--- apiVersion: config.openshift.io/v1 kind: ClusterOperator metadata: annotations: capability.openshift.io/name: OperatorLifecycleManagerV1 include.release.openshift.io/self-managed-high-availability: "true" creationTimestamp: "2025-12-03T13:45:00Z" generation: 1 managedFields: - apiVersion: config.openshift.io/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:capability.openshift.io/name: {} f:include.release.openshift.io/self-managed-high-availability: {} f:ownerReferences: .: {} k:{"uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe"}: {} f:spec: {} manager: cluster-version-operator operation: Update time: "2025-12-03T13:45:00Z" - apiVersion: config.openshift.io/v1 fieldsType: FieldsV1 fieldsV1: f:status: .: {} f:extension: {} manager: cluster-version-operator operation: Update subresource: status time: "2025-12-03T13:45:01Z" - apiVersion: config.openshift.io/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: {} f:relatedObjects: {} f:versions: {} manager: cluster-olm-operator operation: Update subresource: status time: "2025-12-03T14:13:38Z" name: olm ownerReferences: - apiVersion: config.openshift.io/v1 controller: true kind: ClusterVersion name: version uid: 5205dfe9-721d-4bc1-91a8-be4081323bbe resourceVersion: "17453" uid: d8ab3715-1dc9-495d-a2c5-c88715e5ff4c spec: {} status: conditions: - lastTransitionTime: "2025-12-03T13:55:30Z" message: All is well reason: AsExpected status: "False" type: Degraded - lastTransitionTime: "2025-12-03T13:56:14Z" message: All is well reason: AsExpected status: "False" type: Progressing - lastTransitionTime: "2025-12-03T13:56:14Z" message: All is well reason: AsExpected status: "True" type: Available - lastTransitionTime: "2025-12-03T13:55:30Z" message: All is well reason: AsExpected status: "True" type: Upgradeable - lastTransitionTime: "2025-12-03T13:55:30Z" reason: NoData status: Unknown type: EvaluationConditionsDetected extension: null relatedObjects: - group: "" name: openshift-catalogd resource: namespaces - group: apiextensions.k8s.io name: clustercatalogs.olm.operatorframework.io resource: customresourcedefinitions - group: "" name: catalogd-controller-manager namespace: openshift-catalogd resource: serviceaccounts - group: rbac.authorization.k8s.io name: catalogd-leader-election-role namespace: openshift-catalogd resource: roles - group: rbac.authorization.k8s.io name: catalogd-manager-role namespace: openshift-config resource: roles - group: rbac.authorization.k8s.io name: catalogd-manager-role resource: clusterroles - group: rbac.authorization.k8s.io name: catalogd-metrics-reader resource: clusterroles - group: rbac.authorization.k8s.io name: catalogd-proxy-role resource: clusterroles - group: rbac.authorization.k8s.io name: catalogd-leader-election-rolebinding namespace: openshift-catalogd resource: rolebindings - group: rbac.authorization.k8s.io name: catalogd-manager-rolebinding namespace: openshift-config resource: rolebindings - group: rbac.authorization.k8s.io name: catalogd-manager-rolebinding resource: clusterrolebindings - group: rbac.authorization.k8s.io name: catalogd-proxy-rolebinding resource: clusterrolebindings - group: "" name: catalogd-trusted-ca-bundle namespace: openshift-catalogd resource: configmaps - group: "" name: catalogd-service namespace: openshift-catalogd resource: services - group: apps name: catalogd-controller-manager namespace: openshift-catalogd resource: deployments - group: olm.operatorframework.io name: openshift-certified-operators resource: clustercatalogs - group: olm.operatorframework.io name: openshift-community-operators resource: clustercatalogs - group: olm.operatorframework.io name: openshift-redhat-marketplace resource: clustercatalogs - group: olm.operatorframework.io name: openshift-redhat-operators resource: clustercatalogs - group: admissionregistration.k8s.io name: catalogd-mutating-webhook-configuration resource: mutatingwebhookconfigurations - group: "" name: openshift-catalogd resource: namespaces - group: apiextensions.k8s.io name: clustercatalogs.olm.operatorframework.io resource: customresourcedefinitions - group: "" name: catalogd-controller-manager namespace: openshift-catalogd resource: serviceaccounts - group: rbac.authorization.k8s.io name: catalogd-leader-election-role namespace: openshift-catalogd resource: roles - group: rbac.authorization.k8s.io name: catalogd-manager-role namespace: openshift-config resource: roles - group: rbac.authorization.k8s.io name: catalogd-manager-role resource: clusterroles - group: rbac.authorization.k8s.io name: catalogd-metrics-reader resource: clusterroles - group: rbac.authorization.k8s.io name: catalogd-proxy-role resource: clusterroles - group: rbac.authorization.k8s.io name: catalogd-leader-election-rolebinding namespace: openshift-catalogd resource: rolebindings - group: rbac.authorization.k8s.io name: catalogd-manager-rolebinding namespace: openshift-config resource: rolebindings - group: rbac.authorization.k8s.io name: catalogd-manager-rolebinding resource: clusterrolebindings - group: rbac.authorization.k8s.io name: catalogd-proxy-rolebinding resource: clusterrolebindings - group: "" name: catalogd-trusted-ca-bundle namespace: openshift-catalogd resource: configmaps - group: "" name: catalogd-service namespace: openshift-catalogd resource: services - group: apps name: catalogd-controller-manager namespace: openshift-catalogd resource: deployments - group: olm.operatorframework.io name: openshift-certified-operators resource: clustercatalogs - group: olm.operatorframework.io name: openshift-community-operators resource: clustercatalogs - group: olm.operatorframework.io name: openshift-redhat-marketplace resource: clustercatalogs - group: olm.operatorframework.io name: openshift-redhat-operators resource: clustercatalogs - group: admissionregistration.k8s.io name: catalogd-mutating-webhook-configuration resource: mutatingwebhookconfigurations - group: "" name: openshift-operator-controller resource: namespaces - group: apiextensions.k8s.io name: clusterextensions.olm.operatorframework.io resource: customresourcedefinitions - group: "" name: operator-controller-controller-manager namespace: openshift-operator-controller resource: serviceaccounts - group: rbac.authorization.k8s.io name: operator-controller-manager-role namespace: openshift-config resource: roles - group: rbac.authorization.k8s.io name: operator-controller-leader-election-role namespace: openshift-operator-controller resource: roles - group: rbac.authorization.k8s.io name: operator-controller-manager-role namespace: openshift-operator-controller resource: roles - group: rbac.authorization.k8s.io name: operator-controller-clusterextension-editor-role resource: clusterroles - group: rbac.authorization.k8s.io name: operator-controller-clusterextension-viewer-role resource: clusterroles - group: rbac.authorization.k8s.io name: operator-controller-extension-editor-role resource: clusterroles - group: rbac.authorization.k8s.io name: operator-controller-extension-viewer-role resource: clusterroles - group: rbac.authorization.k8s.io name: operator-controller-manager-role resource: clusterroles - group: rbac.authorization.k8s.io name: operator-controller-metrics-reader resource: clusterroles - group: rbac.authorization.k8s.io name: operator-controller-proxy-role resource: clusterroles - group: rbac.authorization.k8s.io name: operator-controller-manager-rolebinding namespace: openshift-config resource: rolebindings - group: rbac.authorization.k8s.io name: operator-controller-leader-election-rolebinding namespace: openshift-operator-controller resource: rolebindings - group: rbac.authorization.k8s.io name: operator-controller-manager-rolebinding namespace: openshift-operator-controller resource: rolebindings - group: rbac.authorization.k8s.io name: operator-controller-manager-rolebinding resource: clusterrolebindings - group: rbac.authorization.k8s.io name: operator-controller-proxy-rolebinding resource: clusterrolebindings - group: "" name: operator-controller-trusted-ca-bundle namespace: openshift-operator-controller resource: configmaps - group: "" name: operator-controller-controller-manager-metrics-service namespace: openshift-operator-controller resource: services - group: apps name: operator-controller-controller-manager namespace: openshift-operator-controller resource: deployments - group: "" name: openshift-operator-controller resource: namespaces - group: apiextensions.k8s.io name: clusterextensions.olm.operatorframework.io resource: customresourcedefinitions - group: "" name: operator-controller-controller-manager namespace: openshift-operator-controller resource: serviceaccounts - group: rbac.authorization.k8s.io name: operator-controller-manager-role namespace: openshift-config resource: roles - group: rbac.authorization.k8s.io name: operator-controller-leader-election-role namespace: openshift-operator-controller resource: roles - group: rbac.authorization.k8s.io name: operator-controller-manager-role namespace: openshift-operator-controller resource: roles - group: rbac.authorization.k8s.io name: operator-controller-clusterextension-editor-role resource: clusterroles - group: rbac.authorization.k8s.io name: operator-controller-clusterextension-viewer-role resource: clusterroles - group: rbac.authorization.k8s.io name: operator-controller-extension-editor-role resource: clusterroles - group: rbac.authorization.k8s.io name: operator-controller-extension-viewer-role resource: clusterroles - group: rbac.authorization.k8s.io name: operator-controller-manager-role resource: clusterroles - group: rbac.authorization.k8s.io name: operator-controller-metrics-reader resource: clusterroles - group: rbac.authorization.k8s.io name: operator-controller-proxy-role resource: clusterroles - group: rbac.authorization.k8s.io name: operator-controller-manager-rolebinding namespace: openshift-config resource: rolebindings - group: rbac.authorization.k8s.io name: operator-controller-leader-election-rolebinding namespace: openshift-operator-controller resource: rolebindings - group: rbac.authorization.k8s.io name: operator-controller-manager-rolebinding namespace: openshift-operator-controller resource: rolebindings - group: rbac.authorization.k8s.io name: operator-controller-manager-rolebinding resource: clusterrolebindings - group: rbac.authorization.k8s.io name: operator-controller-proxy-rolebinding resource: clusterrolebindings - group: "" name: operator-controller-trusted-ca-bundle namespace: openshift-operator-controller resource: configmaps - group: "" name: operator-controller-controller-manager-metrics-service namespace: openshift-operator-controller resource: services - group: apps name: operator-controller-controller-manager namespace: openshift-operator-controller resource: deployments - group: operator.openshift.io name: cluster resource: olms - group: "" name: openshift-cluster-olm-operator resource: namespaces versions: - name: operator version: 4.18.28