","reason":"ConfigMapCreated","message":"Created ConfigMap/console-public -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:08:13Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"RouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\\nSyncLoopRefreshDegraded: no ingress for host console-openshift-console.apps.sno.openstack.lab in route console in namespace openshift-console\" to \"RouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\",Progressing changed from False to True (\"SyncLoopRefreshProgressing: changes made during sync updates, additional sync expected\"),Available changed from Unknown to False (\"DeploymentAvailable: 0 replicas available for console deployment\")","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:08:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"RouteHealthDegraded: route.route.openshift.io \\\"console\\\" not found\" to \"RouteHealthDegraded: console route is not admitted\",Available message changed from \"DeploymentAvailable: 0 replicas available for console deployment\" to \"DeploymentAvailable: 0 replicas available for console deployment\\nRouteHealthAvailable: console route is not admitted\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:08:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"RouteHealthDegraded: console route is not admitted\" to \"RouteHealthDegraded: route not yet available, https://console-openshift-console.apps.sno.openstack.lab returns '503 Service Unavailable'\",Available message changed from \"DeploymentAvailable: 0 replicas available for console deployment\\nRouteHealthAvailable: console route is not admitted\" to \"DeploymentAvailable: 0 replicas available for console deployment\\nRouteHealthAvailable: route not yet available, https://console-openshift-console.apps.sno.openstack.lab returns '503 Service Unavailable'\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:08:32Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: status.relatedObjects changed from [{\"console.openshift.io\" \"consoleplugins\" \"\" \"monitoring-plugin\"} {\"operator.openshift.io\" \"consoles\" \"\" \"cluster\"} {\"config.openshift.io\" \"consoles\" \"\" \"cluster\"} {\"config.openshift.io\" \"infrastructures\" \"\" \"cluster\"} {\"config.openshift.io\" \"proxies\" \"\" \"cluster\"} {\"config.openshift.io\" \"oauths\" \"\" \"cluster\"} {\"oauth.openshift.io\" \"oauthclients\" \"\" \"console\"} {\"\" \"namespaces\" \"\" \"openshift-console-operator\"} {\"\" \"namespaces\" \"\" \"openshift-console\"} {\"\" \"configmaps\" \"openshift-config-managed\" \"console-public\"}] to [{\"console.openshift.io\" \"consoleplugins\" \"\" \"monitoring-plugin\"} {\"console.openshift.io\" \"consoleplugins\" \"\" \"networking-console-plugin\"} {\"operator.openshift.io\" \"consoles\" \"\" \"cluster\"} {\"config.openshift.io\" \"consoles\" \"\" \"cluster\"} {\"config.openshift.io\" \"infrastructures\" \"\" \"cluster\"} {\"config.openshift.io\" \"proxies\" \"\" \"cluster\"} {\"config.openshift.io\" \"oauths\" \"\" \"cluster\"} {\"oauth.openshift.io\" \"oauthclients\" \"\" \"console\"} {\"\" \"namespaces\" \"\" \"openshift-console-operator\"} {\"\" \"namespaces\" \"\" \"openshift-console\"} {\"\" \"configmaps\" \"openshift-config-managed\" \"console-public\"}]","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:08:35Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/console-config -n openshift-console:\ncause by changes in data.console-config.yaml","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:08:35Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/console -n openshift-console because it changed","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:08:35Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Progressing message changed from \"SyncLoopRefreshProgressing: changes made during sync updates, additional sync expected\" to \"SyncLoopRefreshProgressing: working toward version 4.18.32, 0 replicas available\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:08:35Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Progressing message changed from \"SyncLoopRefreshProgressing: working toward version 4.18.32, 0 replicas available\" to \"SyncLoopRefreshProgressing: changes made during sync updates, additional sync expected\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:14:15Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:14:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : object \"openshift-console-operator\"/\"console-operator-config\" not registered","type":"Warning"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:14:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"trusted-ca\" : object \"openshift-console-operator\"/\"trusted-ca\" not registered","type":"Warning"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:14:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-sbrtz\" : [object \"openshift-console-operator\"/\"kube-root-ca.crt\" not registered, object \"openshift-console-operator\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:14:27Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:14:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : object \"openshift-console-operator\"/\"serving-cert\" not registered","type":"Warning"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:14:54Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.78/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:23:57Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:23:59Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"trusted-ca\" : object \"openshift-console-operator\"/\"trusted-ca\" not registered","type":"Warning"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:23:59Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : object \"openshift-console-operator\"/\"serving-cert\" not registered","type":"Warning"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:24:11Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : object \"openshift-console-operator\"/\"console-operator-config\" not registered","type":"Warning"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:24:11Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"trusted-ca\" : object \"openshift-console-operator\"/\"trusted-ca\" not registered","type":"Warning"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:24:11Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : object \"openshift-console-operator\"/\"serving-cert\" not registered","type":"Warning"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:24:11Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:24:12Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-sbrtz\" : [object \"openshift-console-operator\"/\"kube-root-ca.crt\" not registered, object \"openshift-console-operator\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-console-operator","lastTimestamp":"2026-02-16T17:24:39Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.78/23] from ovn-kubernetes","type":"Normal"}]}events/openshift-oauth-apiserver.json0000640000000000000000000002451315144651377016574 0ustar0000000000000000{"items":[{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:00:50Z","reason":"Scheduled","message":"Successfully assigned openshift-oauth-apiserver/apiserver-66788cb45c-dp9bc to master-0","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:00:50Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-66788cb45c-dp9bc","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:00:50Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-66788cb45c to 1","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:00:51Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.35/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:00:51Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192\"","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:00:58Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192\" in 7.316s (7.316s including waiting). Image size: 500175306 bytes.","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:00:59Z","reason":"Started","message":"Started container oauth-apiserver","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:00:59Z","reason":"Created","message":"Created container: oauth-apiserver","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:00:59Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192\" already present on machine","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:00:59Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:00:59Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:02:12Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-5v65g\" : [failed to fetch token: Post \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-oauth-apiserver/serviceaccounts/oauth-apiserver-sa/token\": dial tcp 192.168.32.10:6443: connect: connection refused, failed to sync configmap cache: timed out waiting for the condition]","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:02:15Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"trusted-ca-bundle\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:02:15Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"encryption-config\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:02:15Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"etcd-client\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:02:15Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"audit-policies\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:02:15Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:02:15Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"etcd-serving-ca\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:14:15Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:14:21Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"etcd-client\" : object \"openshift-oauth-apiserver\"/\"etcd-client\" not registered","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:14:21Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"encryption-config\" : object \"openshift-oauth-apiserver\"/\"encryption-config-1\" not registered","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:14:21Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"etcd-serving-ca\" : object \"openshift-oauth-apiserver\"/\"etcd-serving-ca\" not registered","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:14:21Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"audit-policies\" : object \"openshift-oauth-apiserver\"/\"audit-1\" not registered","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:14:21Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-5v65g\" : [object \"openshift-oauth-apiserver\"/\"kube-root-ca.crt\" not registered, object \"openshift-oauth-apiserver\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:14:21Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:14:23Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : object \"openshift-oauth-apiserver\"/\"serving-cert\" not registered","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:14:23Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"trusted-ca-bundle\" : object \"openshift-oauth-apiserver\"/\"trusted-ca-bundle\" not registered","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:14:52Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.35/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:23:58Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:23:59Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"etcd-serving-ca\" : object \"openshift-oauth-apiserver\"/\"etcd-serving-ca\" not registered","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:23:59Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"audit-policies\" : object \"openshift-oauth-apiserver\"/\"audit-1\" not registered","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:24:05Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"encryption-config\" : object \"openshift-oauth-apiserver\"/\"encryption-config-1\" not registered","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:24:05Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : object \"openshift-oauth-apiserver\"/\"serving-cert\" not registered","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:24:05Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"audit-policies\" : object \"openshift-oauth-apiserver\"/\"audit-1\" not registered","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:24:05Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-5v65g\" : [object \"openshift-oauth-apiserver\"/\"kube-root-ca.crt\" not registered, object \"openshift-oauth-apiserver\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:24:05Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"trusted-ca-bundle\" : object \"openshift-oauth-apiserver\"/\"trusted-ca-bundle\" not registered","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:24:05Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:24:07Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"etcd-serving-ca\" : object \"openshift-oauth-apiserver\"/\"etcd-serving-ca\" not registered","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:24:07Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"etcd-client\" : object \"openshift-oauth-apiserver\"/\"etcd-client\" not registered","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T17:24:39Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.35/23] from ovn-kubernetes","type":"Normal"}]}events/openshift-ingress.json0000640000000000000000000001114715144651377015127 0ustar0000000000000000{"items":[{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T17:00:51Z","reason":"SuccessfulCreate","message":"Created pod: router-default-864ddd5f56-pm4rt","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T17:00:51Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T17:00:51Z","reason":"ScalingReplicaSet","message":"Scaled up replica set router-default-864ddd5f56 to 1","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T17:02:51Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T17:03:28Z","reason":"Scheduled","message":"Successfully assigned openshift-ingress/router-default-864ddd5f56-pm4rt to master-0","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T17:03:28Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb\"","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T17:03:31Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb\" in 2.579s (2.579s including waiting). Image size: 481879166 bytes.","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T17:03:31Z","reason":"Created","message":"Created container: router","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T17:03:31Z","reason":"Started","message":"Started container router","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T17:14:19Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb\" already present on machine","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T17:14:19Z","reason":"Created","message":"Created container: router","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T17:14:19Z","reason":"Started","message":"Started container router","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T17:14:30Z","reason":"ProbeError","message":"Startup probe error: HTTP probe failed with statuscode: 500\nbody: [-]backend-http failed: reason withheld\n[-]has-synced failed: reason withheld\n[+]process-running ok\nhealthz check failed\n\n","type":"Warning"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T17:14:30Z","reason":"Unhealthy","message":"Startup probe failed: HTTP probe failed with statuscode: 500","type":"Warning"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T17:24:04Z","reason":"Created","message":"Created container: router","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T17:24:04Z","reason":"Started","message":"Started container router","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T17:24:04Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb\" already present on machine","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T17:24:05Z","reason":"ProbeError","message":"Startup probe error: Get \"http://localhost:1936/healthz/ready\": dial tcp [::1]:1936: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T17:24:05Z","reason":"Unhealthy","message":"Startup probe failed: Get \"http://localhost:1936/healthz/ready\": dial tcp [::1]:1936: connect: connection refused","type":"Warning"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T17:24:15Z","reason":"ProbeError","message":"Startup probe error: HTTP probe failed with statuscode: 500\nbody: [-]backend-http failed: reason withheld\n[-]has-synced failed: reason withheld\n[+]process-running ok\nhealthz check failed\n\n","type":"Warning"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T17:24:15Z","reason":"Unhealthy","message":"Startup probe failed: HTTP probe failed with statuscode: 500","type":"Warning"}]}events/openshift-authentication-operator.json0000640000000000000000000040573115144651377020333 0ustar0000000000000000{"items":[{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T16:55:15Z","reason":"ScalingReplicaSet","message":"Scaled up replica set authentication-operator-755d954778 to 1","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T16:55:25Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-755d954778-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T16:58:49Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-755d954778-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T16:58:51Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T16:58:51Z","reason":"SuccessfulCreate","message":"Created pod: authentication-operator-755d954778-lf4cb","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T16:59:56Z","reason":"Scheduled","message":"Successfully assigned openshift-authentication-operator/authentication-operator-755d954778-lf4cb to master-0","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T16:59:58Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_authentication-operator-755d954778-lf4cb_openshift-authentication-operator_9aa57eb4-c511-4ab8-a5d7-385e1ed9ee41_0(7d93cb4502ffa248022429ed843e52a6dda3fa68352e9ee52370209f6d1530fe): error adding pod openshift-authentication-operator_authentication-operator-755d954778-lf4cb to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"7d93cb4502ffa248022429ed843e52a6dda3fa68352e9ee52370209f6d1530fe\" Netns:\"/var/run/netns/1aa4ba52-cd68-418d-a567-84c6be05a263\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-authentication-operator;K8S_POD_NAME=authentication-operator-755d954778-lf4cb;K8S_POD_INFRA_CONTAINER_ID=7d93cb4502ffa248022429ed843e52a6dda3fa68352e9ee52370209f6d1530fe;K8S_POD_UID=9aa57eb4-c511-4ab8-a5d7-385e1ed9ee41\" Path:\"\" ERRORED: error configuring pod [openshift-authentication-operator/authentication-operator-755d954778-lf4cb] networking: [openshift-authentication-operator/authentication-operator-755d954778-lf4cb/9aa57eb4-c511-4ab8-a5d7-385e1ed9ee41:ovn-kubernetes]: error adding container to network \"ovn-kubernetes\": failed to send CNI request: Post \"http://dummy/\": dial unix /var/run/ovn-kubernetes/cni//ovn-cni-server.sock: connect: connection refused\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:06Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_authentication-operator-755d954778-lf4cb_openshift-authentication-operator_9aa57eb4-c511-4ab8-a5d7-385e1ed9ee41_0(368ea21b12ee629f43d4f26e25177485b2a06fdf19b09ce692f98e61e2248fe1): error adding pod openshift-authentication-operator_authentication-operator-755d954778-lf4cb to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"368ea21b12ee629f43d4f26e25177485b2a06fdf19b09ce692f98e61e2248fe1\" Netns:\"/var/run/netns/88258e9d-54a2-45ed-9119-b752c64f5183\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-authentication-operator;K8S_POD_NAME=authentication-operator-755d954778-lf4cb;K8S_POD_INFRA_CONTAINER_ID=368ea21b12ee629f43d4f26e25177485b2a06fdf19b09ce692f98e61e2248fe1;K8S_POD_UID=9aa57eb4-c511-4ab8-a5d7-385e1ed9ee41\" Path:\"\" ERRORED: error configuring pod [openshift-authentication-operator/authentication-operator-755d954778-lf4cb] networking: [openshift-authentication-operator/authentication-operator-755d954778-lf4cb/9aa57eb4-c511-4ab8-a5d7-385e1ed9ee41:ovn-kubernetes]: error adding container to network \"ovn-kubernetes\": failed to send CNI request: Post \"http://dummy/\": dial unix /var/run/ovn-kubernetes/cni//ovn-cni-server.sock: connect: connection refused\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:18Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.9/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:18Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:24Z","reason":"Started","message":"Started container authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:24Z","reason":"Created","message":"Created container: authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:24Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963\" in 6.209s (6.209s including waiting). Image size: 508050651 bytes.","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:25Z","reason":"LeaderElection","message":"authentication-operator-755d954778-lf4cb_0df7ca66-df85-4c9b-bead-bc05ea42b2f1 became leader","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:26Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"operator\" \"4.18.32\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:26Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded changed from Unknown to False (\"All is well\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:26Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"operator\" changed from \"\" to \"4.18.32\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:27Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available changed from Unknown to False (\"ReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:28Z","reason":"ObserveAPIAudiences","message":"service account issuer changed from to https://kubernetes.default.svc","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:28Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:28Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:28Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:28Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthAPIServer\") of observed config: \"\\u00a0\\u00a0map[string]any(\\n-\\u00a0\\tnil,\\n+\\u00a0\\t{\\n+\\u00a0\\t\\t\\\"apiServerArguments\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"api-audiences\\\": []any{string(\\\"https://kubernetes.default.svc\\\")},\\n+\\u00a0\\t\\t\\t\\\"cors-allowed-origins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+\\u00a0\\t\\t\\t\\\"etcd-servers\\\": []any{string(\\\"https://192.168.32.10:2379\\\")},\\n+\\u00a0\\t\\t\\t\\\"tls-cipher-suites\\\": []any{\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t\\t\\\"tls-min-version\\\": string(\\\"VersionTLS12\\\"),\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t},\\n\\u00a0\\u00a0)\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:28Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"All is well\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:29Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"ReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:29Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:29Z","reason":"ObserveAPIServerURL","message":"loginURL changed from to https://api.sno.openstack.lab:6443","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:29Z","reason":"ObserveAuditProfile","message":"AuditProfile changed from '%!s(\u003cnil\u003e)' to 'map[audit-log-format:[json] audit-log-maxbackup:[10] audit-log-maxsize:[100] audit-log-path:[/var/log/oauth-server/audit.log] audit-policy-file:[/var/run/configmaps/audit/audit.yaml]]'","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:29Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\",Available message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:29Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:29Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:29Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:29Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \"\\u00a0\\u00a0map[string]any(\\n-\\u00a0\\tnil,\\n+\\u00a0\\t{\\n+\\u00a0\\t\\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+\\u00a0\\t\\t\\\"oauthConfig\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"assetPublicURL\\\": string(\\\"\\\"),\\n+\\u00a0\\t\\t\\t\\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"),\\n+\\u00a0\\t\\t\\t\\\"templates\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\t\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t\\t\\\"tokenConfig\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\t\\\"accessTokenMaxAgeSeconds\\\": float64(86400),\\n+\\u00a0\\t\\t\\t\\t\\\"authorizeTokenMaxAgeSeconds\\\": float64(300),\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t\\t\\\"serverArguments\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"audit-log-format\\\": []any{string(\\\"json\\\")},\\n+\\u00a0\\t\\t\\t\\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")},\\n+\\u00a0\\t\\t\\t\\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")},\\n+\\u00a0\\t\\t\\t\\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")},\\n+\\u00a0\\t\\t\\t\\\"audit-policy-file\\\": []any{string(\\\"/var/run/configmaps/audit/audit.\\\"...)},\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t\\t\\\"servingInfo\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"cipherSuites\\\": []any{\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t\\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n+\\u00a0\\t},\\n\\u00a0\\u00a0)\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:29Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:29Z","reason":"ObserveTokenConfig","message":"accessTokenMaxAgeSeconds changed from %!d(float64=0) to %!d(float64=86400)","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:29Z","reason":"ObserveTemplates","message":"templates changed to map[\"error\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/errors.html\" \"login\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/login.html\" \"providerSelection\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/providers.html\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:31Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:32Z","reason":"NoValidCertificateFound","message":"No valid client certificate for OpenShiftAuthenticatorCertRequester is found: unable to parse certificate: data does not contain any valid RSA or ECDSA certificates","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:32Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:32Z","reason":"CSRApproval","message":"The CSR \"system:openshift:openshift-authenticator-7lxqx\" has been approved","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:32Z","reason":"CSRCreated","message":"A csr \"system:openshift:openshift-authenticator-7lxqx\" is created for OpenShiftAuthenticatorCertRequester","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:33Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/audit -n openshift-authentication: namespaces \"openshift-authentication\" not found","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:33Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:33Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:34Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:34Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:38Z","reason":"ClientCertificateCreated","message":"A new client certificate for OpenShiftAuthenticatorCertRequester is available","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:39Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:43Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/v4-0-config-system-trusted-ca-bundle -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:44Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:45Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:45Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:45Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-ocp-branding-template -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"All is well\" to \"AuthenticatorCertKeyProgressing: All is well\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:48Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-apiserver-sa -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:48Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:48Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:49Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\",Progressing changed from False to True (\"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\"),Available message changed from \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:50Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:52Z","reason":"ServiceCreated","message":"Created Service/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:52Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:52Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:54Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:56Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-router-certs -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:56Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:56Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:56Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:56Z","reason":"ObserveRouterSecret","message":"namedCertificates changed to []interface {}{map[string]interface {}{\"certFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"keyFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"names\":[]interface {}{\"*.apps.sno.openstack.lab\"}}}","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:56Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \"\\u00a0\\u00a0map[string]any{\\n\\u00a0\\u00a0\\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n\\u00a0\\u00a0\\t\\\"oauthConfig\\\": map[string]any{\\\"assetPublicURL\\\": string(\\\"\\\"), \\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"), \\\"templates\\\": map[string]any{\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...)}, \\\"tokenConfig\\\": map[string]any{\\\"accessTokenMaxAgeSeconds\\\": float64(86400), \\\"authorizeTokenMaxAgeSeconds\\\": float64(300)}},\\n\\u00a0\\u00a0\\t\\\"serverArguments\\\": map[string]any{\\\"audit-log-format\\\": []any{string(\\\"json\\\")}, \\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")}, \\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")}, \\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")}, ...},\\n\\u00a0\\u00a0\\t\\\"servingInfo\\\": map[string]any{\\n\\u00a0\\u00a0\\t\\t\\\"cipherSuites\\\": []any{string(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"), string(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"), string(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\\\"), ...},\\n\\u00a0\\u00a0\\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+\\u00a0\\t\\t\\\"namedCertificates\\\": []any{\\n+\\u00a0\\t\\t\\tmap[string]any{\\n+\\u00a0\\t\\t\\t\\t\\\"certFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"keyFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"names\\\": []any{string(\\\"*.apps.sno.openstack.lab\\\")},\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t},\\n\\u00a0\\u00a0\\t},\\n\\u00a0\\u00a0\\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n\\u00a0\\u00a0}\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:56Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:56Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:56Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:00:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:01:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/oauth-serving-cert -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:01:01Z","reason":"OpenShiftAPICheckFailed","message":"\"oauth.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:01:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:01:01Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.user.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:01:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:01:01Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.oauth.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:01:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:01:01Z","reason":"OpenShiftAPICheckFailed","message":"\"user.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:01:02Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"oauth-apiserver\" changed from \"\" to \"4.18.32\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:01:02Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: status.versions changed from [{\"operator\" \"4.18.32\"}] to [{\"operator\" \"4.18.32\"} {\"oauth-apiserver\" \"4.18.32\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:01:02Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing changed from True to False (\"AuthenticatorCertKeyProgressing: All is well\"),Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:01:35Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963\" already present on machine","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:01:35Z","reason":"Created","message":"Created container: authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:01:35Z","reason":"Started","message":"Started container authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:01:36Z","reason":"LeaderElection","message":"authentication-operator-755d954778-lf4cb_7efe8790-24dd-436a-ada1-e99041ce8aca became leader","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:01:37Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:01:38Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:01:44Z","reason":"SecretCreated","message":"Created Secret/webhook-authentication-integrated-oauth -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:01:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:02:20Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"service-ca-bundle\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:02:20Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:02:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-f42cr\" : [failed to fetch token: Post \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-authentication-operator/serviceaccounts/authentication-operator/token\": dial tcp 192.168.32.10:6443: connect: connection refused, failed to sync configmap cache: timed out waiting for the condition]","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"trusted-ca-bundle\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:03:33Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-session -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:03:33Z","reason":"ConfigMapCreated","message":"Created ConfigMap/v4-0-config-system-metadata -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:03:33Z","reason":"DeploymentCreated","message":"Created Deployment.apps/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:03:33Z","reason":"ConfigMapCreated","message":"Created ConfigMap/v4-0-config-system-cliconfig -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:03:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded changed from False to True (\"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:04:43Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"oauth-openshift\" changed from \"\" to \"4.18.32_openshift\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:04:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: status.versions changed from [{\"operator\" \"4.18.32\"} {\"oauth-apiserver\" \"4.18.32\"}] to [{\"operator\" \"4.18.32\"} {\"oauth-apiserver\" \"4.18.32\"} {\"oauth-openshift\" \"4.18.32_openshift\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:04:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerRouteEndpointAccessibleControllerDegraded: ingress.config/cluster does not yet have status for the \\\"openshift-authentication/oauth-openshift\\\" route\\nWellKnownReadyControllerDegraded: failed to get oauth metadata from openshift-config-managed/oauth-openshift ConfigMap: configmap \\\"oauth-openshift\\\" not found (check authentication operator, it is supposed to create this)\" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerRouteEndpointAccessibleControllerDegraded: ingress.config/cluster does not yet have status for the \\\"openshift-authentication/oauth-openshift\\\" route\\nWellKnownReadyControllerDegraded: failed to get oauth metadata from openshift-config-managed/oauth-openshift ConfigMap: configmap \\\"oauth-openshift\\\" not found (check authentication operator, it is supposed to create this)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:04:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded changed from True to False (\"OAuthServerRouteEndpointAccessibleControllerDegraded: ingress.config/cluster does not yet have status for the \\\"openshift-authentication/oauth-openshift\\\" route\\nWellKnownReadyControllerDegraded: failed to get oauth metadata from openshift-config-managed/oauth-openshift ConfigMap: configmap \\\"oauth-openshift\\\" not found (check authentication operator, it is supposed to create this)\"),Progressing changed from False to True (\"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"),Available message changed from \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.35:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.35:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: failed to retrieve route from cache: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get oauth metadata from openshift-config-managed/oauth-openshift ConfigMap: configmap \\\"oauth-openshift\\\" not found (check authentication operator, it is supposed to create this)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:04:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available\" to \"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available\\nWellKnownReadyControllerProgressing: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\",Available message changed from \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: failed to retrieve route from cache: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get oauth metadata from openshift-config-managed/oauth-openshift ConfigMap: configmap \\\"oauth-openshift\\\" not found (check authentication operator, it is supposed to create this)\" to \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: failed to retrieve route from cache: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:04:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/oauth-openshift -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:07:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\" to \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nRouterCertsDomainValidationControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get secrets router-certs)\\nWebhookAuthenticatorControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get authentications.config.openshift.io cluster)\",Progressing message changed from \"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available\\nWellKnownReadyControllerProgressing: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\" to \"APIServerDeploymentProgressing: deployment/openshift-oauth-apiserver: could not be retrieved\\nOAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available\\nWellKnownReadyControllerProgressing: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\",Available message changed from \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\" to \"APIServerDeploymentAvailable: deployment/openshift-oauth-apiserver: could not be retrieved\\nOAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:07:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded changed from False to True (\"OAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:07:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nRouterCertsDomainValidationControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get secrets router-certs)\\nWebhookAuthenticatorControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get authentications.config.openshift.io cluster)\" to \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get authentications.config.openshift.io cluster)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:07:56Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get authentications.config.openshift.io cluster)\" to \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:07:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/ns.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-authentication)\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/authentication-clusterrolebinding.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:openshift-authentication)\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerStaticResourcesDegraded: \\\"oauth-apiserver/ns.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-oauth-apiserver)\\nAPIServerStaticResourcesDegraded: \\\"oauth-apiserver/apiserver-clusterrolebinding.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:oauth-apiserver)\\nAPIServerStaticResourcesDegraded: \\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/ns.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-authentication)\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/authentication-clusterrolebinding.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:openshift-authentication)\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:07:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\" to \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/ns.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-authentication)\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/authentication-clusterrolebinding.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:openshift-authentication)\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:08:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerStaticResourcesDegraded: \\\"oauth-apiserver/ns.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-oauth-apiserver)\\nAPIServerStaticResourcesDegraded: \\\"oauth-apiserver/apiserver-clusterrolebinding.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:oauth-apiserver)\\nAPIServerStaticResourcesDegraded: \\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\" to \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:08:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerStaticResourcesDegraded: \\\"oauth-apiserver/ns.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-oauth-apiserver)\\nAPIServerStaticResourcesDegraded: \\\"oauth-apiserver/apiserver-clusterrolebinding.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:oauth-apiserver)\\nAPIServerStaticResourcesDegraded: \\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/ns.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-authentication)\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/authentication-clusterrolebinding.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:openshift-authentication)\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerStaticResourcesDegraded: \\\"oauth-apiserver/ns.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-oauth-apiserver)\\nAPIServerStaticResourcesDegraded: \\\"oauth-apiserver/apiserver-clusterrolebinding.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:oauth-apiserver)\\nAPIServerStaticResourcesDegraded: \\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:08:03Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\" to \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nCustomRouteControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get routes.route.openshift.io oauth-openshift)\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:08:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nCustomRouteControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get routes.route.openshift.io oauth-openshift)\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\" to \"CustomRouteControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get routes.route.openshift.io oauth-openshift)\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\",Progressing message changed from \"APIServerDeploymentProgressing: deployment/openshift-oauth-apiserver: could not be retrieved\\nOAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available\\nWellKnownReadyControllerProgressing: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\" to \"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available\\nWellKnownReadyControllerProgressing: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\",Available message changed from \"APIServerDeploymentAvailable: deployment/openshift-oauth-apiserver: could not be retrieved\\nOAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\" to \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:08:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available\\nWellKnownReadyControllerProgressing: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\" to \"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: observed generation is 2, desired generation is 3.\\nWellKnownReadyControllerProgressing: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:08:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"CustomRouteControllerDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get routes.route.openshift.io oauth-openshift)\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:08:10Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/oauth-openshift -n openshift-authentication because it changed","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:08:12Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \"\\u00a0\\u00a0map[string]any{\\n\\u00a0\\u00a0\\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n\\u00a0\\u00a0\\t\\\"oauthConfig\\\": map[string]any{\\n-\\u00a0\\t\\t\\\"assetPublicURL\\\": string(\\\"\\\"),\\n+\\u00a0\\t\\t\\\"assetPublicURL\\\": string(\\\"https://console-openshift-console.apps.sno.openstack.lab\\\"),\\n\\u00a0\\u00a0\\t\\t\\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"),\\n\\u00a0\\u00a0\\t\\t\\\"templates\\\": map[string]any{\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...)},\\n\\u00a0\\u00a0\\t\\t\\\"tokenConfig\\\": map[string]any{\\\"accessTokenMaxAgeSeconds\\\": float64(86400), \\\"authorizeTokenMaxAgeSeconds\\\": float64(300)},\\n\\u00a0\\u00a0\\t},\\n\\u00a0\\u00a0\\t\\\"serverArguments\\\": map[string]any{\\\"audit-log-format\\\": []any{string(\\\"json\\\")}, \\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")}, \\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")}, \\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")}, ...},\\n\\u00a0\\u00a0\\t\\\"servingInfo\\\": map[string]any{\\\"cipherSuites\\\": []any{string(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"), string(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"), string(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\\\"), ...}, \\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"), \\\"namedCertificates\\\": []any{map[string]any{\\\"certFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...), \\\"keyFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...), \\\"names\\\": []any{string(\\\"*.apps.sno.openstack.lab\\\")}}}},\\n\\u00a0\\u00a0\\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n\\u00a0\\u00a0}\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:08:12Z","reason":"ObserveConsoleURL","message":"assetPublicURL changed from to https://console-openshift-console.apps.sno.openstack.lab","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:08:17Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/v4-0-config-system-cliconfig -n openshift-authentication:\ncause by changes in data.v4-0-config-system-cliconfig","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:08:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:08:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.145.24:443/healthz\\\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\" to \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.145.24:443/healthz\\\": dial tcp 172.30.145.24:443: connect: connection refused\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:14:14Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:14:23Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : object \"openshift-authentication-operator\"/\"serving-cert\" not registered","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:14:23Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"trusted-ca-bundle\" : object \"openshift-authentication-operator\"/\"trusted-ca-bundle\" not registered","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:14:23Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-f42cr\" : [object \"openshift-authentication-operator\"/\"kube-root-ca.crt\" not registered, object \"openshift-authentication-operator\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:14:23Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"service-ca-bundle\" : object \"openshift-authentication-operator\"/\"service-ca-bundle\" not registered","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:14:25Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:14:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : object \"openshift-authentication-operator\"/\"authentication-operator-config\" not registered","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:14:54Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.9/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:23:57Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:23:59Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : object \"openshift-authentication-operator\"/\"authentication-operator-config\" not registered","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:23:59Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"service-ca-bundle\" : object \"openshift-authentication-operator\"/\"service-ca-bundle\" not registered","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:24:07Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-f42cr\" : [object \"openshift-authentication-operator\"/\"kube-root-ca.crt\" not registered, object \"openshift-authentication-operator\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:24:07Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"trusted-ca-bundle\" : object \"openshift-authentication-operator\"/\"trusted-ca-bundle\" not registered","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:24:07Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : object \"openshift-authentication-operator\"/\"serving-cert\" not registered","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:24:07Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"service-ca-bundle\" : object \"openshift-authentication-operator\"/\"service-ca-bundle\" not registered","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:24:09Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:24:11Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : object \"openshift-authentication-operator\"/\"authentication-operator-config\" not registered","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T17:24:37Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.9/23] from ovn-kubernetes","type":"Normal"}]}events/openshift-authentication.json0000640000000000000000000002537015144651377016477 0ustar0000000000000000{"items":[{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:03:33Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"v4-0-config-system-cliconfig\" : configmap \"v4-0-config-system-cliconfig\" not found","type":"Warning"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:03:33Z","reason":"Scheduled","message":"Successfully assigned openshift-authentication/oauth-openshift-989b889c9-l264c to master-0","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:03:33Z","reason":"SuccessfulCreate","message":"Created pod: oauth-openshift-989b889c9-l264c","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:03:33Z","reason":"ScalingReplicaSet","message":"Scaled up replica set oauth-openshift-989b889c9 to 1","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:03:34Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2969828f1fcae82b7ef16d3588046ace3cf51b9ea578658c42475386e0ee1fc7\"","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:03:34Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.75/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:03:36Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2969828f1fcae82b7ef16d3588046ace3cf51b9ea578658c42475386e0ee1fc7\" in 1.836s (1.836s including waiting). Image size: 476284775 bytes.","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:03:36Z","reason":"Created","message":"Created container: oauth-openshift","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:03:36Z","reason":"Started","message":"Started container oauth-openshift","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:04:39Z","reason":"ScalingReplicaSet","message":"Scaled down replica set oauth-openshift-989b889c9 to 0 from 1","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:04:39Z","reason":"SuccessfulDelete","message":"Deleted pod: oauth-openshift-989b889c9-l264c","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:04:39Z","reason":"Killing","message":"Stopping container oauth-openshift","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:04:39Z","reason":"SuccessfulCreate","message":"Created pod: oauth-openshift-8cd8fdb64-4ltx8","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:04:39Z","reason":"ScalingReplicaSet","message":"Scaled up replica set oauth-openshift-8cd8fdb64 to 1 from 0","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:04:47Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:08:27Z","reason":"SuccessfulDelete","message":"Deleted pod: oauth-openshift-8cd8fdb64-4ltx8","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:08:27Z","reason":"SuccessfulCreate","message":"Created pod: oauth-openshift-64f85b8fc9-n9msn","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:08:27Z","reason":"ScalingReplicaSet","message":"Scaled down replica set oauth-openshift-8cd8fdb64 to 0 from 1","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:08:27Z","reason":"ScalingReplicaSet","message":"Scaled up replica set oauth-openshift-64f85b8fc9 to 1 from 0","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:16:56Z","reason":"Scheduled","message":"Successfully assigned openshift-authentication/oauth-openshift-64f85b8fc9-n9msn to master-0","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:16:57Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.33/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:16:58Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2969828f1fcae82b7ef16d3588046ace3cf51b9ea578658c42475386e0ee1fc7\" already present on machine","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:16:58Z","reason":"Created","message":"Created container: oauth-openshift","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:16:58Z","reason":"Started","message":"Started container oauth-openshift","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:23:57Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:23:59Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"v4-0-config-user-template-error\" : object \"openshift-authentication\"/\"v4-0-config-user-template-error\" not registered","type":"Warning"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:23:59Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"v4-0-config-user-template-login\" : object \"openshift-authentication\"/\"v4-0-config-user-template-login\" not registered","type":"Warning"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:23:59Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"v4-0-config-system-service-ca\" : object \"openshift-authentication\"/\"v4-0-config-system-service-ca\" not registered","type":"Warning"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:23:59Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"v4-0-config-system-serving-cert\" : object \"openshift-authentication\"/\"v4-0-config-system-serving-cert\" not registered","type":"Warning"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:24:03Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:24:03Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"v4-0-config-system-cliconfig\" : object \"openshift-authentication\"/\"v4-0-config-system-cliconfig\" not registered","type":"Warning"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:24:03Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"v4-0-config-user-template-provider-selection\" : object \"openshift-authentication\"/\"v4-0-config-user-template-provider-selection\" not registered","type":"Warning"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:24:04Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"v4-0-config-user-template-login\" : object \"openshift-authentication\"/\"v4-0-config-user-template-login\" not registered","type":"Warning"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:24:04Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"v4-0-config-system-trusted-ca-bundle\" : object \"openshift-authentication\"/\"v4-0-config-system-trusted-ca-bundle\" not registered","type":"Warning"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:24:04Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"v4-0-config-system-router-certs\" : object \"openshift-authentication\"/\"v4-0-config-system-router-certs\" not registered","type":"Warning"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:24:04Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"v4-0-config-system-session\" : object \"openshift-authentication\"/\"v4-0-config-system-session\" not registered","type":"Warning"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:24:04Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"audit-policies\" : object \"openshift-authentication\"/\"audit\" not registered","type":"Warning"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:24:04Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"v4-0-config-system-service-ca\" : object \"openshift-authentication\"/\"v4-0-config-system-service-ca\" not registered","type":"Warning"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:24:04Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"v4-0-config-system-serving-cert\" : object \"openshift-authentication\"/\"v4-0-config-system-serving-cert\" not registered","type":"Warning"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:24:04Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"v4-0-config-user-template-error\" : object \"openshift-authentication\"/\"v4-0-config-user-template-error\" not registered","type":"Warning"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:24:04Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"v4-0-config-system-ocp-branding-template\" : object \"openshift-authentication\"/\"v4-0-config-system-ocp-branding-template\" not registered","type":"Warning"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:24:05Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-7mrkc\" : [object \"openshift-authentication\"/\"kube-root-ca.crt\" not registered, object \"openshift-authentication\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:24:11Z","reason":"FailedMount","message":"(combined from similar events): MountVolume.SetUp failed for volume \"kube-api-access-7mrkc\" : [object \"openshift-authentication\"/\"kube-root-ca.crt\" not registered, object \"openshift-authentication\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-authentication","lastTimestamp":"2026-02-16T17:24:39Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.33/23] from ovn-kubernetes","type":"Normal"}]}events/openshift-config-managed.json0000640000000000000000000000061015144651377016305 0ustar0000000000000000{"items":[{"namespace":"openshift-config-managed","lastTimestamp":"2026-02-16T17:00:51Z","reason":"PublishedRouterCA","message":"Published \"default-ingress-cert\" in \"openshift-config-managed\"","type":"Normal"},{"namespace":"openshift-config-managed","lastTimestamp":"2026-02-16T17:00:51Z","reason":"PublishedRouterCertificates","message":"Published router certificates","type":"Normal"}]}config/serviceaccounts.json0000640000000000000000000003722615144651375014625 0ustar0000000000000000{"serviceAccounts":{"TOTAL_COUNT":367,"namespaces":{"default":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-public":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-system":[{"name":"attachdetach-controller","secrets":1},{"name":"builder","secrets":1},{"name":"certificate-controller","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"clusterrole-aggregation-controller","secrets":1},{"name":"cronjob-controller","secrets":1},{"name":"daemon-set-controller","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"deployment-controller","secrets":1},{"name":"disruption-controller","secrets":1},{"name":"endpoint-controller","secrets":1},{"name":"endpointslice-controller","secrets":1},{"name":"endpointslicemirroring-controller","secrets":1},{"name":"ephemeral-volume-controller","secrets":1},{"name":"expand-controller","secrets":1},{"name":"generic-garbage-collector","secrets":1},{"name":"horizontal-pod-autoscaler","secrets":1},{"name":"job-controller","secrets":1},{"name":"legacy-service-account-token-cleaner","secrets":1},{"name":"namespace-controller","secrets":1},{"name":"node-controller","secrets":1},{"name":"persistent-volume-binder","secrets":1},{"name":"pod-garbage-collector","secrets":1},{"name":"pv-protection-controller","secrets":1},{"name":"pvc-protection-controller","secrets":1},{"name":"replicaset-controller","secrets":1},{"name":"replication-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"root-ca-cert-publisher","secrets":1},{"name":"service-account-controller","secrets":1},{"name":"service-ca-cert-publisher","secrets":1},{"name":"statefulset-controller","secrets":1},{"name":"ttl-after-finished-controller","secrets":1},{"name":"validatingadmissionpolicy-status-controller","secrets":1}],"openshift":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-sa","secrets":1}],"openshift-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-operator","secrets":1}],"openshift-authentication":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-openshift","secrets":1}],"openshift-authentication-operator":[{"name":"authentication-operator","secrets":1},{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-catalogd":[{"name":"builder","secrets":1},{"name":"catalogd-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager":[{"name":"builder","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"cloud-node-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"cluster-cloud-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-credential-operator":[{"name":"builder","secrets":1},{"name":"cloud-credential-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-network-config-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-platform-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-csi-drivers":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-machine-approver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-approver-sa","secrets":1}],"openshift-cluster-node-tuning-operator":[{"name":"builder","secrets":1},{"name":"cluster-node-tuning-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"tuned","secrets":1}],"openshift-cluster-olm-operator":[{"name":"builder","secrets":1},{"name":"cluster-olm-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-samples-operator":[{"name":"builder","secrets":1},{"name":"cluster-samples-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-storage-operator":[{"name":"builder","secrets":1},{"name":"cluster-storage-operator","secrets":1},{"name":"csi-snapshot-controller","secrets":1},{"name":"csi-snapshot-controller-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-version":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-managed":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-config-operator","secrets":1}],"openshift-console":[{"name":"builder","secrets":1},{"name":"console","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-console-operator":[{"name":"builder","secrets":1},{"name":"console-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-console-user-settings":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-sa","secrets":1}],"openshift-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-operator","secrets":1}],"openshift-dns":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns","secrets":1},{"name":"node-resolver","secrets":1}],"openshift-dns-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns-operator","secrets":1}],"openshift-etcd":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-backup-sa","secrets":1},{"name":"etcd-sa","secrets":1},{"name":"installer-sa","secrets":1}],"openshift-etcd-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-operator","secrets":1}],"openshift-host-network":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-image-registry":[{"name":"builder","secrets":1},{"name":"cluster-image-registry-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"node-ca","secrets":1},{"name":"pruner","secrets":1}],"openshift-infra":[{"name":"build-config-change-controller","secrets":1},{"name":"build-controller","secrets":1},{"name":"builder","secrets":1},{"name":"cluster-csr-approver-controller","secrets":1},{"name":"cluster-quota-reconciliation-controller","secrets":1},{"name":"default","secrets":1},{"name":"default-rolebindings-controller","secrets":1},{"name":"deployer","secrets":1},{"name":"deployer-controller","secrets":1},{"name":"deploymentconfig-controller","secrets":1},{"name":"image-import-controller","secrets":1},{"name":"image-trigger-controller","secrets":1},{"name":"ingress-to-route-controller","secrets":1},{"name":"namespace-security-allocation-controller","secrets":1},{"name":"node-bootstrapper","secrets":1},{"name":"origin-namespace-controller","secrets":1},{"name":"podsecurity-admission-label-syncer-controller","secrets":1},{"name":"privileged-namespaces-psa-label-syncer","secrets":1},{"name":"pv-recycler-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"serviceaccount-controller","secrets":1},{"name":"serviceaccount-pull-secrets-controller","secrets":1},{"name":"template-instance-controller","secrets":1},{"name":"template-instance-finalizer-controller","secrets":1},{"name":"unidling-controller","secrets":1}],"openshift-ingress":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"router","secrets":1}],"openshift-ingress-canary":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ingress-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ingress-operator","secrets":1}],"openshift-insights":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"gather","secrets":1},{"name":"operator","secrets":1}],"openshift-kni-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-kube-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-apiserver-operator","secrets":1}],"openshift-kube-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"kube-controller-manager-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-controller-manager-operator","secrets":1}],"openshift-kube-scheduler":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1},{"name":"openshift-kube-scheduler-sa","secrets":1}],"openshift-kube-scheduler-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-kube-scheduler-operator","secrets":1}],"openshift-kube-storage-version-migrator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-sa","secrets":1}],"openshift-kube-storage-version-migrator-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-operator","secrets":1}],"openshift-machine-api":[{"name":"builder","secrets":1},{"name":"cluster-autoscaler","secrets":1},{"name":"cluster-autoscaler-operator","secrets":1},{"name":"cluster-baremetal-operator","secrets":1},{"name":"control-plane-machine-set-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-api-controllers","secrets":1},{"name":"machine-api-operator","secrets":1},{"name":"machine-api-termination-handler","secrets":1}],"openshift-machine-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-config-controller","secrets":1},{"name":"machine-config-daemon","secrets":1},{"name":"machine-config-operator","secrets":1},{"name":"machine-config-server","secrets":1},{"name":"machine-os-builder","secrets":1},{"name":"machine-os-puller","secrets":1},{"name":"node-bootstrapper","secrets":1}],"openshift-marketplace":[{"name":"builder","secrets":1},{"name":"certified-operators","secrets":1},{"name":"community-operators","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"marketplace-operator","secrets":1},{"name":"redhat-marketplace","secrets":1},{"name":"redhat-operators","secrets":1}],"openshift-monitoring":[{"name":"alertmanager-main","secrets":1},{"name":"builder","secrets":1},{"name":"cluster-monitoring-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-state-metrics","secrets":1},{"name":"metrics-server","secrets":1},{"name":"monitoring-plugin","secrets":1},{"name":"node-exporter","secrets":1},{"name":"openshift-state-metrics","secrets":1},{"name":"prometheus-k8s","secrets":1},{"name":"prometheus-operator","secrets":1},{"name":"prometheus-operator-admission-webhook","secrets":1},{"name":"telemeter-client","secrets":1},{"name":"thanos-querier","secrets":1}],"openshift-multus":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"metrics-daemon-sa","secrets":1},{"name":"multus","secrets":1},{"name":"multus-ac","secrets":1},{"name":"multus-ancillary-tools","secrets":1}],"openshift-network-console":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-network-diagnostics":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-diagnostics","secrets":1}],"openshift-network-node-identity":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-node-identity","secrets":1}],"openshift-network-operator":[{"name":"builder","secrets":1},{"name":"cluster-network-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"iptables-alerter","secrets":1}],"openshift-node":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-nutanix-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-oauth-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-apiserver-sa","secrets":1}],"openshift-openstack-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-operator-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"operator-controller-controller-manager","secrets":1}],"openshift-operator-lifecycle-manager":[{"name":"builder","secrets":1},{"name":"collect-profiles","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"olm-operator-serviceaccount","secrets":1}],"openshift-operators":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovirt-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovn-kubernetes":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ovn-kubernetes-control-plane","secrets":1},{"name":"ovn-kubernetes-node","secrets":1}],"openshift-route-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"route-controller-manager-sa","secrets":1}],"openshift-service-ca":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca","secrets":1}],"openshift-service-ca-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca-operator","secrets":1}],"openshift-user-workload-monitoring":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-vsphere-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}]}}}config/installplans.json0000640000000000000000000000010015144651374014105 0ustar0000000000000000{"items":null,"stats":{"TOTAL_COUNT":0,"TOTAL_NONUNIQ_COUNT":0}}config/alerts.json0000640000000000000000000000153215144651361012701 0ustar0000000000000000[{"labels":{"alertname":"Watchdog","namespace":"openshift-monitoring","openshift_io_alert_source":"platform","prometheus":"openshift-monitoring/k8s","severity":"none"},"annotations":{"description":"This is an alert meant to ensure that the entire alerting pipeline is functional.\nThis alert is always firing, therefore it should always be firing in Alertmanager\nand always fire against a receiver. There are integrations with various notification\nmechanisms that send a notification when this alert is not firing. For example the\n\"DeadMansSnitch\" integration in PagerDuty.\n","summary":"An alert that should always be firing to certify that Alertmanager is working properly."},"endsAt":"2026-02-16T17:28:52.646Z","startsAt":"2026-02-16T17:24:52.646Z","updatedAt":"2026-02-16T17:24:52.677Z","status":{"inhibitedBy":[],"silencedBy":[],"state":"active"}}]config/silenced_alerts.json0000640000000000000000000000000315144651361014537 0ustar0000000000000000[] config/node/logs/master-0.log0000640000000000000000000002243615144651360014545 0ustar0000000000000000Feb 16 17:24:21.907675 master-0 kubenswrapper[4652]: E0216 17:24:21.907023 4652 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/dce85b5e-6e92-4e0e-bee7-07b1a3634302-kube-api-access-fhcw6 podName:dce85b5e-6e92-4e0e-bee7-07b1a3634302 nodeName:}" failed. No retries permitted until 2026-02-16 17:24:37.907008354 +0000 UTC m=+35.295176870 (durationBeforeRetry 16s). Error: MountVolume.SetUp failed for volume "kube-api-access-fhcw6" (UniqueName: "kubernetes.io/projected/dce85b5e-6e92-4e0e-bee7-07b1a3634302-kube-api-access-fhcw6") pod "apiserver-fc4bf7f79-tqnlw" (UID: "dce85b5e-6e92-4e0e-bee7-07b1a3634302") : failed to sync configmap cache: timed out waiting for the condition Feb 16 17:24:21.935884 master-0 kubenswrapper[4652]: E0216 17:24:21.935848 4652 projected.go:288] Couldn't get configMap openshift-insights/openshift-service-ca.crt: failed to sync configmap cache: timed out waiting for the condition Feb 16 17:24:21.935884 master-0 kubenswrapper[4652]: E0216 17:24:21.935884 4652 projected.go:194] Error preparing data for projected volume kube-api-access-hnshv for pod openshift-insights/insights-operator-cb4f7b4cf-6qrw5: failed to sync configmap cache: timed out waiting for the condition Feb 16 17:24:21.936058 master-0 kubenswrapper[4652]: E0216 17:24:21.935955 4652 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/c2511146-1d04-4ecd-a28e-79662ef7b9d3-kube-api-access-hnshv podName:c2511146-1d04-4ecd-a28e-79662ef7b9d3 nodeName:}" failed. No retries permitted until 2026-02-16 17:24:37.935933662 +0000 UTC m=+35.324102238 (durationBeforeRetry 16s). Error: MountVolume.SetUp failed for volume "kube-api-access-hnshv" (UniqueName: "kubernetes.io/projected/c2511146-1d04-4ecd-a28e-79662ef7b9d3-kube-api-access-hnshv") pod "insights-operator-cb4f7b4cf-6qrw5" (UID: "c2511146-1d04-4ecd-a28e-79662ef7b9d3") : failed to sync configmap cache: timed out waiting for the condition Feb 16 17:24:21.937309 master-0 kubenswrapper[4652]: E0216 17:24:21.937272 4652 projected.go:288] Couldn't get configMap openshift-service-ca/openshift-service-ca.crt: failed to sync configmap cache: timed out waiting for the condition Feb 16 17:24:21.937363 master-0 kubenswrapper[4652]: E0216 17:24:21.937309 4652 projected.go:194] Error preparing data for projected volume kube-api-access-nqfds for pod openshift-service-ca/service-ca-676cd8b9b5-cp9rb: failed to sync configmap cache: timed out waiting for the condition Feb 16 17:24:21.937394 master-0 kubenswrapper[4652]: E0216 17:24:21.937379 4652 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/48801344-a48a-493e-aea4-19d998d0b708-kube-api-access-nqfds podName:48801344-a48a-493e-aea4-19d998d0b708 nodeName:}" failed. No retries permitted until 2026-02-16 17:24:37.93736061 +0000 UTC m=+35.325529216 (durationBeforeRetry 16s). Error: MountVolume.SetUp failed for volume "kube-api-access-nqfds" (UniqueName: "kubernetes.io/projected/48801344-a48a-493e-aea4-19d998d0b708-kube-api-access-nqfds") pod "service-ca-676cd8b9b5-cp9rb" (UID: "48801344-a48a-493e-aea4-19d998d0b708") : failed to sync configmap cache: timed out waiting for the condition Feb 16 17:24:22.263275 master-0 kubenswrapper[4652]: I0216 17:24:22.251747 4652 kubelet_pods.go:1000] "Unable to retrieve pull secret, the image pull may not succeed." pod="openshift-marketplace/redhat-operators-lnzfx" secret="" err="failed to sync secret cache: timed out waiting for the condition" Feb 16 17:24:22.318220 master-0 kubenswrapper[4652]: I0216 17:24:22.318171 4652 kubelet_pods.go:1000] "Unable to retrieve pull secret, the image pull may not succeed." pod="openshift-marketplace/community-operators-7w4km" secret="" err="failed to sync secret cache: timed out waiting for the condition" Feb 16 17:24:22.492823 master-0 kubenswrapper[4652]: E0216 17:24:22.492777 4652 projected.go:194] Error preparing data for projected volume kube-api-access-xvwzr for pod openshift-kube-storage-version-migrator-operator/kube-storage-version-migrator-operator-cd5474998-829l6: failed to sync configmap cache: timed out waiting for the condition Feb 16 17:24:22.493022 master-0 kubenswrapper[4652]: E0216 17:24:22.492852 4652 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/8e623376-9e14-4341-9dcf-7a7c218b6f9f-kube-api-access-xvwzr podName:8e623376-9e14-4341-9dcf-7a7c218b6f9f nodeName:}" failed. No retries permitted until 2026-02-16 17:24:38.492834009 +0000 UTC m=+35.881002515 (durationBeforeRetry 16s). Error: MountVolume.SetUp failed for volume "kube-api-access-xvwzr" (UniqueName: "kubernetes.io/projected/8e623376-9e14-4341-9dcf-7a7c218b6f9f-kube-api-access-xvwzr") pod "kube-storage-version-migrator-operator-cd5474998-829l6" (UID: "8e623376-9e14-4341-9dcf-7a7c218b6f9f") : failed to sync configmap cache: timed out waiting for the condition Feb 16 17:24:38.209893 master-0 kubenswrapper[4652]: I0216 17:24:38.209864 4652 patch_prober.go:28] interesting pod/catalog-operator-588944557d-5drhs container/catalog-operator namespace/openshift-operator-lifecycle-manager: Readiness probe status=failure output="Get \"https://10.128.0.56:8443/healthz\": dial tcp 10.128.0.56:8443: connect: connection refused" start-of-body= Feb 16 17:24:38.209942 master-0 kubenswrapper[4652]: I0216 17:24:38.209899 4652 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-operator-lifecycle-manager/catalog-operator-588944557d-5drhs" podUID="188e42e5-9f9c-42af-ba15-5548c4fa4b52" containerName="catalog-operator" probeResult="failure" output="Get \"https://10.128.0.56:8443/healthz\": dial tcp 10.128.0.56:8443: connect: connection refused" Feb 16 17:24:38.229217 master-0 kubenswrapper[4652]: I0216 17:24:38.229183 4652 patch_prober.go:28] interesting pod/packageserver-6d5d8c8c95-kzfjw container/packageserver namespace/openshift-operator-lifecycle-manager: Readiness probe status=failure output="Get \"https://10.128.0.59:5443/healthz\": dial tcp 10.128.0.59:5443: connect: connection refused" start-of-body= Feb 16 17:24:38.229316 master-0 kubenswrapper[4652]: I0216 17:24:38.229216 4652 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-operator-lifecycle-manager/packageserver-6d5d8c8c95-kzfjw" podUID="e73ee493-de15-44c2-bd51-e12fcbb27a15" containerName="packageserver" probeResult="failure" output="Get \"https://10.128.0.59:5443/healthz\": dial tcp 10.128.0.59:5443: connect: connection refused" Feb 16 17:24:40.881365 master-0 kubenswrapper[4652]: I0216 17:24:40.880141 4652 patch_prober.go:28] interesting pod/controller-manager-7fc9897cf8-9rjwd container/controller-manager namespace/openshift-controller-manager: Readiness probe status=failure output="Get \"https://10.128.0.61:8443/healthz\": dial tcp 10.128.0.61:8443: connect: connection refused" start-of-body= Feb 16 17:24:40.881365 master-0 kubenswrapper[4652]: I0216 17:24:40.880171 4652 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-controller-manager/controller-manager-7fc9897cf8-9rjwd" podUID="e1a7c783-2e23-4284-b648-147984cf1022" containerName="controller-manager" probeResult="failure" output="Get \"https://10.128.0.61:8443/healthz\": dial tcp 10.128.0.61:8443: connect: connection refused" Feb 16 17:24:42.029494 master-0 kubenswrapper[4652]: I0216 17:24:42.029383 4652 patch_prober.go:28] interesting pod/console-operator-7777d5cc66-64vhv container/console-operator namespace/openshift-console-operator: Readiness probe status=failure output="Get \"https://10.128.0.78:8443/readyz\": dial tcp 10.128.0.78:8443: connect: connection refused" start-of-body= Feb 16 17:24:42.029689 master-0 kubenswrapper[4652]: I0216 17:24:42.029567 4652 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-console-operator/console-operator-7777d5cc66-64vhv" podUID="0517b180-00ee-47fe-a8e7-36a3931b7e72" containerName="console-operator" probeResult="failure" output="Get \"https://10.128.0.78:8443/readyz\": dial tcp 10.128.0.78:8443: connect: connection refused" Feb 16 17:24:46.086875 master-0 kubenswrapper[4652]: I0216 17:24:46.086830 4652 patch_prober.go:28] interesting pod/console-599b567ff7-nrcpr container/console namespace/openshift-console: Startup probe status=failure output="Get \"https://10.128.0.13:8443/health\": dial tcp 10.128.0.13:8443: connect: connection refused" start-of-body= Feb 16 17:24:46.086934 master-0 kubenswrapper[4652]: I0216 17:24:46.086885 4652 prober.go:107] "Probe failed" probeType="Startup" pod="openshift-console/console-599b567ff7-nrcpr" podUID="ed3d89d0-bc00-482e-a656-7fdf4646ab0a" containerName="console" probeResult="failure" output="Get \"https://10.128.0.13:8443/health\": dial tcp 10.128.0.13:8443: connect: connection refused" Feb 16 17:24:56.085943 master-0 kubenswrapper[4652]: I0216 17:24:56.085904 4652 patch_prober.go:28] interesting pod/console-599b567ff7-nrcpr container/console namespace/openshift-console: Startup probe status=failure output="Get \"https://10.128.0.13:8443/health\": dial tcp 10.128.0.13:8443: connect: connection refused" start-of-body= Feb 16 17:24:56.086138 master-0 kubenswrapper[4652]: I0216 17:24:56.085945 4652 prober.go:107] "Probe failed" probeType="Startup" pod="openshift-console/console-599b567ff7-nrcpr" podUID="ed3d89d0-bc00-482e-a656-7fdf4646ab0a" containerName="console" probeResult="failure" output="Get \"https://10.128.0.13:8443/health\": dial tcp 10.128.0.13:8443: connect: connection refused"aggregated/unused_machine_configs_count.json0000640000000000000000000000004215144651360020135 0ustar0000000000000000{"unused_machineconfigs_count":23}config/machineconfigs/rendered-worker-c7ccd6fb94dd6d087e4a528948c79fb2.json0000640000000000000000000004054015144651360024234 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","metadata":{"annotations":{"machineconfiguration.openshift.io/generated-by-controller-version":"0b0569287da3daea19bf47aa298037ccb4cbff98","machineconfiguration.openshift.io/release-image-version":"4.18.32"},"creationTimestamp":"2026-02-16T17:04:52Z","generation":1,"name":"rendered-worker-c7ccd6fb94dd6d087e4a528948c79fb2","ownerReferences":[{"apiVersion":"machineconfiguration.openshift.io/v1","blockOwnerDeletion":true,"controller":true,"kind":"MachineConfigPool","name":"worker","uid":"e7796f79-1f69-4cd6-a99d-2e90f692a258"}],"resourceVersion":"13472","uid":"806864f1-c581-4b69-ab5e-a69a62fd3801"},"spec":{"baseOSExtensionsContainerImage":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee7b795566b8bd3a23d3186c8412e8cc1338556850ecac38c6734c20191fea91","config":{"ignition":{"version":"3.4.0"},"passwd":{"users":null},"storage":{"files":null},"systemd":{"units":[{"contents":"[Unit]\nDescription=Cleans NetworkManager state generated by dracut\n# Removal of this file signals firstboot completion\nConditionPathExists=!/etc/ignition-machine-config-encapsulated.json\n# This is opt-in for some deployment types, and opt-out for others.\nConditionPathExists=/var/lib/mco/nm-clean-initrd-state\nWants=network-pre.target\nBefore=network-pre.target\n\n[Service]\nType=oneshot\n# Remove any existing state possibly generated NM run by dracut. We want NM to\n# consider all profiles autoconnect priority when it starts instead of\n# remembering which profile was a device activated with when NM is run by\n# dracut.\nExecStart=/usr/local/bin/nm-clean-initrd-state.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"NetworkManager-clean-initrd-state.service"},{"dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"ENABLE_PROFILE_UNIX_SOCKET=true\"\n","name":"10-mco-profile-unix-socket.conf"},{"contents":"[Unit]\nAfter=kubelet-dependencies.target\nRequires=kubelet-dependencies.target\n","name":"05-mco-ordering.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"name":"crio.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"docker.socket"},{"contents":"[Unit]\nDescription=The firstboot OS update has completed\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target\n\n[Install]\nWantedBy=default.target\n","enabled":true,"name":"firstboot-osupdate.target"},{"dropins":[{"contents":"[Unit]\nAfter=ovs-configuration.service\nBefore=crio.service\n","name":"01-after-configure-ovs.conf"}],"name":"ipsec.service"},{"contents":"[Unit]\nDescription=Dynamically sets the system reserved for the kubelet\nWants=network-online.target\nAfter=network-online.target firstboot-osupdate.target\nBefore=kubelet-dependencies.target\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nRemainAfterExit=yes\nEnvironmentFile=/etc/node-sizing-enabled.env\nExecStart=/bin/bash /usr/local/sbin/dynamic-system-reserved-calc.sh ${NODE_SIZING_ENABLED} ${SYSTEM_RESERVED_MEMORY} ${SYSTEM_RESERVED_CPU} ${SYSTEM_RESERVED_ES}\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"kubelet-auto-node-size.service"},{"contents":"[Unit]\nDescription=Dependencies necessary to run kubelet\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target network-online.target\nWants=NetworkManager-wait-online.service crio-wipe.service\nWants=rpc-statd.service chrony-wait.service\n","name":"kubelet-dependencies.target"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet\nRequires=crio.service kubelet-dependencies.target\nAfter=kubelet-dependencies.target\nAfter=ostree-finalize-staged.service\n\n[Service]\nType=notify\nExecStartPre=/bin/mkdir --parents /etc/kubernetes/manifests\nExecStartPre=-/usr/sbin/restorecon -ri /var/lib/kubelet/pod-resources /usr/local/bin/kubenswrapper /usr/bin/kubensenter\nEnvironment=\"KUBELET_NODE_IP=0.0.0.0\"\nEnvironmentFile=/etc/os-release\nEnvironmentFile=-/etc/kubernetes/kubelet-workaround\nEnvironmentFile=-/etc/kubernetes/kubelet-env\nEnvironmentFile=/etc/node-sizing.env\n\nExecStart=/usr/local/bin/kubenswrapper \\\n /usr/bin/kubelet \\\n --config=/etc/kubernetes/kubelet.conf \\\n --bootstrap-kubeconfig=/etc/kubernetes/kubeconfig \\\n --kubeconfig=/var/lib/kubelet/kubeconfig \\\n --container-runtime-endpoint=/var/run/crio/crio.sock \\\n --runtime-cgroups=/system.slice/crio.service \\\n --node-labels=node-role.kubernetes.io/worker,node.openshift.io/os_id=${ID} \\\n --node-ip=${KUBELET_NODE_IP} \\\n --minimum-container-ttl-duration=6m0s \\\n --volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec \\\n --cloud-provider= \\\n \\\n --hostname-override=${KUBELET_NODE_NAME} \\\n --provider-id=${KUBELET_PROVIDERID} \\\n --pod-infra-container-image=quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1593b6aac7bb18c1bbb5d41693e8b8c7f0c0410fcc09e15de52d8bd53e356541 \\\n --system-reserved=cpu=${SYSTEM_RESERVED_CPU},memory=${SYSTEM_RESERVED_MEMORY},ephemeral-storage=${SYSTEM_RESERVED_ES} \\\n --v=${KUBELET_LOG_LEVEL}\n\nRestart=always\nRestartSec=10\n\n[Install]\nWantedBy=multi-user.target\n","dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"enabled":true,"name":"kubelet.service"},{"contents":"[Unit]\nDescription=Manages a mount namespace for kubernetes-specific mounts\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nRuntimeDirectory=kubens\nEnvironment=RUNTIME_DIRECTORY=%t/kubens\nEnvironment=BIND_POINT=%t/kubens/mnt\nEnvironment=ENVFILE=%t/kubens/env\n\n# Set up the runtime directory as an unbindable mountpoint\nExecStartPre=bash -c \"findmnt ${RUNTIME_DIRECTORY} || mount --make-unbindable --bind ${RUNTIME_DIRECTORY} ${RUNTIME_DIRECTORY}\"\n# Ensure the bind point exists\nExecStartPre=touch ${BIND_POINT}\n# Use 'unshare' to create the new mountpoint, then 'mount --make-rshared' so it cascades internally\nExecStart=unshare --mount=${BIND_POINT} --propagation slave mount --make-rshared /\n# Finally, set an env pointer for ease-of-use\nExecStartPost=bash -c 'echo \"KUBENSMNT=${BIND_POINT}\" \u003e \"${ENVFILE}\"'\n\n# On stop, a recursive unmount cleans up the namespace and bind-mounted unbindable parent directory\nExecStop=umount -R ${RUNTIME_DIRECTORY}\n\n[Install]\nWantedBy=multi-user.target\n","enabled":false,"name":"kubens.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Firstboot\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# Removal of this file signals firstboot completion\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\nAfter=machine-config-daemon-pull.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\n# Disable existing repos (if any) so that OS extensions would use embedded RPMs only\nExecStartPre=-/usr/bin/sh -c \"sed -i 's/enabled=1/enabled=0/' /etc/yum.repos.d/*.repo\"\n# Run this via podman because we want to use the nmstatectl binary in our container\nExecStart=/usr/bin/podman run --rm --privileged --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42' firstboot-complete-machineconfig --persist-nics\nExecStart=/usr/bin/podman run --rm --privileged --pid=host --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42' firstboot-complete-machineconfig\n[Install]\nRequiredBy=firstboot-osupdate.target\n","enabled":true,"name":"machine-config-daemon-firstboot.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Pull\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# This \"stamp file\" is unlinked when we complete\n# machine-config-daemon-firstboot.service\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\n# Run after crio-wipe so the pulled MCD image is protected against a corrupted storage from a forced shutdown\nWants=crio-wipe.service NetworkManager-wait-online.service\nAfter=crio-wipe.service NetworkManager-wait-online.service network.service\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nExecStartPre=/etc/machine-config-daemon/generate_podman_policy_args.sh\nExecStart=/bin/sh -c \"while ! /usr/bin/podman pull $(cat /tmp/podman_policy_args) --authfile=/var/lib/kubelet/config.json 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42'; do sleep 1; done\"\n\n[Install]\nRequiredBy=machine-config-daemon-firstboot.service\n","enabled":true,"name":"machine-config-daemon-pull.service"},{"contents":"[Unit]\nDescription=Applies per-node NMState network configuration\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service\nBefore=nmstate.service kubelet-dependencies.target ovs-configuration.service node-valid-hostname.service\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/usr/local/bin/nmstate-configuration.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"nmstate-configuration.service"},{"contents":"[Unit]\nDescription=Apply nmstate on-disk state\nDocumentation=man:nmstate.service(8) https://www.nmstate.io\nAfter=NetworkManager-wait-online.service\nBefore=network-online.target\nWants=NetworkManager-wait-online.service\nRequires=NetworkManager.service\n\n[Service]\nType=oneshot\nExecStart=/usr/bin/nmstatectl service\nRemainAfterExit=yes\n\n[Install]\nWantedBy=NetworkManager.service\n","enabled":true,"name":"nmstate.service"},{"contents":"[Unit]\nDescription=Wait for a non-localhost hostname\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nUser=root\nExecStart=/usr/local/bin/mco-hostname --wait\n\n# Wait up to 5min for the node to get a non-localhost name\nTimeoutSec=300\n\n[Install]\n# TODO: Change this to RequiredBy after we fix https://github.com/openshift/machine-config-operator/pull/3865#issuecomment-1746963115\nWantedBy=kubelet-dependencies.target\n","enabled":true,"name":"node-valid-hostname.service"},{"contents":"[Unit]\nDescription=Writes IP address configuration so that kubelet and crio services select a valid node IP\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service firstboot-osupdate.target\nBefore=kubelet-dependencies.target ovs-configuration.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/bin/podman run --rm \\\n --authfile /var/lib/kubelet/config.json \\\n --env 'ENABLE_NODEIP_DEBUG=true' \\\n --net=host \\\n --security-opt label=disable \\\n --volume /etc/systemd/system:/etc/systemd/system \\\n --volume /run/nodeip-configuration:/run/nodeip-configuration \\\n quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:07093043bca0089b3c56d9e5331e68f549541e5661e2a39a260aa534dc9528bd \\\n node-ip \\\n set \\\n --retry-on-failure \\\n --network-type OVNKubernetes \\\n ${NODEIP_HINT:-${KUBELET_NODEIP_HINT:-}}; \\\n do \\\n sleep 5; \\\n done\"\nExecStart=/bin/systemctl daemon-reload\nExecStartPre=/bin/mkdir -p /run/nodeip-configuration\nStandardOutput=journal+console\nStandardError=journal+console\n\nEnvironmentFile=-/etc/default/nodeip-configuration\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"nodeip-configuration.service"},{"enabled":true,"name":"openvswitch.service"},{"contents":"[Unit]\n# Kdump will generate it's initramfs based on the running state when kdump.service run\n# If OVS has already run, the kdump fails to gather a working network config,\n# which prevent network log exports, sush as SSH.\n# See https://issues.redhat.com/browse/OCPBUGS-28239\nAfter=kdump.service\nDescription=Configures OVS with proper host networking configuration\n# This service is used to move a physical NIC into OVS and reconfigure OVS to use the host IP\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=firstboot-osupdate.target\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service nmstate.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nExecStart=/usr/local/bin/configure-ovs.sh OVNKubernetes\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"ovs-configuration.service"},{"dropins":[{"contents":"[Service]\nRestart=always\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /var/lib/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /etc/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /run/openvswitch'\nExecStartPost=-/usr/bin/ovs-appctl vlog/set syslog:info\nExecReload=-/usr/bin/ovs-appctl vlog/set syslog:info\n","name":"10-ovs-vswitchd-restart.conf"}],"name":"ovs-vswitchd.service"},{"dropins":[{"contents":"[Service]\nRestart=always\n","name":"10-ovsdb-restart.conf"}],"enabled":true,"name":"ovsdb-server.service"},{"dropins":[{"contents":"","name":"10-mco-default-env.conf"}],"name":"rpm-ostreed.service"},{"contents":"[Unit]\nDescription=Ensure IKE SA established for existing IPsec connections.\nAfter=ipsec.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\nType=oneshot\nExecStart=/usr/local/bin/ipsec-connect-wait.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=ipsec.service\n","enabled":true,"name":"wait-for-ipsec-connect.service"},{"contents":"[Unit]\nDescription=Ensure primary IP is assigned and usable\nRequires=nmstate.service\nAfter=nmstate.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/local/bin/wait-for-primary-ip.sh; \\\n do \\\n sleep 10; \\\n done\"\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"wait-for-primary-ip.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"zincati.service"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet After Reboot Cleanup\nBefore=kubelet.service\n\n[Service]\nType=oneshot\nExecStart=/bin/rm -f /var/lib/kubelet/cpu_manager_state\nExecStart=/bin/rm -f /var/lib/kubelet/memory_manager_state\nExecStart=-/bin/rm -f /var/lib/kubelet/dra_manager_state\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"kubelet-cleanup.service"}]}},"extensions":[],"fips":false,"kernelArguments":["systemd.unified_cgroup_hierarchy=1","cgroup_no_v1=\"all\"","psi=0"],"kernelType":"default","osImageURL":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4aa42a4b31390d46f924ce2d0c4da772bfbf6a5e1e121bdb0f8b69f989e0a0db"}}config/machineconfigs/rendered-master-ccc1c4b4035b8605635ebee7b29103f5.json0000640000000000000000000004333015144651360024011 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","metadata":{"annotations":{"machineconfiguration.openshift.io/generated-by-controller-version":"0b0569287da3daea19bf47aa298037ccb4cbff98","machineconfiguration.openshift.io/release-image-version":"4.18.32"},"creationTimestamp":"2026-02-16T17:04:57Z","generation":1,"name":"rendered-master-ccc1c4b4035b8605635ebee7b29103f5","ownerReferences":[{"apiVersion":"machineconfiguration.openshift.io/v1","blockOwnerDeletion":true,"controller":true,"kind":"MachineConfigPool","name":"master","uid":"73e10899-7ee9-47b2-8cc6-a9ffda074267"}],"resourceVersion":"13627","uid":"1f1653b8-e7f6-40fe-97a2-fa858cc70cf5"},"spec":{"baseOSExtensionsContainerImage":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee7b795566b8bd3a23d3186c8412e8cc1338556850ecac38c6734c20191fea91","config":{"ignition":{"version":"3.4.0"},"passwd":{"users":null},"storage":{"disks":[{"device":"/dev/vdc","wipeTable":true},{"device":"/dev/vdd","wipeTable":true},{"device":"/dev/vde","wipeTable":true}],"files":null},"systemd":{"units":[{"contents":"[Unit]\nDescription=Cleans NetworkManager state generated by dracut\n# Removal of this file signals firstboot completion\nConditionPathExists=!/etc/ignition-machine-config-encapsulated.json\n# This is opt-in for some deployment types, and opt-out for others.\nConditionPathExists=/var/lib/mco/nm-clean-initrd-state\nWants=network-pre.target\nBefore=network-pre.target\n\n[Service]\nType=oneshot\n# Remove any existing state possibly generated NM run by dracut. We want NM to\n# consider all profiles autoconnect priority when it starts instead of\n# remembering which profile was a device activated with when NM is run by\n# dracut.\nExecStart=/usr/local/bin/nm-clean-initrd-state.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"NetworkManager-clean-initrd-state.service"},{"dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"ENABLE_PROFILE_UNIX_SOCKET=true\"\n","name":"10-mco-profile-unix-socket.conf"},{"contents":"[Unit]\nAfter=kubelet-dependencies.target\nRequires=kubelet-dependencies.target\n","name":"05-mco-ordering.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"name":"crio.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"docker.socket"},{"contents":"[Unit]\nDescription=The firstboot OS update has completed\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target\n\n[Install]\nWantedBy=default.target\n","enabled":true,"name":"firstboot-osupdate.target"},{"dropins":[{"contents":"[Unit]\nAfter=ovs-configuration.service\nBefore=crio.service\n","name":"01-after-configure-ovs.conf"}],"name":"ipsec.service"},{"contents":"[Unit]\nDescription=Dynamically sets the system reserved for the kubelet\nWants=network-online.target\nAfter=network-online.target firstboot-osupdate.target\nBefore=kubelet-dependencies.target\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nRemainAfterExit=yes\nEnvironmentFile=/etc/node-sizing-enabled.env\nExecStart=/bin/bash /usr/local/sbin/dynamic-system-reserved-calc.sh ${NODE_SIZING_ENABLED} ${SYSTEM_RESERVED_MEMORY} ${SYSTEM_RESERVED_CPU} ${SYSTEM_RESERVED_ES}\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"kubelet-auto-node-size.service"},{"contents":"[Unit]\nDescription=Dependencies necessary to run kubelet\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target network-online.target\nWants=NetworkManager-wait-online.service crio-wipe.service\nWants=rpc-statd.service chrony-wait.service\n","name":"kubelet-dependencies.target"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet\nRequires=crio.service kubelet-dependencies.target\nAfter=kubelet-dependencies.target\nAfter=ostree-finalize-staged.service\n\n[Service]\nType=notify\nExecStartPre=/bin/mkdir --parents /etc/kubernetes/manifests\nExecStartPre=-/usr/sbin/restorecon -ri /var/lib/kubelet/pod-resources /usr/local/bin/kubenswrapper /usr/bin/kubensenter\nEnvironment=\"KUBELET_NODE_IP=0.0.0.0\"\nEnvironmentFile=/etc/os-release\nEnvironmentFile=-/etc/kubernetes/kubelet-workaround\nEnvironmentFile=-/etc/kubernetes/kubelet-env\nEnvironmentFile=/etc/node-sizing.env\n\nExecStart=/usr/local/bin/kubenswrapper \\\n /usr/bin/kubelet \\\n --config=/etc/kubernetes/kubelet.conf \\\n --bootstrap-kubeconfig=/etc/kubernetes/kubeconfig \\\n --kubeconfig=/var/lib/kubelet/kubeconfig \\\n --container-runtime-endpoint=/var/run/crio/crio.sock \\\n --runtime-cgroups=/system.slice/crio.service \\\n --node-labels=node-role.kubernetes.io/control-plane,node-role.kubernetes.io/master,node.openshift.io/os_id=${ID} \\\n --node-ip=${KUBELET_NODE_IP} \\\n --minimum-container-ttl-duration=6m0s \\\n --cloud-provider= \\\n --volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec \\\n \\\n --hostname-override=${KUBELET_NODE_NAME} \\\n --provider-id=${KUBELET_PROVIDERID} \\\n --register-with-taints=node-role.kubernetes.io/master=:NoSchedule \\\n --pod-infra-container-image=quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1593b6aac7bb18c1bbb5d41693e8b8c7f0c0410fcc09e15de52d8bd53e356541 \\\n --system-reserved=cpu=${SYSTEM_RESERVED_CPU},memory=${SYSTEM_RESERVED_MEMORY},ephemeral-storage=${SYSTEM_RESERVED_ES} \\\n --v=${KUBELET_LOG_LEVEL}\n\nRestart=always\nRestartSec=10\n\n[Install]\nWantedBy=multi-user.target\n","dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"enabled":true,"name":"kubelet.service"},{"contents":"[Unit]\nDescription=Manages a mount namespace for kubernetes-specific mounts\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nRuntimeDirectory=kubens\nEnvironment=RUNTIME_DIRECTORY=%t/kubens\nEnvironment=BIND_POINT=%t/kubens/mnt\nEnvironment=ENVFILE=%t/kubens/env\n\n# Set up the runtime directory as an unbindable mountpoint\nExecStartPre=bash -c \"findmnt ${RUNTIME_DIRECTORY} || mount --make-unbindable --bind ${RUNTIME_DIRECTORY} ${RUNTIME_DIRECTORY}\"\n# Ensure the bind point exists\nExecStartPre=touch ${BIND_POINT}\n# Use 'unshare' to create the new mountpoint, then 'mount --make-rshared' so it cascades internally\nExecStart=unshare --mount=${BIND_POINT} --propagation slave mount --make-rshared /\n# Finally, set an env pointer for ease-of-use\nExecStartPost=bash -c 'echo \"KUBENSMNT=${BIND_POINT}\" \u003e \"${ENVFILE}\"'\n\n# On stop, a recursive unmount cleans up the namespace and bind-mounted unbindable parent directory\nExecStop=umount -R ${RUNTIME_DIRECTORY}\n\n[Install]\nWantedBy=multi-user.target\n","enabled":false,"name":"kubens.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Firstboot\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# Removal of this file signals firstboot completion\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\nAfter=machine-config-daemon-pull.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\n# Disable existing repos (if any) so that OS extensions would use embedded RPMs only\nExecStartPre=-/usr/bin/sh -c \"sed -i 's/enabled=1/enabled=0/' /etc/yum.repos.d/*.repo\"\n# Run this via podman because we want to use the nmstatectl binary in our container\nExecStart=/usr/bin/podman run --rm --privileged --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42' firstboot-complete-machineconfig --persist-nics\nExecStart=/usr/bin/podman run --rm --privileged --pid=host --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42' firstboot-complete-machineconfig\n[Install]\nRequiredBy=firstboot-osupdate.target\n","enabled":true,"name":"machine-config-daemon-firstboot.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Pull\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# This \"stamp file\" is unlinked when we complete\n# machine-config-daemon-firstboot.service\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\n# Run after crio-wipe so the pulled MCD image is protected against a corrupted storage from a forced shutdown\nWants=crio-wipe.service NetworkManager-wait-online.service\nAfter=crio-wipe.service NetworkManager-wait-online.service network.service\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nExecStartPre=/etc/machine-config-daemon/generate_podman_policy_args.sh\nExecStart=/bin/sh -c \"while ! /usr/bin/podman pull $(cat /tmp/podman_policy_args) --authfile=/var/lib/kubelet/config.json 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42'; do sleep 1; done\"\n\n[Install]\nRequiredBy=machine-config-daemon-firstboot.service\n","enabled":true,"name":"machine-config-daemon-pull.service"},{"contents":"[Unit]\nDescription=Applies per-node NMState network configuration\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service\nBefore=nmstate.service kubelet-dependencies.target ovs-configuration.service node-valid-hostname.service\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/usr/local/bin/nmstate-configuration.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"nmstate-configuration.service"},{"contents":"[Unit]\nDescription=Apply nmstate on-disk state\nDocumentation=man:nmstate.service(8) https://www.nmstate.io\nAfter=NetworkManager-wait-online.service\nBefore=network-online.target\nWants=NetworkManager-wait-online.service\nRequires=NetworkManager.service\n\n[Service]\nType=oneshot\nExecStart=/usr/bin/nmstatectl service\nRemainAfterExit=yes\n\n[Install]\nWantedBy=NetworkManager.service\n","enabled":true,"name":"nmstate.service"},{"contents":"[Unit]\nDescription=Wait for a non-localhost hostname\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nUser=root\nExecStart=/usr/local/bin/mco-hostname --wait\n\n# Wait up to 5min for the node to get a non-localhost name\nTimeoutSec=300\n\n[Install]\n# TODO: Change this to RequiredBy after we fix https://github.com/openshift/machine-config-operator/pull/3865#issuecomment-1746963115\nWantedBy=kubelet-dependencies.target\n","enabled":true,"name":"node-valid-hostname.service"},{"contents":"[Unit]\nDescription=Writes IP address configuration so that kubelet and crio services select a valid node IP\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service firstboot-osupdate.target\nBefore=kubelet-dependencies.target ovs-configuration.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/bin/podman run --rm \\\n --authfile /var/lib/kubelet/config.json \\\n --env 'ENABLE_NODEIP_DEBUG=true' \\\n --net=host \\\n --security-opt label=disable \\\n --volume /etc/systemd/system:/etc/systemd/system \\\n --volume /run/nodeip-configuration:/run/nodeip-configuration \\\n quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:07093043bca0089b3c56d9e5331e68f549541e5661e2a39a260aa534dc9528bd \\\n node-ip \\\n set \\\n --retry-on-failure \\\n --network-type OVNKubernetes \\\n ${NODEIP_HINT:-${KUBELET_NODEIP_HINT:-}}; \\\n do \\\n sleep 5; \\\n done\"\nExecStart=/bin/systemctl daemon-reload\nExecStartPre=/bin/mkdir -p /run/nodeip-configuration\nStandardOutput=journal+console\nStandardError=journal+console\n\nEnvironmentFile=-/etc/default/nodeip-configuration\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"nodeip-configuration.service"},{"enabled":true,"name":"openvswitch.service"},{"contents":"[Unit]\n# Kdump will generate it's initramfs based on the running state when kdump.service run\n# If OVS has already run, the kdump fails to gather a working network config,\n# which prevent network log exports, sush as SSH.\n# See https://issues.redhat.com/browse/OCPBUGS-28239\nAfter=kdump.service\nDescription=Configures OVS with proper host networking configuration\n# This service is used to move a physical NIC into OVS and reconfigure OVS to use the host IP\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=firstboot-osupdate.target\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service nmstate.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nExecStart=/usr/local/bin/configure-ovs.sh OVNKubernetes\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"ovs-configuration.service"},{"dropins":[{"contents":"[Service]\nRestart=always\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /var/lib/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /etc/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /run/openvswitch'\nExecStartPost=-/usr/bin/ovs-appctl vlog/set syslog:info\nExecReload=-/usr/bin/ovs-appctl vlog/set syslog:info\n","name":"10-ovs-vswitchd-restart.conf"}],"name":"ovs-vswitchd.service"},{"dropins":[{"contents":"[Service]\nRestart=always\n","name":"10-ovsdb-restart.conf"}],"enabled":true,"name":"ovsdb-server.service"},{"dropins":[{"contents":"","name":"10-mco-default-env.conf"},{"contents":"# See https://github.com/openshift/machine-config-operator/issues/1897\n[Service]\nNice=10\nIOSchedulingClass=best-effort\nIOSchedulingPriority=6\n","name":"mco-controlplane-nice.conf"}],"name":"rpm-ostreed.service"},{"contents":"[Unit]\nDescription=Ensure IKE SA established for existing IPsec connections.\nAfter=ipsec.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\nType=oneshot\nExecStart=/usr/local/bin/ipsec-connect-wait.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=ipsec.service\n","enabled":true,"name":"wait-for-ipsec-connect.service"},{"contents":"[Unit]\nDescription=Ensure primary IP is assigned and usable\nRequires=nmstate.service\nAfter=nmstate.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/local/bin/wait-for-primary-ip.sh; \\\n do \\\n sleep 10; \\\n done\"\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"wait-for-primary-ip.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"zincati.service"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet After Reboot Cleanup\nBefore=kubelet.service\n\n[Service]\nType=oneshot\nExecStart=/bin/rm -f /var/lib/kubelet/cpu_manager_state\nExecStart=/bin/rm -f /var/lib/kubelet/memory_manager_state\nExecStart=-/bin/rm -f /var/lib/kubelet/dra_manager_state\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"kubelet-cleanup.service"},{"contents":"[Unit]\nDescription=Run dnsmasq to provide local dns for Single Node OpenShift\nBefore=kubelet.service crio.service\nAfter=network.target ovs-configuration.service\n\n[Service]\nTimeoutStartSec=30\nExecStartPre=/usr/local/bin/dnsmasq_config.sh\nExecStart=/usr/sbin/dnsmasq -k\nRestart=always\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"dnsmasq.service"},{"enabled":true,"name":"iscsid.service"},{"contents":"[Unit]\nDescription=Create logical volume with name cinder-volumes.\nAfter=var.mount systemd-udev-settle.service\n\n[Service]\nType=oneshot\nExecCondition=/bin/bash -c '! /usr/sbin/vgdisplay cinder-volumes'\nExecStartPre=/usr/sbin/pvcreate /dev/vdc /dev/vdd /dev/vde\nExecStart=/usr/sbin/vgcreate cinder-volumes /dev/vdc /dev/vdd /dev/vde\nRemainAfterExit=yes\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"lv-cinder-volumes.service"},{"enabled":true,"name":"multipathd.service"}]}},"extensions":[],"fips":false,"kernelArguments":["net.ifnames=0","systemd.unified_cgroup_hierarchy=1","cgroup_no_v1=\"all\"","psi=0"],"kernelType":"default","osImageURL":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4aa42a4b31390d46f924ce2d0c4da772bfbf6a5e1e121bdb0f8b69f989e0a0db"}}config/machineconfigs/rendered-master-4ff3bdc50d696d239efb12817ae47acf.json0000640000000000000000000004322415144651360024254 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","metadata":{"annotations":{"machineconfiguration.openshift.io/generated-by-controller-version":"0b0569287da3daea19bf47aa298037ccb4cbff98","machineconfiguration.openshift.io/release-image-version":"4.18.32"},"creationTimestamp":"2026-02-16T17:04:52Z","generation":1,"name":"rendered-master-4ff3bdc50d696d239efb12817ae47acf","ownerReferences":[{"apiVersion":"machineconfiguration.openshift.io/v1","blockOwnerDeletion":true,"controller":true,"kind":"MachineConfigPool","name":"master","uid":"73e10899-7ee9-47b2-8cc6-a9ffda074267"}],"resourceVersion":"13473","uid":"31efcbad-8dcc-4b55-8875-de9bb978906c"},"spec":{"baseOSExtensionsContainerImage":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee7b795566b8bd3a23d3186c8412e8cc1338556850ecac38c6734c20191fea91","config":{"ignition":{"version":"3.4.0"},"passwd":{"users":null},"storage":{"disks":[{"device":"/dev/vdc","wipeTable":true},{"device":"/dev/vdd","wipeTable":true},{"device":"/dev/vde","wipeTable":true}],"files":null},"systemd":{"units":[{"contents":"[Unit]\nDescription=Cleans NetworkManager state generated by dracut\n# Removal of this file signals firstboot completion\nConditionPathExists=!/etc/ignition-machine-config-encapsulated.json\n# This is opt-in for some deployment types, and opt-out for others.\nConditionPathExists=/var/lib/mco/nm-clean-initrd-state\nWants=network-pre.target\nBefore=network-pre.target\n\n[Service]\nType=oneshot\n# Remove any existing state possibly generated NM run by dracut. We want NM to\n# consider all profiles autoconnect priority when it starts instead of\n# remembering which profile was a device activated with when NM is run by\n# dracut.\nExecStart=/usr/local/bin/nm-clean-initrd-state.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"NetworkManager-clean-initrd-state.service"},{"dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"ENABLE_PROFILE_UNIX_SOCKET=true\"\n","name":"10-mco-profile-unix-socket.conf"},{"contents":"[Unit]\nAfter=kubelet-dependencies.target\nRequires=kubelet-dependencies.target\n","name":"05-mco-ordering.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"name":"crio.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"docker.socket"},{"contents":"[Unit]\nDescription=The firstboot OS update has completed\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target\n\n[Install]\nWantedBy=default.target\n","enabled":true,"name":"firstboot-osupdate.target"},{"dropins":[{"contents":"[Unit]\nAfter=ovs-configuration.service\nBefore=crio.service\n","name":"01-after-configure-ovs.conf"}],"name":"ipsec.service"},{"contents":"[Unit]\nDescription=Dynamically sets the system reserved for the kubelet\nWants=network-online.target\nAfter=network-online.target firstboot-osupdate.target\nBefore=kubelet-dependencies.target\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nRemainAfterExit=yes\nEnvironmentFile=/etc/node-sizing-enabled.env\nExecStart=/bin/bash /usr/local/sbin/dynamic-system-reserved-calc.sh ${NODE_SIZING_ENABLED} ${SYSTEM_RESERVED_MEMORY} ${SYSTEM_RESERVED_CPU} ${SYSTEM_RESERVED_ES}\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"kubelet-auto-node-size.service"},{"contents":"[Unit]\nDescription=Dependencies necessary to run kubelet\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target network-online.target\nWants=NetworkManager-wait-online.service crio-wipe.service\nWants=rpc-statd.service chrony-wait.service\n","name":"kubelet-dependencies.target"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet\nRequires=crio.service kubelet-dependencies.target\nAfter=kubelet-dependencies.target\nAfter=ostree-finalize-staged.service\n\n[Service]\nType=notify\nExecStartPre=/bin/mkdir --parents /etc/kubernetes/manifests\nExecStartPre=-/usr/sbin/restorecon -ri /var/lib/kubelet/pod-resources /usr/local/bin/kubenswrapper /usr/bin/kubensenter\nEnvironment=\"KUBELET_NODE_IP=0.0.0.0\"\nEnvironmentFile=/etc/os-release\nEnvironmentFile=-/etc/kubernetes/kubelet-workaround\nEnvironmentFile=-/etc/kubernetes/kubelet-env\nEnvironmentFile=/etc/node-sizing.env\n\nExecStart=/usr/local/bin/kubenswrapper \\\n /usr/bin/kubelet \\\n --config=/etc/kubernetes/kubelet.conf \\\n --bootstrap-kubeconfig=/etc/kubernetes/kubeconfig \\\n --kubeconfig=/var/lib/kubelet/kubeconfig \\\n --container-runtime-endpoint=/var/run/crio/crio.sock \\\n --runtime-cgroups=/system.slice/crio.service \\\n --node-labels=node-role.kubernetes.io/control-plane,node-role.kubernetes.io/master,node.openshift.io/os_id=${ID} \\\n --node-ip=${KUBELET_NODE_IP} \\\n --minimum-container-ttl-duration=6m0s \\\n --cloud-provider= \\\n --volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec \\\n \\\n --hostname-override=${KUBELET_NODE_NAME} \\\n --provider-id=${KUBELET_PROVIDERID} \\\n --register-with-taints=node-role.kubernetes.io/master=:NoSchedule \\\n --pod-infra-container-image=quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1593b6aac7bb18c1bbb5d41693e8b8c7f0c0410fcc09e15de52d8bd53e356541 \\\n --system-reserved=cpu=${SYSTEM_RESERVED_CPU},memory=${SYSTEM_RESERVED_MEMORY},ephemeral-storage=${SYSTEM_RESERVED_ES} \\\n --v=${KUBELET_LOG_LEVEL}\n\nRestart=always\nRestartSec=10\n\n[Install]\nWantedBy=multi-user.target\n","dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"enabled":true,"name":"kubelet.service"},{"contents":"[Unit]\nDescription=Manages a mount namespace for kubernetes-specific mounts\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nRuntimeDirectory=kubens\nEnvironment=RUNTIME_DIRECTORY=%t/kubens\nEnvironment=BIND_POINT=%t/kubens/mnt\nEnvironment=ENVFILE=%t/kubens/env\n\n# Set up the runtime directory as an unbindable mountpoint\nExecStartPre=bash -c \"findmnt ${RUNTIME_DIRECTORY} || mount --make-unbindable --bind ${RUNTIME_DIRECTORY} ${RUNTIME_DIRECTORY}\"\n# Ensure the bind point exists\nExecStartPre=touch ${BIND_POINT}\n# Use 'unshare' to create the new mountpoint, then 'mount --make-rshared' so it cascades internally\nExecStart=unshare --mount=${BIND_POINT} --propagation slave mount --make-rshared /\n# Finally, set an env pointer for ease-of-use\nExecStartPost=bash -c 'echo \"KUBENSMNT=${BIND_POINT}\" \u003e \"${ENVFILE}\"'\n\n# On stop, a recursive unmount cleans up the namespace and bind-mounted unbindable parent directory\nExecStop=umount -R ${RUNTIME_DIRECTORY}\n\n[Install]\nWantedBy=multi-user.target\n","enabled":false,"name":"kubens.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Firstboot\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# Removal of this file signals firstboot completion\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\nAfter=machine-config-daemon-pull.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\n# Disable existing repos (if any) so that OS extensions would use embedded RPMs only\nExecStartPre=-/usr/bin/sh -c \"sed -i 's/enabled=1/enabled=0/' /etc/yum.repos.d/*.repo\"\n# Run this via podman because we want to use the nmstatectl binary in our container\nExecStart=/usr/bin/podman run --rm --privileged --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42' firstboot-complete-machineconfig --persist-nics\nExecStart=/usr/bin/podman run --rm --privileged --pid=host --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42' firstboot-complete-machineconfig\n[Install]\nRequiredBy=firstboot-osupdate.target\n","enabled":true,"name":"machine-config-daemon-firstboot.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Pull\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# This \"stamp file\" is unlinked when we complete\n# machine-config-daemon-firstboot.service\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\n# Run after crio-wipe so the pulled MCD image is protected against a corrupted storage from a forced shutdown\nWants=crio-wipe.service NetworkManager-wait-online.service\nAfter=crio-wipe.service NetworkManager-wait-online.service network.service\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nExecStartPre=/etc/machine-config-daemon/generate_podman_policy_args.sh\nExecStart=/bin/sh -c \"while ! /usr/bin/podman pull $(cat /tmp/podman_policy_args) --authfile=/var/lib/kubelet/config.json 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42'; do sleep 1; done\"\n\n[Install]\nRequiredBy=machine-config-daemon-firstboot.service\n","enabled":true,"name":"machine-config-daemon-pull.service"},{"contents":"[Unit]\nDescription=Applies per-node NMState network configuration\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service\nBefore=nmstate.service kubelet-dependencies.target ovs-configuration.service node-valid-hostname.service\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/usr/local/bin/nmstate-configuration.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"nmstate-configuration.service"},{"contents":"[Unit]\nDescription=Apply nmstate on-disk state\nDocumentation=man:nmstate.service(8) https://www.nmstate.io\nAfter=NetworkManager-wait-online.service\nBefore=network-online.target\nWants=NetworkManager-wait-online.service\nRequires=NetworkManager.service\n\n[Service]\nType=oneshot\nExecStart=/usr/bin/nmstatectl service\nRemainAfterExit=yes\n\n[Install]\nWantedBy=NetworkManager.service\n","enabled":true,"name":"nmstate.service"},{"contents":"[Unit]\nDescription=Wait for a non-localhost hostname\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nUser=root\nExecStart=/usr/local/bin/mco-hostname --wait\n\n# Wait up to 5min for the node to get a non-localhost name\nTimeoutSec=300\n\n[Install]\n# TODO: Change this to RequiredBy after we fix https://github.com/openshift/machine-config-operator/pull/3865#issuecomment-1746963115\nWantedBy=kubelet-dependencies.target\n","enabled":true,"name":"node-valid-hostname.service"},{"contents":"[Unit]\nDescription=Writes IP address configuration so that kubelet and crio services select a valid node IP\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service firstboot-osupdate.target\nBefore=kubelet-dependencies.target ovs-configuration.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/bin/podman run --rm \\\n --authfile /var/lib/kubelet/config.json \\\n --env 'ENABLE_NODEIP_DEBUG=true' \\\n --net=host \\\n --security-opt label=disable \\\n --volume /etc/systemd/system:/etc/systemd/system \\\n --volume /run/nodeip-configuration:/run/nodeip-configuration \\\n quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:07093043bca0089b3c56d9e5331e68f549541e5661e2a39a260aa534dc9528bd \\\n node-ip \\\n set \\\n --retry-on-failure \\\n --network-type OVNKubernetes \\\n ${NODEIP_HINT:-${KUBELET_NODEIP_HINT:-}}; \\\n do \\\n sleep 5; \\\n done\"\nExecStart=/bin/systemctl daemon-reload\nExecStartPre=/bin/mkdir -p /run/nodeip-configuration\nStandardOutput=journal+console\nStandardError=journal+console\n\nEnvironmentFile=-/etc/default/nodeip-configuration\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"nodeip-configuration.service"},{"enabled":true,"name":"openvswitch.service"},{"contents":"[Unit]\n# Kdump will generate it's initramfs based on the running state when kdump.service run\n# If OVS has already run, the kdump fails to gather a working network config,\n# which prevent network log exports, sush as SSH.\n# See https://issues.redhat.com/browse/OCPBUGS-28239\nAfter=kdump.service\nDescription=Configures OVS with proper host networking configuration\n# This service is used to move a physical NIC into OVS and reconfigure OVS to use the host IP\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=firstboot-osupdate.target\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service nmstate.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nExecStart=/usr/local/bin/configure-ovs.sh OVNKubernetes\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"ovs-configuration.service"},{"dropins":[{"contents":"[Service]\nRestart=always\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /var/lib/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /etc/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /run/openvswitch'\nExecStartPost=-/usr/bin/ovs-appctl vlog/set syslog:info\nExecReload=-/usr/bin/ovs-appctl vlog/set syslog:info\n","name":"10-ovs-vswitchd-restart.conf"}],"name":"ovs-vswitchd.service"},{"dropins":[{"contents":"[Service]\nRestart=always\n","name":"10-ovsdb-restart.conf"}],"enabled":true,"name":"ovsdb-server.service"},{"dropins":[{"contents":"","name":"10-mco-default-env.conf"},{"contents":"# See https://github.com/openshift/machine-config-operator/issues/1897\n[Service]\nNice=10\nIOSchedulingClass=best-effort\nIOSchedulingPriority=6\n","name":"mco-controlplane-nice.conf"}],"name":"rpm-ostreed.service"},{"contents":"[Unit]\nDescription=Ensure IKE SA established for existing IPsec connections.\nAfter=ipsec.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\nType=oneshot\nExecStart=/usr/local/bin/ipsec-connect-wait.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=ipsec.service\n","enabled":true,"name":"wait-for-ipsec-connect.service"},{"contents":"[Unit]\nDescription=Ensure primary IP is assigned and usable\nRequires=nmstate.service\nAfter=nmstate.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/local/bin/wait-for-primary-ip.sh; \\\n do \\\n sleep 10; \\\n done\"\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"wait-for-primary-ip.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"zincati.service"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet After Reboot Cleanup\nBefore=kubelet.service\n\n[Service]\nType=oneshot\nExecStart=/bin/rm -f /var/lib/kubelet/cpu_manager_state\nExecStart=/bin/rm -f /var/lib/kubelet/memory_manager_state\nExecStart=-/bin/rm -f /var/lib/kubelet/dra_manager_state\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"kubelet-cleanup.service"},{"contents":"[Unit]\nDescription=Run dnsmasq to provide local dns for Single Node OpenShift\nBefore=kubelet.service crio.service\nAfter=network.target ovs-configuration.service\n\n[Service]\nTimeoutStartSec=30\nExecStartPre=/usr/local/bin/dnsmasq_config.sh\nExecStart=/usr/sbin/dnsmasq -k\nRestart=always\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"dnsmasq.service"},{"enabled":true,"name":"iscsid.service"},{"contents":"[Unit]\nDescription=Create logical volume with name cinder-volumes.\nAfter=var.mount systemd-udev-settle.service\n\n[Service]\nType=oneshot\nExecCondition=/bin/bash -c '! /usr/sbin/vgdisplay cinder-volumes'\nExecStartPre=/usr/sbin/pvcreate /dev/vdc /dev/vdd /dev/vde\nExecStart=/usr/sbin/vgcreate cinder-volumes /dev/vdc /dev/vdd /dev/vde\nRemainAfterExit=yes\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"lv-cinder-volumes.service"},{"enabled":true,"name":"multipathd.service"}]}},"extensions":[],"fips":false,"kernelArguments":["net.ifnames=0"],"kernelType":"default","osImageURL":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4aa42a4b31390d46f924ce2d0c4da772bfbf6a5e1e121bdb0f8b69f989e0a0db"}}config/clusteroperator/storage.json0000640000000000000000000000346615144651360016317 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"storage","uid":"0ce5b06d-c1c3-41fb-b07e-161860b26a88","resourceVersion":"9474","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"capability.openshift.io/name":"Storage","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:01:34Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:01:34Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:01:34Z","reason":"AsExpected","message":"DefaultStorageClassControllerAvailable: No default StorageClass for this platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:01:34Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T17:01:34Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"","resource":"namespaces","name":"openshift-cluster-csi-drivers"},{"group":"operator.openshift.io","resource":"storages","name":"cluster"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"cluster-storage-operator-role"}],"extension":null}}config/clusteroperator/service-ca.json0000640000000000000000000000340315144651360016663 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"service-ca","uid":"e579a016-8d91-4574-af6c-d888c548e479","resourceVersion":"4760","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:00:26Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:00:33Z","reason":"AsExpected","message":"Progressing: All service-ca-operator deployments updated"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:00:28Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:00:28Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T17:00:25Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"servicecas","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-service-ca-operator"},{"group":"","resource":"namespaces","name":"openshift-service-ca"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-packageserver.json0000640000000000000000000000313315144651360024662 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-packageserver","uid":"ee025990-0955-4d66-8e9a-ce0a03b33dd6","resourceVersion":"21022","generation":1,"creationTimestamp":"2026-02-16T16:54:58Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:01:26Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:24:40Z","reason":"ClusterServiceVersionSucceeded","message":"ClusterServiceVersion openshift-operator-lifecycle-manager/packageserver observed in phase Succeeded"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:24:40Z","message":"Deployed version 0.0.1-snapshot"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:01:26Z","message":"Safe to upgrade"}],"versions":[{"name":"operator","version":"4.18.32"},{"name":"packageserver","version":"0.0.1-snapshot"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"},{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-catalog.json0000640000000000000000000000255615144651360023462 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-catalog","uid":"268789f8-f8aa-43d7-94a1-ca6f012c04b6","resourceVersion":"11619","generation":1,"creationTimestamp":"2026-02-16T16:54:58Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:01:34Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:03:31Z","message":"Deployed 4.18.0-202601171746.p2.g357bb13.assembly.stream.el9-357bb13"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:01:34Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:01:34Z"}],"versions":[{"name":"operator","version":"4.18.32"},{"name":"operator-lifecycle-manager","version":"4.18.0-202601171746.p2.g357bb13.assembly.stream.el9-357bb13"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager.json0000640000000000000000000000264115144651360022045 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager","uid":"4c54c568-3370-402f-8e3d-5403a7ce92fd","resourceVersion":"9136","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:01:26Z","message":"Deployed 4.18.0-202601171746.p2.g357bb13.assembly.stream.el9-357bb13"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:01:26Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:01:26Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:01:26Z"}],"versions":[{"name":"operator","version":"4.18.32"},{"name":"operator-lifecycle-manager","version":"4.18.0-202601171746.p2.g357bb13.assembly.stream.el9-357bb13"}],"relatedObjects":[{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/openshift-samples.json0000640000000000000000000000260515144651360020306 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-samples","uid":"b936d998-9e08-4010-a5b0-61405e149efd","resourceVersion":"12725","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"capability.openshift.io/name":"openshift-samples","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:04:20Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:04:29Z","message":"Samples installation successful at 4.18.32"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:04:20Z","message":"Samples installation successful at 4.18.32"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"samples.operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-samples-operator"},{"group":"template.openshift.io","resource":"templates","namespace":"openshift","name":""},{"group":"image.openshift.io","resource":"imagestreams","namespace":"openshift","name":""}],"extension":null}}config/clusteroperator/openshift-controller-manager.json0000640000000000000000000000346215144651360022437 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-controller-manager","uid":"e86bc762-0388-4dd3-b277-28f0b84dc0cf","resourceVersion":"13801","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:00:26Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:01:46Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:01:26Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:00:29Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T17:00:25Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftcontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-controller-manager-operator"},{"group":"","resource":"namespaces","name":"openshift-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-route-controller-manager"}],"extension":null}}config/clusteroperator/openshift-apiserver.json0000640000000000000000000000552415144651360020645 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-apiserver","uid":"7e0ba513-30a7-46aa-9b08-f21443d541bd","resourceVersion":"14180","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:00:33Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:01:07Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:08:09Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:00:33Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T17:00:32Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"},{"name":"openshift-apiserver","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftapiservers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-apiserver"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"endpoints","namespace":"openshift-etcd","name":"host-etcd-2"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-apiserver","name":""},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.apps.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.authorization.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.build.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.image.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.project.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.quota.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.route.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.security.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.template.openshift.io"}],"extension":null}}config/clusteroperator/olm.json0000640000000000000000000001420515144651360015433 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"olm","uid":"5f7db6f8-34af-46e6-94ec-a2969487ad22","resourceVersion":"14187","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManagerV1","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:00:46Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:01:13Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:01:13Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:00:46Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T17:00:46Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-catalogd"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clustercatalogs.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-catalogd","name":"catalogd-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-catalogd","name":"catalogd-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-catalogd","name":"catalogd-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-catalogd","name":"catalogd-service"},{"group":"apps","resource":"deployments","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-certified-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-community-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-marketplace"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-operators"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":"catalogd-mutating-webhook-configuration"},{"group":"","resource":"namespaces","name":"openshift-operator-controller"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusterextensions.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-operator-controller","name":"operator-controller-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager-metrics-service"},{"group":"apps","resource":"deployments","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"operator.openshift.io","resource":"olms","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-olm-operator"}],"extension":null}}config/clusteroperator/node-tuning.json0000640000000000000000000000342115144651360017071 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"node-tuning","uid":"99585ab4-efed-4310-acc7-3456bd63f10d","resourceVersion":"5929","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:00:47Z","reason":"AsExpected","message":"Cluster has deployed 1/1 \"4.18.32\" operands"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:00:49Z","reason":"AsExpected","message":"Cluster version is \"4.18.32\""},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:00:46Z","reason":"AsExpected","message":"DaemonSet \"tuned\" available"}],"versions":[{"name":"ocp-tuned","version":"4.18.32"},{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-node-tuning-operator"},{"group":"tuned.openshift.io","resource":"profiles","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"tuned.openshift.io","resource":"tuneds","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"apps","resource":"daemonsets","namespace":"openshift-cluster-node-tuning-operator","name":"tuned"},{"group":"performance.openshift.io","resource":"performanceprofiles","name":""}],"extension":null}}config/clusteroperator/network.json0000640000000000000000000003734715144651360016351 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"network","uid":"ee2ed50c-5e35-41a4-b5aa-69d632584ec4","resourceVersion":"14447","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","network.operator.openshift.io/last-seen-state":"{\"DaemonsetStates\":[],\"DeploymentStates\":[],\"StatefulsetStates\":[]}","network.operator.openshift.io/relatedClusterObjects":""},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"ManagementStateDegraded","status":"False","lastTransitionTime":"2026-02-16T16:59:12Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T16:59:01Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T16:59:01Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-16T17:08:31Z","reason":"Deploying","message":"Deployment \"/openshift-network-console/networking-console-plugin\" is not available (awaiting 1 nodes)"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:00:28Z"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"applied-cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"network-attachment-definitions.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ippools.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"overlappingrangeipreservations.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"nodeslicepools.whereabouts.cni.cncf.io"},{"group":"","resource":"namespaces","name":"openshift-multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-ancillary-tools"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-transient"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-group"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-cluster-readers"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"net-attach-def-project"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"default-cni-sysctl-allowlist"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"cni-copy-resources"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"whereabouts-config"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"multus-daemon-config"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus-additional-cni-plugins"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"metrics-daemon-sa"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"metrics-daemon-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"metrics-daemon-sa-rolebinding"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"network-metrics-daemon"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-network"},{"group":"","resource":"services","namespace":"openshift-multus","name":"network-metrics-service"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"","resource":"services","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ac"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-admission-controller-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-admission-controller-webhook"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"multus.openshift.io"},{"group":"apps","resource":"deployments","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-multus-admission-controller"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-multus","name":"prometheus-k8s-rules"},{"group":"","resource":"namespaces","name":"openshift-ovn-kubernetes"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressfirewalls.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressips.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressqoses.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminpolicybasedexternalroutes.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressservices.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"baselineadminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ipamclaims.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"userdefinednetworks.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusteruserdefinednetworks.k8s.ovn.org"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-nodes-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-kube-rbac-proxy"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-kube-rbac-proxy"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-config"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"ovn"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"signer"},{"group":"flowcontrol.apiserver.k8s.io","resource":"flowschemas","name":"openshift-ovn-kubernetes"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-cluster-reader"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-script-lib"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-editor"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-viewer"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"master-rules"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"networking-rules"},{"group":"","resource":"configmaps","namespace":"openshift-config-managed","name":"openshift-network-features"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-control-plane-metrics"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-node"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"","resource":"namespaces","name":"openshift-host-network"},{"group":"","resource":"resourcequotas","namespace":"openshift-host-network","name":"host-network-namespace-quotas"},{"group":"apps","resource":"deployments","namespace":"openshift-ovn-kubernetes","name":"ovnkube-control-plane"},{"group":"apps","resource":"daemonsets","namespace":"openshift-ovn-kubernetes","name":"ovnkube-node"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicies","name":"user-defined-networks-namespace-label"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicybindings","name":"user-defined-networks-namespace-label-binding"},{"group":"","resource":"namespaces","name":"openshift-network-diagnostics"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"kube-system","name":"network-diagnostics"},{"group":"apps","resource":"deployments","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config-managed","name":"openshift-network-public-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config-managed","name":"openshift-network-public-role-binding"},{"group":"","resource":"namespaces","name":"openshift-network-node-identity"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"system:openshift:scc:hostnetwork-v2"},{"group":"","resource":"configmaps","namespace":"openshift-network-node-identity","name":"ovnkube-identity-cm"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"network-node-identity.openshift.io"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-network-operator","name":"openshift-network-operator-ipsec-rules"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-iptables-alerter"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-iptables-alerter"},{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"iptables-alerter-script"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"","resource":"namespaces","name":"openshift-network-console"},{"group":"","resource":"configmaps","namespace":"openshift-network-console","name":"networking-console-plugin"},{"group":"apps","resource":"deployments","namespace":"openshift-network-console","name":"networking-console-plugin"},{"group":"","resource":"services","namespace":"openshift-network-console","name":"networking-console-plugin"},{"group":"console.openshift.io","resource":"consoleplugins","name":"networking-console-plugin"},{"group":"","resource":"namespaces","name":"openshift-network-operator"},{"group":"operator.openshift.io","resource":"networks","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cloud-network-config-controller"}],"extension":null}}config/clusteroperator/monitoring.json0000640000000000000000000000423015144651360017026 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"monitoring","uid":"615e8c59-6578-4d1c-86be-bb6f22d14606","resourceVersion":"14497","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:08:34Z","reason":"RollOutDone","message":"Successfully rolled out the stack."},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:08:34Z","reason":"PrometheusDataPersistenceNotConfigured","message":"Prometheus is running without persistent storage which can lead to data loss during upgrades and cluster disruptions. Please refer to the official documentation to see how to configure storage for Prometheus: https://docs.openshift.com/container-platform/4.18/observability/monitoring/configuring-the-monitoring-stack.html"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:08:34Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:00:53Z"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-monitoring"},{"group":"","resource":"namespaces","name":"openshift-user-workload-monitoring"},{"group":"monitoring.coreos.com","resource":"servicemonitors","name":""},{"group":"monitoring.coreos.com","resource":"podmonitors","name":""},{"group":"monitoring.coreos.com","resource":"prometheusrules","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagers","name":""},{"group":"monitoring.coreos.com","resource":"prometheuses","name":""},{"group":"monitoring.coreos.com","resource":"thanosrulers","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagerconfigs","name":""}],"extension":null}}config/clusteroperator/marketplace.json0000640000000000000000000000313315144651360017132 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"marketplace","uid":"41dcdbeb-ccd7-4742-9a97-7ee133393629","resourceVersion":"6254","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"capability.openshift.io/name":"marketplace","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:00:54Z","reason":"OperatorAvailable","message":"Successfully progressed to release version: 4.18.32"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:00:54Z","reason":"OperatorAvailable","message":"Available release version: 4.18.32"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:00:54Z","reason":"OperatorAvailable","message":"Marketplace is upgradeable"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:00:54Z","reason":"OperatorAvailable","message":"Available release version: 4.18.32"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-marketplace"},{"group":"operators.coreos.com","resource":"catalogsources","namespace":"openshift-marketplace","name":""}],"extension":null}}config/clusteroperator/machine-config.json0000640000000000000000000000554615144651360017523 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-config","uid":"482ff5ca-3e9d-4596-ac84-f242e0f93ba6","resourceVersion":"14198","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-16T17:04:48Z","message":"Working towards 4.18.32"},{"type":"Degraded","status":"True","lastTransitionTime":"2026-02-16T17:04:53Z","reason":"RequiredPoolsFailed","message":"Unable to apply 4.18.32: error during syncRequiredMachineConfigPools: context deadline exceeded"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:04:53Z","reason":"AsExpected","message":"Cluster has deployed []"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:04:53Z","reason":"AsExpected"},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-02-16T17:04:53Z","reason":"AsExpected"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-config-operator"},{"group":"machineconfiguration.openshift.io","resource":"machineconfigpools","name":""},{"group":"machineconfiguration.openshift.io","resource":"controllerconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"kubeletconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"containerruntimeconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"machineconfigs","name":""},{"group":"operator.openshift.io","resource":"machineconfigurations","name":""},{"group":"","resource":"nodes","name":""},{"group":"","resource":"namespaces","name":"openshift-kni-infra"},{"group":"","resource":"namespaces","name":"openshift-openstack-infra"},{"group":"","resource":"namespaces","name":"openshift-ovirt-infra"},{"group":"","resource":"namespaces","name":"openshift-vsphere-infra"},{"group":"","resource":"namespaces","name":"openshift-nutanix-infra"},{"group":"","resource":"namespaces","name":"openshift-cloud-platform-infra"}],"extension":{"lastSyncError":"MachineConfigPool master has not progressed to latest configuration: configuration status for pool master is empty: 0 (ready 0) out of 1 nodes are updating to latest configuration rendered-master-ccc1c4b4035b8605635ebee7b29103f5, retrying","master":"0 (ready 0) out of 1 nodes are updating to latest configuration rendered-master-ccc1c4b4035b8605635ebee7b29103f5","worker":"all 0 nodes are at latest configuration rendered-worker-c7ccd6fb94dd6d087e4a528948c79fb2"}}}config/clusteroperator/machine-approver.json0000640000000000000000000000253215144651360020104 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-approver","uid":"c8f5304c-453e-4d21-ba7d-125b9021b783","resourceVersion":"8791","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:01:22Z","reason":"AsExpected","message":"Cluster Machine Approver is available at 4.18.32"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:01:22Z","reason":"AsExpected"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:01:22Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:01:22Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-machine-approver"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""}],"extension":null}}config/clusteroperator/machine-api.json0000640000000000000000000000371415144651360017022 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-api","uid":"fae5423a-854d-4812-8c0e-7a16406c8a6b","resourceVersion":"11841","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:03:44Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:03:44Z","reason":"AsExpected"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:03:44Z","reason":"AsExpected","message":"Cluster Machine API Operator is in NoOp mode"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:03:44Z"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"machines","namespace":"openshift-machine-api","name":""},{"group":"machine.openshift.io","resource":"machinesets","namespace":"openshift-machine-api","name":""},{"group":"machine.openshift.io","resource":"machinehealthchecks","namespace":"openshift-machine-api","name":""},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-machine-api","name":""},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-operator"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-controllers"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/kube-storage-version-migrator.json0000640000000000000000000000325415144651360022543 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-storage-version-migrator","uid":"17dc16ac-b0f6-4636-8844-da68e0678eb8","resourceVersion":"14038","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:00:26Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:00:34Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:00:34Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:00:26Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T17:00:26Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubestorageversionmigrators","name":"cluster"},{"group":"migration.k8s.io","resource":"storageversionmigrations","name":""},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator"},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator-operator"}],"extension":null}}config/clusteroperator/kube-scheduler.json0000640000000000000000000000414615144651360017551 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-scheduler","uid":"b3677bce-59d6-49a9-973e-c284a65e4cdc","resourceVersion":"14236","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:00:25Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:03:33Z","reason":"AsExpected","message":"NodeInstallerProgressing: 1 node is at revision 4"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:03:33Z","reason":"AsExpected","message":"StaticPodsAvailable: 1 nodes are active; 1 node is at revision 4"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:00:25Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T17:00:25Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.32"},{"name":"kube-scheduler","version":"1.31.14"},{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeschedulers","name":"cluster"},{"group":"config.openshift.io","resource":"schedulers","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler-operator"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""}],"extension":null}}config/clusteroperator/kube-controller-manager.json0000640000000000000000000001112115144651360021355 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-controller-manager","uid":"69410ea4-cb93-4367-8401-e62731705951","resourceVersion":"14548","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:00:33Z","reason":"AsExpected","message":"NodeInstallerDegraded: 1 nodes are failing on revision 2:\nNodeInstallerDegraded: installer: taller revisions to settle for node master-0\nNodeInstallerDegraded: I0216 17:01:35.234528 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0216 17:01:35.234558 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0216 17:01:35.248736 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\nNodeInstallerDegraded: I0216 17:01:45.254520 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\nNodeInstallerDegraded: I0216 17:01:55.820613 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\nNodeInstallerDegraded: W0216 17:02:05.252061 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": dial tcp 172.30.0.1:443: connect: connection refused\nNodeInstallerDegraded: W0216 17:02:15.250548 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": dial tcp 172.30.0.1:443: connect: connection refused\nNodeInstallerDegraded: W0216 17:02:25.251080 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": dial tcp 172.30.0.1:443: connect: connection refused\nNodeInstallerDegraded: W0216 17:02:35.250231 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": dial tcp 172.30.0.1:443: connect: connection refused\nNodeInstallerDegraded: W0216 17:02:35.250822 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": dial tcp 172.30.0.1:443: connect: connection refused\nNodeInstallerDegraded: F0216 17:02:35.250856 1 cmd.go:109] timed out waiting for the condition\nNodeInstallerDegraded: \nNodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-16T17:01:13Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-16T17:00:33Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:00:33Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T17:00:32Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubecontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager-operator"},{"group":"","resource":"namespaces","name":"kube-system"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""},{"group":"","resource":"nodes","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/kube-apiserver.json0000640000000000000000000000530515144651360017571 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-apiserver","uid":"fc2b2c81-11fe-4d35-9fbc-1446a88397c0","resourceVersion":"14065","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:00:19Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-16T17:03:47Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 1; 0 nodes have achieved new revision 4"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:03:37Z","reason":"AsExpected","message":"StaticPodsAvailable: 1 nodes are active; 1 node is at revision 1; 0 nodes have achieved new revision 4"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:00:19Z","reason":"AsExpected","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced."},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-02-16T17:00:19Z","reason":"AsExpected","message":"All is well"}],"versions":[{"name":"raw-internal","version":"4.18.32"},{"name":"operator","version":"4.18.32"},{"name":"kube-apiserver","version":"1.31.14"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeapiservers","name":"cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":""},{"group":"security.openshift.io","resource":"securitycontextconstraints","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":""},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":""},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""},{"group":"apiserver.openshift.io","resource":"apirequestcounts","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/insights.json0000640000000000000000000000562515144651360016502 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"insights","uid":"be017328-7102-4a0b-b0a9-99f46e6abb13","resourceVersion":"17777","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"capability.openshift.io/name":"Insights","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:08:33Z","reason":"AsExpected","message":"Insights works as expected"},{"type":"ClusterTransferAvailable","status":"False","lastTransitionTime":"2026-02-16T17:16:48Z","reason":"NoClusterTransfer","message":"no available cluster transfer"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:08:33Z","reason":"AsExpected","message":"Insights works as expected"},{"type":"Disabled","status":"False","lastTransitionTime":"2026-02-16T17:08:33Z","reason":"AsExpected"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:08:33Z","reason":"AsExpected","message":"Monitoring the cluster"},{"type":"RemoteConfigurationAvailable","status":"True","lastTransitionTime":"2026-02-16T17:08:33Z","reason":"AsExpected"},{"type":"RemoteConfigurationValid","status":"True","lastTransitionTime":"2026-02-16T17:08:33Z","reason":"AsExpected"},{"type":"SCAAvailable","status":"True","lastTransitionTime":"2026-02-16T17:16:48Z","reason":"Updated","message":"SCA certs successfully updated in the etc-pki-entitlement secret"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:08:33Z","reason":"InsightsUpgradeable","message":"Insights operator can be upgraded"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-insights"},{"group":"apps","resource":"deployments","namespace":"openshift-insights","name":"insights-operator"},{"group":"","resource":"secrets","namespace":"openshift-config","name":"pull-secret"},{"group":"","resource":"secrets","namespace":"openshift-config","name":"support"},{"group":"","resource":"serviceaccounts","namespace":"openshift-insights","name":"gather"},{"group":"","resource":"serviceaccounts","namespace":"openshift-insights","name":"operator"},{"group":"","resource":"services","namespace":"openshift-insights","name":"metrics"},{"group":"","resource":"configmaps","namespace":"openshift-insights","name":"service-ca-bundle"},{"group":"operator.openshift.io","resource":"insightsoperators","name":"cluster"}],"extension":{"lastReportTime":"2026-02-16T17:16:48Z"}}}config/clusteroperator/ingress.json0000640000000000000000000000467715144651360016332 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"ingress","uid":"fa856484-f6c9-4b3e-b7f9-e2fbc31a8ab3","resourceVersion":"21123","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"capability.openshift.io/name":"Ingress","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:00:51Z","reason":"IngressAvailable","message":"The \"default\" ingress controller reports Available=True."},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-16T17:24:44Z","reason":"Reconciling","message":"ingresscontroller \"default\" is progressing: IngressControllerProgressing: One or more status conditions indicate progressing: DeploymentRollingOut=True (DeploymentRollingOut: Waiting for router deployment rollout to finish: 0 of 1 updated replica(s) are available...\n)."},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:00:51Z","reason":"IngressNotDegraded","message":"The \"default\" ingress controller reports Degraded=False."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:00:50Z","reason":"Upgradeable"},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-02-16T17:00:50Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.32"},{"name":"ingress-controller","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb"},{"name":"canary-server","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3d21c51712e6e0cdd9c776479f6d1ab55bc1085df5bb5f583e69ee192d11fd3"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-ingress-operator"},{"group":"operator.openshift.io","resource":"ingresscontrollers","namespace":"openshift-ingress-operator","name":""},{"group":"ingress.operator.openshift.io","resource":"dnsrecords","namespace":"openshift-ingress-operator","name":""},{"group":"","resource":"namespaces","name":"openshift-ingress"},{"group":"","resource":"namespaces","name":"openshift-ingress-canary"}],"extension":null}}config/clusteroperator/image-registry.json0000640000000000000000000000405115144651360017572 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"image-registry","uid":"4f239c89-009c-4b73-9336-71550f8793a9","resourceVersion":"14294","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"capability.openshift.io/name":"ImageRegistry","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"False","lastTransitionTime":"2026-02-16T17:07:55Z","reason":"NodeCADaemonNoAvailableReplicas::Removed","message":"Available: The registry is removed\nNodeCADaemonAvailable: The daemon set node-ca does not have available replicas\nImagePrunerAvailable: Pruner CronJob has been created"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-16T17:07:55Z","reason":"NodeCADaemonUnavailable::Removed","message":"Progressing: All registry resources are removed\nNodeCADaemonProgressing: The daemon set node-ca is deploying node pods"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:07:55Z","reason":"Removed","message":"Degraded: The registry is removed"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"imageregistry.operator.openshift.io","resource":"configs","name":"cluster"},{"group":"imageregistry.operator.openshift.io","resource":"imagepruners","name":"cluster"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"system:registry"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"registry-registry-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-image-registry-pruner"},{"group":"","resource":"namespaces","name":"openshift-image-registry"}],"extension":null}}config/clusteroperator/etcd.json0000640000000000000000000000400215144651360015555 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"etcd","uid":"f7f95caf-8203-4890-ba01-85a4c420ca2c","resourceVersion":"14094","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:07:54Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready\nEtcdMembersDegraded: No unhealthy members found"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:07:54Z","reason":"AsExpected","message":"NodeInstallerProgressing: 1 node is at revision 2\nEtcdMembersProgressing: No unstarted etcd members found"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:07:54Z","reason":"AsExpected","message":"StaticPodsAvailable: 1 nodes are active; 1 node is at revision 2\nEtcdMembersAvailable: 1 members are available"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:00:25Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T17:00:25Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.32"},{"name":"operator","version":"4.18.32"},{"name":"etcd","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"etcds","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"namespaces","name":"openshift-etcd"}],"extension":null}}config/clusteroperator/dns.json0000640000000000000000000000365615144651360015440 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"dns","uid":"7bcb7fe6-6901-40dc-8b07-5c6ef7a4a3b4","resourceVersion":"21333","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:25:00Z","reason":"AsExpected","message":"DNS \"default\" is available."},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:25:00Z","reason":"AsExpected","message":"Desired and current number of DNSes are equal"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:25:00Z","reason":"DNSNotDegraded"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:00:46Z","reason":"DNSUpgradeable","message":"DNS default is upgradeable: DNS Operator can be upgraded"}],"versions":[{"name":"operator","version":"4.18.32"},{"name":"coredns","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8ea13b0cbfe9be0d3d7ea80d50e512af6a453921a553c7c79b566530142b611b"},{"name":"openshift-cli","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e155421620a4ac28a759265f53059b75308fdd1491caeba6a9a34d2fbeab4954"},{"name":"kube-rbac-proxy","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-dns-operator"},{"group":"operator.openshift.io","resource":"dnses","name":"default"},{"group":"","resource":"namespaces","name":"openshift-dns"}],"extension":null}}config/clusteroperator/csi-snapshot-controller.json0000640000000000000000000000322015144651360021433 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"csi-snapshot-controller","uid":"d0dbe8e8-4ac5-4e39-8045-d08d3c8e79d2","resourceVersion":"14121","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"capability.openshift.io/name":"CSISnapshot","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:00:32Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:00:37Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:00:37Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:00:33Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T17:00:32Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"},{"name":"csi-snapshot-controller","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"operator.openshift.io","resource":"csisnapshotcontrollers","name":"cluster"}],"extension":null}}config/clusteroperator/control-plane-machine-set.json0000640000000000000000000000263515144651360021620 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"control-plane-machine-set","uid":"01a1bb0a-4eb4-453b-beeb-e57109b463f4","resourceVersion":"8663","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:01:20Z","reason":"AsExpected","message":"cluster operator is available"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:01:20Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:01:20Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:01:20Z","reason":"AsExpected","message":"cluster operator is upgradable"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"controlplanemachinesets","name":""},{"group":"machine.openshift.io","resource":"machines","name":""}],"extension":null}}config/clusteroperator/console.json0000640000000000000000000000530115144651360016303 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"console","uid":"7ecac173-bcc7-480b-90c3-445c16be2d28","resourceVersion":"14539","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"capability.openshift.io/name":"Console","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"True","lastTransitionTime":"2026-02-16T17:07:52Z","reason":"RouteHealth_StatusError","message":"RouteHealthDegraded: route not yet available, https://console-openshift-console.apps.sno.openstack.lab returns '503 Service Unavailable'"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-16T17:08:13Z","reason":"SyncLoopRefresh_InProgress","message":"SyncLoopRefreshProgressing: working toward version 4.18.32, 0 replicas available"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-16T17:08:13Z","reason":"Deployment_InsufficientReplicas::RouteHealth_StatusError","message":"DeploymentAvailable: 0 replicas available for console deployment\nRouteHealthAvailable: route not yet available, https://console-openshift-console.apps.sno.openstack.lab returns '503 Service Unavailable'"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:08:11Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T17:04:18Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"console.openshift.io","resource":"consoleplugins","name":"monitoring-plugin"},{"group":"console.openshift.io","resource":"consoleplugins","name":"networking-console-plugin"},{"group":"operator.openshift.io","resource":"consoles","name":"cluster"},{"group":"config.openshift.io","resource":"consoles","name":"cluster"},{"group":"config.openshift.io","resource":"infrastructures","name":"cluster"},{"group":"config.openshift.io","resource":"proxies","name":"cluster"},{"group":"config.openshift.io","resource":"oauths","name":"cluster"},{"group":"oauth.openshift.io","resource":"oauthclients","name":"console"},{"group":"","resource":"namespaces","name":"openshift-console-operator"},{"group":"","resource":"namespaces","name":"openshift-console"},{"group":"","resource":"configmaps","namespace":"openshift-config-managed","name":"console-public"}],"extension":null}}config/clusteroperator/config-operator.json0000640000000000000000000000311615144651360017741 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"config-operator","uid":"624901c7-e9a0-4b05-9f25-afd19fe713db","resourceVersion":"3842","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:00:25Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:00:25Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:00:25Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:00:25Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T17:00:25Z","reason":"NoData"}],"versions":[{"name":"feature-gates","version":"4.18.32"},{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-operator"}],"extension":null}}config/clusteroperator/cluster-autoscaler.json0000640000000000000000000000266015144651360020467 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster-autoscaler","uid":"6be95c80-0198-401b-9e81-b575923ef812","resourceVersion":"11885","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:01:34Z","reason":"AsExpected","message":"at version 4.18.32"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:03:49Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:03:49Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:01:34Z"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"autoscaling.openshift.io","resource":"machineautoscalers","namespace":"openshift-machine-api","name":""},{"group":"autoscaling.openshift.io","resource":"clusterautoscalers","namespace":"openshift-machine-api","name":""},{"group":"","resource":"namespaces","name":"openshift-machine-api"}],"extension":null}}config/clusteroperator/cloud-credential.json0000640000000000000000000002022315144651360020057 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-credential","uid":"4eed5134-b7b8-4e87-9d9d-2f842d3cbbec","resourceVersion":"9916","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"capability.openshift.io/name":"CloudCredential","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:01:34Z","reason":"AsExpected","message":"All is well"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:01:34Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:01:34Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:01:34Z"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"aws-ebs-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"azure-disk-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"azure-file-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"cloud-credential-operator-gcp-ro-creds"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"cloud-credential-operator-iam-ro"},{"group":"operator.openshift.io","resource":"cloudcredentials","name":"cluster"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ibm-powervs-block-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ibm-vpc-block-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"manila-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-azure-cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-credential-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-aws"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cluster-csi-drivers"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-gcp-ccm"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-gcp-pd-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ibm-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-gcs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-ibmcos"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-ibmcos-powervs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-aws"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-ibmcloud"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-nutanix"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-powervs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-vsphere"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-network"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-nutanix-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-openstack-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-powervs-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vmware-vsphere-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vsphere-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vsphere-problem-detector"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ovirt-csi-driver-operator"}],"extension":null}}config/clusteroperator/cloud-controller-manager.json0000640000000000000000000000440115144651360021540 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-controller-manager","uid":"df6485fe-2bd2-4d3f-8c9b-690c463b7287","resourceVersion":"9715","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"capability.openshift.io/name":"CloudControllerManager","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"TrustedCABundleControllerControllerAvailable","status":"True","lastTransitionTime":"2026-02-16T17:01:38Z","reason":"AsExpected","message":"Trusted CA Bundle Controller works as expected"},{"type":"TrustedCABundleControllerControllerDegraded","status":"False","lastTransitionTime":"2026-02-16T17:01:38Z","reason":"AsExpected","message":"Trusted CA Bundle Controller works as expected"},{"type":"CloudConfigControllerAvailable","status":"True","lastTransitionTime":"2026-02-16T17:01:38Z","reason":"AsExpected","message":"Cloud Config Controller works as expected"},{"type":"CloudConfigControllerDegraded","status":"False","lastTransitionTime":"2026-02-16T17:01:38Z","reason":"AsExpected","message":"Cloud Config Controller works as expected"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:01:39Z","reason":"AsExpected","message":"Cluster Cloud Controller Manager Operator is available at 4.18.32"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:01:39Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:01:39Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:01:39Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager-operator"},{"group":"config.openshift.io","resource":"clusteroperators","name":"cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager"}],"extension":null}}config/clusteroperator/baremetal.json0000640000000000000000000000427015144651360016601 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"baremetal","uid":"41b38793-d1e5-4d34-a61a-1689bc1b270d","resourceVersion":"9348","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"capability.openshift.io/name":"baremetal","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:01:34Z","reason":"WaitingForProvisioningCR"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:01:34Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:01:34Z","reason":"WaitingForProvisioningCR","message":"Waiting for Provisioning CR on BareMetal Platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:01:34Z"},{"type":"Disabled","status":"False","lastTransitionTime":"2026-02-16T17:01:34Z"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"provisioning","name":""},{"group":"metal3.io","resource":"hostfirmwaresettings","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"firmwareschemas","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"preprovisioningimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"bmceventsubscriptions","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostfirmwarecomponents","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"dataimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostupdatepolicies","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/authentication.json0000640000000000000000000001057715144651360017673 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"authentication","uid":"a715bf42-49e1-49c8-8327-3a7b3019e86f","resourceVersion":"14392","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"True","lastTransitionTime":"2026-02-16T17:07:36Z","reason":"IngressStateEndpoints_MissingSubsets::OAuthServerRouteEndpointAccessibleController_SyncError::OAuthServerServiceEndpointAccessibleController_SyncError::OAuthServerServiceEndpointsEndpointAccessibleController_SyncError","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.145.24:443/healthz\": dial tcp 172.30.145.24:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-16T17:04:50Z","reason":"OAuthServerDeployment_NewGeneration::WellKnownReadyController_OAuthMetadataNotYetServed","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: observed generation is 2, desired generation is 3.\nWellKnownReadyControllerProgressing: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-16T17:00:26Z","reason":"OAuthServerDeployment_NoPod::OAuthServerRouteEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::WellKnown_NotReady","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.145.24:443/healthz\": dial tcp 172.30.145.24:443: connect: connection refused\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T17:00:26Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T17:00:26Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"},{"name":"oauth-apiserver","version":"4.18.32"},{"name":"oauth-openshift","version":"4.18.32_openshift"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"infrastructures","name":"cluster"},{"group":"config.openshift.io","resource":"oauths","name":"cluster"},{"group":"route.openshift.io","resource":"routes","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"services","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-authentication"},{"group":"","resource":"namespaces","name":"openshift-authentication-operator"},{"group":"","resource":"namespaces","name":"openshift-ingress"},{"group":"","resource":"namespaces","name":"openshift-oauth-apiserver"}],"extension":null}}config/running_containers.json0000640000000000000000000001526515144651360015323 0ustar0000000000000000{"images":{"0":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","1":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","10":"sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","11":"sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","12":"sha256:df623c15a78ca969fb8ad134bde911c2047bf82b50244ee8e523763b6587e072","13":"sha256:e3d21c51712e6e0cdd9c776479f6d1ab55bc1085df5bb5f583e69ee192d11fd3","14":"sha256:0e446723bbab96c4e4662ff058d5eccba72d0c36d26c7b8b3f07183fa49d3ab9","15":"sha256:9f2b80358f029728d7f4ce46418bb6859d9ea7365de7b6f97a5f549ed6e77471","16":"sha256:56dffbd86bfae06921432678caf184b335bf2fc6ac7ee128f48aee396d57ea55","17":"sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192","18":"sha256:5abe992def861ec075251ae17bbd66fa23bd05bd3701953c0fdcf68a8d161f1e","19":"sha256:86d47b2746de823e60068255722d2c0f1ff9d327b2865071a4f2f1e08b1f4ee9","2":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","20":"sha256:a64a70eb2fef4095ba241021e37c52034c067c57121d6c588f8c7fd3dc24b55f","21":"sha256:3bb3c46533b24f1a6a6669117dc888ed8f0c7ae56b34068a4ff2052335e34c4e","22":"sha256:b41a8ae60c0eafa4a13e6dcd0e79ba63b0d7bd2bdc28aaed434b3bef98a5dc95","23":"sha256:abf98e8b78df5cf21c9da051db2827b8c9081cf3ea201bf9017a5d9548dbc73e","24":"sha256:fe683caef773a1963fc13f96afe58892563ea9921db8ac39369e3a9a05ea7181","25":"sha256:e155421620a4ac28a759265f53059b75308fdd1491caeba6a9a34d2fbeab4954","26":"sha256:ae30b3ab740f21c451d0272bceacb99fa34d22bbf2ea22f1e1e18230a156104b","27":"sha256:240701090a5f8e40d4b88fa200cf63dffb11a8e2eae713cf3c629b016c2823b0","28":"sha256:80531a0fe966e1cc0582c581951b09a7a4e42037c106748c44859110361b2c1b","29":"sha256:a913cef121c9a6c3ddc57b01fc807bb042e5a903489c05f99e6e2da9e6ec0b98","3":"sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","30":"registry.redhat.io/redhat/redhat-marketplace-index:v4.18","31":"sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","32":"sha256:f353131d8a1223db7f637c9851016b3a348d80c2b2be663a2db6d01e14ddca88","33":"sha256:5d54bd262ca625a326b01ea2bfd33db10a402c05590e6b710b0959712e1bf30b","34":"sha256:bd8adea550cbbaf16cb9409b31ec8b997320d247f9f30c80608ac1fbf9c7a07e","35":"sha256:fa28b66298c8b34f2c7b357b012e663e3954cfc7c85aa1e44651a79aeaf8b2a9","36":"sha256:f22dd40cd10354e3512d2065a8dd8c9dcb995ea487c0f661f172c527509123fc","37":"sha256:dab7a82d88f90f1ef4ac307b16132d4d573a4fa9080acc3272ca084613bd902a","38":"sha256:9899b0f08b1202d149e16f09616ee7b8f37e3cda642386d93a6d3f63d72a316b","39":"sha256:5c38d58b62290b59d0182b50ce3cfd87fbb7729f3ce6fc06ffa46d9805c7dd78","4":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","40":"sha256:47c1d88223ffb35bb36a4d2bde736fb3e45f08e204519387e0e52e3e3dc00cfb","41":"registry.redhat.io/redhat/certified-operator-index:v4.18","42":"sha256:fc2817e5b16d83dac91d1a274fb93521165953e9bdc28f3073b127eacc5a534e","43":"sha256:aaa92509b71c898caed43ac2b5d3b3fc44fff333855789eb1d7df15f08e91ea3","44":"sha256:333e6572029953b4c4676076f0991ee6e5c7d28cbe2887c71b1682f19831d8a1","45":"sha256:c1a0aba9ead3a33353dc8a033699dfa4795f4050516677dad6ed4ac664094692","46":"sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","47":"sha256:a26b20d3ef7b75aeb05acf9be2702f9d478822c43f679ff578811843692b960c","48":"sha256:f122c11c2f6a10ca150b136f7291d2e135b3a182d67809aa49727da289787cee","49":"sha256:0871b6c16b38a2eda5d1c89fd75079aff0775224307e940557e6fda6ba229f38","5":"sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","50":"registry.redhat.io/redhat/redhat-operator-index:v4.18","51":"sha256:9e96b53e74d1b802c2e63544e4689c9d262e9c996902c6e8a7f3ca34b23fdd50","52":"sha256:13d06502c0f0a3c73f69bf8d0743718f7cfc46e71f4a12916517ad7e9bff17e1","53":"sha256:bbe162375a11ed3810a1081c30dd400f461f2421d5f1e27d8792048bbd216956","54":"sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963","55":"sha256:19c3c8392b72ccf9a518d1d60fab0fd1e58a05b544caa79eb11bb68f00981d9d","56":"sha256:8ea13b0cbfe9be0d3d7ea80d50e512af6a453921a553c7c79b566530142b611b","57":"sha256:15c5e645edf257a08c061ad9ae7dab4293104a042b8396181d76dd28f396cebe","58":"sha256:2969828f1fcae82b7ef16d3588046ace3cf51b9ea578658c42475386e0ee1fc7","59":"sha256:a90d19460fbc705172df7759a3da394930623c6b6974620b79ffa07bab53c51f","6":"sha256:52ba78768a24efe94f7f95fe5bdd3c6156919979d5882682e06ae4a8a8d3fb4a","60":"sha256:c8164cc9e16e8be9ea18be73c9df5041af326ed6b3059faff08f76e568cf4dc2","61":"sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb","62":"sha256:0100b616991bd8bca68d583e902283aa4cc0d388046437d5d68407190e3fb041","63":"sha256:bfc52d6ca96f377d53757dc437ca720e860e3e016d16c084bd5f6f2e337d3a1d","64":"sha256:6dd544a8a6b4d08fe0f4fd076109c09cf181302ab6056ec6b2b89d68a52954c5","65":"sha256:2431778975829348e271dc9bf123c7a24c81a52537a61414cd17c8436436078b","66":"sha256:7b8fb1f11df51c131f5be8ddfc1b1c95ac13481f58d2dcd5a465a4a8341c0f49","67":"registry.redhat.io/redhat/community-operator-index:v4.18","68":"sha256:e4d0e747f55d3f773a63180bc4e4820ee5f17efbd45eb1dac9167fbc7520650e","69":"sha256:e786e28fbe0b95c4f5723bebc3abde1333b259fd26673716fc5638d88286d8b7","7":"sha256:aca57c8abaa83b2d1dce95fa7fe5b9416be70e100957ce48f212e2ec404387bc","70":"sha256:3f08586dd67c2d3d21053a044138f1bbedceb0847f1af8c3aa76127d86135a58","71":"sha256:95e7647e6fda21b94b692f03908e4cd154e3374fca0560229c646fefe2c46730","72":"sha256:7fccb6e19eb4caa16d32f4cf59670c2c741c98b099d1f12368b85aab3f84dc38","73":"sha256:d6ab8803bac3ebada13e90d9dd6208301b981488277cdeb847c25ff8002f5a30","74":"sha256:e1c8b9784a60860a08bd47935f0767b7b7f8f36c5c0adb7623a31b82c01d4c09","75":"sha256:99ad83497ea12819957ccba33c807c6e4c5297621db568e5635202cb9cc69f8f","76":"sha256:e391fce0b2e04f22fc089597db9e0671ba7f8b5b3a709151b5f33dd23b262144","77":"sha256:9cc42212fb15c1f3e6a88acaaa4919c9693be3c6099ea849d28855e231dc9e44","78":"sha256:cc03f91dbf08df9907c0ebad30c54a7fa92285b19ec4e440ed762b197378a861","79":"sha256:1faa2081a881db884a86bdfe33fcb6a6af1d14c3e9ee5c44dfe4b09045684e13","8":"sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e","9":"sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42"},"containers":{"2026-02":{"0":36,"1":9,"10":3,"11":3,"12":2,"13":2,"14":2,"15":2,"16":2,"17":2,"18":2,"19":2,"2":8,"20":2,"21":2,"22":2,"23":2,"24":2,"25":2,"26":2,"27":2,"28":1,"29":1,"3":6,"30":1,"31":1,"32":1,"33":1,"34":1,"35":1,"36":1,"37":1,"38":1,"39":1,"4":6,"40":1,"41":1,"42":1,"43":1,"44":1,"45":1,"46":1,"47":1,"48":1,"49":1,"5":5,"50":1,"51":1,"52":1,"53":1,"54":1,"55":1,"56":1,"57":1,"58":1,"59":1,"6":5,"60":1,"61":1,"62":1,"63":1,"64":1,"65":1,"66":1,"67":1,"68":1,"69":1,"7":4,"70":1,"71":1,"72":1,"73":1,"74":1,"75":1,"76":1,"77":1,"78":1,"79":1,"8":3,"9":3}}}config/pod/openshift-ovn-kubernetes/ovnkube-control-plane-bb7ffbb8d-lzgs9.json0000640000000000000000000002317515144651360026161 0ustar0000000000000000{"metadata":{"name":"ovnkube-control-plane-bb7ffbb8d-lzgs9","generateName":"ovnkube-control-plane-bb7ffbb8d-","namespace":"openshift-ovn-kubernetes","uid":"ab80e0fb-09dd-4c93-b235-1487024105d2","resourceVersion":"20025","creationTimestamp":"2026-02-16T16:59:24Z","labels":{"app":"ovnkube-control-plane","component":"network","kubernetes.io/os":"linux","openshift.io/component":"network","pod-template-hash":"bb7ffbb8d","type":"infra"},"annotations":{"networkoperator.openshift.io/cluster-network-cidr":"10.128.0.0/16","networkoperator.openshift.io/hybrid-overlay-status":"disabled","networkoperator.openshift.io/ip-family-mode":"single-stack"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"ovnkube-control-plane-bb7ffbb8d","uid":"f9a07319-a525-42c6-97a6-0e598a00517a","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"ovnkube-config","configMap":{"name":"ovnkube-config","defaultMode":420}},{"name":"env-overrides","configMap":{"name":"env-overrides","defaultMode":420,"optional":true}},{"name":"ovn-control-plane-metrics-cert","secret":{"secretName":"ovn-control-plane-metrics-cert","defaultMode":420,"optional":true}},{"name":"kube-api-access-fkwxl","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","command":["/bin/bash","-c","#!/bin/bash\nset -euo pipefail\nTLS_PK=/etc/pki/tls/metrics-cert/tls.key\nTLS_CERT=/etc/pki/tls/metrics-cert/tls.crt\n# As the secret mount is optional we must wait for the files to be present.\n# The service is created in monitor.yaml and this is created in sdn.yaml.\nTS=$(date +%s)\nWARN_TS=$(( ${TS} + $(( 20 * 60)) ))\nHAS_LOGGED_INFO=0\n\nlog_missing_certs(){\n CUR_TS=$(date +%s)\n if [[ \"${CUR_TS}\" -gt \"WARN_TS\" ]]; then\n echo $(date -Iseconds) WARN: ovn-control-plane-metrics-cert not mounted after 20 minutes.\n elif [[ \"${HAS_LOGGED_INFO}\" -eq 0 ]] ; then\n echo $(date -Iseconds) INFO: ovn-control-plane-metrics-cert not mounted. Waiting 20 minutes.\n HAS_LOGGED_INFO=1\n fi\n}\nwhile [[ ! -f \"${TLS_PK}\" || ! -f \"${TLS_CERT}\" ]] ; do\n log_missing_certs\n sleep 5\ndone\n\necho $(date -Iseconds) INFO: ovn-control-plane-metrics-certs mounted, starting kube-rbac-proxy\nexec /usr/bin/kube-rbac-proxy \\\n --logtostderr \\\n --secure-listen-address=:9108 \\\n --tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 \\\n --upstream=http://127.0.0.1:29108/ \\\n --tls-private-key-file=${TLS_PK} \\\n --tls-cert-file=${TLS_CERT}\n"],"ports":[{"name":"https","hostPort":9108,"containerPort":9108,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"ovn-control-plane-metrics-cert","readOnly":true,"mountPath":"/etc/pki/tls/metrics-cert"},{"name":"kube-api-access-fkwxl","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"ovnkube-cluster-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n\novn_v4_join_subnet_opt=\nif [[ \"\" != \"\" ]]; then\n ovn_v4_join_subnet_opt=\"--gateway-v4-join-subnet \"\nfi\novn_v6_join_subnet_opt=\nif [[ \"\" != \"\" ]]; then\n ovn_v6_join_subnet_opt=\"--gateway-v6-join-subnet \"\nfi\n\novn_v4_transit_switch_subnet_opt=\nif [[ \"\" != \"\" ]]; then\n ovn_v4_transit_switch_subnet_opt=\"--cluster-manager-v4-transit-switch-subnet \"\nfi\novn_v6_transit_switch_subnet_opt=\nif [[ \"\" != \"\" ]]; then\n ovn_v6_transit_switch_subnet_opt=\"--cluster-manager-v6-transit-switch-subnet \"\nfi\n\ndns_name_resolver_enabled_flag=\nif [[ \"false\" == \"true\" ]]; then\n dns_name_resolver_enabled_flag=\"--enable-dns-name-resolver\"\nfi\n\npersistent_ips_enabled_flag=\nif [[ \"true\" == \"true\" ]]; then\n persistent_ips_enabled_flag=\"--enable-persistent-ips\"\nfi\n\n# This is needed so that converting clusters from GA to TP\n# will rollout control plane pods as well\nnetwork_segmentation_enabled_flag=\nmulti_network_enabled_flag=\nif [[ \"true\" == \"true\" ]]; then\n multi_network_enabled_flag=\"--enable-multi-network\"\n network_segmentation_enabled_flag=\"--enable-network-segmentation\"\nfi\n\nroute_advertisements_enable_flag=\nif [[ \"false\" == \"true\" ]]; then\n route_advertisements_enable_flag=\"--enable-route-advertisements\"\nfi\n\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - ovnkube-control-plane - start ovnkube --init-cluster-manager ${K8S_NODE}\"\nexec /usr/bin/ovnkube \\\n --enable-interconnect \\\n --init-cluster-manager \"${K8S_NODE}\" \\\n --config-file=/run/ovnkube-config/ovnkube.conf \\\n --loglevel \"${OVN_KUBE_LOG_LEVEL}\" \\\n --metrics-bind-address \"127.0.0.1:29108\" \\\n --metrics-enable-pprof \\\n --metrics-enable-config-duration \\\n ${ovn_v4_join_subnet_opt} \\\n ${ovn_v6_join_subnet_opt} \\\n ${ovn_v4_transit_switch_subnet_opt} \\\n ${ovn_v6_transit_switch_subnet_opt} \\\n ${dns_name_resolver_enabled_flag} \\\n ${persistent_ips_enabled_flag} \\\n ${multi_network_enabled_flag} \\\n ${network_segmentation_enabled_flag} \\\n ${route_advertisements_enable_flag}\n"],"ports":[{"name":"metrics-port","hostPort":29108,"containerPort":29108,"protocol":"TCP"}],"env":[{"name":"OVN_KUBE_LOG_LEVEL","value":"4"},{"name":"K8S_NODE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"300Mi"}},"volumeMounts":[{"name":"ovnkube-config","mountPath":"/run/ovnkube-config/"},{"name":"env-overrides","mountPath":"/env"},{"name":"kube-api-access-fkwxl","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"Default","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"ovn-kubernetes-control-plane","serviceAccount":"ovn-kubernetes-control-plane","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists"},{"key":"node.kubernetes.io/not-ready","operator":"Exists"},{"key":"node.kubernetes.io/unreachable","operator":"Exists"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:20Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T16:59:24Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:04Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:04Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T16:59:24Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-16T16:59:24Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-16T17:24:00Z"}},"lastState":{},"ready":true,"restartCount":4,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://5c5bcea03650c0cdda60439583d0a74ffa94b8547b99e2c40adb5f801938dcb3","started":true,"volumeMounts":[{"name":"ovn-control-plane-metrics-cert","mountPath":"/etc/pki/tls/metrics-cert","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-fkwxl","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"ovnkube-cluster-manager","state":{"running":{"startedAt":"2026-02-16T17:24:04Z"}},"lastState":{"waiting":{}},"ready":true,"restartCount":4,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","containerID":"cri-o://9d36c889938be83b9d8ad1a3695ce158d437c9d9a2db353bc823fc0d888cab87","started":true,"volumeMounts":[{"name":"ovnkube-config","mountPath":"/run/ovnkube-config/"},{"name":"env-overrides","mountPath":"/env"},{"name":"kube-api-access-fkwxl","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-apiserver/installer-4-master-0.json0000640000000000000000000001511215144651360022674 0ustar0000000000000000{"metadata":{"name":"installer-4-master-0","namespace":"openshift-kube-apiserver","uid":"1ea5bf67-1fd1-488a-a440-00bb9a8533d0","resourceVersion":"15197","creationTimestamp":"2026-02-16T17:07:58Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.90/23\"],\"mac_address\":\"0a:58:0a:80:00:5a\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.90/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.90\"\n ],\n \"mac\": \"0a:58:0a:80:00:5a\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-4","uid":"7d8c23d8-2bc7-4e07-b7e7-9823f98f64b0"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","command":["cluster-kube-apiserver-operator","installer"],"args":["-v=2","--revision=4","--namespace=openshift-kube-apiserver","--pod=kube-apiserver-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-apiserver-pod","--configmaps=config","--configmaps=kube-apiserver-cert-syncer-kubeconfig","--optional-configmaps=oauth-metadata","--optional-configmaps=cloud-config","--configmaps=bound-sa-token-signing-certs","--configmaps=etcd-serving-ca","--optional-configmaps=kube-apiserver-server-ca","--configmaps=kubelet-serving-ca","--configmaps=sa-token-signing-certs","--configmaps=kube-apiserver-audit-policies","--secrets=etcd-client","--optional-secrets=encryption-config","--secrets=localhost-recovery-serving-certkey","--secrets=localhost-recovery-client-token","--optional-secrets=webhook-authenticator","--cert-dir=/etc/kubernetes/static-pod-resources/kube-apiserver-certs","--cert-configmaps=aggregator-client-ca","--cert-configmaps=client-ca","--optional-cert-configmaps=trusted-ca-bundle","--cert-configmaps=control-plane-node-kubeconfig","--cert-configmaps=check-endpoints-kubeconfig","--cert-secrets=aggregator-client","--cert-secrets=localhost-serving-cert-certkey","--cert-secrets=service-network-serving-certkey","--cert-secrets=external-loadbalancer-serving-certkey","--cert-secrets=internal-loadbalancer-serving-certkey","--cert-secrets=bound-service-account-signing-key","--cert-secrets=control-plane-node-admin-client-cert-key","--cert-secrets=check-endpoints-client-cert-key","--cert-secrets=kubelet-client","--cert-secrets=node-kubeconfigs","--optional-cert-secrets=user-serving-cert","--optional-cert-secrets=user-serving-cert-000","--optional-cert-secrets=user-serving-cert-001","--optional-cert-secrets=user-serving-cert-002","--optional-cert-secrets=user-serving-cert-003","--optional-cert-secrets=user-serving-cert-004","--optional-cert-secrets=user-serving-cert-005","--optional-cert-secrets=user-serving-cert-006","--optional-cert-secrets=user-serving-cert-007","--optional-cert-secrets=user-serving-cert-008","--optional-cert-secrets=user-serving-cert-009"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"imagePullSecrets":[{"name":"installer-sa-dockercfg-z9qtm"}],"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:19Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:07:58Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:19Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:14:19Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:07:58Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-16T17:07:58Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":137,"reason":"ContainerStatusUnknown","message":"The container could not be located when the pod was terminated","startedAt":null,"finishedAt":null}},"lastState":{"terminated":{"exitCode":137,"reason":"ContainerStatusUnknown","message":"The container could not be located when the pod was deleted. The container used to be Running","startedAt":null,"finishedAt":null}},"ready":false,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","imageID":"","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}config/pod/openshift-cluster-machine-approver/machine-approver-8569dd85ff-4vxmz.json0000640000000000000000000001662415144651360027054 0ustar0000000000000000{"metadata":{"name":"machine-approver-8569dd85ff-4vxmz","generateName":"machine-approver-8569dd85ff-","namespace":"openshift-cluster-machine-approver","uid":"702322ac-7610-4568-9a68-b6acbd1f0c12","resourceVersion":"20010","creationTimestamp":"2026-02-16T17:01:39Z","labels":{"app":"machine-approver","pod-template-hash":"8569dd85ff"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"machine-approver-8569dd85ff","uid":"f1baa33b-cc58-48a9-a024-6ba587a8afad","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"auth-proxy-config","configMap":{"name":"kube-rbac-proxy","defaultMode":420}},{"name":"machine-approver-tls","secret":{"secretName":"machine-approver-tls","defaultMode":420}},{"name":"config","configMap":{"name":"machine-approver-config","defaultMode":440,"optional":true}},{"name":"kube-api-access-6ftld","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","args":["--secure-listen-address=0.0.0.0:9192","--upstream=http://127.0.0.1:9191/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key","--config-file=/etc/kube-rbac-proxy/config-file.yaml","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305","--logtostderr=true","--v=3"],"ports":[{"name":"https","hostPort":9192,"containerPort":9192,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"auth-proxy-config","mountPath":"/etc/kube-rbac-proxy"},{"name":"machine-approver-tls","mountPath":"/etc/tls/private"},{"name":"kube-api-access-6ftld","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"machine-approver-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e7ac69aff2f28f6b3cbdb166c7dac7a3490167bcd670cd7057bdde1e1e7684d","command":["/usr/bin/machine-approver"],"args":["--config=/var/run/configmaps/config/config.yaml","-v=2","--logtostderr","--leader-elect=true","--leader-elect-lease-duration=137s","--leader-elect-renew-deadline=107s","--leader-elect-retry-period=26s","--leader-elect-resource-namespace=openshift-cluster-machine-approver","--api-group-version=machine.openshift.io/v1beta1","--max-concurrent-reconciles=10"],"env":[{"name":"RELEASE_VERSION","value":"4.18.32"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"kube-api-access-6ftld","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"machine-approver-sa","serviceAccount":"machine-approver-sa","nodeName":"master-0","hostNetwork":true,"securityContext":{},"imagePullSecrets":[{"name":"machine-approver-sa-dockercfg-wnnb7"}],"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:02:47Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:01:39Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:21Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:21Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:01:39Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-16T17:01:39Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-16T17:24:05Z"}},"lastState":{},"ready":true,"restartCount":6,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://c10bf35f014a3280dc7aaee3934cc96e72b8738183e88a20b73e44eb7ab27de8","started":true,"volumeMounts":[{"name":"auth-proxy-config","mountPath":"/etc/kube-rbac-proxy"},{"name":"machine-approver-tls","mountPath":"/etc/tls/private"},{"name":"kube-api-access-6ftld","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"machine-approver-controller","state":{"running":{"startedAt":"2026-02-16T17:24:20Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"W0216 17:24:07.127960 1 client_config.go:659] Neither --kubeconfig nor --master was specified. Using the inClusterConfig. This might not work.\nW0216 17:24:07.128171 1 client_config.go:659] Neither --kubeconfig nor --master was specified. Using the inClusterConfig. This might not work.\nI0216 17:24:07.128274 1 main.go:152] setting up manager\nF0216 17:24:07.130729 1 main.go:174] failed to index field spec.signerName: failed to get API group resources: unable to retrieve the complete list of server APIs: certificates.k8s.io/v1: Get \"https://172.30.0.1:443/apis/certificates.k8s.io/v1\": dial tcp 172.30.0.1:443: connect: connection refused\n","startedAt":"2026-02-16T17:24:07Z","finishedAt":"2026-02-16T17:24:07Z","containerID":"cri-o://19be8681c0a46d475538415f31af270ce62d3e7bda1a682c75b5e072b00f3769"}},"ready":true,"restartCount":8,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e7ac69aff2f28f6b3cbdb166c7dac7a3490167bcd670cd7057bdde1e1e7684d","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e7ac69aff2f28f6b3cbdb166c7dac7a3490167bcd670cd7057bdde1e1e7684d","containerID":"cri-o://6b79ebd81e96fe94af841e19982ef839de1783e10b5f15c4bd042bf4b678fa19","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"kube-api-access-6ftld","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/configmaps/kube-system/cluster-config-v1/install-config0000640000000000000000000000155515144651360023222 0ustar0000000000000000apiVersion: v1 baseDomain: xxxxxxxxxxxxx compute: - hyperthreading: Enabled name: worker platform: {} replicas: 0 controlPlane: hyperthreading: Enabled name: master platform: {} replicas: 1 metadata: creationTimestamp: null name: sno networking: clusterNetwork: - cidr: 10.128.0.0/16 hostPrefix: 23 machineNetwork: - cidr: 192.168.32.0/24 networkType: OVNKubernetes serviceNetwork: - 172.30.0.0/16 platform: none: {} publish: External pullSecret: "" sshKey: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt0000640000000000000000000000010115144651360025432 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/openshift-install-manifests/version0000640000000000000000000000000715144651360025141 0ustar0000000000000000v4.18.0config/configmaps/openshift-config/openshift-install-manifests/invoker0000640000000000000000000000001715144651360025132 0ustar0000000000000000agent-installerconfig/configmaps/openshift-config/kube-root-ca.crt/ca.crt0000640000000000000000000000030315144651360022252 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/initial-kube-apiserver-server-ca/ca-bundle.crt0000640000000000000000000000050515144651360026706 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt0000640000000000000000000000010115144651360023411 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt0000640000000000000000000000010115144651360023205 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt0000640000000000000000000000010115144651360025475 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- events/openshift-cluster-version.json0000640000000000000000000002562715144651360016621 0ustar0000000000000000{"items":[{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T16:54:28Z","reason":"LeaderElection","message":"master-0_73539c9d-3bba-44b7-89ff-b14bc727e544 became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T16:54:36Z","reason":"LeaderElection","message":"master-0_73539c9d-3bba-44b7-89ff-b14bc727e544 stopped leading","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T16:54:37Z","reason":"LeaderElection","message":"master-0_f4bed8e0-1512-4e7e-89f2-5e594b410d2a became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T16:54:39Z","reason":"LeaderElection","message":"master-0_f4bed8e0-1512-4e7e-89f2-5e594b410d2a stopped leading","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T16:54:47Z","reason":"ScalingReplicaSet","message":"Scaled up replica set cluster-version-operator-76959b6567 to 1","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T16:54:54Z","reason":"LeaderElection","message":"master-0_a264fcb4-3169-4f76-9871-9f959f017906 became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T16:54:55Z","reason":"RetrievePayload","message":"Retrieving and verifying payload version=\"4.18.32\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T16:54:55Z","reason":"LoadPayload","message":"Loading payload version=\"4.18.32\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T16:54:57Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.32\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\" architecture=\"amd64\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T16:55:28Z","reason":"FailedCreate","message":"Error creating: pods \"cluster-version-operator-76959b6567-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T16:58:50Z","reason":"FailedCreate","message":"Error creating: pods \"cluster-version-operator-76959b6567-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T16:58:52Z","reason":"Scheduled","message":"Successfully assigned openshift-cluster-version/cluster-version-operator-76959b6567-wnh7l to master-0","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T16:58:52Z","reason":"SuccessfulCreate","message":"Created pod: cluster-version-operator-76959b6567-wnh7l","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T16:59:58Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"cluster-version-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:00:33Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"cluster-version-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:00:36Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:00:46Z","reason":"Started","message":"Started container cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:00:46Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\" in 9.306s (9.306s including waiting). Image size: 512819769 bytes.","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:00:46Z","reason":"Created","message":"Created container: cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:00:46Z","reason":"LeaderElection","message":"master-0_7549f6e7-d53d-48e0-8bc8-a8e058ed2750 became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:00:47Z","reason":"RetrievePayload","message":"Retrieving and verifying payload version=\"4.18.32\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:00:47Z","reason":"LoadPayload","message":"Loading payload version=\"4.18.32\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:00:49Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.32\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\" architecture=\"amd64\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:01:00Z","reason":"SuccessfulDelete","message":"Deleted pod: cluster-version-operator-76959b6567-wnh7l","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:01:00Z","reason":"Killing","message":"Stopping container cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:01:00Z","reason":"ScalingReplicaSet","message":"Scaled down replica set cluster-version-operator-76959b6567 to 0 from 1","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:01:01Z","reason":"ScalingReplicaSet","message":"Scaled up replica set cluster-version-operator-649c4f5445 to 1","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:01:01Z","reason":"Scheduled","message":"Successfully assigned openshift-cluster-version/cluster-version-operator-649c4f5445-vt6wb to master-0","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:01:01Z","reason":"LeaderElection","message":"master-0_538c553f-f749-4aec-8ad9-32c8ab1ad21b became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:01:01Z","reason":"SuccessfulCreate","message":"Created pod: cluster-version-operator-649c4f5445-vt6wb","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:01:01Z","reason":"Started","message":"Started container cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:01:01Z","reason":"Created","message":"Created container: cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:01:01Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\" already present on machine","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:01:03Z","reason":"LoadPayload","message":"Loading payload version=\"4.18.32\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:01:03Z","reason":"RetrievePayload","message":"Retrieving and verifying payload version=\"4.18.32\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:01:04Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.32\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\" architecture=\"amd64\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:02:26Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access\" : [failed to fetch token: Post \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-cluster-version/serviceaccounts/default/token\": dial tcp 192.168.32.10:6443: connect: connection refused, failed to sync configmap cache: timed out waiting for the condition]","type":"Warning"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"service-ca\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:14:20Z","reason":"Created","message":"Created container: cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:14:20Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\" already present on machine","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:14:20Z","reason":"Started","message":"Started container cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:14:32Z","reason":"NodeNotReady","message":"Node is not ready","type":"Warning"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:24:05Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\" already present on machine","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:24:05Z","reason":"Created","message":"Created container: cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:24:05Z","reason":"Started","message":"Started container cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T17:24:17Z","reason":"NodeNotReady","message":"Node is not ready","type":"Warning"}]}config/pod/openshift-cluster-version/cluster-version-operator-649c4f5445-vt6wb.json0000640000000000000000000001342115144651360026633 0ustar0000000000000000{"metadata":{"name":"cluster-version-operator-649c4f5445-vt6wb","generateName":"cluster-version-operator-649c4f5445-","namespace":"openshift-cluster-version","uid":"b6ad958f-25e4-40cb-89ec-5da9cb6395c7","resourceVersion":"20084","creationTimestamp":"2026-02-16T17:01:01Z","labels":{"k8s-app":"cluster-version-operator","pod-template-hash":"649c4f5445"},"annotations":{"openshift.io/required-scc":"hostaccess","openshift.io/scc":"hostaccess"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-version-operator-649c4f5445","uid":"2e63d2e5-a070-4d56-8cc3-db8eb3272f20","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"etc-ssl-certs","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"etc-cvo-updatepayloads","hostPath":{"path":"/etc/cvo/updatepayloads","type":""}},{"name":"serving-cert","secret":{"secretName":"cluster-version-operator-serving-cert","defaultMode":420}},{"name":"service-ca","configMap":{"name":"openshift-service-ca.crt","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-version-operator","image":"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","args":["start","--release-image=quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","--enable-auto-update=false","--listen=0.0.0.0:9099","--serving-cert-file=/etc/tls/serving-cert/tls.crt","--serving-key-file=/etc/tls/serving-cert/tls.key","--v=2","--always-enable-capabilities=Ingress"],"env":[{"name":"OPERATOR_IMAGE_VERSION","value":"0.0.1-snapshot"},{"name":"KUBERNETES_SERVICE_PORT","value":"6443"},{"name":"KUBERNETES_SERVICE_HOST","value":"api-int.sno.openstack.lab"},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}},{"name":"CLUSTER_PROFILE","value":"self-managed-high-availability"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-ssl-certs","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"etc-cvo-updatepayloads","readOnly":true,"mountPath":"/etc/cvo/updatepayloads"},{"name":"serving-cert","readOnly":true,"mountPath":"/etc/tls/serving-cert"},{"name":"service-ca","readOnly":true,"mountPath":"/etc/tls/service-ca"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000040000,"runAsNonRoot":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":130,"dnsPolicy":"Default","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"default","serviceAccount":"default","automountServiceAccountToken":false,"nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c6,c5"},"fsGroup":1000040000},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:01:02Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:01:01Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:05Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:24:05Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T17:01:01Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-16T17:01:01Z","containerStatuses":[{"name":"cluster-version-operator","state":{"running":{"startedAt":"2026-02-16T17:24:05Z"}},"lastState":{},"ready":true,"restartCount":6,"image":"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","imageID":"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","containerID":"cri-o://f12fbce99708f4008dc34ab8e21bf1c87846b98eab8d8b8a3bed899f12098f55","started":true,"volumeMounts":[{"name":"etc-ssl-certs","mountPath":"/etc/ssl/certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-cvo-updatepayloads","mountPath":"/etc/cvo/updatepayloads","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"serving-cert","mountPath":"/etc/tls/serving-cert","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca","mountPath":"/etc/tls/service-ca","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/id0000640000000000000000000000004415144651360011027 0ustar00000000000000005cc9bdbc-753a-4614-947c-20d2c71801f3config/version.json0000640000000000000000000001030315144651360013067 0ustar0000000000000000{"metadata":{"name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","resourceVersion":"14257","generation":2,"creationTimestamp":"2026-02-16T16:54:34Z"},"spec":{"clusterID":"5cc9bdbc-753a-4614-947c-20d2c71801f3","channel":"stable-4.18","signatureStores":null},"status":{"desired":{"version":"4.18.32","image":"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","url":"https://access.redhat.com/errata/RHSA-2026:1062","channels":["candidate-4.18","candidate-4.19","candidate-4.20","eus-4.18","fast-4.18","stable-4.18"]},"history":[{"state":"Partial","startedTime":"2026-02-16T16:54:57Z","completionTime":null,"version":"4.18.32","image":"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","verified":false}],"observedGeneration":2,"versionHash":"mWssvFsfzgI=","capabilities":{"enabledCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"],"knownCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"]},"conditions":[{"type":"RetrievedUpdates","status":"True","lastTransitionTime":"2026-02-16T16:54:57Z"},{"type":"Upgradeable","status":"False","lastTransitionTime":"2026-02-16T16:54:57Z","reason":"MultipleReasons","message":"Cluster should not be upgraded between minor versions for multiple reasons: AdminAckRequired,ConsoleDefaultRouteSync_FailedDefaultRouteApply::DownloadsDefaultRouteSync_FailedDefaultRouteApply\n* Kubernetes 1.32 and therefore OpenShift 4.19 remove several APIs which require admin consideration. Please see the knowledge article https://access.redhat.com/articles/7112216 for details and instructions.\n* Cluster operator console should not be upgraded between minor versions: ConsoleDefaultRouteSyncUpgradeable: Internal error occurred: resource quota evaluation timed out\nDownloadsDefaultRouteSyncUpgradeable: Internal error occurred: resource quota evaluation timed out"},{"type":"ImplicitlyEnabledCapabilities","status":"False","lastTransitionTime":"2026-02-16T16:54:57Z","reason":"AsExpected","message":"Capabilities match configured spec"},{"type":"ReleaseAccepted","status":"True","lastTransitionTime":"2026-02-16T16:54:57Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.32\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\" architecture=\"amd64\""},{"type":"Available","status":"False","lastTransitionTime":"2026-02-16T16:54:57Z"},{"type":"Failing","status":"True","lastTransitionTime":"2026-02-16T17:04:04Z","reason":"ClusterOperatorsNotAvailable","message":"Cluster operators authentication, console, image-registry, insights, kube-controller-manager, monitoring, openshift-apiserver are not available"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-16T16:54:57Z","reason":"ClusterOperatorsNotAvailable","message":"Unable to apply 4.18.32: some cluster operators are not available"},{"type":"UpgradeableAdminAckRequired","status":"False","lastTransitionTime":"2026-02-16T17:06:41Z","reason":"AdminAckRequired","message":"Kubernetes 1.32 and therefore OpenShift 4.19 remove several APIs which require admin consideration. Please see the knowledge article https://access.redhat.com/articles/7112216 for details and instructions."},{"type":"UpgradeableClusterOperators","status":"False","lastTransitionTime":"2026-02-16T17:06:41Z","reason":"ConsoleDefaultRouteSync_FailedDefaultRouteApply::DownloadsDefaultRouteSync_FailedDefaultRouteApply","message":"Cluster operator console should not be upgraded between minor versions: ConsoleDefaultRouteSyncUpgradeable: Internal error occurred: resource quota evaluation timed out\nDownloadsDefaultRouteSyncUpgradeable: Internal error occurred: resource quota evaluation timed out"}],"availableUpdates":null}}aggregated/ingress_controllers_certs.json0000640000000000000000000000045715144651360017540 0ustar0000000000000000[{"name":"router-ca","namespace":"openshift-ingress-operator","not_before":"2026-02-16T17:00:49Z","not_after":"2028-02-16T17:00:50Z","controllers":[]},{"name":"router-certs-default","namespace":"openshift-ingress","not_before":"2026-02-16T17:00:50Z","not_after":"2028-02-16T17:00:51Z","controllers":[]}]config/crd/volumesnapshotcontents.snapshot.storage.k8s.io.json0000640000000000000000000005444315144651360023447 0ustar0000000000000000{"metadata":{"name":"volumesnapshotcontents.snapshot.storage.k8s.io","uid":"5dd164b5-c069-4571-be1c-d1abc08bd644","resourceVersion":"4630","generation":1,"creationTimestamp":"2026-02-16T17:00:32Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/955","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"scope":"Cluster","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the\nunderlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system.\nRequired.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on\nthe underlying storage system should be deleted when its bound VolumeSnapshot is deleted.\nSupported values are \"Retain\" and \"Delete\".\n\"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept.\n\"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted.\nFor dynamically provisioned snapshots, this field will automatically be filled in by the\nCSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding\nVolumeSnapshotClass.\nFor pre-existing snapshots, users MUST specify this field when creating the\n VolumeSnapshotContent object.\nRequired.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on\nthe underlying storage system.\nThis MUST be the same as the name returned by the CSI GetPluginName() call for\nthat driver.\nRequired.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned\nor already exists, and just requires a Kubernetes object representation.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on\nthe underlying storage system for which a Kubernetes object representation\nwas (or should be) created.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"snapshotHandle is immutable"}]},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot\nshould be dynamically taken from.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeHandle is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.volumeHandle) || has(self.volumeHandle)","message":"volumeHandle is required once set"},{"rule":"!has(oldSelf.snapshotHandle) || has(self.snapshotHandle)","message":"snapshotHandle is required once set"},{"rule":"(has(self.volumeHandle) \u0026\u0026 !has(self.snapshotHandle)) || (!has(self.volumeHandle) \u0026\u0026 has(self.snapshotHandle))","message":"exactly one of volumeHandle and snapshotHandle must be set"}]},"sourceVolumeMode":{"description":"SourceVolumeMode is the mode of the volume whose snapshot is taken.\nCan be either “Filesystem” or “Block”.\nIf not specified, it indicates the source volume's mode is unknown.\nThis field is immutable.\nThis field is an alpha field.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"sourceVolumeMode is immutable"}]},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be)\ncreated.\nNote that after provisioning, the VolumeSnapshotClass may be deleted or\nrecreated with different set of values, and as such, should not be referenced\npost-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this\nVolumeSnapshotContent object is bound.\nVolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to\nthis VolumeSnapshotContent's name for the bidirectional binding to be valid.\nFor a pre-existing VolumeSnapshotContent object, name and namespace of the\nVolumeSnapshot object MUST be provided for binding to happen.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string\nshould contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2].\nFor example, if the object reference is to a container within a pod, this would take on a value like:\n\"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered\nthe event) or if no container name is specified \"spec.containers[2]\" (container with\nindex 2 in this pod). This syntax is chosen only to have some well-defined way of\nreferencing a part of an object.\nTODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}},"x-kubernetes-map-type":"atomic","x-kubernetes-validations":[{"rule":"has(self.name) \u0026\u0026 has(self.__namespace__)","message":"both spec.volumeSnapshotRef.name and spec.volumeSnapshotRef.namespace must be set"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.sourceVolumeMode) || has(self.sourceVolumeMode)","message":"sourceVolumeMode is required once set"}]},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it indicates the creation time is unknown.\nThe format of this field is a Unix nanoseconds time encoded as an int64.\nOn Unix, the command `date +%s%N` returns the current time in nanoseconds\nsince 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nUpon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system.\nIf not specified, it indicates that dynamic snapshot creation has either failed\nor it is still in progress.","type":"string"},"volumeGroupSnapshotHandle":{"description":"VolumeGroupSnapshotHandle is the CSI \"group_snapshot_id\" of a group snapshot\non the underlying storage system.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshotContent is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshotContent","schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the underlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system. Required.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted. Supported values are \"Retain\" and \"Delete\". \"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept. \"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted. For dynamically provisioned snapshots, this field will automatically be filled in by the CSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding VolumeSnapshotClass. For pre-existing snapshots, users MUST specify this field when creating the VolumeSnapshotContent object. Required.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on the underlying storage system. This MUST be the same as the name returned by the CSI GetPluginName() call for that driver. Required.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned or already exists, and just requires a Kubernetes object representation. This field is immutable after creation. Required.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on the underlying storage system for which a Kubernetes object representation was (or should be) created. This field is immutable.","type":"string"},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot should be dynamically taken from. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be) created. Note that after provisioning, the VolumeSnapshotClass may be deleted or recreated with different set of values, and as such, should not be referenced post-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this VolumeSnapshotContent object is bound. VolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to this VolumeSnapshotContent's name for the bidirectional binding to be valid. For a pre-existing VolumeSnapshotContent object, name and namespace of the VolumeSnapshot object MUST be provided for binding to happen. This field is immutable after creation. Required.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string should contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2]. For example, if the object reference is to a container within a pod, this would take on a value like: \"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered the event) or if no container name is specified \"spec.containers[2]\" (container with index 2 in this pod). This syntax is chosen only to have some well-defined way of referencing a part of an object. TODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}}}}},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it indicates the creation time is unknown. The format of this field is a Unix nanoseconds time encoded as an int64. On Unix, the command `date +%s%N` returns the current time in nanoseconds since 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any. Upon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system. If not specified, it indicates that dynamic snapshot creation has either failed or it is still in progress.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-02-16T17:00:33Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/955"},{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-02-16T17:00:33Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-02-16T17:00:33Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"}],"acceptedNames":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"storedVersions":["v1"]}}config/crd/volumesnapshots.snapshot.storage.k8s.io.json0000640000000000000000000004563015144651360022052 0ustar0000000000000000{"metadata":{"name":"volumesnapshots.snapshot.storage.k8s.io","uid":"714d27ce-0550-4e82-a0bf-95196f80a287","resourceVersion":"4578","generation":1,"creationTimestamp":"2026-02-16T17:00:32Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/814","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"scope":"Namespaced","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time\nsnapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user.\nMore info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots\nRequired.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim\nobject representing the volume from which a snapshot should be created.\nThis PVC is assumed to be in the same namespace as the VolumeSnapshot\nobject.\nThis field should be set if the snapshot does not exists, and needs to be\ncreated.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"persistentVolumeClaimName is immutable"}]},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent\nobject representing an existing volume snapshot.\nThis field should be set if the snapshot already exists and only needs a representation in Kubernetes.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeSnapshotContentName is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.persistentVolumeClaimName) || has(self.persistentVolumeClaimName)","message":"persistentVolumeClaimName is required once set"},{"rule":"!has(oldSelf.volumeSnapshotContentName) || has(self.volumeSnapshotContentName)","message":"volumeSnapshotContentName is required once set"},{"rule":"(has(self.volumeSnapshotContentName) \u0026\u0026 !has(self.persistentVolumeClaimName)) || (!has(self.volumeSnapshotContentName) \u0026\u0026 has(self.persistentVolumeClaimName))","message":"exactly one of volumeSnapshotContentName and persistentVolumeClaimName must be set"}]},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass\nrequested by the VolumeSnapshot.\nVolumeSnapshotClassName may be left nil to indicate that the default\nSnapshotClass should be used.\nA given cluster may have multiple default Volume SnapshotClasses: one\ndefault per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass,\nVolumeSnapshotSource will be checked to figure out what the associated\nCSI Driver is, and the default VolumeSnapshotClass associated with that\nCSI Driver will be used. If more than one VolumeSnapshotClass exist for\na given CSI Driver and more than one have been marked as default,\nCreateSnapshot will fail and generate an event.\nEmpty string is not allowed for this field.","type":"string","x-kubernetes-validations":[{"rule":"size(self) \u003e 0","message":"volumeSnapshotClassName must not be the empty string when set"}]}}},"status":{"description":"status represents the current information of a snapshot.\nConsumers must verify binding between VolumeSnapshot and\nVolumeSnapshotContent objects is successful (by validating that both\nVolumeSnapshot and VolumeSnapshotContent point at each other) before\nusing this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent\nobject to which this VolumeSnapshot object intends to bind to.\nIf not specified, it indicates that the VolumeSnapshot object has not been\nsuccessfully bound to a VolumeSnapshotContent object yet.\nNOTE: To avoid possible security issues, consumers must verify binding between\nVolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that\nboth VolumeSnapshot and VolumeSnapshotContent point at each other) before using\nthis object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nThis field could be helpful to upper level controllers(i.e., application controller)\nto decide whether they should continue on waiting for the snapshot to be created\nbased on the type of error reported.\nThe snapshot controller will keep retrying when an error occurs during the\nsnapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume\nfrom this snapshot.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"volumeGroupSnapshotName":{"description":"VolumeGroupSnapshotName is the name of the VolumeGroupSnapshot of which this\nVolumeSnapshot is a part of.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshot is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshot","schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time snapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user. More info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots Required.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from. This field is immutable after creation. Required.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim object representing the volume from which a snapshot should be created. This PVC is assumed to be in the same namespace as the VolumeSnapshot object. This field should be set if the snapshot does not exists, and needs to be created. This field is immutable.","type":"string"},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent object representing an existing volume snapshot. This field should be set if the snapshot already exists and only needs a representation in Kubernetes. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass requested by the VolumeSnapshot. VolumeSnapshotClassName may be left nil to indicate that the default SnapshotClass should be used. A given cluster may have multiple default Volume SnapshotClasses: one default per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass, VolumeSnapshotSource will be checked to figure out what the associated CSI Driver is, and the default VolumeSnapshotClass associated with that CSI Driver will be used. If more than one VolumeSnapshotClass exist for a given CSI Driver and more than one have been marked as default, CreateSnapshot will fail and generate an event. Empty string is not allowed for this field.","type":"string"}}},"status":{"description":"status represents the current information of a snapshot. Consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent object to which this VolumeSnapshot object intends to bind to. If not specified, it indicates that the VolumeSnapshot object has not been successfully bound to a VolumeSnapshotContent object yet. NOTE: To avoid possible security issues, consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any. This field could be helpful to upper level controllers(i.e., application controller) to decide whether they should continue on waiting for the snapshot to be created based on the type of error reported. The snapshot controller will keep retrying when an error occurs during the snapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume from this snapshot. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-02-16T17:00:32Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-02-16T17:00:32Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"},{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-02-16T17:00:32Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/814"}],"acceptedNames":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"storedVersions":["v1"]}}config/namespaces_with_overlapping_uids.json0000640000000000000000000000000215144651360020201 0ustar0000000000000000[]cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/edit.json0000640000000000000000000002311515144651360025501 0ustar0000000000000000{"metadata":{"name":"edit","uid":"6630b4f5-185a-4bf5-a8fe-7e676f30682e","resourceVersion":"13049","creationTimestamp":"2026-02-16T16:53:35Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults","rbac.authorization.k8s.io/aggregate-to-admin":"true"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","update","patch","delete"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests"]},{"verbs":["get","list","update","create","watch","patch","delete"],"apiGroups":["helm.openshift.io"],"resources":["projecthelmchartrepositories"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["get","list","watch"],"apiGroups":["metrics.k8s.io"],"resources":["pods","nodes"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-edit":"true"}}]}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/admin.json0000640000000000000000000002614115144651360025646 0ustar0000000000000000{"metadata":{"name":"admin","uid":"ae69e432-2235-46f9-8b6f-98cd281a6162","resourceVersion":"13059","creationTimestamp":"2026-02-16T16:53:35Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","update","patch","delete"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests"]},{"verbs":["get","list","update","create","watch","patch","delete"],"apiGroups":["helm.openshift.io"],"resources":["projecthelmchartrepositories"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["get","list","watch"],"apiGroups":["metrics.k8s.io"],"resources":["pods","nodes"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["watch","list","get"],"apiGroups":["k8s.cni.cncf.io"],"resources":["network-attachment-definitions"]},{"verbs":["*"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindings","roles"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["rbac.authorization.k8s.io"],"resources":["rolebindings","roles"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["localresourceaccessreviews","localsubjectaccessreviews","subjectrulesreviews"]},{"verbs":["create"],"apiGroups":["authorization.k8s.io"],"resources":["localsubjectaccessreviews"]},{"verbs":["delete","get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["resourceaccessreviews","subjectaccessreviews"]},{"verbs":["create"],"apiGroups":["","security.openshift.io"],"resources":["podsecuritypolicyreviews","podsecuritypolicyselfsubjectreviews","podsecuritypolicysubjectreviews"]},{"verbs":["get","list","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindingrestrictions"]},{"verbs":["admin","edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["delete","get","patch","update"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["update"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-admin":"true"}}]}}events/openshift-machine-api.json0000640000000000000000000004554315144651360015627 0ustar0000000000000000{"items":[{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:01:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"machine-api-operator-tls\" : secret \"machine-api-operator-tls\" not found","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:02:20Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:02:20Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cert\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:02:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-vkqml\" : [failed to fetch token: Post \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-machine-api/serviceaccounts/machine-api-operator/token\": dial tcp 192.168.32.10:6443: connect: connection refused, failed to sync configmap cache: timed out waiting for the condition]","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:02:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-tbq2b\" : [failed to fetch token: Post \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-machine-api/serviceaccounts/cluster-autoscaler-operator/token\": dial tcp 192.168.32.10:6443: connect: connection refused, failed to sync configmap cache: timed out waiting for the condition]","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:02:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-dzpnw\" : [failed to fetch token: Post \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-machine-api/serviceaccounts/control-plane-machine-set-operator/token\": dial tcp 192.168.32.10:6443: connect: connection refused, failed to sync configmap cache: timed out waiting for the condition]","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:02:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-hh2cd\" : [failed to fetch token: Post \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-machine-api/serviceaccounts/cluster-baremetal-operator/token\": dial tcp 192.168.32.10:6443: connect: connection refused, failed to sync configmap cache: timed out waiting for the condition]","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"machine-api-operator-tls\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"control-plane-machine-set-operator-tls\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"auth-proxy-config\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cert\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"images\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cluster-baremetal-operator-tls\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:02:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"images\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:15Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:15Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:16Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:16Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:23Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-hh2cd\" : [object \"openshift-machine-api\"/\"kube-root-ca.crt\" not registered, object \"openshift-machine-api\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:23Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"images\" : object \"openshift-machine-api\"/\"cluster-baremetal-operator-images\" not registered","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:23Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cert\" : object \"openshift-machine-api\"/\"cluster-baremetal-webhook-server-cert\" not registered","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:23Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : object \"openshift-machine-api\"/\"baremetal-kube-rbac-proxy\" not registered","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:25Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:27Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-vkqml\" : [object \"openshift-machine-api\"/\"kube-root-ca.crt\" not registered, object \"openshift-machine-api\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : object \"openshift-machine-api\"/\"kube-rbac-proxy\" not registered","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"images\" : object \"openshift-machine-api\"/\"machine-api-operator-images\" not registered","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"machine-api-operator-tls\" : object \"openshift-machine-api\"/\"machine-api-operator-tls\" not registered","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cluster-baremetal-operator-tls\" : object \"openshift-machine-api\"/\"cluster-baremetal-operator-tls\" not registered","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-dzpnw\" : [object \"openshift-machine-api\"/\"kube-root-ca.crt\" not registered, object \"openshift-machine-api\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:28Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-tbq2b\" : [object \"openshift-machine-api\"/\"kube-root-ca.crt\" not registered, object \"openshift-machine-api\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:33Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:33Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:35Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"auth-proxy-config\" : object \"openshift-machine-api\"/\"kube-rbac-proxy-cluster-autoscaler-operator\" not registered","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:35Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"control-plane-machine-set-operator-tls\" : object \"openshift-machine-api\"/\"control-plane-machine-set-operator-tls\" not registered","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:14:35Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cert\" : object \"openshift-machine-api\"/\"cluster-autoscaler-operator-cert\" not registered","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:23:57Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:23:57Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:23:57Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:23:57Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:23:59Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"images\" : object \"openshift-machine-api\"/\"machine-api-operator-images\" not registered","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:23:59Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cluster-baremetal-operator-tls\" : object \"openshift-machine-api\"/\"cluster-baremetal-operator-tls\" not registered","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:24:07Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"images\" : object \"openshift-machine-api\"/\"cluster-baremetal-operator-images\" not registered","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:24:07Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cert\" : object \"openshift-machine-api\"/\"cluster-baremetal-webhook-server-cert\" not registered","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:24:07Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : object \"openshift-machine-api\"/\"baremetal-kube-rbac-proxy\" not registered","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:24:08Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-hh2cd\" : [object \"openshift-machine-api\"/\"kube-root-ca.crt\" not registered, object \"openshift-machine-api\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:24:09Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:24:11Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:24:11Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cluster-baremetal-operator-tls\" : object \"openshift-machine-api\"/\"cluster-baremetal-operator-tls\" not registered","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:24:11Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-tbq2b\" : [object \"openshift-machine-api\"/\"kube-root-ca.crt\" not registered, object \"openshift-machine-api\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:24:11Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"machine-api-operator-tls\" : object \"openshift-machine-api\"/\"machine-api-operator-tls\" not registered","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:24:11Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"images\" : object \"openshift-machine-api\"/\"machine-api-operator-images\" not registered","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:24:11Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : object \"openshift-machine-api\"/\"kube-rbac-proxy\" not registered","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:24:11Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-vkqml\" : [object \"openshift-machine-api\"/\"kube-root-ca.crt\" not registered, object \"openshift-machine-api\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:24:12Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-dzpnw\" : [object \"openshift-machine-api\"/\"kube-root-ca.crt\" not registered, object \"openshift-machine-api\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:24:17Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:24:17Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:24:19Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cert\" : object \"openshift-machine-api\"/\"cluster-autoscaler-operator-cert\" not registered","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:24:19Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"control-plane-machine-set-operator-tls\" : object \"openshift-machine-api\"/\"control-plane-machine-set-operator-tls\" not registered","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T17:24:19Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"auth-proxy-config\" : object \"openshift-machine-api\"/\"kube-rbac-proxy-cluster-autoscaler-operator\" not registered","type":"Warning"}]}config/clusteroperator/imageregistry.operator.openshift.io/config/cluster.json0000640000000000000000000000402415144651360026701 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"6897cd27-676b-4b16-a8e0-b586e3c2a951","resourceVersion":"14498","generation":1,"creationTimestamp":"2026-02-16T17:03:56Z","finalizers":["imageregistry.operator.openshift.io/finalizer"]},"spec":{"managementState":"Removed","logLevel":"Normal","operatorLogLevel":"Normal","unsupportedConfigOverrides":null,"observedConfig":null,"proxy":{},"storage":{},"requests":{"read":{"maxWaitInQueue":"0s"},"write":{"maxWaitInQueue":"0s"}},"replicas":1,"rolloutStrategy":"RollingUpdate"},"status":{"observedGeneration":1,"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T17:08:34Z","reason":"Removed","message":"All registry resources are removed"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:04:28Z","reason":"Removed","message":"The registry is removed"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:04:28Z","reason":"Removed","message":"The registry is removed"},{"type":"Removed","status":"True","lastTransitionTime":"2026-02-16T17:04:28Z","reason":"Removed","message":"The registry is removed"},{"type":"ImageConfigControllerDegraded","status":"False","lastTransitionTime":"2026-02-16T17:04:37Z","reason":"AsExpected"},{"type":"ImageRegistryCertificatesControllerDegraded","status":"False","lastTransitionTime":"2026-02-16T17:04:42Z","reason":"AsExpected"},{"type":"NodeCADaemonAvailable","status":"False","lastTransitionTime":"2026-02-16T17:07:55Z","reason":"NoAvailableReplicas","message":"The daemon set node-ca does not have available replicas"},{"type":"NodeCADaemonProgressing","status":"True","lastTransitionTime":"2026-02-16T17:07:55Z","reason":"Unavailable","message":"The daemon set node-ca is deploying node pods"},{"type":"NodeCADaemonControllerDegraded","status":"False","lastTransitionTime":"2026-02-16T17:07:55Z","reason":"AsExpected"}],"readyReplicas":0,"generations":[{"group":"apps","resource":"daemonsets","namespace":"openshift-image-registry","name":"node-ca","lastGeneration":1,"hash":""}],"storageManaged":false,"storage":{}}}config/machineconfigpools/worker.json0000640000000000000000000001013515144651360016565 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-02-16T17:01:34Z","generation":3,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","pools.operator.machineconfiguration.openshift.io/worker":""},"name":"worker","resourceVersion":"13621","uid":"e7796f79-1f69-4cd6-a99d-2e90f692a258"},"spec":{"configuration":{"name":"rendered-worker-c7ccd6fb94dd6d087e4a528948c79fb2","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-worker"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-workers-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-ssh"}]},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"worker"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/worker":""}},"paused":false},"status":{"certExpirys":[{"bundle":"KubeAPIServerServingCAData","expiry":"2036-02-14T16:44:14Z","subject":"CN=admin-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-02-17T16:50:49Z","subject":"CN=kube-csr-signer_@1771261235"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-02-17T16:50:49Z","subject":"CN=kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-02-16T16:50:49Z","subject":"CN=kube-apiserver-to-kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-02-16T16:50:49Z","subject":"CN=kube-control-plane-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2036-02-14T16:50:47Z","subject":"CN=kubelet-bootstrap-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-02-16T17:00:20Z","subject":"CN=openshift-kube-apiserver-operator_node-system-admin-signer@1771261220"}],"conditions":[{"lastTransitionTime":"2026-02-16T17:04:47Z","message":"","reason":"","status":"False","type":"Updating"},{"lastTransitionTime":"2026-02-16T17:04:47Z","message":"","reason":"","status":"False","type":"NodeDegraded"},{"lastTransitionTime":"2026-02-16T17:04:47Z","message":"","reason":"","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-16T17:04:52Z","message":"","reason":"","status":"False","type":"RenderDegraded"},{"lastTransitionTime":"2026-02-16T17:04:47Z","message":"All nodes are updated with MachineConfig rendered-worker-c7ccd6fb94dd6d087e4a528948c79fb2","reason":"","status":"True","type":"Updated"}],"configuration":{"name":"rendered-worker-c7ccd6fb94dd6d087e4a528948c79fb2","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-worker"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-workers-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-ssh"}]},"degradedMachineCount":0,"machineCount":0,"observedGeneration":3,"readyMachineCount":0,"unavailableMachineCount":0,"updatedMachineCount":0}}config/machineconfigpools/master.json0000640000000000000000000000744315144651360016557 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-02-16T17:01:34Z","generation":4,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","operator.machineconfiguration.openshift.io/required-for-upgrade":"","pools.operator.machineconfiguration.openshift.io/master":""},"name":"master","resourceVersion":"18126","uid":"73e10899-7ee9-47b2-8cc6-a9ffda074267"},"spec":{"configuration":{"name":"rendered-master-ccc1c4b4035b8605635ebee7b29103f5","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-master"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-master-dnsmasq-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-masters-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-nable-iscsi"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-netifnames-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-lv-cinder-volumes"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-multipath-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-ssh"}]},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"master"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/master":""}},"paused":false},"status":{"certExpirys":[{"bundle":"KubeAPIServerServingCAData","expiry":"2036-02-14T16:44:14Z","subject":"CN=admin-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-02-17T16:50:49Z","subject":"CN=kube-csr-signer_@1771261235"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-02-17T16:50:49Z","subject":"CN=kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-02-16T16:50:49Z","subject":"CN=kube-apiserver-to-kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-02-16T16:50:49Z","subject":"CN=kube-control-plane-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2036-02-14T16:50:47Z","subject":"CN=kubelet-bootstrap-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-02-16T17:00:20Z","subject":"CN=openshift-kube-apiserver-operator_node-system-admin-signer@1771261220"}],"conditions":[{"lastTransitionTime":"2026-02-16T17:04:47Z","message":"","reason":"","status":"False","type":"Updated"},{"lastTransitionTime":"2026-02-16T17:04:52Z","message":"","reason":"","status":"False","type":"RenderDegraded"},{"lastTransitionTime":"2026-02-16T17:04:47Z","message":"All nodes are updating to MachineConfig rendered-master-ccc1c4b4035b8605635ebee7b29103f5","reason":"","status":"True","type":"Updating"},{"lastTransitionTime":"2026-02-16T17:18:02Z","message":"","reason":"","status":"False","type":"NodeDegraded"},{"lastTransitionTime":"2026-02-16T17:18:02Z","message":"","reason":"","status":"False","type":"Degraded"}],"configuration":{},"degradedMachineCount":0,"machineCount":1,"observedGeneration":4,"readyMachineCount":0,"unavailableMachineCount":1,"updatedMachineCount":0}}config/pdbs/openshift-operator-lifecycle-manager/packageserver-pdb.json0000640000000000000000000000173615144651360025126 0ustar0000000000000000{"metadata":{"name":"packageserver-pdb","namespace":"openshift-operator-lifecycle-manager","uid":"41386aff-d308-4e12-ad7d-f438b319c08b","resourceVersion":"20990","generation":1,"creationTimestamp":"2026-02-16T16:55:16Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"spec":{"selector":{"matchLabels":{"app":"packageserver"}},"maxUnavailable":1},"status":{"observedGeneration":1,"disruptionsAllowed":1,"currentHealthy":1,"desiredHealthy":0,"expectedPods":1,"conditions":[{"type":"DisruptionAllowed","status":"True","observedGeneration":1,"lastTransitionTime":"2026-02-16T17:24:40Z","reason":"SufficientPods","message":""}]}}config/pdbs/openshift-console/downloads.json0000640000000000000000000000107115144651360017765 0ustar0000000000000000{"metadata":{"name":"downloads","namespace":"openshift-console","uid":"d32f7fae-5152-439c-bac0-11391178399f","resourceVersion":"21259","generation":1,"creationTimestamp":"2026-02-16T17:04:18Z"},"spec":{"selector":{"matchLabels":{"app":"console","component":"downloads"}},"maxUnavailable":1},"status":{"observedGeneration":1,"disruptionsAllowed":1,"currentHealthy":1,"desiredHealthy":0,"expectedPods":1,"conditions":[{"type":"DisruptionAllowed","status":"True","observedGeneration":1,"lastTransitionTime":"2026-02-16T17:24:45Z","reason":"SufficientPods","message":""}]}}config/pdbs/openshift-console/console.json0000640000000000000000000000106315144651360017436 0ustar0000000000000000{"metadata":{"name":"console","namespace":"openshift-console","uid":"dd9da217-498c-472d-99a1-a9270e39de12","resourceVersion":"19322","generation":1,"creationTimestamp":"2026-02-16T17:04:18Z"},"spec":{"selector":{"matchLabels":{"app":"console","component":"ui"}},"maxUnavailable":1},"status":{"observedGeneration":1,"disruptionsAllowed":0,"currentHealthy":0,"desiredHealthy":0,"expectedPods":1,"conditions":[{"type":"DisruptionAllowed","status":"False","observedGeneration":1,"lastTransitionTime":"2026-02-16T17:24:16Z","reason":"InsufficientPods","message":""}]}}config/mutatingwebhookconfigurations/catalogd-mutating-webhook-configuration.json0000640000000000000000000000533615144651360027503 0ustar0000000000000000{"metadata":{"name":"catalogd-mutating-webhook-configuration","uid":"ba6091cf-5820-45b7-8e6c-1745523863a5","resourceVersion":"6101","generation":2,"creationTimestamp":"2026-02-16T17:00:51Z","annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"inject-metadata-name.olm.operatorframework.io","clientConfig":{"service":{"namespace":"openshift-catalogd","name":"catalogd-service","path":"/mutate-olm-operatorframework-io-v1-clustercatalog","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["olm.operatorframework.io"],"apiVersions":["v1"],"resources":["clustercatalogs"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"],"reinvocationPolicy":"Never","matchConditions":[{"name":"MissingOrIncorrectMetadataNameLabel","expression":"'name' in object.metadata \u0026\u0026 (!has(object.metadata.labels) || !('olm.operatorframework.io/metadata.name' in object.metadata.labels) || object.metadata.labels['olm.operatorframework.io/metadata.name'] != object.metadata.name)"}]}]}config/infrastructure.json0000640000000000000000000000106515144651360014467 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"6a0f538a-aaee-46c5-bb03-9291b6642603","resourceVersion":"537","generation":1,"creationTimestamp":"2026-02-16T16:54:28Z"},"spec":{"cloudConfig":{"name":""},"platformSpec":{"type":"None"}},"status":{"infrastructureName":"xxx-xxxxx","platform":"None","platformStatus":{"type":"None"},"etcdDiscoveryDomain":"","apiServerURL":"https://api.sno.openstack.lab:6443","apiServerInternalURI":"https://api-int.sno.openstack.lab:6443","controlPlaneTopology":"SingleReplica","infrastructureTopology":"SingleReplica","cpuPartitioning":"None"}}config/validatingwebhookconfigurations/prometheusrules.openshift.io.json0000640000000000000000000000511515144651360025735 0ustar0000000000000000{"metadata":{"name":"prometheusrules.openshift.io","uid":"3f84bf30-666a-4473-9e78-35e31771e3bb","resourceVersion":"13491","generation":2,"creationTimestamp":"2026-02-16T17:03:33Z","labels":{"app.kubernetes.io/component":"controller","app.kubernetes.io/managed-by":"cluster-monitoring-operator","app.kubernetes.io/name":"prometheus-operator","app.kubernetes.io/part-of":"openshift-monitoring"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"prometheusrules.openshift.io","clientConfig":{"service":{"namespace":"openshift-monitoring","name":"prometheus-operator-admission-webhook","path":"/admission-prometheusrules/validate","port":8443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["monitoring.coreos.com"],"apiVersions":["v1"],"resources":["prometheusrules"],"scope":"Namespaced"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":5,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/performance-addon-operator.json0000640000000000000000000000552115144651360025301 0ustar0000000000000000{"metadata":{"name":"performance-addon-operator","uid":"96069914-7ca4-49ea-bce6-cbc36431b39a","resourceVersion":"4525","generation":2,"creationTimestamp":"2026-02-16T16:55:25Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"webhooks":[{"name":"vwb.performance.openshift.io","clientConfig":{"service":{"namespace":"openshift-cluster-node-tuning-operator","name":"performance-addon-operator-service","path":"/validate-performance-openshift-io-v2-performanceprofile","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["performance.openshift.io"],"apiVersions":["v2"],"resources":["performanceprofiles"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/network-node-identity.openshift.io.json0000640000000000000000000001075515144651360026740 0ustar0000000000000000{"metadata":{"name":"network-node-identity.openshift.io","uid":"2492c35c-7a7b-47c3-82ec-3c5f9417422b","resourceVersion":"7215","generation":1,"creationTimestamp":"2026-02-16T17:01:08Z","ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"02592f7d-524d-4e79-96f9-b0fd3a82dc66","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"node.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/node","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["nodes/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"pod.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/pod","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["pods/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/multus.openshift.io.json0000640000000000000000000000506715144651360024026 0ustar0000000000000000{"metadata":{"name":"multus.openshift.io","uid":"51d5618e-d0a9-4754-ad82-2af47b19e6e5","resourceVersion":"4526","generation":2,"creationTimestamp":"2026-02-16T16:59:15Z","labels":{"app":"multus-admission-controller"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"02592f7d-524d-4e79-96f9-b0fd3a82dc66","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"multus-validating-config.k8s.io","clientConfig":{"service":{"namespace":"openshift-multus","name":"multus-admission-controller","path":"/validate","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["k8s.cni.cncf.io"],"apiVersions":["v1"],"resources":["network-attachment-definitions"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"NoneOnDryRun","timeoutSeconds":30,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io.json0000640000000000000000000000537215144651360030640 0ustar0000000000000000{"metadata":{"name":"controlplanemachineset.machine.openshift.io","uid":"9d59a756-c378-492a-81e6-91f7da32328c","resourceVersion":"9622","generation":2,"creationTimestamp":"2026-02-16T17:01:37Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f","controller":true}]},"webhooks":[{"name":"controlplanemachineset.machine.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"control-plane-machine-set-operator","path":"/validate-machine-openshift-io-v1-controlplanemachineset","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["machine.openshift.io"],"apiVersions":["v1"],"resources":["controlplanemachinesets"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration.json0000640000000000000000000000500115144651360032111 0ustar0000000000000000{"metadata":{"name":"cluster-baremetal-validating-webhook-configuration","uid":"ea715f71-cbfe-4fd1-bc61-fd956b5e5ec7","resourceVersion":"9352","generation":2,"creationTimestamp":"2026-02-16T17:01:34Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"vprovisioning.kb.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-baremetal-webhook-service","path":"/validate-metal3-io-v1alpha1-provisioning","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["metal3.io"],"apiVersions":["v1alpha1"],"resources":["provisionings"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1","v1beta1"]}]}config/validatingwebhookconfigurations/autoscaling.openshift.io.json0000640000000000000000000001102615144651360024776 0ustar0000000000000000{"metadata":{"name":"autoscaling.openshift.io","uid":"1c3ba408-3aed-4618-946f-78f742554799","resourceVersion":"9360","generation":2,"creationTimestamp":"2026-02-16T17:01:34Z","labels":{"k8s-app":"cluster-autoscaler-operator"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"clusterautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-clusterautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1"],"resources":["clusterautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"machineautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-machineautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1beta1"],"resources":["machineautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io.json0000640000000000000000000000514315144651360026503 0ustar0000000000000000{"metadata":{"name":"alertmanagerconfigs.openshift.io","uid":"187b7739-1eb2-4137-a79e-722ef52e3494","resourceVersion":"13490","generation":2,"creationTimestamp":"2026-02-16T17:03:33Z","labels":{"app.kubernetes.io/component":"controller","app.kubernetes.io/managed-by":"cluster-monitoring-operator","app.kubernetes.io/name":"prometheus-operator","app.kubernetes.io/part-of":"openshift-monitoring"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"alertmanagerconfigs.openshift.io","clientConfig":{"service":{"namespace":"openshift-monitoring","name":"prometheus-operator-admission-webhook","path":"/admission-alertmanagerconfigs/validate","port":8443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["monitoring.coreos.com"],"apiVersions":["v1alpha1"],"resources":["alertmanagerconfigs"],"scope":"Namespaced"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":5,"admissionReviewVersions":["v1"]}]}config/machinehealthchecks/openshift-machine-api/machine-api-termination-handler.json0000640000000000000000000000163315144651360027650 0ustar0000000000000000{"apiVersion":"machine.openshift.io/v1beta1","kind":"MachineHealthCheck","metadata":{"annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"creationTimestamp":"2026-02-16T17:03:54Z","generation":1,"labels":{"api":"clusterapi","k8s-app":"termination-handler"},"name":"machine-api-termination-handler","namespace":"openshift-machine-api","ownerReferences":[{"apiVersion":"config.openshift.io/v1","controller":true,"kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f"}],"resourceVersion":"11953","uid":"c7e802b8-d609-46e0-bfb0-6524c305770d"},"spec":{"maxUnhealthy":"100%","nodeStartupTimeout":"0","selector":{"matchLabels":{"machine.openshift.io/interruptible-instance":""}},"unhealthyConditions":[{"status":"True","timeout":"0s","type":"Terminating"}]}}config/image.json0000640000000000000000000000111715144651360012467 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"c68c9cd0-c997-40eb-8d81-0f6604b25bcb","resourceVersion":"1295","generation":1,"creationTimestamp":"2026-02-16T16:55:09Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f"}]},"spec":{"additionalTrustedCA":{"name":""},"registrySources":{},"imageStreamImportMode":""},"status":{}}config/featuregate.json0000640000000000000000000000613615144651360013707 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"bec1ce93-22b3-44df-98c4-b8d44cf6a666","resourceVersion":"644","generation":1,"creationTimestamp":"2026-02-16T16:54:50Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true"}},"spec":{},"status":{"featureGates":[{"version":"4.18.32","enabled":[{"name":"AWSEFSDriverVolumeMetrics"},{"name":"AdminNetworkPolicy"},{"name":"AlibabaPlatform"},{"name":"AzureWorkloadIdentity"},{"name":"BareMetalLoadBalancer"},{"name":"BuildCSIVolumes"},{"name":"ChunkSizeMiB"},{"name":"CloudDualStackNodeIPs"},{"name":"DisableKubeletCloudCredentialProviders"},{"name":"GCPLabelsTags"},{"name":"HardwareSpeed"},{"name":"IngressControllerLBSubnetsAWS"},{"name":"KMSv1"},{"name":"ManagedBootImages"},{"name":"ManagedBootImagesAWS"},{"name":"MultiArchInstallAWS"},{"name":"MultiArchInstallGCP"},{"name":"NetworkDiagnosticsConfig"},{"name":"NetworkLiveMigration"},{"name":"NetworkSegmentation"},{"name":"NewOLM"},{"name":"NodeDisruptionPolicy"},{"name":"OnClusterBuild"},{"name":"PersistentIPsForVirtualization"},{"name":"PrivateHostedZoneAWS"},{"name":"SetEIPForNLBIngressController"},{"name":"StreamingCollectionEncodingToJSON"},{"name":"StreamingCollectionEncodingToProtobuf"},{"name":"VSphereControlPlaneMachineSet"},{"name":"VSphereDriverConfiguration"},{"name":"VSphereMultiVCenters"},{"name":"VSphereStaticIPs"},{"name":"ValidatingAdmissionPolicy"}],"disabled":[{"name":"AWSClusterHostedDNS"},{"name":"AdditionalRoutingCapabilities"},{"name":"AutomatedEtcdBackup"},{"name":"BootcNodeManagement"},{"name":"CSIDriverSharedResource"},{"name":"ClusterAPIInstall"},{"name":"ClusterAPIInstallIBMCloud"},{"name":"ClusterMonitoringConfig"},{"name":"ConsolePluginContentSecurityPolicy"},{"name":"DNSNameResolver"},{"name":"DynamicResourceAllocation"},{"name":"EtcdBackendQuota"},{"name":"EventedPLEG"},{"name":"Example"},{"name":"ExternalOIDC"},{"name":"ExternalOIDCWithUIDAndExtraClaimMappings"},{"name":"GCPClusterHostedDNS"},{"name":"GatewayAPI"},{"name":"ImageStreamImportMode"},{"name":"IngressControllerDynamicConfigurationManager"},{"name":"InsightsConfig"},{"name":"InsightsConfigAPI"},{"name":"InsightsOnDemandDataGather"},{"name":"InsightsRuntimeExtractor"},{"name":"MachineAPIMigration"},{"name":"MachineAPIOperatorDisableMachineHealthCheckController"},{"name":"MachineAPIProviderOpenStack"},{"name":"MachineConfigNodes"},{"name":"MaxUnavailableStatefulSet"},{"name":"MetricsCollectionProfiles"},{"name":"MinimumKubeletVersion"},{"name":"MixedCPUsAllocation"},{"name":"MultiArchInstallAzure"},{"name":"NodeSwap"},{"name":"NutanixMultiSubnets"},{"name":"OVNObservability"},{"name":"OpenShiftPodSecurityAdmission"},{"name":"PinnedImages"},{"name":"PlatformOperators"},{"name":"ProcMountType"},{"name":"RouteAdvertisements"},{"name":"RouteExternalCertificate"},{"name":"ServiceAccountTokenNodeBinding"},{"name":"SignatureStores"},{"name":"SigstoreImageVerification"},{"name":"TranslateStreamCloseWebsocketRequests"},{"name":"UpgradeStatus"},{"name":"UserNamespacesPodSecurityStandards"},{"name":"UserNamespacesSupport"},{"name":"VSphereMultiNetworks"},{"name":"VolumeAttributesClass"},{"name":"VolumeGroupSnapshot"}]}]}}config/oauth.json0000640000000000000000000000114415144651360012525 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"0a00c89a-07e1-4a36-81a9-8811c0e96f17","resourceVersion":"1542","generation":1,"creationTimestamp":"2026-02-16T16:55:14Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f"}]},"spec":{"tokenConfig":{},"templates":{"login":{"name":""},"providerSelection":{"name":""},"error":{"name":""}}},"status":{}}config/ingress.json0000640000000000000000000000213215144651360013055 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"f43fa63b-74da-41de-9629-9c75e4b8b11e","resourceVersion":"13613","generation":1,"creationTimestamp":"2026-02-16T16:54:29Z"},"spec":{"domain":"apps.sno.openstack.lab","loadBalancer":{"platform":{"type":""}}},"status":{"componentRoutes":[{"namespace":"openshift-authentication","name":"oauth-openshift","defaultHostname":"oauth-openshift.apps.sno.openstack.lab","consumingUsers":["system:serviceaccount:oauth-openshift:authentication-operator"],"currentHostnames":["oauth-openshift.apps.sno.openstack.lab"],"conditions":[{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-16T17:04:57Z","reason":"ErrorReachingOutToService","message":"unexpected error at oauth-openshift.apps.sno.openstack.lab: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:04:35Z","reason":"AsExpected","message":"All is well"}],"relatedObjects":[{"group":"route.openshift.io","resource":"routes","namespace":"openshift-authentication","name":"oauth-openshift"}]}],"defaultPlacement":"ControlPlane"}}config/proxy.json0000640000000000000000000000031315144651360012563 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"96cb4a06-7538-4457-b58d-bf0c79cb7d11","resourceVersion":"554","generation":1,"creationTimestamp":"2026-02-16T16:54:30Z"},"spec":{"trustedCA":{"name":""}},"status":{}}config/schedulers/cluster.json0000640000000000000000000000052415144651360015230 0ustar0000000000000000{"kind":"Scheduler","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster","uid":"b3f4a23c-2ace-4235-a15c-7da79e1ac3f8","resourceVersion":"559","generation":1,"creationTimestamp":"2026-02-16T16:54:31Z"},"spec":{"policy":{"name":""},"profileCustomizations":{"dynamicResourceAllocation":""},"mastersSchedulable":true},"status":{}}config/node/master-0.json0000640000000000000000000000712615144651360013770 0ustar0000000000000000{"metadata":{"name":"master-0","uid":"da39ce92-6a7c-4cce-aa8b-3e495e33f616","resourceVersion":"20097","creationTimestamp":"2026-02-16T16:58:50Z","labels":{"beta.kubernetes.io/arch":"amd64","beta.kubernetes.io/os":"linux","kubernetes.io/arch":"amd64","kubernetes.io/hostname":"master-0","kubernetes.io/os":"linux","node-role.kubernetes.io/control-plane":"","node-role.kubernetes.io/master":"","node-role.kubernetes.io/worker":"","node.openshift.io/os_id":"rhcos"},"annotations":{"k8s.ovn.org/host-cidrs":"","k8s.ovn.org/l3-gateway-config":"","k8s.ovn.org/node-chassis-id":"","k8s.ovn.org/node-encap-ips":"","k8s.ovn.org/node-id":"","k8s.ovn.org/node-masquerade-subnet":"","k8s.ovn.org/node-primary-ifaddr":"","k8s.ovn.org/node-subnets":"","k8s.ovn.org/node-transit-switch-port-ifaddr":"","k8s.ovn.org/remote-zone-migrated":"","k8s.ovn.org/zone-name":"","machineconfiguration.openshift.io/controlPlaneTopology":"SingleReplica","machineconfiguration.openshift.io/currentConfig":"rendered-master-4ff3bdc50d696d239efb12817ae47acf","machineconfiguration.openshift.io/desiredConfig":"rendered-master-ccc1c4b4035b8605635ebee7b29103f5","machineconfiguration.openshift.io/desiredDrain":"uncordon-rendered-master-ccc1c4b4035b8605635ebee7b29103f5","machineconfiguration.openshift.io/lastAppliedDrain":"uncordon-rendered-master-4ff3bdc50d696d239efb12817ae47acf","machineconfiguration.openshift.io/lastObservedServerCAAnnotation":"false","machineconfiguration.openshift.io/lastSyncedControllerConfigResourceVersion":"13330","machineconfiguration.openshift.io/post-config-action":"","machineconfiguration.openshift.io/reason":"","machineconfiguration.openshift.io/state":"Working","volumes.kubernetes.io/controller-managed-attach-detach":"true"}},"spec":{},"status":{"capacity":{"cpu":"16","ephemeral-storage":"209124332Ki","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"49330216Ki","pods":"250"},"allocatable":{"cpu":"15500m","ephemeral-storage":"191655242229","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"48179240Ki","pods":"250"},"conditions":[{"type":"MemoryPressure","status":"False","lastHeartbeatTime":"2026-02-16T17:24:23Z","lastTransitionTime":"2026-02-16T16:58:50Z","reason":"KubeletHasSufficientMemory","message":"kubelet has sufficient memory available"},{"type":"DiskPressure","status":"False","lastHeartbeatTime":"2026-02-16T17:24:23Z","lastTransitionTime":"2026-02-16T16:58:50Z","reason":"KubeletHasNoDiskPressure","message":"kubelet has no disk pressure"},{"type":"PIDPressure","status":"False","lastHeartbeatTime":"2026-02-16T17:24:23Z","lastTransitionTime":"2026-02-16T16:58:50Z","reason":"KubeletHasSufficientPID","message":"kubelet has sufficient PID available"},{"type":"Ready","status":"True","lastHeartbeatTime":"2026-02-16T17:24:23Z","lastTransitionTime":"2026-02-16T17:24:23Z","reason":"KubeletReady","message":"kubelet is posting ready status"}],"addresses":[{"type":"InternalIP","address":"192.168.32.10"},{"type":"Hostname","address":"master-0"}],"daemonEndpoints":{"kubeletEndpoint":{"Port":10250}},"nodeInfo":{"machineID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","systemUUID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","bootID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","kernelVersion":"5.14.0-427.107.1.el9_4.x86_64","osImage":"Red Hat Enterprise Linux CoreOS 418.94.202601202224-0","containerRuntimeVersion":"cri-o://1.31.13-3.rhaos4.18.gite0b87e5.el9","kubeletVersion":"v1.31.14","kubeProxyVersion":"v1.31.14","operatingSystem":"linux","architecture":"amd64"},"runtimeHandlers":[{"name":"crun","features":{"recursiveReadOnlyMounts":true}},{"name":"","features":{"recursiveReadOnlyMounts":true}},{"name":"runc","features":{"recursiveReadOnlyMounts":true}}]}}config/network.json0000640000000000000000000000117015144651360013075 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"a1431426-a318-4303-a4ad-4558aff6d73c","resourceVersion":"3172","generation":2,"creationTimestamp":"2026-02-16T16:54:30Z"},"spec":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","externalIP":{"policy":{}},"networkDiagnostics":{"mode":"","sourcePlacement":{"nodeSelector":null,"tolerations":null},"targetPlacement":{"nodeSelector":null,"tolerations":null}}},"status":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","clusterNetworkMTU":8900}}config/clusteroperator/imageregistry.operator.openshift.io/imagepruner/cluster.json0000640000000000000000000000163115144651360027753 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"d83909f7-62ae-43a8-a4d6-76bdb82abdbb","resourceVersion":"6007","generation":1,"creationTimestamp":"2026-02-16T17:00:50Z"},"spec":{"schedule":"","suspend":false,"keepTagRevisions":3,"successfulJobsHistoryLimit":3,"failedJobsHistoryLimit":3,"ignoreInvalidImageReferences":true,"logLevel":"Normal"},"status":{"observedGeneration":1,"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T17:00:50Z","reason":"AsExpected","message":"Pruner CronJob has been created"},{"type":"Failed","status":"False","lastTransitionTime":"2026-02-16T17:00:50Z","reason":"Complete","message":"Pruner completed successfully"},{"type":"Scheduled","status":"True","lastTransitionTime":"2026-02-16T17:00:50Z","reason":"Scheduled","message":"The pruner job has been scheduled"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T17:00:50Z","reason":"AsExpected"}]}}config/authentication.json0000640000000000000000000000134315144651360014425 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"5c62b944-313b-4825-81fe-bae19af62452","resourceVersion":"11663","generation":2,"creationTimestamp":"2026-02-16T16:55:01Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f"}]},"spec":{"type":"","oauthMetadata":{"name":""},"webhookTokenAuthenticator":{"kubeConfig":{"name":"webhook-authentication-integrated-oauth"}},"serviceAccountIssuer":""},"status":{"integratedOAuthMetadata":{"name":"oauth-openshift"},"oidcClients":null}}config/apiserver.json0000640000000000000000000000121615144651360013405 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"5a70fcfa-5f0c-4b0b-bdc6-3e720ae1d787","resourceVersion":"727","generation":1,"creationTimestamp":"2026-02-16T16:54:57Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","oauth-apiserver.openshift.io/secure-token-storage":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"dc77316f-6152-4ab5-94a1-b776ba98cd1f"}]},"spec":{"servingCerts":{},"clientCA":{"name":""},"encryption":{},"audit":{"profile":"Default"}},"status":{}}