insights-operator/gathers.json0000640000000000000000000002507615114042303015254 0ustar0000000000000000{"status_reports":[{"name":"clusterconfig/machine_healthchecks","duration_in_ms":4567,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pdbs","duration_in_ms":4574,"records_count":3,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress_certificates","duration_in_ms":4689,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig","duration_in_ms":42287,"records_count":174,"errors":["function \"pod_network_connectivity_checks\" failed with an error","function \"support_secret\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error"],"warnings":null,"panic":null},{"name":"clusterconfig/feature_gates","duration_in_ms":4552,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_controlplanes","duration_in_ms":26,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/validating_webhook_configurations","duration_in_ms":4551,"records_count":8,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_pruners","duration_in_ms":4553,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_classes","duration_in_ms":4557,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_sets","duration_in_ms":4559,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cost_management_metrics_configs","duration_in_ms":16,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/support_secret","duration_in_ms":4559,"records_count":0,"errors":["secrets \"support\" not found"],"warnings":null,"panic":null},{"name":"clusterconfig/infrastructures","duration_in_ms":4557,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress","duration_in_ms":4560,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/clusterroles","duration_in_ms":4599,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/tsdb_status","duration_in_ms":1130,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_machine_api_events","duration_in_ms":4594,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators","duration_in_ms":47,"records_count":34,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image","duration_in_ms":4552,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/node_logs","duration_in_ms":4776,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"workloads","duration_in_ms":6951,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ceph_cluster","duration_in_ms":25,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkstates","duration_in_ms":22,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/olm_operators","duration_in_ms":4575,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/overlapping_namespace_uids","duration_in_ms":4578,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_images","duration_in_ms":4642,"records_count":4,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/service_accounts","duration_in_ms":30257,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/oauths","duration_in_ms":16,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/lokistack","duration_in_ms":26,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/dvo_metrics","duration_in_ms":4551,"records_count":0,"errors":null,"warnings":["warning: no service found with label selector name=deployment-validation-operator"],"panic":null},{"name":"clusterconfig/crds","duration_in_ms":4602,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/install_plans","duration_in_ms":30077,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"conditional/conditional_gatherer_rules","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_datahubs","duration_in_ms":19,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cluster_apiserver","duration_in_ms":4559,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/version","duration_in_ms":4645,"records_count":4,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_version","duration_in_ms":26,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_logging","duration_in_ms":26,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanenodesets","duration_in_ms":24,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_runtime_configs","duration_in_ms":4551,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_config_pools","duration_in_ms":4580,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_pods","duration_in_ms":24,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/mutating_webhook_configurations","duration_in_ms":4539,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/monitoring_persistent_volumes","duration_in_ms":4555,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/networks","duration_in_ms":4573,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"workloads/helmchart_info","duration_in_ms":18,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"workloads/workload_info","duration_in_ms":6950,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"conditional","duration_in_ms":353,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/active_alerts","duration_in_ms":1110,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/authentication","duration_in_ms":4543,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators_pods_and_events","duration_in_ms":42281,"records_count":77,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_cluster","duration_in_ms":24,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/metrics","duration_in_ms":1116,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"conditional/remote_configuration","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkconfigurationpolicies","duration_in_ms":25,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/silenced_alerts","duration_in_ms":1108,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_registries","duration_in_ms":4578,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/aggregated_monitoring_cr_names","duration_in_ms":4626,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/config_maps","duration_in_ms":4642,"records_count":9,"errors":["configmaps \"cluster-monitoring-config\" not found","configmaps \"gateway-mode-config\" not found","configmaps \"insights-config\" not found"],"warnings":["warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt\""],"panic":null},{"name":"clusterconfig/machine_configs","duration_in_ms":4741,"records_count":4,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/jaegers","duration_in_ms":15,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/certificate_signing_requests","duration_in_ms":19,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanedeployments","duration_in_ms":26,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/proxies","duration_in_ms":4558,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machines","duration_in_ms":4557,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/qemu_kubevirt_launcher_logs","duration_in_ms":4559,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/number_of_pods_and_netnamespaces_with_sdn_annotations","duration_in_ms":4667,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"conditional/rapid_container_logs","duration_in_ms":0,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pod_network_connectivity_checks","duration_in_ms":16,"records_count":0,"errors":["the server could not find the requested resource (get podnetworkconnectivitychecks.controlplane.operator.openshift.io)"],"warnings":null,"panic":null},{"name":"clusterconfig/nodes","duration_in_ms":4561,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_autoscalers","duration_in_ms":4575,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/schedulers","duration_in_ms":4577,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_config","duration_in_ms":15,"records_count":0,"errors":null,"warnings":null,"panic":null}],"container_memory_bytes_usage":0,"uptime_seconds":72.583,"is_global_obfuscation_enabled":false}insights-operator/remote-configuration.json0000640000000000000000000000443515114042303017753 0ustar0000000000000000{"conditional_gathering_rules":[{"conditions":[{"alert":{"name":"APIRemovedInNextEUSReleaseInUse"},"type":"alert_is_firing"}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedReload"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedToSendAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"KubePodCrashLooping"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","previous":true,"tail_lines":20}}},{"conditions":[{"alert":{"name":"KubePodNotReady"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},{"conditions":[{"alert":{"name":"PrometheusOperatorSyncFailed"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},{"conditions":[{"alert":{"name":"PrometheusRemoteStorageFailures"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},{"conditions":[{"alert":{"name":"PrometheusTargetSyncFailure"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},{"conditions":[{"alert":{"name":"SamplesImagestreamImportFailing"},"type":"alert_is_firing"}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},{"conditions":[{"alert":{"name":"ThanosRuleQueueIsDroppingAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}}],"container_logs":[],"version":"1.2.0"}insights-operator/conditional-gatherer-rules.json0000640000000000000000000000542715114042303021047 0ustar0000000000000000{"version":"1.2.0","conditional_gathering_rules":[{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"APIRemovedInNextEUSReleaseInUse"}}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},"errors":null,"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedReload"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},"errors":null,"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedToSendAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},"errors":null,"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodCrashLooping"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","tail_lines":20,"previous":true}}},"errors":null,"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodNotReady"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},"errors":null,"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusOperatorSyncFailed"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},"errors":null,"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusRemoteStorageFailures"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},"errors":null,"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusTargetSyncFailure"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},"errors":null,"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"SamplesImagestreamImportFailing"}}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},"errors":null,"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"ThanosRuleQueueIsDroppingAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}},"errors":null,"was_triggered":false}],"endpoint":"https://console.redhat.com/api/gathering/v2/%s/gathering_rules"}config/workload_info.json0000640000000000000000000007044015114042303014233 0ustar0000000000000000{"pods":100,"imageCount":79,"images":{"sha256:3d886210d2faa9ace5750adfc70c0c3c5512cdf492f19d1c536a446db659aabb":{"layerIDs":["sha256:25c75c34b2e2b68ba9245d9cddeb6b8a0887371ed30744064f85241a75704d87","sha256:7c642b165004c0390d6af15d5c8517aa311812987fdeb1ec7ff669118b91ed62","sha256:34f760ec92833e2da7b81cebad5ee7e5b050c40d5b39d4648a53484639376fd2","sha256:5f1a03a9a998cd718b4dd440dad3f3d1170c451243a76491af055ac96fbf423b","sha256:9b4b13466430712795214a620f445799438137ee422e6a6bb2302802e3f2c2a6"],"repository":"7VIClVjumW_e"},"sha256:51a4c20765f54b6a6b5513f97cf54bb99631c2abe860949293456886a74f87fe":{"layerIDs":["sha256:25c75c34b2e2b68ba9245d9cddeb6b8a0887371ed30744064f85241a75704d87","sha256:7c642b165004c0390d6af15d5c8517aa311812987fdeb1ec7ff669118b91ed62","sha256:34f760ec92833e2da7b81cebad5ee7e5b050c40d5b39d4648a53484639376fd2","sha256:5f1a03a9a998cd718b4dd440dad3f3d1170c451243a76491af055ac96fbf423b"],"repository":"MDmT2_nMiHID"}},"namespaces":{"0LiT6ZNtbpYL":{"count":4,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:ceaa4102b35e54be54e23c8ea73bb0dac4978cffb54105ad00b51393f47595da","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:0d866f93bed16cfebd8019ad6b89a4dd4abedfc20ee5d28d7edad045e7df0fda","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:ee896bce586a3fcd37b4be8165cf1b4a83e88b5d47667de10475ec43e31b7926","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:2f86d9ffe13cbab06ff676496b50a26bbc4819d8b81b98fbacca6aee9b56792f","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:e8f313372fe49afad871cc56225dcd4d31bed249abeab55fb288e1f854138fbf","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:e8f313372fe49afad871cc56225dcd4d31bed249abeab55fb288e1f854138fbf","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:98ce2d349f8bc693d76d9a68097b758b987cf17ea3beb66bbd09d12fa78b4d0c","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:eac937aae64688cb47b38ad2cbba5aa7e6d41c691df1f3ca4ff81e5117084d1e","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:98ce2d349f8bc693d76d9a68097b758b987cf17ea3beb66bbd09d12fa78b4d0c","firstCommand":"N9KxLV2avCo2","firstArg":"BuLIUMMJnyP_"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:7825952834ade266ce08d1a9eb0665e4661dea0a40647d3e1de2cf6266665e9d","firstCommand":"FC0eu9ID58Bm","firstArg":"47DEQpj8HBSa"}]}]},"0h5ohwdJx4S5":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:6199be91b821875ba2609cf7fa886b74b9a8b573622fe33cc1bc39cd55acac08","firstCommand":"buSkac1OkQU4","firstArg":"XV1E-c-gSQmZ"}]}]},"2IqVYeidVUxV":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:e0e3400f1cb68a205bfb841b6b1a78045e7d80703830aa64979d46418d19c835","firstCommand":"po5yju59c7HJ"}],"containers":[{"imageID":"sha256:d0c6de747539dd00ede882fb4f73cead462bf0a7efda7173fd5d443ef7a00251","firstCommand":"UcO4la9rqCTe"}]}]},"43Xz0HbE9FHX":{"count":9,"ignoredCount":4,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:dc72da7f7930eb09abf6f8dbe577bb537e3a2a59dc0e14a4319b42c0212218d1","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:446e5d504e70c7963ef7b0f090f3fcb19847ef48150299bf030847565d7a579b","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:d3c0962dbbad51633a7d97ef253d0249269bfe3bbef3bfe99a99457470e7a682","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:dc72da7f7930eb09abf6f8dbe577bb537e3a2a59dc0e14a4319b42c0212218d1","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:dba4a8e0293f7b6e1459b74484a7126274bdc9efa75f808eb15e5a3896a3c818","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:d3c0962dbbad51633a7d97ef253d0249269bfe3bbef3bfe99a99457470e7a682","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:36fa1378b9c26de6d45187b1e7352f3b1147109427fab3669b107d81fd967601","firstCommand":"4MEQ8E7-fUvu","firstArg":"mDEjdpyJDBZ4"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:dc72da7f7930eb09abf6f8dbe577bb537e3a2a59dc0e14a4319b42c0212218d1","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:e8990432556acad31519b1a73ec32f32d27c2034cf9e5cc4db8980efc7331594","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:d3c0962dbbad51633a7d97ef253d0249269bfe3bbef3bfe99a99457470e7a682","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:dc72da7f7930eb09abf6f8dbe577bb537e3a2a59dc0e14a4319b42c0212218d1","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:27562b2c78cb890b90f8106f6f9225cc0da5a3232b1ac8a122bfc65917123a4e","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:d3c0962dbbad51633a7d97ef253d0249269bfe3bbef3bfe99a99457470e7a682","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]}]},"47HAKWqp7-jn":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:ca4933b9ba55069205ea53970128c4e8c4b46560ef721c8aaee00aaf736664b5","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:ca4933b9ba55069205ea53970128c4e8c4b46560ef721c8aaee00aaf736664b5","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1","firstCommand":"N9KxLV2avCo2"}]}]},"4k7XyKW2A17e":{"count":3,"terminalCount":2,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:d0bb91faa6e9f82b589a6535665e51517abe4a1b2eb5d0b3a36b36df6a5330a0","firstCommand":"930btY2ohuPL","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:d0bb91faa6e9f82b589a6535665e51517abe4a1b2eb5d0b3a36b36df6a5330a0","firstCommand":"aC8iSHmKHojh","firstArg":"r7zEsGNvlNrk"},{"imageID":"sha256:3d835ce07d1bec4a4b13f0bca5ea20ea5c781ea7853d7b42310f4ad8aeba6d7c","firstCommand":"WFJEBSInAJpw","firstArg":"5gS4z5mOnDuY"},{"imageID":"sha256:3d835ce07d1bec4a4b13f0bca5ea20ea5c781ea7853d7b42310f4ad8aeba6d7c","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"}]}]},"5fn-sCitjq6a":{"count":3,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ae8c6193ace2c439dd93d8129f68f3704727650851a628c906bff9290940ef03","firstCommand":"HgS-rIunFHfD","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:607e31ebb2c85f53775455b38a607a68cb2bdab1e369f03c57e715a4ebb88831","firstArg":"ESRPWfqdsWE1"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:4cb6ecfb89e53653b69ae494ebc940b9fcf7b7db317b156e186435cc541589d9","firstArg":"zO0oxtw_mcI5"}]}]},"5oRWKKS3566n":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ef51f50a9bf1b4dfa6fdb7b484eae9e3126e813b48f380c833dd7eaf4e55853e","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"6KbiDGNUd_ub":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:a17e9d83aeb6de5f0851aaacd1a9ebddbc8a4ac3ece2e4af8670aa0c33b8fc9c","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:a17e9d83aeb6de5f0851aaacd1a9ebddbc8a4ac3ece2e4af8670aa0c33b8fc9c","firstCommand":"N9KxLV2avCo2"}]}]},"6bLpdRMvgXVP":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:68dbccdff76515d5b659c9c2d031235073d292cb56a5385f8e69d24ac5f48b8f","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"},{"imageID":"sha256:68dbccdff76515d5b659c9c2d031235073d292cb56a5385f8e69d24ac5f48b8f","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]}]},"9dJB3pvMrhr8":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ebd79294a663cb38370ae81f9cda91cef7fb1370ec5b495b4bdb95e77272e6a8","firstCommand":"51QuNwyM-xYf","firstArg":"r7zEsGNvlNrk"}]}]},"AN3N38xANElq":{"count":1,"terminalCount":1,"shapes":[]},"CMkFy_B6OMUO":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:eefdc67602b8bc3941001b030ab95d82e10432f814634b80eb8ce45bc9ebd3de","firstCommand":"7aQQEh6Tr2m7","firstArg":"r7zEsGNvlNrk"}]}]},"C_9an18W0cU6":{"count":5,"terminalCount":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:dc72da7f7930eb09abf6f8dbe577bb537e3a2a59dc0e14a4319b42c0212218d1","firstCommand":"ZS9VAWJDvxuf","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:dc72da7f7930eb09abf6f8dbe577bb537e3a2a59dc0e14a4319b42c0212218d1","firstCommand":"ArvlNzaZtYpC","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:dc72da7f7930eb09abf6f8dbe577bb537e3a2a59dc0e14a4319b42c0212218d1","firstCommand":"PPJ_dAh1Wl4S","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:dc72da7f7930eb09abf6f8dbe577bb537e3a2a59dc0e14a4319b42c0212218d1","firstCommand":"5-ZY-7KtGiOe"}]}]},"EOB8Fqt74gVH":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:dfc0403f71f7c926db1084c7fb5fb4f19007271213ee34f6f3d3eecdbe817d6b","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","firstArg":"aV86_fLS8Aye"}]}]},"EyQn00UhCg7z":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ff94e909d3b037c815e8ae67989a7616936e67195b758abac6b5d3f0d59562c8","firstCommand":"bsRjeCtd7lVU","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:ff94e909d3b037c815e8ae67989a7616936e67195b758abac6b5d3f0d59562c8","firstCommand":"ZDrZSWYe4Hpn"}]}]},"F-y2qosZEzxd":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:eefdc67602b8bc3941001b030ab95d82e10432f814634b80eb8ce45bc9ebd3de","firstCommand":"7aQQEh6Tr2m7","firstArg":"gcNszUTvGLqr"}]}]},"ICyEPw5KVYuy":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:4a3e2790bda8898df5e4e9cf1878103ac483ea1633819d76ea68976b0b2062b6","firstCommand":"ijLlFtdBW-Uk","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:51a4c20765f54b6a6b5513f97cf54bb99631c2abe860949293456886a74f87fe","firstCommand":"N9KxLV2avCo2"}]}]},"KETRwZOPBpF9":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:6dd80564094a262c1bb53c037288c9c69a46b22dc7dd3ee5c52384404ebfdc81","firstCommand":"buSkac1OkQU4","firstArg":"47DEQpj8HBSa"}]}]},"Kt0qS5G8piJp":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:492103a8365ef9a1d5f237b4ba90aff87369167ec91db29ff0251ba5aab2b419","firstCommand":"9RqZYN0XQJuD"}]}]},"LBp1kjMRhgCD":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:49a6a3308d885301c7718a465f1af2d08a617abbdff23352d5422d1ae4af33cf","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:49a6a3308d885301c7718a465f1af2d08a617abbdff23352d5422d1ae4af33cf","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"M9RntwZOZgi3":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:89b279931fe13f3b33c9dd6cdf0f5e7fc3e5384b944f998034d35af7242a47fa","firstCommand":"k9iHTIyG8PyJ","firstArg":"r7zEsGNvlNrk"}]}]},"MBms5agiSYKb":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:44e82a51fce7b5996b183c10c44bd79b0e1ae2257fd5809345fbca1c50aaa08f","firstArg":"zO0oxtw_mcI5"}]}]},"N3z7Gdl4s2xN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:656fe650bac2929182cd0cf7d7e566d089f69e06541b8329c6d40b89346c03ca","firstCommand":"vLhjmt4GJVrQ"},{"imageID":"sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","firstArg":"47DEQpj8HBSa"}]}]},"NJ5StnkN7lNJ":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:b99ce0f31213291444482af4af36345dc93acdbe965868073e8232797b8a2f14","firstCommand":"euUHIZmT1r6w","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:b99ce0f31213291444482af4af36345dc93acdbe965868073e8232797b8a2f14","firstCommand":"euUHIZmT1r6w"}]}]},"NuNApgGLWU3S":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:912759ba49a70e63f7585b351b1deed008b5815d275f478f052c8c2880101d3c","firstCommand":"loDbMsNsNHAN"},{"imageID":"sha256:912759ba49a70e63f7585b351b1deed008b5815d275f478f052c8c2880101d3c","firstCommand":"BWdk-C4p4WVi","firstArg":"ov8ZFLf4OaCu"}]}]},"QRCRK87Nh9-g":{"count":4,"terminalCount":3,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:d0bb91faa6e9f82b589a6535665e51517abe4a1b2eb5d0b3a36b36df6a5330a0","firstCommand":"930btY2ohuPL","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:d0bb91faa6e9f82b589a6535665e51517abe4a1b2eb5d0b3a36b36df6a5330a0","firstCommand":"N9KxLV2avCo2","firstArg":"OOfnAGgDw729"},{"imageID":"sha256:91cbda9693e888881e7c45cd6e504b91ba8a203fe0596237a4a17b3ca4e18eef","firstCommand":"VvlllczXFX2z","firstArg":"5gS4z5mOnDuY"},{"imageID":"sha256:91cbda9693e888881e7c45cd6e504b91ba8a203fe0596237a4a17b3ca4e18eef","firstCommand":"VvlllczXFX2z","firstArg":"5gS4z5mOnDuY"},{"imageID":"sha256:91cbda9693e888881e7c45cd6e504b91ba8a203fe0596237a4a17b3ca4e18eef","firstCommand":"VvlllczXFX2z","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:91cbda9693e888881e7c45cd6e504b91ba8a203fe0596237a4a17b3ca4e18eef","firstCommand":"VvlllczXFX2z","firstArg":"Yfg8wToYnj2U"}]}]},"QhwI_DkC7RkW":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:a17e9d83aeb6de5f0851aaacd1a9ebddbc8a4ac3ece2e4af8670aa0c33b8fc9c","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:a17e9d83aeb6de5f0851aaacd1a9ebddbc8a4ac3ece2e4af8670aa0c33b8fc9c","firstCommand":"N9KxLV2avCo2"}],"containers":[{"imageID":"sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:a17e9d83aeb6de5f0851aaacd1a9ebddbc8a4ac3ece2e4af8670aa0c33b8fc9c","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:a17e9d83aeb6de5f0851aaacd1a9ebddbc8a4ac3ece2e4af8670aa0c33b8fc9c","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:a17e9d83aeb6de5f0851aaacd1a9ebddbc8a4ac3ece2e4af8670aa0c33b8fc9c","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:a17e9d83aeb6de5f0851aaacd1a9ebddbc8a4ac3ece2e4af8670aa0c33b8fc9c","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:a17e9d83aeb6de5f0851aaacd1a9ebddbc8a4ac3ece2e4af8670aa0c33b8fc9c","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:a17e9d83aeb6de5f0851aaacd1a9ebddbc8a4ac3ece2e4af8670aa0c33b8fc9c","firstCommand":"N9KxLV2avCo2"}]}]},"RGIC92MKxXzi":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:9f4724570795357eb097251a021f20c94c79b3054f3adb3bc0812143ba791dc1","firstCommand":"RxKEaTc90uWM","firstArg":"r7zEsGNvlNrk"}]}]},"WPOX0dN4tqDv":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:492103a8365ef9a1d5f237b4ba90aff87369167ec91db29ff0251ba5aab2b419","firstCommand":"9RqZYN0XQJuD"},{"imageID":"sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","firstArg":"47DEQpj8HBSa"}]}]},"XStfgPOmHYzB":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:93145fd0c004dc4fca21435a32c7e55e962f321aff260d702f387cfdebee92a5","firstCommand":"AiycEq1CClLy","firstArg":"r7zEsGNvlNrk"}]}]},"YgQZCjyI6D9c":{"count":1,"terminalCount":1,"shapes":[]},"cMIdS73ad1cT":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ca4933b9ba55069205ea53970128c4e8c4b46560ef721c8aaee00aaf736664b5","firstCommand":"09D_XsQaIohy","firstArg":"r7zEsGNvlNrk"}]}]},"cWNZj9dm5f4i":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:3d835ce07d1bec4a4b13f0bca5ea20ea5c781ea7853d7b42310f4ad8aeba6d7c","firstCommand":"WFJEBSInAJpw","firstArg":"r7zEsGNvlNrk"}]}]},"coRkJ8lvmtSk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:3ed4dc45b0e0d6229620e2ac6a53ecd180cad44a11daf9f0170d94b4acd35ded"}]}]},"de1zmznD1F_L":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:3051af3343018fecbf3a6edacea69de841fc5211c09e7fb6a2499188dc979395","firstCommand":"rb3iLnl9GmZR","firstArg":"r7zEsGNvlNrk"}]}]},"eCjF12pGOLUF":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:32236659da74056138c839429f304a96ba36dd304d7eefb6b2618ecfdf6308e3","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:32236659da74056138c839429f304a96ba36dd304d7eefb6b2618ecfdf6308e3","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","firstArg":"aV86_fLS8Aye"}]}]},"ecUe5cl6bPwX":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:2d41c3e944e86b73b4ba0d037ff016562211988f3206b9deb6cc7dccca708248","firstCommand":"pgaYl1gqTV2L","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:b294511902fd7a80e135b23895a944570932dc0fab1ee22f296523840740332e","firstCommand":"kwBOP3_4oVMx","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:23aa409d98c18a25b5dd3c14b4c5a88eba2c793d020f2deb3bafd58a2225c328","firstCommand":"buSkac1OkQU4","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:f8a38d71a75c4fa803249cc709d60039d14878e218afd88a86083526ee8f78ad","firstCommand":"Tt12uskXp-TN","firstArg":"zO0oxtw_mcI5"}]}]},"iAB_cGZtvYGo":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:2e254a7fb8a2643817718cfdb54bc819e86eb84232f6e2456548c55c5efb09d2","firstCommand":"zT6_GoC4_8OY","firstArg":"r7zEsGNvlNrk"},{"imageID":"sha256:d0bb91faa6e9f82b589a6535665e51517abe4a1b2eb5d0b3a36b36df6a5330a0","firstCommand":"aC8iSHmKHojh","firstArg":"eE7ekwlit3Mq"}]}]},"inQbBSWydCWk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:3a2ef63f356c11ba629d8038474ab287797340de1219b4fee97c386975689110","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"ioFx0itCFPcs":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:6dd80564094a262c1bb53c037288c9c69a46b22dc7dd3ee5c52384404ebfdc81","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:6199be91b821875ba2609cf7fa886b74b9a8b573622fe33cc1bc39cd55acac08","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"}],"containers":[{"imageID":"sha256:c2b518cb834a0b6ca50d73eceb5f8e64aefb09094d39e4ba0d8e4632f6cdf908","firstCommand":"bFMn8sKmxXTo","firstArg":"zO0oxtw_mcI5"}]}]},"jmuesrd3LOV1":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:a31af646ce5587c051459a88df413dc30be81e7f15399aa909e19effa7de772a","firstCommand":"aDHd4M_0XUOd","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:a31af646ce5587c051459a88df413dc30be81e7f15399aa909e19effa7de772a","firstCommand":"wCdwTcAdXQ_H","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:a31af646ce5587c051459a88df413dc30be81e7f15399aa909e19effa7de772a","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:a31af646ce5587c051459a88df413dc30be81e7f15399aa909e19effa7de772a","firstCommand":"jXkiIgNfKeEy","firstArg":"zO0oxtw_mcI5"}]}]},"k2lPYOlQaXUX":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:84a52132860e74998981b76c08d38543561197c3da77836c670fa8e394c5ec17","firstCommand":"XqE_QmN1P920","firstArg":"r7zEsGNvlNrk"}]}]},"n8ih8iFf25K7":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:51a4c20765f54b6a6b5513f97cf54bb99631c2abe860949293456886a74f87fe","firstCommand":"CX8KiHZjJyVD"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:ff94e909d3b037c815e8ae67989a7616936e67195b758abac6b5d3f0d59562c8","firstCommand":"N9KxLV2avCo2"}]}]},"nMMaB9HQd060":{"count":11,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:6363cc3335d2a930fa0e4e6c6c3515fa0ef85e9d7abb3b3007fbb185eabb498f","firstCommand":"NJuOSOguFZRT","firstArg":"3NvCs-dGLEBM"}],"containers":[{"imageID":"sha256:d12d87386ab9c19148c49c1e79d839a6f47f3a2cd7e078d94319d80b6936be13","firstArg":"rDQv7paSi7RY"},{"imageID":"sha256:6363cc3335d2a930fa0e4e6c6c3515fa0ef85e9d7abb3b3007fbb185eabb498f","firstCommand":"NJuOSOguFZRT","firstArg":"nw1jEXz0CN6o"},{"imageID":"sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:3ef6fd8a728768571ca93950ec6d7222c9304a98d81b58329eeb7974fa2c8dc8","firstArg":"TIre9pmD-tbd"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:b4e0b20fdb38d516e871ff5d593c4273cc9933cb6a65ec93e727ca4a7777fd20","firstArg":"aZFPdeh8u0QY"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:b0737727dcbfb50c3c09b69684ba3c07b5a4ab7652bbe4970a46d6a11c4a2bca","firstArg":"5wzTZA9Ffwb3"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:3cc3977d34490059b692d5fbdb89bb9a676db39c88faa35f5d9b4e98f6b0c4e2","firstArg":"P0uRYWPWnbxt"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:30948d73ae763e995468b7e0767b855425ccbbbef13667a2fd3ba06b3c40a165","firstCommand":"K8aRMFBO_jyE","firstArg":"vWfRLhDFJlMA"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:debbfa579e627e291b629851278c9e608e080a1642a6e676d023f218252a3ed0","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:debbfa579e627e291b629851278c9e608e080a1642a6e676d023f218252a3ed0","firstCommand":"icTsn2s_EIax","firstArg":"SCcKjYHEPDKM"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:e39fd49a8aa33e4b750267b4e773492b85c08cc7830cd7b22e64a92bcb5b6729","firstArg":"5wzTZA9Ffwb3"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:6363cc3335d2a930fa0e4e6c6c3515fa0ef85e9d7abb3b3007fbb185eabb498f","firstCommand":"NJuOSOguFZRT","firstArg":"3NvCs-dGLEBM"}],"containers":[{"imageID":"sha256:6363cc3335d2a930fa0e4e6c6c3515fa0ef85e9d7abb3b3007fbb185eabb498f","firstCommand":"NJuOSOguFZRT","firstArg":"nw1jEXz0CN6o"},{"imageID":"sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:78f6aebe76fa9da71b631ceced1ed159d8b60a6fa8e0325fd098c7b029039e89","firstArg":"cteiHEtNKHn0"},{"imageID":"sha256:e955ac7de27deecd1a88d06c08a1b7a43e867cadf4289f20a6ab982fa647e6b7","firstArg":"bItFNczIfxkG"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:903557bdbb44cf720481cc9b305a8060f327435d303c95e710b92669ff43d055","firstArg":"e1V8mDIYJ-Es"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:f870aa3c7bcd039c7905b2c7a9e9c0776d76ed4cf34ccbef872ae7ad8cf2157f","firstArg":"Sr6QxZ9vlnXv"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:3ef6fd8a728768571ca93950ec6d7222c9304a98d81b58329eeb7974fa2c8dc8","firstArg":"TIre9pmD-tbd"},{"imageID":"sha256:e955ac7de27deecd1a88d06c08a1b7a43e867cadf4289f20a6ab982fa647e6b7","firstArg":"qLdxkguDGeRy"}]}]},"nO8YkKLJMsaW":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:da6f62afd2795d1b0af69532a5534c099bbb81d4e7abd2616b374db191552c51","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:da6f62afd2795d1b0af69532a5534c099bbb81d4e7abd2616b374db191552c51","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:91cbda9693e888881e7c45cd6e504b91ba8a203fe0596237a4a17b3ca4e18eef","firstCommand":"VvlllczXFX2z","firstArg":"47DEQpj8HBSa"}]}]},"nTf6g7hF1YMN":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8e8903affdf29401b9a86b9f58795c9f445f34194960c7b2734f30601c48cbdf","firstArg":"8DZ1gO9Xqn6d"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:2ad82327a0c3eac3d7a73ca67630eaf63bafc37514ea75cb6e8b51e995458b01","firstCommand":"icTsn2s_EIax"}]}]},"oNeg9VIL3k3N":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:dc9758be9f0f0a480fb5e119ecb1e1101ef807bdc765a155212a8188d79b9e60","firstCommand":"oNeg9VIL3k3N","firstArg":"r7zEsGNvlNrk"}]}]},"p1tmSwFC_Q2L":{"count":3,"shapes":[{"duplicates":1,"restartAlways":true,"containers":[{"imageID":"sha256:da806db797ef2b291ff0ce5f302e88a0cb74e57f253b8fe76296f969512cd79e","firstCommand":"F_KbBzFD2M2X"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:3d886210d2faa9ace5750adfc70c0c3c5512cdf492f19d1c536a446db659aabb","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"}]}]},"pepxDbsB4SPa":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:91cbda9693e888881e7c45cd6e504b91ba8a203fe0596237a4a17b3ca4e18eef","firstCommand":"VvlllczXFX2z","firstArg":"r7zEsGNvlNrk"}]}]},"q1TpN3EUiKjG":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:58ed827ee19ac91b6f860d307797b24b8aec02e671605388c4afe4fa19ddfc36","firstCommand":"FATPL2W-sitV","firstArg":"r7zEsGNvlNrk"}]}]},"vDGHaQt8x6K_":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:98c80d92a2ef8d44ee625b229b77b7bfdb1b06cbfe0d4df9e2ca2cba904467f7","firstArg":"zO0oxtw_mcI5"}]}]}}}route-controller-manager_current.log0000640000000000000000000004762215114042274037531 0ustar0000000000000000config/pod/openshift-route-controller-manager/logs/route-controller-manager-678c7f799b-4b7nv2025-12-03T14:09:00.740552812Z I1203 14:09:00.740210 1 cmd.go:240] Using service-serving-cert provided certificates 2025-12-03T14:09:00.740552812Z I1203 14:09:00.740477 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2025-12-03T14:09:00.744445749Z I1203 14:09:00.741683 1 observer_polling.go:159] Starting file observer 2025-12-03T14:09:00.744445749Z I1203 14:09:00.742246 1 builder.go:298] route-controller-manager version 4.18.0-202510210939.p2.gce6ffa2.assembly.stream.el9-ce6ffa2-ce6ffa24dac3a5f49f70818e1159e40eaf27a6a3 2025-12-03T14:09:00.744445749Z I1203 14:09:00.743538 1 dynamic_serving_content.go:113] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2025-12-03T14:09:01.463469598Z I1203 14:09:01.463302 1 requestheader_controller.go:244] Loaded a new request header values for RequestHeaderAuthRequestController 2025-12-03T14:09:01.468160279Z I1203 14:09:01.468019 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2025-12-03T14:09:01.468160279Z I1203 14:09:01.468051 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2025-12-03T14:09:01.468160279Z I1203 14:09:01.468087 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2025-12-03T14:09:01.468160279Z I1203 14:09:01.468093 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2025-12-03T14:09:01.477931515Z I1203 14:09:01.476014 1 secure_serving.go:57] Forcing use of http/1.1 only 2025-12-03T14:09:01.477931515Z W1203 14:09:01.476047 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2025-12-03T14:09:01.477931515Z W1203 14:09:01.476055 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2025-12-03T14:09:01.477931515Z W1203 14:09:01.476061 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2025-12-03T14:09:01.477931515Z W1203 14:09:01.476067 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2025-12-03T14:09:01.477931515Z W1203 14:09:01.476070 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2025-12-03T14:09:01.477931515Z W1203 14:09:01.476075 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2025-12-03T14:09:01.477931515Z I1203 14:09:01.476347 1 genericapiserver.go:514] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2025-12-03T14:09:01.497664831Z I1203 14:09:01.494177 1 tlsconfig.go:200] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"route-controller-manager.openshift-route-controller-manager.svc\" [serving] validServingFor=[route-controller-manager.openshift-route-controller-manager.svc,route-controller-manager.openshift-route-controller-manager.svc.cluster.local] issuer=\"openshift-service-serving-signer@1764770119\" (2025-12-03 13:55:42 +0000 UTC to 2027-12-03 13:55:43 +0000 UTC (now=2025-12-03 14:09:01.494129404 +0000 UTC))" 2025-12-03T14:09:01.497664831Z I1203 14:09:01.494387 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1764770941\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1764770941\" (2025-12-03 13:09:00 +0000 UTC to 2026-12-03 13:09:00 +0000 UTC (now=2025-12-03 14:09:01.494346921 +0000 UTC))" 2025-12-03T14:09:01.497664831Z I1203 14:09:01.494410 1 secure_serving.go:213] Serving securely on [::]:8443 2025-12-03T14:09:01.497664831Z I1203 14:09:01.494479 1 genericapiserver.go:662] [graceful-termination] waiting for shutdown to be initiated 2025-12-03T14:09:01.497664831Z I1203 14:09:01.494516 1 requestheader_controller.go:169] Starting RequestHeaderAuthRequestController 2025-12-03T14:09:01.497664831Z I1203 14:09:01.494557 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2025-12-03T14:09:01.497664831Z I1203 14:09:01.494600 1 dynamic_serving_content.go:132] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2025-12-03T14:09:01.497664831Z I1203 14:09:01.494767 1 tlsconfig.go:240] "Starting DynamicServingCertificateController" 2025-12-03T14:09:01.497664831Z I1203 14:09:01.495694 1 configmap_cafile_content.go:202] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2025-12-03T14:09:01.497664831Z I1203 14:09:01.495731 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2025-12-03T14:09:01.497664831Z I1203 14:09:01.495766 1 configmap_cafile_content.go:202] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2025-12-03T14:09:01.497664831Z I1203 14:09:01.495774 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2025-12-03T14:09:01.502113935Z I1203 14:09:01.502060 1 builder.go:439] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2025-12-03T14:09:01.503431475Z I1203 14:09:01.502669 1 leaderelection.go:250] attempting to acquire leader lease openshift-route-controller-manager/openshift-route-controllers... 2025-12-03T14:09:01.503892899Z I1203 14:09:01.503674 1 reflector.go:359] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2025-12-03T14:09:01.505375054Z I1203 14:09:01.505325 1 reflector.go:359] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2025-12-03T14:09:01.506501238Z I1203 14:09:01.506471 1 reflector.go:359] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2025-12-03T14:09:01.529598076Z I1203 14:09:01.529529 1 leaderelection.go:260] successfully acquired lease openshift-route-controller-manager/openshift-route-controllers 2025-12-03T14:09:01.531591796Z I1203 14:09:01.530572 1 event.go:377] Event(v1.ObjectReference{Kind:"Lease", Namespace:"openshift-route-controller-manager", Name:"openshift-route-controllers", UID:"e34321d2-0a69-4569-9e13-e2965b975b61", APIVersion:"coordination.k8s.io/v1", ResourceVersion:"16490", FieldPath:""}): type: 'Normal' reason: 'LeaderElection' route-controller-manager-678c7f799b-4b7nv_c841bc60-7211-4fd2-8f02-c1b7a7cfe287 became leader 2025-12-03T14:09:01.531591796Z I1203 14:09:01.531009 1 controller_manager.go:36] Starting "openshift.io/ingress-ip" 2025-12-03T14:09:01.531591796Z I1203 14:09:01.531021 1 controller_manager.go:46] Started "openshift.io/ingress-ip" 2025-12-03T14:09:01.531591796Z I1203 14:09:01.531027 1 controller_manager.go:36] Starting "openshift.io/ingress-to-route" 2025-12-03T14:09:01.557309463Z I1203 14:09:01.556799 1 ingress.go:262] ingress-to-route metrics registered with prometheus 2025-12-03T14:09:01.557309463Z I1203 14:09:01.556830 1 controller_manager.go:46] Started "openshift.io/ingress-to-route" 2025-12-03T14:09:01.557309463Z I1203 14:09:01.556837 1 controller_manager.go:48] Started Route Controllers 2025-12-03T14:09:01.559619833Z I1203 14:09:01.557432 1 ingress.go:313] Starting controller 2025-12-03T14:09:01.561882572Z W1203 14:09:01.561805 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2025-12-03T14:09:01.561882572Z E1203 14:09:01.561869 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2025-12-03T14:09:01.562333775Z I1203 14:09:01.562144 1 reflector.go:359] Caches populated for *v1.Ingress from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2025-12-03T14:09:01.562677296Z I1203 14:09:01.562389 1 reflector.go:359] Caches populated for *v1.IngressClass from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2025-12-03T14:09:01.571748770Z I1203 14:09:01.571665 1 reflector.go:359] Caches populated for *v1.Service from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2025-12-03T14:09:01.598354504Z I1203 14:09:01.595969 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2025-12-03T14:09:01.598354504Z I1203 14:09:01.596036 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2025-12-03T14:09:01.598354504Z I1203 14:09:01.596477 1 tlsconfig.go:178] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2025-12-03 13:29:46 +0000 UTC to 2035-12-01 13:29:46 +0000 UTC (now=2025-12-03 14:09:01.596437976 +0000 UTC))" 2025-12-03T14:09:01.598354504Z I1203 14:09:01.596511 1 tlsconfig.go:178] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2025-12-03 13:37:22 +0000 UTC to 2025-12-04 13:37:22 +0000 UTC (now=2025-12-03 14:09:01.596494198 +0000 UTC))" 2025-12-03T14:09:01.598354504Z I1203 14:09:01.596529 1 tlsconfig.go:178] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2025-12-03 13:37:22 +0000 UTC to 2026-12-03 13:37:22 +0000 UTC (now=2025-12-03 14:09:01.596517218 +0000 UTC))" 2025-12-03T14:09:01.598354504Z I1203 14:09:01.596545 1 tlsconfig.go:178] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2025-12-03 13:37:22 +0000 UTC to 2026-12-03 13:37:22 +0000 UTC (now=2025-12-03 14:09:01.596534809 +0000 UTC))" 2025-12-03T14:09:01.598354504Z I1203 14:09:01.596562 1 tlsconfig.go:178] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2025-12-03 13:37:20 +0000 UTC to 2035-12-01 13:37:20 +0000 UTC (now=2025-12-03 14:09:01.596551079 +0000 UTC))" 2025-12-03T14:09:01.598354504Z I1203 14:09:01.596613 1 tlsconfig.go:178] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-csr-signer_@1764770129\" [] issuer=\"kubelet-signer\" (2025-12-03 13:55:28 +0000 UTC to 2025-12-04 13:37:22 +0000 UTC (now=2025-12-03 14:09:01.596600361 +0000 UTC))" 2025-12-03T14:09:01.598354504Z I1203 14:09:01.596631 1 tlsconfig.go:178] "Loaded client CA" index=6 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"openshift-kube-apiserver-operator_node-system-admin-signer@1764770095\" [] issuer=\"\" (2025-12-03 13:54:54 +0000 UTC to 2026-12-03 13:54:55 +0000 UTC (now=2025-12-03 14:09:01.596619281 +0000 UTC))" 2025-12-03T14:09:01.598354504Z I1203 14:09:01.596816 1 tlsconfig.go:200] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"route-controller-manager.openshift-route-controller-manager.svc\" [serving] validServingFor=[route-controller-manager.openshift-route-controller-manager.svc,route-controller-manager.openshift-route-controller-manager.svc.cluster.local] issuer=\"openshift-service-serving-signer@1764770119\" (2025-12-03 13:55:42 +0000 UTC to 2027-12-03 13:55:43 +0000 UTC (now=2025-12-03 14:09:01.596791437 +0000 UTC))" 2025-12-03T14:09:01.598354504Z I1203 14:09:01.596952 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1764770941\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1764770941\" (2025-12-03 13:09:00 +0000 UTC to 2026-12-03 13:09:00 +0000 UTC (now=2025-12-03 14:09:01.596934601 +0000 UTC))" 2025-12-03T14:09:01.598354504Z I1203 14:09:01.597214 1 tlsconfig.go:178] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2025-12-03 13:29:46 +0000 UTC to 2035-12-01 13:29:46 +0000 UTC (now=2025-12-03 14:09:01.597194979 +0000 UTC))" 2025-12-03T14:09:01.598354504Z I1203 14:09:01.597239 1 tlsconfig.go:178] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2025-12-03 13:37:22 +0000 UTC to 2025-12-04 13:37:22 +0000 UTC (now=2025-12-03 14:09:01.59722608 +0000 UTC))" 2025-12-03T14:09:01.598354504Z I1203 14:09:01.597257 1 tlsconfig.go:178] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2025-12-03 13:37:22 +0000 UTC to 2026-12-03 13:37:22 +0000 UTC (now=2025-12-03 14:09:01.59724491 +0000 UTC))" 2025-12-03T14:09:01.598354504Z I1203 14:09:01.597273 1 tlsconfig.go:178] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2025-12-03 13:37:22 +0000 UTC to 2026-12-03 13:37:22 +0000 UTC (now=2025-12-03 14:09:01.597262371 +0000 UTC))" 2025-12-03T14:09:01.598354504Z I1203 14:09:01.597293 1 tlsconfig.go:178] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2025-12-03 13:37:20 +0000 UTC to 2035-12-01 13:37:20 +0000 UTC (now=2025-12-03 14:09:01.597278861 +0000 UTC))" 2025-12-03T14:09:01.598354504Z I1203 14:09:01.597310 1 tlsconfig.go:178] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-csr-signer_@1764770129\" [] issuer=\"kubelet-signer\" (2025-12-03 13:55:28 +0000 UTC to 2025-12-04 13:37:22 +0000 UTC (now=2025-12-03 14:09:01.597298682 +0000 UTC))" 2025-12-03T14:09:01.598354504Z I1203 14:09:01.597326 1 tlsconfig.go:178] "Loaded client CA" index=6 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"openshift-kube-apiserver-operator_node-system-admin-signer@1764770095\" [] issuer=\"\" (2025-12-03 13:54:54 +0000 UTC to 2026-12-03 13:54:55 +0000 UTC (now=2025-12-03 14:09:01.597314722 +0000 UTC))" 2025-12-03T14:09:01.598354504Z I1203 14:09:01.597341 1 tlsconfig.go:178] "Loaded client CA" index=7 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2025-12-03 13:37:20 +0000 UTC to 2025-12-04 13:37:20 +0000 UTC (now=2025-12-03 14:09:01.597331243 +0000 UTC))" 2025-12-03T14:09:01.598354504Z I1203 14:09:01.597506 1 tlsconfig.go:200] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"route-controller-manager.openshift-route-controller-manager.svc\" [serving] validServingFor=[route-controller-manager.openshift-route-controller-manager.svc,route-controller-manager.openshift-route-controller-manager.svc.cluster.local] issuer=\"openshift-service-serving-signer@1764770119\" (2025-12-03 13:55:42 +0000 UTC to 2027-12-03 13:55:43 +0000 UTC (now=2025-12-03 14:09:01.597485318 +0000 UTC))" 2025-12-03T14:09:01.598463147Z I1203 14:09:01.597637 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1764770941\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1764770941\" (2025-12-03 13:09:00 +0000 UTC to 2026-12-03 13:09:00 +0000 UTC (now=2025-12-03 14:09:01.597621602 +0000 UTC))" 2025-12-03T14:09:01.598463147Z I1203 14:09:01.597663 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2025-12-03T14:09:01.729779344Z I1203 14:09:01.729705 1 reflector.go:359] Caches populated for *v1.Secret from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 2025-12-03T14:09:02.783816286Z W1203 14:09:02.783735 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2025-12-03T14:09:02.783816286Z E1203 14:09:02.783789 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2025-12-03T14:09:04.444766679Z W1203 14:09:04.442222 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2025-12-03T14:09:04.444766679Z E1203 14:09:04.442265 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2025-12-03T14:09:08.070202455Z W1203 14:09:08.070115 1 reflector.go:547] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2025-12-03T14:09:08.070202455Z E1203 14:09:08.070180 1 reflector.go:150] k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2025-12-03T14:09:14.530341542Z I1203 14:09:14.530283 1 reflector.go:359] Caches populated for *v1.Route from k8s.io/client-go@v0.30.1/tools/cache/reflector.go:232 config/pod/openshift-route-controller-manager/route-controller-manager-678c7f799b-4b7nv.json0000640000000000000000000001503015114042274030327 0ustar0000000000000000{"metadata":{"name":"route-controller-manager-678c7f799b-4b7nv","generateName":"route-controller-manager-678c7f799b-","namespace":"openshift-route-controller-manager","uid":"1ba502ba-1179-478e-b4b9-f3409320b0ad","resourceVersion":"16685","creationTimestamp":"2025-12-03T14:02:48Z","labels":{"app":"route-controller-manager","openshift-route-controller-manager-anti-affinity":"true","pod-template-hash":"678c7f799b","route-controller-manager":"true"},"annotations":{"configmaps/client-ca":"6918","configmaps/config":"13474","k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.96/23\"],\"mac_address\":\"0a:58:0a:80:00:60\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.96/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.96\"\n ],\n \"mac\": \"0a:58:0a:80:00:60\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","openshiftcontrollermanagers.operator.openshift.io/cluster":"4","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"route-controller-manager-678c7f799b","uid":"731b34a1-c98c-4c36-a46a-d84e57ced6e5","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config","configMap":{"name":"config","defaultMode":420}},{"name":"client-ca","configMap":{"name":"client-ca","defaultMode":420}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420}},{"name":"kube-api-access-lq4dz","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"route-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ebd79294a663cb38370ae81f9cda91cef7fb1370ec5b495b4bdb95e77272e6a8","command":["route-controller-manager","start"],"args":["--config=/var/run/configmaps/config/config.yaml","-v=2"],"ports":[{"containerPort":8443,"protocol":"TCP"}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"100m","memory":"100Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"client-ca","mountPath":"/var/run/configmaps/client-ca"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-lq4dz","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":10},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000600000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"route-controller-manager-sa","serviceAccount":"route-controller-manager-sa","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c25,c0"},"runAsNonRoot":true,"fsGroup":1000600000,"seccompProfile":{"type":"RuntimeDefault"}},"imagePullSecrets":[{"name":"route-controller-manager-sa-dockercfg-8wv68"}],"affinity":{"podAntiAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":[{"labelSelector":{"matchLabels":{"app":"route-controller-manager","openshift-route-controller-manager-anti-affinity":"true","route-controller-manager":"true"}},"topologyKey":"kubernetes.io/hostname"}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:09:01Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:02:54Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:09:01Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:09:01Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:02:54Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.96","podIPs":[{"ip":"10.128.0.96"}],"startTime":"2025-12-03T14:02:54Z","containerStatuses":[{"name":"route-controller-manager","state":{"running":{"startedAt":"2025-12-03T14:09:00Z"}},"lastState":{},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ebd79294a663cb38370ae81f9cda91cef7fb1370ec5b495b4bdb95e77272e6a8","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ebd79294a663cb38370ae81f9cda91cef7fb1370ec5b495b4bdb95e77272e6a8","containerID":"cri-o://29053444b96be204cfacc06f351623469ad90ff08fa41fd3de790b64c121c396","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"client-ca","mountPath":"/var/run/configmaps/client-ca"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-lq4dz","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}controller-manager_current.log0000640000000000000000000005120315114042274034122 0ustar0000000000000000config/pod/openshift-controller-manager/logs/controller-manager-78d987764b-xcs5w2025-12-03T14:09:01.822706682Z I1203 14:09:01.822530 1 scheduled_image_controller.go:68] Starting scheduled import controller 2025-12-03T14:09:01.835659914Z I1203 14:09:01.832384 1 controller_manager.go:156] Started "openshift.io/templateinstancefinalizer" 2025-12-03T14:09:01.835659914Z W1203 14:09:01.832408 1 controller_manager.go:143] "openshift.io/default-rolebindings" is disabled 2025-12-03T14:09:01.835659914Z I1203 14:09:01.832433 1 controller_manager.go:161] Started Origin Controllers 2025-12-03T14:09:01.835659914Z I1203 14:09:01.832845 1 templateinstance_finalizer.go:189] TemplateInstanceFinalizer controller waiting for cache sync 2025-12-03T14:09:01.844401908Z I1203 14:09:01.844344 1 reflector.go:368] Caches populated for *v1.Event from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2025-12-03T14:09:01.844989896Z I1203 14:09:01.844971 1 reflector.go:368] Caches populated for *v1alpha1.ImageContentSourcePolicy from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2025-12-03T14:09:01.846115020Z I1203 14:09:01.846094 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2025-12-03T14:09:01.846364657Z W1203 14:09:01.846347 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io) 2025-12-03T14:09:01.846464800Z E1203 14:09:01.846444 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io)" 2025-12-03T14:09:01.846791020Z I1203 14:09:01.846750 1 reflector.go:368] Caches populated for *v1.StatefulSet from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2025-12-03T14:09:01.860571317Z I1203 14:09:01.854162 1 reflector.go:368] Caches populated for *v1.Build from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2025-12-03T14:09:01.860638879Z I1203 14:09:01.859398 1 reflector.go:368] Caches populated for *v1.Image from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2025-12-03T14:09:01.865498006Z W1203 14:09:01.861438 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2025-12-03T14:09:01.865498006Z E1203 14:09:01.861501 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2025-12-03T14:09:01.865498006Z I1203 14:09:01.862029 1 reflector.go:368] Caches populated for *v1.ImageDigestMirrorSet from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2025-12-03T14:09:01.865498006Z W1203 14:09:01.862222 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io) 2025-12-03T14:09:01.865498006Z E1203 14:09:01.862280 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io)" 2025-12-03T14:09:01.865498006Z I1203 14:09:01.862952 1 reflector.go:368] Caches populated for *v1.ReplicationController from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2025-12-03T14:09:01.865498006Z W1203 14:09:01.863190 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io) 2025-12-03T14:09:01.865498006Z E1203 14:09:01.863212 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io)" 2025-12-03T14:09:01.865498006Z I1203 14:09:01.863753 1 reflector.go:368] Caches populated for *v1.ImageTagMirrorSet from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2025-12-03T14:09:01.865498006Z W1203 14:09:01.863984 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io) 2025-12-03T14:09:01.865498006Z E1203 14:09:01.864021 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io)" 2025-12-03T14:09:01.865498006Z W1203 14:09:01.864019 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io) 2025-12-03T14:09:01.865498006Z E1203 14:09:01.864092 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io)" 2025-12-03T14:09:01.865498006Z I1203 14:09:01.864403 1 reflector.go:368] Caches populated for *v1.CronJob from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2025-12-03T14:09:01.876342843Z I1203 14:09:01.875912 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2025-12-03T14:09:01.878080386Z I1203 14:09:01.878044 1 reflector.go:368] Caches populated for *v1.DaemonSet from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2025-12-03T14:09:01.880336334Z I1203 14:09:01.880299 1 reflector.go:368] Caches populated for *v1.RoleBinding from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2025-12-03T14:09:01.880387816Z I1203 14:09:01.880341 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2025-12-03T14:09:01.881093797Z I1203 14:09:01.881060 1 reflector.go:368] Caches populated for *v1.Proxy from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2025-12-03T14:09:01.915486816Z I1203 14:09:01.915333 1 shared_informer.go:320] Caches are synced for BuilderRoleBindingController 2025-12-03T14:09:01.915486816Z I1203 14:09:01.915385 1 shared_informer.go:320] Caches are synced for openshift.io/internal-image-registry-pull-secrets_urls 2025-12-03T14:09:01.915530898Z I1203 14:09:01.915478 1 registry_urls_observation_controller.go:147] "Started controller" name="openshift.io/internal-image-registry-pull-secrets_urls" 2025-12-03T14:09:01.925791018Z I1203 14:09:01.925712 1 reflector.go:368] Caches populated for *v1.ServiceAccount from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2025-12-03T14:09:01.929731257Z I1203 14:09:01.929666 1 shared_informer.go:320] Caches are synced for ImagePullerRoleBindingController 2025-12-03T14:09:01.937621495Z I1203 14:09:01.932862 1 reflector.go:368] Caches populated for *v1.Deployment from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2025-12-03T14:09:01.948536885Z I1203 14:09:01.948143 1 shared_informer.go:320] Caches are synced for DeployerRoleBindingController 2025-12-03T14:09:01.959662461Z I1203 14:09:01.951399 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2025-12-03T14:09:01.959820946Z I1203 14:09:01.958301 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2025-12-03T14:09:01.970540790Z I1203 14:09:01.970463 1 shared_informer.go:320] Caches are synced for service account 2025-12-03T14:09:01.971829009Z I1203 14:09:01.970778 1 shared_informer.go:320] Caches are synced for service account 2025-12-03T14:09:02.035632217Z I1203 14:09:02.035511 1 factory.go:80] Deployer controller caches are synced. Starting workers. 2025-12-03T14:09:02.352375469Z I1203 14:09:02.348809 1 reflector.go:368] Caches populated for *v1.Secret from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2025-12-03T14:09:02.397498692Z I1203 14:09:02.396958 1 shared_informer.go:320] Caches are synced for openshift.io/internal-image-registry-pull-secrets_kids 2025-12-03T14:09:02.397498692Z I1203 14:09:02.397058 1 keyid_observation_controller.go:172] "Started controller" name="openshift.io/internal-image-registry-pull-secrets_kids" 2025-12-03T14:09:02.397498692Z I1203 14:09:02.397475 1 shared_informer.go:320] Caches are synced for openshift.io/internal-image-registry-pull-secrets_image-pull-secret 2025-12-03T14:09:02.397542913Z I1203 14:09:02.397504 1 image_pull_secret_controller.go:398] Waiting for service account token signing cert to be observed 2025-12-03T14:09:02.397551894Z I1203 14:09:02.397536 1 image_pull_secret_controller.go:401] "Observed service account token signing certs" kids=["6YdmAVacl8lALjdbZ3SNe6Dg5vcGhZ0bzUTe7A545Q0"] 2025-12-03T14:09:02.399954386Z I1203 14:09:02.397563 1 shared_informer.go:320] Caches are synced for openshift.io/internal-image-registry-pull-secrets_legacy-token-secret 2025-12-03T14:09:02.399954386Z I1203 14:09:02.397600 1 legacy_token_secret_controller.go:110] "Started controller" name="openshift.io/internal-image-registry-pull-secrets_legacy-token-secret" 2025-12-03T14:09:02.399954386Z I1203 14:09:02.397615 1 shared_informer.go:320] Caches are synced for openshift.io/internal-image-registry-pull-secrets_legacy-image-pull-secret 2025-12-03T14:09:02.399954386Z I1203 14:09:02.397630 1 legacy_image_pull_secret_controller.go:138] "Started controller" name="openshift.io/internal-image-registry-pull-secrets_legacy-image-pull-secret" 2025-12-03T14:09:02.399954386Z I1203 14:09:02.397681 1 image_pull_secret_controller.go:384] Waiting for image registry urls to be observed 2025-12-03T14:09:02.399954386Z I1203 14:09:02.397792 1 shared_informer.go:320] Caches are synced for openshift.io/internal-image-registry-pull-secrets_service-account 2025-12-03T14:09:02.399954386Z I1203 14:09:02.397808 1 service_account_controller.go:346] "Started controller" name="openshift.io/internal-image-registry-pull-secrets_service-account" 2025-12-03T14:09:02.433636434Z I1203 14:09:02.433554 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2025-12-03T14:09:02.796638544Z W1203 14:09:02.796543 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io) 2025-12-03T14:09:02.796638544Z E1203 14:09:02.796610 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io)" 2025-12-03T14:09:02.995675748Z W1203 14:09:02.995585 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io) 2025-12-03T14:09:02.995675748Z E1203 14:09:02.995655 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io)" 2025-12-03T14:09:03.020433967Z W1203 14:09:03.020326 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io) 2025-12-03T14:09:03.020433967Z E1203 14:09:03.020402 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io)" 2025-12-03T14:09:03.047511905Z W1203 14:09:03.047412 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io) 2025-12-03T14:09:03.047511905Z E1203 14:09:03.047497 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io)" 2025-12-03T14:09:03.434978474Z W1203 14:09:03.434876 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2025-12-03T14:09:03.434978474Z E1203 14:09:03.434934 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2025-12-03T14:09:03.453286827Z W1203 14:09:03.450172 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io) 2025-12-03T14:09:03.453286827Z E1203 14:09:03.450255 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io)" 2025-12-03T14:09:04.890519149Z W1203 14:09:04.889384 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io) 2025-12-03T14:09:04.890519149Z E1203 14:09:04.889494 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io)" 2025-12-03T14:09:04.961816353Z W1203 14:09:04.961728 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io) 2025-12-03T14:09:04.961859115Z E1203 14:09:04.961789 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.BuildConfig: failed to list *v1.BuildConfig: the server is currently unable to handle the request (get buildconfigs.build.openshift.io)" 2025-12-03T14:09:05.206123826Z W1203 14:09:05.206032 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io) 2025-12-03T14:09:05.206123826Z E1203 14:09:05.206092 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io)" 2025-12-03T14:09:05.926443723Z W1203 14:09:05.926338 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io) 2025-12-03T14:09:05.926443723Z E1203 14:09:05.926395 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Build: failed to list *v1.Build: the server is currently unable to handle the request (get builds.build.openshift.io)" 2025-12-03T14:09:06.565533555Z W1203 14:09:06.565327 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2025-12-03T14:09:06.565533555Z E1203 14:09:06.565374 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2025-12-03T14:09:06.612403532Z W1203 14:09:06.612236 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io) 2025-12-03T14:09:06.612403532Z E1203 14:09:06.612296 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.DeploymentConfig: failed to list *v1.DeploymentConfig: the server is currently unable to handle the request (get deploymentconfigs.apps.openshift.io)" 2025-12-03T14:09:08.296313888Z W1203 14:09:08.296207 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io) 2025-12-03T14:09:08.296313888Z E1203 14:09:08.296267 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.Image: failed to list *v1.Image: the server is currently unable to handle the request (get images.image.openshift.io)" 2025-12-03T14:09:09.274851027Z W1203 14:09:09.274786 1 reflector.go:561] k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io) 2025-12-03T14:09:09.274892509Z E1203 14:09:09.274842 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243: Failed to watch *v1.TemplateInstance: failed to list *v1.TemplateInstance: the server is currently unable to handle the request (get templateinstances.template.openshift.io)" 2025-12-03T14:09:10.640495806Z W1203 14:09:10.640337 1 warnings.go:70] apps.openshift.io/v1 DeploymentConfig is deprecated in v4.14+, unavailable in v4.10000+ 2025-12-03T14:09:10.640566048Z I1203 14:09:10.640512 1 reflector.go:368] Caches populated for *v1.DeploymentConfig from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2025-12-03T14:09:10.646107405Z W1203 14:09:10.645777 1 warnings.go:70] apps.openshift.io/v1 DeploymentConfig is deprecated in v4.14+, unavailable in v4.10000+ 2025-12-03T14:09:10.683103233Z I1203 14:09:10.683006 1 factory.go:85] deploymentconfig controller caches are synced. Starting workers. 2025-12-03T14:09:11.038869474Z I1203 14:09:11.038786 1 reflector.go:368] Caches populated for *v1.BuildConfig from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2025-12-03T14:09:11.085649068Z I1203 14:09:11.085581 1 buildconfig_controller.go:212] Starting buildconfig controller 2025-12-03T14:09:11.667344206Z I1203 14:09:11.667256 1 reflector.go:368] Caches populated for *v1.ImageStream from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2025-12-03T14:09:12.000080631Z I1203 14:09:11.999976 1 reflector.go:368] Caches populated for *v1.Build from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2025-12-03T14:09:12.005100053Z I1203 14:09:12.004980 1 build_controller.go:503] Starting build controller 2025-12-03T14:09:12.005100053Z I1203 14:09:12.005020 1 build_controller.go:505] OpenShift image registry hostname: 2025-12-03T14:09:19.085991889Z I1203 14:09:19.085894 1 reflector.go:368] Caches populated for *v1.Image from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2025-12-03T14:09:21.735067161Z I1203 14:09:21.734985 1 reflector.go:368] Caches populated for *v1.TemplateInstance from k8s.io/client-go@v1.5.2/tools/cache/reflector.go:243 2025-12-03T14:09:21.763511130Z I1203 14:09:21.763407 1 templateinstance_controller.go:297] Starting TemplateInstance controller 2025-12-03T14:09:21.833576258Z I1203 14:09:21.833475 1 templateinstance_finalizer.go:194] Starting TemplateInstanceFinalizer controller config/pod/openshift-controller-manager/controller-manager-78d987764b-xcs5w.json0000640000000000000000000001543315114042274026075 0ustar0000000000000000{"metadata":{"name":"controller-manager-78d987764b-xcs5w","generateName":"controller-manager-78d987764b-","namespace":"openshift-controller-manager","uid":"d3200abb-a440-44db-8897-79c809c1d838","resourceVersion":"16711","creationTimestamp":"2025-12-03T14:02:47Z","labels":{"app":"openshift-controller-manager-a","controller-manager":"true","openshift-route-controller-manager-anti-affinity":"true","pod-template-hash":"78d987764b"},"annotations":{"configmaps/client-ca":"6916","configmaps/config":"13465","configmaps/openshift-global-ca":"5236","configmaps/openshift-service-ca":"5456","k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.95/23\"],\"mac_address\":\"0a:58:0a:80:00:5f\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.95/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.95\"\n ],\n \"mac\": \"0a:58:0a:80:00:5f\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","openshiftcontrollermanagers.operator.openshift.io/cluster":"4","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"controller-manager-78d987764b","uid":"2bc18d60-71c2-4beb-a86b-32ab37fcc81c","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config","configMap":{"name":"config","defaultMode":420}},{"name":"client-ca","configMap":{"name":"client-ca","defaultMode":420}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420}},{"name":"proxy-ca-bundles","configMap":{"name":"openshift-global-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420}},{"name":"kube-api-access-lxlb8","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:dc9758be9f0f0a480fb5e119ecb1e1101ef807bdc765a155212a8188d79b9e60","command":["openshift-controller-manager","start"],"args":["--config=/var/run/configmaps/config/config.yaml","-v=2"],"ports":[{"containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"100m","memory":"100Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"client-ca","mountPath":"/var/run/configmaps/client-ca"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"proxy-ca-bundles","mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"kube-api-access-lxlb8","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":10},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000580000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-controller-manager-sa","serviceAccount":"openshift-controller-manager-sa","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c24,c14"},"runAsNonRoot":true,"fsGroup":1000580000,"seccompProfile":{"type":"RuntimeDefault"}},"imagePullSecrets":[{"name":"openshift-controller-manager-sa-dockercfg-qsbb9"}],"affinity":{"podAntiAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":[{"labelSelector":{"matchLabels":{"app":"openshift-controller-manager-a","controller-manager":"true","openshift-route-controller-manager-anti-affinity":"true"}},"topologyKey":"kubernetes.io/hostname"}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:09:02Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:02:51Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:09:02Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:09:02Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:02:51Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.95","podIPs":[{"ip":"10.128.0.95"}],"startTime":"2025-12-03T14:02:51Z","containerStatuses":[{"name":"controller-manager","state":{"running":{"startedAt":"2025-12-03T14:09:00Z"}},"lastState":{},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:dc9758be9f0f0a480fb5e119ecb1e1101ef807bdc765a155212a8188d79b9e60","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:dc9758be9f0f0a480fb5e119ecb1e1101ef807bdc765a155212a8188d79b9e60","containerID":"cri-o://19cd1be0a1fd107136c87f10930951b933947476c18e9119b4fdeaf6fc43da04","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"client-ca","mountPath":"/var/run/configmaps/client-ca"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"proxy-ca-bundles","mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"kube-api-access-lxlb8","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-controller-manager-operator_current.log0000640000000000000000000001021115114042274045275 0ustar0000000000000000config/pod/openshift-controller-manager-operator/logs/openshift-controller-manager-operator-7c4697b5f5-9f69p2025-12-03T14:08:57.654005070Z I1203 14:08:57.653722 1 cmd.go:253] Using service-serving-cert provided certificates 2025-12-03T14:08:57.654005070Z I1203 14:08:57.653919 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2025-12-03T14:08:57.654705221Z I1203 14:08:57.654664 1 observer_polling.go:159] Starting file observer 2025-12-03T14:08:57.684141141Z I1203 14:08:57.684072 1 builder.go:304] openshift-controller-manager-operator version 4.18.0-202510210939.p2.gf1711cf.assembly.stream.el9-f1711cf-f1711cf30f683ec0eaa187cd5168caae9e8c1254 2025-12-03T14:08:58.271132858Z I1203 14:08:58.271012 1 secure_serving.go:57] Forcing use of http/1.1 only 2025-12-03T14:08:58.271132858Z W1203 14:08:58.271041 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2025-12-03T14:08:58.271132858Z W1203 14:08:58.271046 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2025-12-03T14:08:58.271132858Z W1203 14:08:58.271059 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2025-12-03T14:08:58.271132858Z W1203 14:08:58.271062 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2025-12-03T14:08:58.271132858Z W1203 14:08:58.271065 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2025-12-03T14:08:58.271132858Z W1203 14:08:58.271067 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2025-12-03T14:08:58.276589223Z I1203 14:08:58.276550 1 secure_serving.go:213] Serving securely on [::]:8443 2025-12-03T14:08:58.276666005Z I1203 14:08:58.276637 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2025-12-03T14:08:58.276678786Z I1203 14:08:58.276673 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2025-12-03T14:08:58.276747548Z I1203 14:08:58.276710 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2025-12-03T14:08:58.276863061Z I1203 14:08:58.276834 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2025-12-03T14:08:58.276949274Z I1203 14:08:58.276932 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2025-12-03T14:08:58.276949274Z I1203 14:08:58.276941 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2025-12-03T14:08:58.276958734Z I1203 14:08:58.276953 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2025-12-03T14:08:58.276966124Z I1203 14:08:58.276958 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2025-12-03T14:08:58.280488371Z I1203 14:08:58.280439 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2025-12-03T14:08:58.280729458Z I1203 14:08:58.280703 1 leaderelection.go:254] attempting to acquire leader lease openshift-controller-manager-operator/openshift-controller-manager-operator-lock... 2025-12-03T14:08:58.378857713Z I1203 14:08:58.377619 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2025-12-03T14:08:58.378857713Z I1203 14:08:58.377699 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2025-12-03T14:08:58.378857713Z I1203 14:08:58.377823 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file openshift-controller-manager-operator-7c4697b5f5-9f69p.json0000640000000000000000000001403715114042274033350 0ustar0000000000000000config/pod/openshift-controller-manager-operator{"metadata":{"name":"openshift-controller-manager-operator-7c4697b5f5-9f69p","generateName":"openshift-controller-manager-operator-7c4697b5f5-","namespace":"openshift-controller-manager-operator","uid":"adbcce01-7282-4a75-843a-9623060346f0","resourceVersion":"16309","creationTimestamp":"2025-12-03T13:51:43Z","labels":{"app":"openshift-controller-manager-operator","pod-template-hash":"7c4697b5f5"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.13/23\"],\"mac_address\":\"0a:58:0a:80:00:0d\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.13/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.13\"\n ],\n \"mac\": \"0a:58:0a:80:00:0d\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-controller-manager-operator-7c4697b5f5","uid":"41fcae2b-062d-4d5d-a699-c533460df0c5","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access-jkbcq","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3051af3343018fecbf3a6edacea69de841fc5211c09e7fb6a2499188dc979395","command":["cluster-openshift-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.28"},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:dc9758be9f0f0a480fb5e119ecb1e1101ef807bdc765a155212a8188d79b9e60"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.28"},{"name":"ROUTE_CONTROLLER_MANAGER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ebd79294a663cb38370ae81f9cda91cef7fb1370ec5b495b4bdb95e77272e6a8"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-jkbcq","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-controller-manager-operator","serviceAccount":"openshift-controller-manager-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c15,c0"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:57Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T13:54:51Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:57Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:57Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T13:54:51Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.13","podIPs":[{"ip":"10.128.0.13"}],"startTime":"2025-12-03T13:54:51Z","containerStatuses":[{"name":"openshift-controller-manager-operator","state":{"running":{"startedAt":"2025-12-03T14:08:57Z"}},"lastState":{},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3051af3343018fecbf3a6edacea69de841fc5211c09e7fb6a2499188dc979395","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3051af3343018fecbf3a6edacea69de841fc5211c09e7fb6a2499188dc979395","containerID":"cri-o://663e8a37fd419b7f79754aa24f5933c92f81a1598e294f4a7ce88dc057a79131","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-jkbcq","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}machine-config-server_current.log0000640000000000000000000003233215114042274034605 0ustar0000000000000000config/pod/openshift-machine-config-operator/logs/machine-config-server-pvrfs2025-12-03T14:08:23.033593338Z I1203 14:08:23.032662 1 start.go:40] Version: 2cfe7049 (bb2aa85171d93b2df952ed802a8cb200164e666f) 2025-12-03T14:08:23.062156982Z W1203 14:08:23.058758 1 reflector.go:561] github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: failed to list *v1.ControllerConfig: Get "https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/controllerconfigs?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2025-12-03T14:08:23.062226514Z W1203 14:08:23.062109 1 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.ConfigMap: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-machine-config-operator/configmaps?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2025-12-03T14:08:23.062236034Z W1203 14:08:23.058720 1 reflector.go:561] github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: failed to list *v1.MachineConfigPool: Get "https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigpools?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2025-12-03T14:08:23.062356048Z W1203 14:08:23.058774 1 reflector.go:561] github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: failed to list *v1.MachineConfig: Get "https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigs?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2025-12-03T14:08:23.063638344Z E1203 14:08:23.062712 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: Failed to watch *v1.ControllerConfig: failed to list *v1.ControllerConfig: Get \"https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/controllerconfigs?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2025-12-03T14:08:23.063660665Z E1203 14:08:23.063641 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-machine-config-operator/configmaps?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2025-12-03T14:08:23.063712256Z E1203 14:08:23.063598 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: Failed to watch *v1.MachineConfig: failed to list *v1.MachineConfig: Get \"https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigs?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2025-12-03T14:08:23.064445747Z E1203 14:08:23.062611 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: Failed to watch *v1.MachineConfigPool: failed to list *v1.MachineConfigPool: Get \"https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigpools?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2025-12-03T14:08:24.037439238Z W1203 14:08:24.037290 1 reflector.go:561] github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: failed to list *v1.MachineConfig: Get "https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigs?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2025-12-03T14:08:24.037439238Z E1203 14:08:24.037379 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: Failed to watch *v1.MachineConfig: failed to list *v1.MachineConfig: Get \"https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigs?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2025-12-03T14:08:24.099274119Z W1203 14:08:24.099174 1 reflector.go:561] github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: failed to list *v1.MachineConfigPool: Get "https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigpools?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2025-12-03T14:08:24.099274119Z E1203 14:08:24.099248 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: Failed to watch *v1.MachineConfigPool: failed to list *v1.MachineConfigPool: Get \"https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigpools?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2025-12-03T14:08:24.399396841Z W1203 14:08:24.399296 1 reflector.go:561] github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: failed to list *v1.ControllerConfig: Get "https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/controllerconfigs?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2025-12-03T14:08:24.399396841Z E1203 14:08:24.399355 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: Failed to watch *v1.ControllerConfig: failed to list *v1.ControllerConfig: Get \"https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/controllerconfigs?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2025-12-03T14:08:24.557731188Z W1203 14:08:24.557588 1 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.ConfigMap: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-machine-config-operator/configmaps?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2025-12-03T14:08:24.557731188Z E1203 14:08:24.557702 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-machine-config-operator/configmaps?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2025-12-03T14:08:25.841359332Z W1203 14:08:25.841211 1 reflector.go:561] github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: failed to list *v1.MachineConfigPool: Get "https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigpools?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2025-12-03T14:08:25.841359332Z E1203 14:08:25.841321 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: Failed to watch *v1.MachineConfigPool: failed to list *v1.MachineConfigPool: Get \"https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigpools?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2025-12-03T14:08:26.722395934Z W1203 14:08:26.722232 1 reflector.go:561] github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: failed to list *v1.MachineConfig: Get "https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigs?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2025-12-03T14:08:26.722395934Z E1203 14:08:26.722327 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: Failed to watch *v1.MachineConfig: failed to list *v1.MachineConfig: Get \"https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigs?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2025-12-03T14:08:26.722522808Z W1203 14:08:26.722386 1 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.ConfigMap: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-machine-config-operator/configmaps?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2025-12-03T14:08:26.722522808Z E1203 14:08:26.722452 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-machine-config-operator/configmaps?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2025-12-03T14:08:27.331336590Z W1203 14:08:27.331165 1 reflector.go:561] github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: failed to list *v1.ControllerConfig: Get "https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/controllerconfigs?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2025-12-03T14:08:27.331336590Z E1203 14:08:27.331235 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: Failed to watch *v1.ControllerConfig: failed to list *v1.ControllerConfig: Get \"https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/controllerconfigs?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2025-12-03T14:08:30.684586421Z W1203 14:08:30.684478 1 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.ConfigMap: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-machine-config-operator/configmaps?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2025-12-03T14:08:30.684641163Z E1203 14:08:30.684577 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-machine-config-operator/configmaps?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2025-12-03T14:08:31.008263344Z W1203 14:08:31.008165 1 reflector.go:561] github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: failed to list *v1.MachineConfigPool: Get "https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigpools?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2025-12-03T14:08:31.008303045Z E1203 14:08:31.008272 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: Failed to watch *v1.MachineConfigPool: failed to list *v1.MachineConfigPool: Get \"https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigpools?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2025-12-03T14:08:32.776042329Z W1203 14:08:32.665631 1 reflector.go:561] github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: failed to list *v1.MachineConfig: Get "https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigs?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2025-12-03T14:08:32.776042329Z E1203 14:08:32.665735 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: Failed to watch *v1.MachineConfig: failed to list *v1.MachineConfig: Get \"https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/machineconfigs?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2025-12-03T14:08:33.434998274Z W1203 14:08:33.434059 1 reflector.go:561] github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: failed to list *v1.ControllerConfig: Get "https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/controllerconfigs?limit=500&resourceVersion=0": dial tcp 172.30.0.1:443: connect: connection refused 2025-12-03T14:08:33.434998274Z E1203 14:08:33.434167 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/machineconfiguration/informers/externalversions/factory.go:125: Failed to watch *v1.ControllerConfig: failed to list *v1.ControllerConfig: Get \"https://172.30.0.1:443/apis/machineconfiguration.openshift.io/v1/controllerconfigs?limit=500&resourceVersion=0\": dial tcp 172.30.0.1:443: connect: connection refused" 2025-12-03T14:08:45.241550743Z I1203 14:08:45.241377 1 start.go:51] Launching server with tls min version: VersionTLS12 & cipher suites [TLS_AES_128_GCM_SHA256 TLS_AES_256_GCM_SHA384 TLS_CHACHA20_POLY1305_SHA256 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256] 2025-12-03T14:08:45.241622385Z I1203 14:08:45.241577 1 api.go:67] Launching server on :22624 2025-12-03T14:08:45.241686557Z I1203 14:08:45.241637 1 api.go:67] Launching server on :22623 config/pod/openshift-machine-config-operator/machine-config-server-pvrfs.json0000640000000000000000000001275015114042274026175 0ustar0000000000000000{"metadata":{"name":"machine-config-server-pvrfs","generateName":"machine-config-server-","namespace":"openshift-machine-config-operator","uid":"eecc43f5-708f-4395-98cc-696b243d6321","resourceVersion":"14773","creationTimestamp":"2025-12-03T14:00:33Z","labels":{"controller-revision-hash":"5d87bc6dd9","k8s-app":"machine-config-server","pod-template-generation":"1"},"annotations":{"openshift.io/required-scc":"hostnetwork","openshift.io/scc":"hostnetwork"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"DaemonSet","name":"machine-config-server","uid":"66c0935a-ba09-427b-95a6-ef1d5fa8666a","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"node-bootstrap-token","secret":{"secretName":"node-bootstrapper-token","defaultMode":420}},{"name":"certs","secret":{"secretName":"machine-config-server-tls","defaultMode":420}},{"name":"kube-api-access-szdzx","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"machine-config-server","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a31af646ce5587c051459a88df413dc30be81e7f15399aa909e19effa7de772a","command":["/usr/bin/machine-config-server"],"args":["start","--apiserver-url=https://api-int.sno.openstack.lab:6443","--payload-version=4.18.28","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12"],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"certs","mountPath":"/etc/ssl/mcs"},{"name":"node-bootstrap-token","mountPath":"/etc/mcs/bootstrap-token"},{"name":"kube-api-access-szdzx","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000340000,"runAsNonRoot":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"machine-config-server","serviceAccount":"machine-config-server","nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c18,c17"},"supplementalGroups":[1000340000],"fsGroup":1000340000},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchFields":[{"key":"metadata.name","operator":"In","values":["master-0"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/etcd","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/disk-pressure","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/pid-pressure","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unschedulable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:00:35Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:00:33Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:22Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:22Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:00:33Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2025-12-03T14:00:33Z","containerStatuses":[{"name":"machine-config-server","state":{"running":{"startedAt":"2025-12-03T14:08:21Z"}},"lastState":{},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a31af646ce5587c051459a88df413dc30be81e7f15399aa909e19effa7de772a","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a31af646ce5587c051459a88df413dc30be81e7f15399aa909e19effa7de772a","containerID":"cri-o://5fd119858007e4b5a1b4112671b0b0fdba132ce8265b36ea78a8e9fea5aa487a","started":true,"volumeMounts":[{"name":"certs","mountPath":"/etc/ssl/mcs"},{"name":"node-bootstrap-token","mountPath":"/etc/mcs/bootstrap-token"},{"name":"kube-api-access-szdzx","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-rbac-proxy_current.log0000640000000000000000000000202415114042274035124 0ustar0000000000000000config/pod/openshift-machine-config-operator/logs/machine-config-operator-664c9d94c9-9vfr42025-12-03T14:08:54.919847296Z W1203 14:08:54.919586 1 deprecated.go:66] 2025-12-03T14:08:54.919847296Z ==== Removed Flag Warning ====================== 2025-12-03T14:08:54.919847296Z 2025-12-03T14:08:54.919847296Z logtostderr is removed in the k8s upstream and has no effect any more. 2025-12-03T14:08:54.919847296Z 2025-12-03T14:08:54.919847296Z =============================================== 2025-12-03T14:08:54.919847296Z 2025-12-03T14:08:54.919847296Z I1203 14:08:54.919774 1 kube-rbac-proxy.go:530] Reading config file: /etc/kube-rbac-proxy/config-file.yaml 2025-12-03T14:08:54.920523147Z I1203 14:08:54.920486 1 kube-rbac-proxy.go:233] Valid token audiences: 2025-12-03T14:08:54.921550428Z I1203 14:08:54.921509 1 kube-rbac-proxy.go:347] Reading certificate files 2025-12-03T14:08:54.921889758Z I1203 14:08:54.921832 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:9001 2025-12-03T14:08:54.922249439Z I1203 14:08:54.922211 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:9001 machine-config-operator_current.log0000640000000000000000000000151315114042274036614 0ustar0000000000000000config/pod/openshift-machine-config-operator/logs/machine-config-operator-664c9d94c9-9vfr42025-12-03T14:08:54.660073266Z I1203 14:08:54.659945 1 start.go:52] Version: 4.18.28 (Raw: 2cfe7049, Hash: bb2aa85171d93b2df952ed802a8cb200164e666f) 2025-12-03T14:08:54.660369615Z I1203 14:08:54.660319 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2025-12-03T14:08:54.660552901Z I1203 14:08:54.660501 1 metrics.go:92] Registering Prometheus metrics 2025-12-03T14:08:54.660660954Z I1203 14:08:54.660622 1 metrics.go:99] Starting metrics listener on 127.0.0.1:8797 2025-12-03T14:08:54.680020269Z I1203 14:08:54.679953 1 leaderelection.go:254] attempting to acquire leader lease openshift-machine-config-operator/machine-config... config/pod/openshift-machine-config-operator/machine-config-operator-664c9d94c9-9vfr4.json0000640000000000000000000001634415114042274027665 0ustar0000000000000000{"metadata":{"name":"machine-config-operator-664c9d94c9-9vfr4","generateName":"machine-config-operator-664c9d94c9-","namespace":"openshift-machine-config-operator","uid":"4df2889c-99f7-402a-9d50-18ccf427179c","resourceVersion":"16051","creationTimestamp":"2025-12-03T13:57:58Z","labels":{"k8s-app":"machine-config-operator","pod-template-hash":"664c9d94c9"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.57/23\"],\"mac_address\":\"0a:58:0a:80:00:39\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.57/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.57\"\n ],\n \"mac\": \"0a:58:0a:80:00:39\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"machine-config-operator-664c9d94c9","uid":"de566502-4c6a-4ded-83af-bcc88bcd1561","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"images","configMap":{"name":"machine-config-operator-images","defaultMode":420}},{"name":"proxy-tls","secret":{"secretName":"mco-proxy-tls","defaultMode":420}},{"name":"auth-proxy-config","configMap":{"name":"kube-rbac-proxy","defaultMode":420}},{"name":"kube-api-access-lpl5j","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"machine-config-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a31af646ce5587c051459a88df413dc30be81e7f15399aa909e19effa7de772a","args":["start","--images-json=/etc/mco/images/images.json","--payload-version=4.18.28","--operator-image=quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a31af646ce5587c051459a88df413dc30be81e7f15399aa909e19effa7de772a"],"env":[{"name":"RELEASE_VERSION","value":"4.18.28"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"images","mountPath":"/etc/mco/images"},{"name":"kube-api-access-lpl5j","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]}}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","args":["--secure-listen-address=0.0.0.0:9001","--config-file=/etc/kube-rbac-proxy/config-file.yaml","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305","--upstream=http://127.0.0.1:8797","--logtostderr=true","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key"],"ports":[{"name":"metrics","containerPort":9001,"protocol":"TCP"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"proxy-tls","mountPath":"/etc/tls/private"},{"name":"auth-proxy-config","mountPath":"/etc/kube-rbac-proxy"},{"name":"kube-api-access-lpl5j","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]}}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"machine-config-operator","serviceAccount":"machine-config-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c18,c17"},"runAsUser":65534,"runAsNonRoot":true},"imagePullSecrets":[{"name":"machine-config-operator-dockercfg-9rqxl"}],"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:55Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T13:57:58Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:55Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:55Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T13:57:58Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.57","podIPs":[{"ip":"10.128.0.57"}],"startTime":"2025-12-03T13:57:58Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2025-12-03T14:08:54Z"}},"lastState":{},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","containerID":"cri-o://17a5cd44c392850f434f61e5e79c39571ac458da606d60e15fa99372bc690af8","started":true,"volumeMounts":[{"name":"proxy-tls","mountPath":"/etc/tls/private"},{"name":"auth-proxy-config","mountPath":"/etc/kube-rbac-proxy"},{"name":"kube-api-access-lpl5j","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"machine-config-operator","state":{"running":{"startedAt":"2025-12-03T14:08:54Z"}},"lastState":{},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a31af646ce5587c051459a88df413dc30be81e7f15399aa909e19effa7de772a","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a31af646ce5587c051459a88df413dc30be81e7f15399aa909e19effa7de772a","containerID":"cri-o://3daf9805df4755245acb16c6bd08862ac8da135d42b0fb2123ea52e5c7601eea","started":true,"volumeMounts":[{"name":"images","mountPath":"/etc/mco/images"},{"name":"kube-api-access-lpl5j","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-rbac-proxy_current.log0000640000000000000000000000202415114042274033220 0ustar0000000000000000config/pod/openshift-machine-config-operator/logs/machine-config-daemon-2ztl92025-12-03T14:08:16.798531704Z W1203 14:08:16.797889 3908 deprecated.go:66] 2025-12-03T14:08:16.798531704Z ==== Removed Flag Warning ====================== 2025-12-03T14:08:16.798531704Z 2025-12-03T14:08:16.798531704Z logtostderr is removed in the k8s upstream and has no effect any more. 2025-12-03T14:08:16.798531704Z 2025-12-03T14:08:16.798531704Z =============================================== 2025-12-03T14:08:16.798531704Z 2025-12-03T14:08:16.798531704Z I1203 14:08:16.798037 3908 kube-rbac-proxy.go:530] Reading config file: /etc/kube-rbac-proxy/config-file.yaml 2025-12-03T14:08:16.802447936Z I1203 14:08:16.799357 3908 kube-rbac-proxy.go:233] Valid token audiences: 2025-12-03T14:08:16.803084054Z I1203 14:08:16.803053 3908 kube-rbac-proxy.go:347] Reading certificate files 2025-12-03T14:08:16.805050490Z I1203 14:08:16.805001 3908 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:9001 2025-12-03T14:08:16.805619046Z I1203 14:08:16.805575 3908 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:9001 machine-config-daemon_current.log0000640000000000000000000003366015114042274034330 0ustar0000000000000000config/pod/openshift-machine-config-operator/logs/machine-config-daemon-2ztl92025-12-03T14:08:17.178570551Z I1203 14:08:17.178453 3874 start.go:68] Version: 2cfe7049 (bb2aa85171d93b2df952ed802a8cb200164e666f) 2025-12-03T14:08:17.178762987Z I1203 14:08:17.178743 3874 update.go:2725] Running: mount --rbind /run/secrets /rootfs/run/secrets 2025-12-03T14:08:17.184880901Z I1203 14:08:17.184825 3874 update.go:2725] Running: mount --rbind /usr/bin /rootfs/run/machine-config-daemon-bin 2025-12-03T14:08:17.188964667Z I1203 14:08:17.188908 3874 daemon.go:521] using appropriate binary for source=rhel-9 target=rhel-9 2025-12-03T14:08:17.395235428Z I1203 14:08:17.395156 3874 daemon.go:574] Invoking re-exec /run/bin/machine-config-daemon 2025-12-03T14:08:17.448659188Z I1203 14:08:17.448572 3874 start.go:68] Version: 2cfe7049 (bb2aa85171d93b2df952ed802a8cb200164e666f) 2025-12-03T14:08:17.449181923Z I1203 14:08:17.449151 3874 update.go:2725] Running: systemctl daemon-reload 2025-12-03T14:08:18.971762439Z I1203 14:08:18.971687 3874 rpm-ostree.go:56] Enabled workaround for bug 2111817 2025-12-03T14:08:18.981732122Z I1203 14:08:18.981661 3874 image_manager_helper.go:194] Linking rpm-ostree authfile to /etc/mco/internal-registry-pull-secret.json 2025-12-03T14:08:19.379506934Z I1203 14:08:19.378498 3874 daemon.go:324] Booted osImageURL: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:411b8fa606f0f605401f0a4477f7f5a3e640d42bd145fdc09b8a78272f8e6baf (418.94.202511041748-0) caa08d495b72ddf4b4ec9c426df678599b4f5e98a79d22e3ca1c023fedac4749 2025-12-03T14:08:19.381049148Z I1203 14:08:19.380903 3874 start.go:134] overriding kubernetes api to https://api-int.sno.openstack.lab:6443 2025-12-03T14:08:19.382035286Z I1203 14:08:19.382015 3874 metrics.go:92] Registering Prometheus metrics 2025-12-03T14:08:19.382155369Z I1203 14:08:19.382140 3874 metrics.go:99] Starting metrics listener on 127.0.0.1:8797 2025-12-03T14:08:19.397174587Z I1203 14:08:19.397099 3874 simple_featuregate_reader.go:171] Starting feature-gate-detector 2025-12-03T14:08:19.398954058Z I1203 14:08:19.398880 3874 writer.go:87] NodeWriter initialized with credentials from /var/lib/kubelet/kubeconfig 2025-12-03T14:08:19.405460463Z I1203 14:08:19.405309 3874 start.go:219] FeatureGates initialized: knownFeatureGates=[AWSEFSDriverVolumeMetrics AdminNetworkPolicy AlibabaPlatform AzureWorkloadIdentity BareMetalLoadBalancer BuildCSIVolumes ChunkSizeMiB CloudDualStackNodeIPs DisableKubeletCloudCredentialProviders GCPLabelsTags HardwareSpeed IngressControllerLBSubnetsAWS KMSv1 ManagedBootImages ManagedBootImagesAWS MultiArchInstallAWS MultiArchInstallGCP NetworkDiagnosticsConfig NetworkLiveMigration NetworkSegmentation NewOLM NodeDisruptionPolicy OnClusterBuild PersistentIPsForVirtualization PrivateHostedZoneAWS SetEIPForNLBIngressController VSphereControlPlaneMachineSet VSphereDriverConfiguration VSphereMultiVCenters VSphereStaticIPs ValidatingAdmissionPolicy AWSClusterHostedDNS AdditionalRoutingCapabilities AutomatedEtcdBackup BootcNodeManagement CSIDriverSharedResource ClusterAPIInstall ClusterAPIInstallIBMCloud ClusterMonitoringConfig ConsolePluginContentSecurityPolicy DNSNameResolver DynamicResourceAllocation EtcdBackendQuota EventedPLEG Example ExternalOIDC ExternalOIDCWithUIDAndExtraClaimMappings GCPClusterHostedDNS GatewayAPI ImageStreamImportMode IngressControllerDynamicConfigurationManager InsightsConfig InsightsConfigAPI InsightsOnDemandDataGather InsightsRuntimeExtractor MachineAPIMigration MachineAPIOperatorDisableMachineHealthCheckController MachineAPIProviderOpenStack MachineConfigNodes MaxUnavailableStatefulSet MetricsCollectionProfiles MinimumKubeletVersion MixedCPUsAllocation MultiArchInstallAzure NodeSwap NutanixMultiSubnets OVNObservability OpenShiftPodSecurityAdmission PinnedImages PlatformOperators ProcMountType RouteAdvertisements RouteExternalCertificate ServiceAccountTokenNodeBinding SignatureStores SigstoreImageVerification StreamingCollectionEncodingToJSON StreamingCollectionEncodingToProtobuf TranslateStreamCloseWebsocketRequests UpgradeStatus UserNamespacesPodSecurityStandards UserNamespacesSupport VSphereMultiNetworks VolumeAttributesClass VolumeGroupSnapshot] 2025-12-03T14:08:19.405460463Z I1203 14:08:19.405373 3874 update.go:2770] "Starting to manage node: master-0" 2025-12-03T14:08:19.406701748Z I1203 14:08:19.405731 3874 event.go:377] Event(v1.ObjectReference{Kind:"Node", Namespace:"openshift-machine-config-operator", Name:"master-0", UID:"bd7abe6d-36d2-4ce8-92a1-7fdd9966d574", APIVersion:"v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'FeatureGatesInitialized' FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{"AWSEFSDriverVolumeMetrics", "AdminNetworkPolicy", "AlibabaPlatform", "AzureWorkloadIdentity", "BareMetalLoadBalancer", "BuildCSIVolumes", "ChunkSizeMiB", "CloudDualStackNodeIPs", "DisableKubeletCloudCredentialProviders", "GCPLabelsTags", "HardwareSpeed", "IngressControllerLBSubnetsAWS", "KMSv1", "ManagedBootImages", "ManagedBootImagesAWS", "MultiArchInstallAWS", "MultiArchInstallGCP", "NetworkDiagnosticsConfig", "NetworkLiveMigration", "NetworkSegmentation", "NewOLM", "NodeDisruptionPolicy", "OnClusterBuild", "PersistentIPsForVirtualization", "PrivateHostedZoneAWS", "SetEIPForNLBIngressController", "VSphereControlPlaneMachineSet", "VSphereDriverConfiguration", "VSphereMultiVCenters", "VSphereStaticIPs", "ValidatingAdmissionPolicy"}, Disabled:[]v1.FeatureGateName{"AWSClusterHostedDNS", "AdditionalRoutingCapabilities", "AutomatedEtcdBackup", "BootcNodeManagement", "CSIDriverSharedResource", "ClusterAPIInstall", "ClusterAPIInstallIBMCloud", "ClusterMonitoringConfig", "ConsolePluginContentSecurityPolicy", "DNSNameResolver", "DynamicResourceAllocation", "EtcdBackendQuota", "EventedPLEG", "Example", "ExternalOIDC", "ExternalOIDCWithUIDAndExtraClaimMappings", "GCPClusterHostedDNS", "GatewayAPI", "ImageStreamImportMode", "IngressControllerDynamicConfigurationManager", "InsightsConfig", "InsightsConfigAPI", "InsightsOnDemandDataGather", "InsightsRuntimeExtractor", "MachineAPIMigration", "MachineAPIOperatorDisableMachineHealthCheckController", "MachineAPIProviderOpenStack", "MachineConfigNodes", "MaxUnavailableStatefulSet", "MetricsCollectionProfiles", "MinimumKubeletVersion", "MixedCPUsAllocation", "MultiArchInstallAzure", "NodeSwap", "NutanixMultiSubnets", "OVNObservability", "OpenShiftPodSecurityAdmission", "PinnedImages", "PlatformOperators", "ProcMountType", "RouteAdvertisements", "RouteExternalCertificate", "ServiceAccountTokenNodeBinding", "SignatureStores", "SigstoreImageVerification", "StreamingCollectionEncodingToJSON", "StreamingCollectionEncodingToProtobuf", "TranslateStreamCloseWebsocketRequests", "UpgradeStatus", "UserNamespacesPodSecurityStandards", "UserNamespacesSupport", "VSphereMultiNetworks", "VolumeAttributesClass", "VolumeGroupSnapshot"}} 2025-12-03T14:08:19.414904232Z I1203 14:08:19.414250 3874 image_manager_helper.go:92] Running captured: rpm-ostree status 2025-12-03T14:08:19.487500738Z I1203 14:08:19.487361 3874 daemon.go:1764] State: idle 2025-12-03T14:08:19.487500738Z Deployments: 2025-12-03T14:08:19.487500738Z * ostree-unverified-registry:quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:411b8fa606f0f605401f0a4477f7f5a3e640d42bd145fdc09b8a78272f8e6baf 2025-12-03T14:08:19.487500738Z Digest: sha256:411b8fa606f0f605401f0a4477f7f5a3e640d42bd145fdc09b8a78272f8e6baf 2025-12-03T14:08:19.487500738Z Version: 418.94.202511041748-0 (2025-11-04T17:53:43Z) 2025-12-03T14:08:19.487500738Z 2025-12-03T14:08:19.487500738Z ostree-unverified-registry:quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:411b8fa606f0f605401f0a4477f7f5a3e640d42bd145fdc09b8a78272f8e6baf 2025-12-03T14:08:19.487500738Z Digest: sha256:411b8fa606f0f605401f0a4477f7f5a3e640d42bd145fdc09b8a78272f8e6baf 2025-12-03T14:08:19.487500738Z Version: 418.94.202511041748-0 (2025-11-04T17:53:43Z) 2025-12-03T14:08:19.488127976Z I1203 14:08:19.488033 3874 coreos.go:53] CoreOS aleph version: mtime=2022-08-01 23:42:11 +0000 UTC 2025-12-03T14:08:19.488127976Z { 2025-12-03T14:08:19.488127976Z "container-image": { 2025-12-03T14:08:19.488127976Z "image-digest": "sha256:795cf0188cbfacb86fa5c7cc03e4d09744fef48d1b2d5da666f585f7bfddfd1d", 2025-12-03T14:08:19.488127976Z "image-labels": { 2025-12-03T14:08:19.488127976Z "containers.bootc": "1", 2025-12-03T14:08:19.488127976Z "coreos-assembler.image-config-checksum": "b444a32e2801642f1e41777fd51fa53304496c58a3a6b15e5964a1f86f866507", 2025-12-03T14:08:19.488127976Z "coreos-assembler.image-input-checksum": "27473740c6ee9dddc1381a35327adb9bb3cfcdd57b1091a13ecbae6ad52b9858", 2025-12-03T14:08:19.488127976Z "io.openshift.build.version-display-names": "machine-os=Red Hat Enterprise Linux CoreOS", 2025-12-03T14:08:19.488127976Z "io.openshift.build.versions": "machine-os=418.94.202510081222-0", 2025-12-03T14:08:19.488127976Z "org.opencontainers.image.revision": "50dffc4eddf7a35af7ec98fa402f7b884a4d5e51", 2025-12-03T14:08:19.488127976Z "org.opencontainers.image.source": "https://github.com/openshift/os", 2025-12-03T14:08:19.488127976Z "org.opencontainers.image.version": "418.94.202510081222-0", 2025-12-03T14:08:19.488127976Z "ostree.bootable": "true", 2025-12-03T14:08:19.488127976Z "ostree.commit": "c7eedae8bc2f7f721f1242cf1e9f42810b24a7692783583bfe42019fc505da50", 2025-12-03T14:08:19.488127976Z "ostree.final-diffid": "sha256:12787d84fa137cd5649a9005efe98ec9d05ea46245fdc50aecb7dd007f2035b1", 2025-12-03T14:08:19.488127976Z "ostree.linux": "5.14.0-427.93.1.el9_4.x86_64", 2025-12-03T14:08:19.488127976Z "rpmostree.inputhash": "0d709a7ac4bfbbc5603449117538c4a678956a262d956114c313c4e9ac68be8e" 2025-12-03T14:08:19.488127976Z }, 2025-12-03T14:08:19.488127976Z "image-name": "oci-archive:/rhcos-418.94.202510081222-0-ostree.x86_64.ociarchive" 2025-12-03T14:08:19.488127976Z }, 2025-12-03T14:08:19.488127976Z "osbuild-version": "147", 2025-12-03T14:08:19.488127976Z "ostree-commit": "c7eedae8bc2f7f721f1242cf1e9f42810b24a7692783583bfe42019fc505da50", 2025-12-03T14:08:19.488127976Z "ref": "docker://ostree-image-signed:oci-archive:/rhcos-418.94.202510081222-0-ostree.x86_64.ociarchive", 2025-12-03T14:08:19.488127976Z "version": "418.94.202510081222-0" 2025-12-03T14:08:19.488127976Z } 2025-12-03T14:08:19.488127976Z I1203 14:08:19.488107 3874 coreos.go:70] Ignition provisioning: time=2025-12-03T13:49:36Z 2025-12-03T14:08:19.488127976Z I1203 14:08:19.488114 3874 image_manager_helper.go:92] Running captured: journalctl --list-boots 2025-12-03T14:08:19.497656137Z I1203 14:08:19.497582 3874 daemon.go:1773] journalctl --list-boots: 2025-12-03T14:08:19.497656137Z IDX BOOT ID FIRST ENTRY LAST ENTRY 2025-12-03T14:08:19.497656137Z -1 5051321cb7a74bc8b64ab5b2f6df7e9d Wed 2025-12-03 13:49:01 UTC Wed 2025-12-03 14:07:18 UTC 2025-12-03T14:08:19.497656137Z 0 764a923eeafb47f486359cb972b9b445 Wed 2025-12-03 14:07:30 UTC Wed 2025-12-03 14:08:19 UTC 2025-12-03T14:08:19.497656137Z I1203 14:08:19.497614 3874 image_manager_helper.go:92] Running captured: systemctl list-units --state=failed --no-legend 2025-12-03T14:08:19.510095121Z I1203 14:08:19.509962 3874 daemon.go:1789] systemd service state: OK 2025-12-03T14:08:19.510095121Z I1203 14:08:19.510028 3874 daemon.go:1361] Starting MachineConfigDaemon 2025-12-03T14:08:19.510210324Z I1203 14:08:19.510144 3874 daemon.go:1368] Enabling Kubelet Healthz Monitor 2025-12-03T14:08:19.562273266Z I1203 14:08:19.562188 3874 daemon.go:2873] Found 0 requested local packages in the booted deployment 2025-12-03T14:08:20.404676003Z I1203 14:08:20.404531 3874 daemon.go:655] Node master-0 is part of the control plane 2025-12-03T14:08:20.506230303Z I1203 14:08:20.506061 3874 daemon.go:1938] Running: /run/machine-config-daemon-bin/nmstatectl persist-nic-names --root / --kargs-out /tmp/nmstate-kargs2162671386 --cleanup 2025-12-03T14:08:20.524287967Z [2025-12-03T14:08:20Z INFO nmstatectl] Nmstate version: 2.2.54 2025-12-03T14:08:20.528928229Z 2025-12-03T14:08:20.528958360Z [2025-12-03T14:08:20Z INFO nmstatectl::persist_nic] /etc/systemd/network does not exist, no need to clean up 2025-12-03T14:08:20.539317615Z I1203 14:08:20.539213 3874 daemon.go:1600] Previous boot ostree-finalize-staged.service appears successful 2025-12-03T14:08:20.539317615Z I1203 14:08:20.539256 3874 daemon.go:1723] Current config: rendered-master-459a0309a4bacb184a38028403c86289 2025-12-03T14:08:20.539317615Z I1203 14:08:20.539264 3874 daemon.go:1724] Desired config: rendered-master-2072f444cb169be2ed482bc255f04f4f 2025-12-03T14:08:20.539317615Z I1203 14:08:20.539269 3874 daemon.go:1732] state: Working 2025-12-03T14:08:20.539317615Z I1203 14:08:20.539306 3874 update.go:2725] Running: rpm-ostree cleanup -r 2025-12-03T14:08:22.733165319Z Bootloader updated; bootconfig swap: yes; bootversion: boot.1.1, deployment count change: -1 2025-12-03T14:08:28.929710284Z I1203 14:08:28.929590 3874 update.go:2770] "Disk currentConfig \"rendered-master-2072f444cb169be2ed482bc255f04f4f\" overrides node's currentConfig annotation \"rendered-master-459a0309a4bacb184a38028403c86289\"" 2025-12-03T14:08:28.933819611Z I1203 14:08:28.933772 3874 daemon.go:2136] Validating against current config rendered-master-2072f444cb169be2ed482bc255f04f4f 2025-12-03T14:08:28.934321665Z I1203 14:08:28.934280 3874 daemon.go:2048] SSH key location ("/home/core/.ssh/authorized_keys.d/ignition") up-to-date! 2025-12-03T14:08:28.934321665Z I1203 14:08:28.934296 3874 image_manager_helper.go:92] Running captured: rpm-ostree kargs 2025-12-03T14:08:29.050643406Z I1203 14:08:29.050595 3874 update.go:2770] "Validated on-disk state" 2025-12-03T14:08:29.058933162Z I1203 14:08:29.058883 3874 daemon.go:2238] Completing update to target MachineConfig: rendered-master-2072f444cb169be2ed482bc255f04f4f 2025-12-03T14:09:19.563484117Z I1203 14:09:19.563342 3874 certificate_writer.go:294] Certificate was synced from controllerconfig resourceVersion 12685 config/pod/openshift-machine-config-operator/machine-config-daemon-2ztl9.json0000640000000000000000000001501015114042274025746 0ustar0000000000000000{"metadata":{"name":"machine-config-daemon-2ztl9","generateName":"machine-config-daemon-","namespace":"openshift-machine-config-operator","uid":"799e819f-f4b2-4ac9-8fa4-7d4da7a79285","resourceVersion":"14761","creationTimestamp":"2025-12-03T13:58:04Z","labels":{"controller-revision-hash":"55846b66db","k8s-app":"machine-config-daemon","pod-template-generation":"1"},"annotations":{"openshift.io/required-scc":"privileged","openshift.io/scc":"privileged"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"DaemonSet","name":"machine-config-daemon","uid":"77c5a31a-6e5f-4fc0-95fb-f7ac32097379","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"rootfs","hostPath":{"path":"/","type":""}},{"name":"proxy-tls","secret":{"secretName":"proxy-tls","defaultMode":420}},{"name":"mcd-auth-proxy-config","configMap":{"name":"kube-rbac-proxy","defaultMode":420}},{"name":"kube-api-access-cbch4","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"machine-config-daemon","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a31af646ce5587c051459a88df413dc30be81e7f15399aa909e19effa7de772a","command":["/usr/bin/machine-config-daemon"],"args":["start","--payload-version=4.18.28"],"ports":[{"name":"health","hostPort":8798,"containerPort":8798,"protocol":"TCP"}],"env":[{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"rootfs","mountPath":"/rootfs","mountPropagation":"HostToContainer"},{"name":"kube-api-access-cbch4","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/health","port":8798,"host":"127.0.0.1","scheme":"HTTP"},"initialDelaySeconds":120,"timeoutSeconds":1,"periodSeconds":30,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"readOnlyRootFilesystem":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","args":["--secure-listen-address=0.0.0.0:9001","--config-file=/etc/kube-rbac-proxy/config-file.yaml","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12","--upstream=http://127.0.0.1:8797","--logtostderr=true","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key"],"ports":[{"name":"metrics","hostPort":9001,"containerPort":9001,"protocol":"TCP"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"proxy-tls","mountPath":"/etc/tls/private"},{"name":"mcd-auth-proxy-config","mountPath":"/etc/kube-rbac-proxy"},{"name":"kube-api-access-cbch4","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":600,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux"},"serviceAccountName":"machine-config-daemon","serviceAccount":"machine-config-daemon","nodeName":"master-0","hostNetwork":true,"hostPID":true,"securityContext":{},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchFields":[{"key":"metadata.name","operator":"In","values":["master-0"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T13:58:39Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T13:58:04Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T13:58:39Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T13:58:39Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T13:58:04Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2025-12-03T13:58:04Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2025-12-03T14:08:16Z"}},"lastState":{},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","containerID":"cri-o://b3ca94a978df3ec904f71631e19f006c6a70b016095b3c0dca3c4a7f1e79fe33","started":true,"volumeMounts":[{"name":"proxy-tls","mountPath":"/etc/tls/private"},{"name":"mcd-auth-proxy-config","mountPath":"/etc/kube-rbac-proxy"},{"name":"kube-api-access-cbch4","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"machine-config-daemon","state":{"running":{"startedAt":"2025-12-03T14:08:16Z"}},"lastState":{},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a31af646ce5587c051459a88df413dc30be81e7f15399aa909e19effa7de772a","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a31af646ce5587c051459a88df413dc30be81e7f15399aa909e19effa7de772a","containerID":"cri-o://231d70dfcd4fcc8eb2b3fb42e727308845d827bcb58bdbab372a9e325bfc9160","started":true,"volumeMounts":[{"name":"rootfs","mountPath":"/rootfs"},{"name":"kube-api-access-cbch4","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-rbac-proxy_current.log0000640000000000000000000000246615114042274035750 0ustar0000000000000000config/pod/openshift-machine-config-operator/logs/machine-config-controller-74cddd4fb5-phk6r2025-12-03T14:08:53.499811495Z W1203 14:08:53.498905 1 deprecated.go:66] 2025-12-03T14:08:53.499811495Z ==== Removed Flag Warning ====================== 2025-12-03T14:08:53.499811495Z 2025-12-03T14:08:53.499811495Z logtostderr is removed in the k8s upstream and has no effect any more. 2025-12-03T14:08:53.499811495Z 2025-12-03T14:08:53.499811495Z =============================================== 2025-12-03T14:08:53.499811495Z 2025-12-03T14:08:53.499811495Z I1203 14:08:53.499105 1 kube-rbac-proxy.go:530] Reading config file: /etc/kube-rbac-proxy/config-file.yaml 2025-12-03T14:08:53.499997471Z I1203 14:08:53.499979 1 kube-rbac-proxy.go:233] Valid token audiences: 2025-12-03T14:08:53.503096624Z I1203 14:08:53.503060 1 kube-rbac-proxy.go:347] Reading certificate files 2025-12-03T14:08:53.504485376Z I1203 14:08:53.503824 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:9001 2025-12-03T14:08:53.504698693Z I1203 14:08:53.504672 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:9001 2025-12-03T14:09:30.245525939Z I1203 14:09:30.245380 1 log.go:245] http: proxy error: dial tcp 127.0.0.1:8797: connect: connection refused 2025-12-03T14:10:00.220626212Z I1203 14:10:00.220444 1 log.go:245] http: proxy error: dial tcp 127.0.0.1:8797: connect: connection refused machine-config-controller_current.log0000640000000000000000000000113715114042274037760 0ustar0000000000000000config/pod/openshift-machine-config-operator/logs/machine-config-controller-74cddd4fb5-phk6r2025-12-03T14:08:53.519770548Z I1203 14:08:53.519330 1 start.go:61] Version: 2cfe7049 (bb2aa85171d93b2df952ed802a8cb200164e666f) 2025-12-03T14:08:53.519770548Z I1203 14:08:53.519656 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2025-12-03T14:08:53.548469455Z I1203 14:08:53.538378 1 leaderelection.go:254] attempting to acquire leader lease openshift-machine-config-operator/machine-config-controller... config/pod/openshift-machine-config-operator/machine-config-controller-74cddd4fb5-phk6r.json0000640000000000000000000001650615114042274030477 0ustar0000000000000000{"metadata":{"name":"machine-config-controller-74cddd4fb5-phk6r","generateName":"machine-config-controller-74cddd4fb5-","namespace":"openshift-machine-config-operator","uid":"8c6fa89f-268c-477b-9f04-238d2305cc89","resourceVersion":"15947","creationTimestamp":"2025-12-03T13:59:22Z","labels":{"k8s-app":"machine-config-controller","pod-template-hash":"74cddd4fb5"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.71/23\"],\"mac_address\":\"0a:58:0a:80:00:47\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.71/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.71\"\n ],\n \"mac\": \"0a:58:0a:80:00:47\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"machine-config-controller-74cddd4fb5","uid":"d9d3acda-32a9-4e45-9d4d-8dbf46d21ca7","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"proxy-tls","secret":{"secretName":"mcc-proxy-tls","defaultMode":420}},{"name":"mcc-auth-proxy-config","configMap":{"name":"kube-rbac-proxy","defaultMode":420}},{"name":"kube-api-access-955zg","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"machine-config-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a31af646ce5587c051459a88df413dc30be81e7f15399aa909e19effa7de772a","command":["/usr/bin/machine-config-controller"],"args":["start","--resourcelock-namespace=openshift-machine-config-operator","--v=2","--payload-version=4.18.28"],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"kube-api-access-955zg","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000340000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","args":["--secure-listen-address=0.0.0.0:9001","--config-file=/etc/kube-rbac-proxy/config-file.yaml","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12","--upstream=http://127.0.0.1:8797","--logtostderr=true","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key"],"ports":[{"name":"metrics","containerPort":9001,"protocol":"TCP"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"proxy-tls","mountPath":"/etc/tls/private"},{"name":"mcc-auth-proxy-config","mountPath":"/etc/kube-rbac-proxy"},{"name":"kube-api-access-955zg","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000340000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"machine-config-controller","serviceAccount":"machine-config-controller","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c18,c17"},"fsGroup":1000340000,"seccompProfile":{"type":"RuntimeDefault"}},"imagePullSecrets":[{"name":"machine-config-controller-dockercfg-n8h5v"}],"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:54Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:00:10Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:54Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:54Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:00:10Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.71","podIPs":[{"ip":"10.128.0.71"}],"startTime":"2025-12-03T14:00:10Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2025-12-03T14:08:53Z"}},"lastState":{},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","containerID":"cri-o://08ced1c3618fdc83fc2e72fb6738f0de722b94b0761b7be5638a318aed1b0c8a","started":true,"volumeMounts":[{"name":"proxy-tls","mountPath":"/etc/tls/private"},{"name":"mcc-auth-proxy-config","mountPath":"/etc/kube-rbac-proxy"},{"name":"kube-api-access-955zg","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"machine-config-controller","state":{"running":{"startedAt":"2025-12-03T14:08:53Z"}},"lastState":{},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a31af646ce5587c051459a88df413dc30be81e7f15399aa909e19effa7de772a","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a31af646ce5587c051459a88df413dc30be81e7f15399aa909e19effa7de772a","containerID":"cri-o://fde44d2f5f0d3ffa96138149beb87e962fc098b20de335ba6bc259e4a6260c13","started":true,"volumeMounts":[{"name":"kube-api-access-955zg","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-rbac-proxy-crio_current.log0000640000000000000000000000225215114042274034455 0ustar0000000000000000config/pod/openshift-machine-config-operator/logs/kube-rbac-proxy-crio-master-02025-12-03T14:07:54.339981174Z W1203 14:07:54.339835 1 deprecated.go:66] 2025-12-03T14:07:54.339981174Z ==== Removed Flag Warning ====================== 2025-12-03T14:07:54.339981174Z 2025-12-03T14:07:54.339981174Z logtostderr is removed in the k8s upstream and has no effect any more. 2025-12-03T14:07:54.339981174Z 2025-12-03T14:07:54.339981174Z =============================================== 2025-12-03T14:07:54.339981174Z 2025-12-03T14:07:54.339981174Z I1203 14:07:54.339942 1 kube-rbac-proxy.go:530] Reading config file: /etc/kubernetes/crio-metrics-proxy.cfg 2025-12-03T14:07:54.344160393Z I1203 14:07:54.344118 1 kube-rbac-proxy.go:233] Valid token audiences: 2025-12-03T14:07:54.344564215Z I1203 14:07:54.344511 1 dynamic_cafile_content.go:160] "Starting controller" name="client-ca::/etc/kubernetes/kubelet-ca.crt" 2025-12-03T14:07:54.347576621Z I1203 14:07:54.347540 1 kube-rbac-proxy.go:347] Reading certificate files 2025-12-03T14:07:54.348675242Z I1203 14:07:54.348638 1 kube-rbac-proxy.go:395] Starting TCP socket on :9637 2025-12-03T14:07:54.349647020Z I1203 14:07:54.349604 1 kube-rbac-proxy.go:402] Listening securely on :9637 config/pod/openshift-machine-config-operator/logs/kube-rbac-proxy-crio-master-0/setup_current.log0000640000000000000000000000012615114042274031726 0ustar00000000000000002025-12-03T14:07:53.389705948Z Waiting for kubelet key and certificate to be availableconfig/pod/openshift-machine-config-operator/kube-rbac-proxy-crio-master-0.json0000640000000000000000000001300615114042274026251 0ustar0000000000000000{"metadata":{"name":"kube-rbac-proxy-crio-master-0","namespace":"openshift-machine-config-operator","uid":"583797aa-63a8-4a46-b3e4-5163c7673be3","resourceVersion":"14754","creationTimestamp":"2025-12-03T13:51:43Z","annotations":{"kubernetes.io/config.hash":"b495b0c38f2c54e7cc46282c5f92aab5","kubernetes.io/config.mirror":"b495b0c38f2c54e7cc46282c5f92aab5","kubernetes.io/config.seen":"2025-12-03T13:50:50.835994693Z","kubernetes.io/config.source":"file","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"bd7abe6d-36d2-4ce8-92a1-7fdd9966d574","controller":true}]},"spec":{"volumes":[{"name":"etc-kube","hostPath":{"path":"/etc/kubernetes","type":""}},{"name":"var-lib-kubelet","hostPath":{"path":"/var/lib/kubelet","type":""}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","command":["/bin/bash","-ec"],"args":["echo -n \"Waiting for kubelet key and certificate to be available\"\nwhile [ -n \"$(test -e /var/lib/kubelet/pki/kubelet-server-current.pem)\" ] ; do\n echo -n \".\"\n sleep 1\n (( tries += 1 ))\n if [[ \"${tries}\" -gt 10 ]]; then\n echo \"Timed out waiting for kubelet key and cert.\"\n exit 1\n fi\ndone\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"var-lib-kubelet","mountPath":"/var","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"kube-rbac-proxy-crio","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","args":["--secure-listen-address=:9637","--config-file=/etc/kubernetes/crio-metrics-proxy.cfg","--client-ca-file=/etc/kubernetes/kubelet-ca.crt","--logtostderr=true","--kubeconfig=/var/lib/kubelet/kubeconfig","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12","--upstream=http://127.0.0.1:9537","--tls-cert-file=/var/lib/kubelet/pki/kubelet-server-current.pem","--tls-private-key-file=/var/lib/kubelet/pki/kubelet-server-current.pem"],"ports":[{"hostPort":9637,"containerPort":9637,"protocol":"TCP"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-kube","readOnly":true,"mountPath":"/etc/kubernetes","mountPropagation":"HostToContainer"},{"name":"var-lib-kubelet","readOnly":true,"mountPath":"/var/lib/kubelet","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:19Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:19Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:19Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:19Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:19Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2025-12-03T14:08:19Z","initContainerStatuses":[{"name":"setup","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2025-12-03T14:07:53Z","finishedAt":"2025-12-03T14:07:53Z","containerID":"cri-o://2bd5deb4c2095551f816b9cd7a952bdeb6888c958c7bf3b53ec320fdd7d14864"}},"lastState":{},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","containerID":"cri-o://2bd5deb4c2095551f816b9cd7a952bdeb6888c958c7bf3b53ec320fdd7d14864","started":false}],"containerStatuses":[{"name":"kube-rbac-proxy-crio","state":{"running":{"startedAt":"2025-12-03T14:07:53Z"}},"lastState":{},"ready":true,"restartCount":5,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","containerID":"cri-o://d60ff94b0488538faf66e4166cf33ce56c841715d1cdb0df2e7ec059f70cc2ae","started":true}],"qosClass":"Burstable"}}cluster-policy-controller_current.log0000640000000000000000000002631115114042274034213 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02025-12-03T14:07:54.587314424Z I1203 14:07:54.587005 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2025-12-03T14:07:54.591818332Z I1203 14:07:54.591744 1 observer_polling.go:159] Starting file observer 2025-12-03T14:07:54.601544339Z I1203 14:07:54.601477 1 builder.go:298] cluster-policy-controller version 4.18.0-202510210939.p2.g5fd8525.assembly.stream.el9-5fd8525-5fd852525909ce6eab52972ba9ce8fcf56528eb9 2025-12-03T14:07:54.607967452Z I1203 14:07:54.607863 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.crt::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.key" 2025-12-03T14:08:16.049031562Z I1203 14:08:16.047393 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2025-12-03T14:08:16.061912318Z I1203 14:08:16.061823 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2025-12-03T14:08:16.061912318Z I1203 14:08:16.061873 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2025-12-03T14:08:16.061960990Z I1203 14:08:16.061945 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2025-12-03T14:08:16.061960990Z I1203 14:08:16.061953 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2025-12-03T14:08:16.069790452Z I1203 14:08:16.068808 1 secure_serving.go:57] Forcing use of http/1.1 only 2025-12-03T14:08:16.069790452Z W1203 14:08:16.068849 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2025-12-03T14:08:16.069790452Z W1203 14:08:16.068857 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2025-12-03T14:08:16.069790452Z W1203 14:08:16.068863 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2025-12-03T14:08:16.069790452Z W1203 14:08:16.068867 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2025-12-03T14:08:16.069790452Z W1203 14:08:16.068900 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2025-12-03T14:08:16.069790452Z W1203 14:08:16.068904 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2025-12-03T14:08:16.069790452Z I1203 14:08:16.068817 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2025-12-03T14:08:16.074616870Z I1203 14:08:16.074548 1 builder.go:439] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2025-12-03T14:08:16.075195936Z I1203 14:08:16.074903 1 leaderelection.go:254] attempting to acquire leader lease kube-system/cluster-policy-controller-lock... 2025-12-03T14:08:16.075858065Z I1203 14:08:16.075827 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2025-12-03T14:08:16.075873746Z I1203 14:08:16.075838 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2025-12-03T14:08:16.075921327Z I1203 14:08:16.075883 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2025-12-03T14:08:16.075921327Z I1203 14:08:16.075907 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.crt::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.key" certDetail="\"system:admin\" [client] groups=[system:masters] issuer=\"kube-control-plane-signer\" (2025-12-03 13:37:22 +0000 UTC to 2026-12-03 13:37:22 +0000 UTC (now=2025-12-03 14:08:16.075873896 +0000 UTC))" 2025-12-03T14:08:16.076448082Z I1203 14:08:16.076043 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1764770874\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1764770874\" (2025-12-03 13:07:54 +0000 UTC to 2026-12-03 13:07:54 +0000 UTC (now=2025-12-03 14:08:16.07602306 +0000 UTC))" 2025-12-03T14:08:16.076448082Z I1203 14:08:16.076064 1 secure_serving.go:213] Serving securely on 127.0.0.1:10357 2025-12-03T14:08:16.076448082Z I1203 14:08:16.076094 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2025-12-03T14:08:16.076448082Z I1203 14:08:16.076119 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.crt::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.key" 2025-12-03T14:08:16.076448082Z I1203 14:08:16.076282 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2025-12-03T14:08:16.081153016Z I1203 14:08:16.081092 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2025-12-03T14:08:16.081153016Z I1203 14:08:16.081093 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2025-12-03T14:08:16.081463455Z I1203 14:08:16.081391 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2025-12-03T14:08:16.087719213Z I1203 14:08:16.084607 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2025-12-03T14:08:16.087719213Z I1203 14:08:16.086575 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2025-12-03T14:08:16.087719213Z I1203 14:08:16.086940 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2025-12-03T14:08:16.182267114Z I1203 14:08:16.182200 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2025-12-03T14:08:16.182446839Z I1203 14:08:16.182243 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2025-12-03T14:08:16.182544712Z I1203 14:08:16.182258 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2025-12-03T14:08:16.183119088Z I1203 14:08:16.183074 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2025-12-03 13:29:46 +0000 UTC to 2035-12-01 13:29:46 +0000 UTC (now=2025-12-03 14:08:16.183018035 +0000 UTC))" 2025-12-03T14:08:16.183166049Z I1203 14:08:16.183139 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2025-12-03 13:37:22 +0000 UTC to 2025-12-04 13:37:22 +0000 UTC (now=2025-12-03 14:08:16.183107068 +0000 UTC))" 2025-12-03T14:08:16.183196650Z I1203 14:08:16.183168 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2025-12-03 13:37:22 +0000 UTC to 2026-12-03 13:37:22 +0000 UTC (now=2025-12-03 14:08:16.183154689 +0000 UTC))" 2025-12-03T14:08:16.183196650Z I1203 14:08:16.183189 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2025-12-03 13:37:22 +0000 UTC to 2026-12-03 13:37:22 +0000 UTC (now=2025-12-03 14:08:16.1831774 +0000 UTC))" 2025-12-03T14:08:16.183252592Z I1203 14:08:16.183206 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2025-12-03 13:37:20 +0000 UTC to 2035-12-01 13:37:20 +0000 UTC (now=2025-12-03 14:08:16.18319517 +0000 UTC))" 2025-12-03T14:08:16.183252592Z I1203 14:08:16.183227 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-csr-signer_@1764770129\" [] issuer=\"kubelet-signer\" (2025-12-03 13:55:28 +0000 UTC to 2025-12-04 13:37:22 +0000 UTC (now=2025-12-03 14:08:16.183215951 +0000 UTC))" 2025-12-03T14:08:16.183252592Z I1203 14:08:16.183246 1 tlsconfig.go:181] "Loaded client CA" index=6 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"openshift-kube-apiserver-operator_node-system-admin-signer@1764770095\" [] issuer=\"\" (2025-12-03 13:54:54 +0000 UTC to 2026-12-03 13:54:55 +0000 UTC (now=2025-12-03 14:08:16.183233641 +0000 UTC))" 2025-12-03T14:08:16.183288703Z I1203 14:08:16.183263 1 tlsconfig.go:181] "Loaded client CA" index=7 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2025-12-03 13:37:20 +0000 UTC to 2025-12-04 13:37:20 +0000 UTC (now=2025-12-03 14:08:16.183252782 +0000 UTC))" 2025-12-03T14:08:16.183608362Z I1203 14:08:16.183573 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.crt::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.key" certDetail="\"system:admin\" [client] groups=[system:masters] issuer=\"kube-control-plane-signer\" (2025-12-03 13:37:22 +0000 UTC to 2026-12-03 13:37:22 +0000 UTC (now=2025-12-03 14:08:16.18354758 +0000 UTC))" 2025-12-03T14:08:16.184510308Z I1203 14:08:16.183771 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1764770874\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1764770874\" (2025-12-03 13:07:54 +0000 UTC to 2026-12-03 13:07:54 +0000 UTC (now=2025-12-03 14:08:16.183744176 +0000 UTC))" kube-controller-manager_current.log0000640000000000000000000006032615114042274033577 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02025-12-03T14:09:03.357863993Z I1203 14:09:03.357136 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress-operator/ingress-operator-85dbd94574" duration="38.311µs" 2025-12-03T14:09:03.397152711Z I1203 14:09:03.397092 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-etcd-operator/etcd-operator-7978bf889c" duration="9.92902ms" 2025-12-03T14:09:03.397271864Z I1203 14:09:03.397251 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-etcd-operator/etcd-operator-7978bf889c" duration="65.492µs" 2025-12-03T14:09:03.417346301Z I1203 14:09:03.416951 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/package-server-manager-75b4d49d4c" duration="49.942µs" 2025-12-03T14:09:03.485264453Z I1203 14:09:03.484472 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-dns-operator/dns-operator-6b7bcd6566" duration="94.673µs" 2025-12-03T14:09:03.551904957Z I1203 14:09:03.551431 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-console-operator/console-operator-77df56447c" duration="22.448868ms" 2025-12-03T14:09:03.551904957Z I1203 14:09:03.551516 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-console-operator/console-operator-77df56447c" duration="50.061µs" 2025-12-03T14:09:03.639791433Z I1203 14:09:03.638611 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-controller/operator-controller-controller-manager-5f78c89466" duration="62.602µs" 2025-12-03T14:09:03.688827505Z I1203 14:09:03.688757 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-route-controller-manager/route-controller-manager-678c7f799b" duration="17.576451ms" 2025-12-03T14:09:03.688940198Z I1203 14:09:03.688917 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-route-controller-manager/route-controller-manager-678c7f799b" duration="73.402µs" 2025-12-03T14:09:03.715854812Z I1203 14:09:03.710730 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-olm-operator/cluster-olm-operator-589f5cdc9d" duration="111.583µs" 2025-12-03T14:09:03.764517582Z I1203 14:09:03.764385 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-kube-controller-manager-operator/kube-controller-manager-operator-b5dddf8f5" duration="23.80979ms" 2025-12-03T14:09:03.764579684Z I1203 14:09:03.764539 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-kube-controller-manager-operator/kube-controller-manager-operator-b5dddf8f5" duration="81.363µs" 2025-12-03T14:09:03.774694050Z I1203 14:09:03.774627 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-catalogd/catalogd-controller-manager-754cfd84" duration="53.571µs" 2025-12-03T14:09:03.808680677Z I1203 14:09:03.808606 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-console/downloads-6f5db8559b" duration="70.962µs" 2025-12-03T14:09:03.860814022Z I1203 14:09:03.860749 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/thanos-querier-cc996c4bd" duration="101.473µs" 2025-12-03T14:09:03.899537052Z I1203 14:09:03.899453 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-credential-operator/cloud-credential-operator-7c4dc67499" duration="9.841977ms" 2025-12-03T14:09:03.899579244Z I1203 14:09:03.899537 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-credential-operator/cloud-credential-operator-7c4dc67499" duration="42.651µs" 2025-12-03T14:09:03.926568339Z I1203 14:09:03.924516 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-config-operator/openshift-config-operator-68c95b6cf5" duration="95.873µs" 2025-12-03T14:09:03.997470702Z I1203 14:09:03.996359 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-controller-manager/controller-manager-78d987764b" duration="23.682805ms" 2025-12-03T14:09:03.997470702Z I1203 14:09:03.996559 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-controller-manager/controller-manager-78d987764b" duration="150.274µs" 2025-12-03T14:09:04.102218537Z I1203 14:09:04.102142 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-dns-operator/dns-operator-6b7bcd6566" duration="13.966922ms" 2025-12-03T14:09:04.102341061Z I1203 14:09:04.102312 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-dns-operator/dns-operator-6b7bcd6566" duration="123.154µs" 2025-12-03T14:09:04.116639973Z I1203 14:09:04.116561 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-controller/operator-controller-controller-manager-5f78c89466" duration="50.431µs" 2025-12-03T14:09:04.144713241Z I1203 14:09:04.143620 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-oauth-apiserver/apiserver-57fd58bc7b" duration="69.942µs" 2025-12-03T14:09:04.180485182Z I1203 14:09:04.178668 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-olm-operator/cluster-olm-operator-589f5cdc9d" duration="12.728125ms" 2025-12-03T14:09:04.180485182Z I1203 14:09:04.178730 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-olm-operator/cluster-olm-operator-589f5cdc9d" duration="27.021µs" 2025-12-03T14:09:04.222867853Z I1203 14:09:04.222790 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/thanos-querier-cc996c4bd" duration="19.834909ms" 2025-12-03T14:09:04.222975706Z I1203 14:09:04.222902 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/thanos-querier-cc996c4bd" duration="70.502µs" 2025-12-03T14:09:04.247148467Z I1203 14:09:04.245236 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-apiserver/apiserver-6985f84b49" duration="65.381µs" 2025-12-03T14:09:05.418021119Z I1203 14:09:05.417907 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-config-operator/openshift-config-operator-68c95b6cf5" duration="224.909635ms" 2025-12-03T14:09:05.418101001Z I1203 14:09:05.418076 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-config-operator/openshift-config-operator-68c95b6cf5" duration="102.573µs" 2025-12-03T14:09:07.269335023Z I1203 14:09:07.269267 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-controller/operator-controller-controller-manager-5f78c89466" duration="11.224589ms" 2025-12-03T14:09:07.269555170Z I1203 14:09:07.269533 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-controller/operator-controller-controller-manager-5f78c89466" duration="85.052µs" 2025-12-03T14:09:07.297187605Z I1203 14:09:07.297089 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-oauth-apiserver/apiserver-57fd58bc7b" duration="15.568471ms" 2025-12-03T14:09:07.297275758Z I1203 14:09:07.297245 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-oauth-apiserver/apiserver-57fd58bc7b" duration="96.683µs" 2025-12-03T14:09:09.033031450Z I1203 14:09:09.032884 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-apiserver/apiserver-6985f84b49" duration="85.573µs" 2025-12-03T14:09:09.636142025Z I1203 14:09:09.636068 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-apiserver/apiserver-6985f84b49" duration="239.24052ms" 2025-12-03T14:09:09.636219648Z I1203 14:09:09.636192 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-apiserver/apiserver-6985f84b49" duration="85.333µs" 2025-12-03T14:09:16.243215802Z I1203 14:09:16.241534 1 replica_set.go:477] "pod will be enqueued after a while for availability check" logger="replicaset-controller" duration=5 kind="ReplicaSet" pod="openshift-catalogd/catalogd-controller-manager-754cfd84-qf898" 2025-12-03T14:09:19.884116616Z I1203 14:09:19.884026 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-catalogd/catalogd-controller-manager-754cfd84" duration="3.64206639s" 2025-12-03T14:09:21.591867444Z I1203 14:09:21.591166 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-catalogd/catalogd-controller-manager-754cfd84" duration="1.706880551s" 2025-12-03T14:09:21.591867444Z I1203 14:09:21.591344 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-catalogd/catalogd-controller-manager-754cfd84" duration="110.474µs" 2025-12-03T14:09:22.242561967Z I1203 14:09:22.242364 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-catalogd/catalogd-controller-manager-754cfd84" duration="190.116µs" 2025-12-03T14:09:26.254177265Z I1203 14:09:26.254097 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-console/downloads-6f5db8559b" duration="16.512819ms" 2025-12-03T14:09:26.254514875Z I1203 14:09:26.254475 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-console/downloads-6f5db8559b" duration="95.523µs" 2025-12-03T14:09:30.426984222Z E1203 14:09:30.426772 1 resource_quota_controller.go:446] "Unhandled Error" err="unable to retrieve the complete list of server APIs: metrics.k8s.io/v1beta1: stale GroupVersion discovery: metrics.k8s.io/v1beta1" logger="UnhandledError" 2025-12-03T14:09:30.428159357Z I1203 14:09:30.428103 1 resource_quota_controller.go:476] "syncing resource quota controller with updated resources from discovery" logger="resourcequota-controller" diff="added: [apps.openshift.io/v1, Resource=deploymentconfigs authorization.openshift.io/v1, Resource=rolebindingrestrictions build.openshift.io/v1, Resource=buildconfigs build.openshift.io/v1, Resource=builds image.openshift.io/v1, Resource=imagestreams route.openshift.io/v1, Resource=routes template.openshift.io/v1, Resource=templateinstances template.openshift.io/v1, Resource=templates], removed: []" 2025-12-03T14:09:30.428770156Z I1203 14:09:30.428678 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" logger="resourcequota-controller" resource="builds.build.openshift.io" 2025-12-03T14:09:30.428868059Z I1203 14:09:30.428829 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" logger="resourcequota-controller" resource="deploymentconfigs.apps.openshift.io" 2025-12-03T14:09:30.429010073Z I1203 14:09:30.428969 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" logger="resourcequota-controller" resource="routes.route.openshift.io" 2025-12-03T14:09:30.429083265Z I1203 14:09:30.429043 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" logger="resourcequota-controller" resource="rolebindingrestrictions.authorization.openshift.io" 2025-12-03T14:09:30.429151527Z I1203 14:09:30.429120 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" logger="resourcequota-controller" resource="imagestreams.image.openshift.io" 2025-12-03T14:09:30.429187428Z I1203 14:09:30.429162 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" logger="resourcequota-controller" resource="buildconfigs.build.openshift.io" 2025-12-03T14:09:30.429289392Z I1203 14:09:30.429250 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" logger="resourcequota-controller" resource="templateinstances.template.openshift.io" 2025-12-03T14:09:30.429352053Z I1203 14:09:30.429321 1 resource_quota_monitor.go:227] "QuotaMonitor created object count evaluator" logger="resourcequota-controller" resource="templates.template.openshift.io" 2025-12-03T14:09:30.431083846Z I1203 14:09:30.430456 1 shared_informer.go:313] Waiting for caches to sync for resource quota 2025-12-03T14:09:30.433952032Z I1203 14:09:30.433884 1 reflector.go:368] Caches populated for *v1.DeploymentConfig from github.com/openshift/client-go@v0.0.0-20241001162912-da6d55e4611f/apps/informers/externalversions/factory.go:125 2025-12-03T14:09:30.434263012Z I1203 14:09:30.434209 1 reflector.go:368] Caches populated for *v1.Route from github.com/openshift/client-go@v0.0.0-20241001162912-da6d55e4611f/route/informers/externalversions/factory.go:125 2025-12-03T14:09:30.434814859Z I1203 14:09:30.434554 1 reflector.go:368] Caches populated for *v1.TemplateInstance from github.com/openshift/client-go@v0.0.0-20241001162912-da6d55e4611f/template/informers/externalversions/factory.go:125 2025-12-03T14:09:30.454904456Z I1203 14:09:30.454800 1 reflector.go:368] Caches populated for *v1.Template from github.com/openshift/client-go@v0.0.0-20241001162912-da6d55e4611f/template/informers/externalversions/factory.go:125 2025-12-03T14:09:30.457576556Z I1203 14:09:30.457505 1 reflector.go:368] Caches populated for *v1.BuildConfig from github.com/openshift/client-go@v0.0.0-20241001162912-da6d55e4611f/build/informers/externalversions/factory.go:125 2025-12-03T14:09:30.458658929Z I1203 14:09:30.458609 1 reflector.go:368] Caches populated for *v1.ImageStream from github.com/openshift/client-go@v0.0.0-20241001162912-da6d55e4611f/image/informers/externalversions/factory.go:125 2025-12-03T14:09:30.460695171Z I1203 14:09:30.460633 1 reflector.go:368] Caches populated for *v1.Build from github.com/openshift/client-go@v0.0.0-20241001162912-da6d55e4611f/build/informers/externalversions/factory.go:125 2025-12-03T14:09:30.584049088Z I1203 14:09:30.583957 1 reflector.go:368] Caches populated for *v1.RoleBindingRestriction from github.com/openshift/client-go@v0.0.0-20241001162912-da6d55e4611f/authorization/informers/externalversions/factory.go:125 2025-12-03T14:09:30.631544344Z I1203 14:09:30.631463 1 shared_informer.go:320] Caches are synced for resource quota 2025-12-03T14:09:30.631653917Z I1203 14:09:30.631633 1 resource_quota_controller.go:502] "synced quota controller" logger="resourcequota-controller" 2025-12-03T14:09:31.252028024Z I1203 14:09:31.251883 1 garbagecollector.go:826] "failed to discover some groups" logger="garbage-collector-controller" groups="" 2025-12-03T14:09:31.252392705Z I1203 14:09:31.252289 1 garbagecollector.go:232] "syncing garbage collector with updated resources from discovery" logger="garbage-collector-controller" attempt=1 diff="added: [apps.openshift.io/v1, Resource=deploymentconfigs authorization.openshift.io/v1, Resource=rolebindingrestrictions build.openshift.io/v1, Resource=buildconfigs build.openshift.io/v1, Resource=builds image.openshift.io/v1, Resource=images image.openshift.io/v1, Resource=imagestreams oauth.openshift.io/v1, Resource=oauthaccesstokens oauth.openshift.io/v1, Resource=oauthauthorizetokens oauth.openshift.io/v1, Resource=oauthclientauthorizations oauth.openshift.io/v1, Resource=oauthclients oauth.openshift.io/v1, Resource=useroauthaccesstokens project.openshift.io/v1, Resource=projects quota.openshift.io/v1, Resource=clusterresourcequotas route.openshift.io/v1, Resource=routes security.openshift.io/v1, Resource=rangeallocations security.openshift.io/v1, Resource=securitycontextconstraints template.openshift.io/v1, Resource=brokertemplateinstances template.openshift.io/v1, Resource=templateinstances template.openshift.io/v1, Resource=templates user.openshift.io/v1, Resource=groups user.openshift.io/v1, Resource=identities user.openshift.io/v1, Resource=users], removed: []" 2025-12-03T14:09:31.266958015Z I1203 14:09:31.266860 1 graph_builder.go:456] "item references an owner with coordinates that do not match the observed identity" logger="garbage-collector-controller" item="[route.openshift.io/v1/Route, namespace: openshift-ingress-canary, name: canary, uid: 00c92983-a7a6-44d0-9768-6e258e8c0bc6]" owner="[apps/v1/DaemonSet, namespace: openshift-ingress-canary, name: ingress-canary, uid: 641599fb-53e3-4282-af60-f5b50eabc7dc]" 2025-12-03T14:09:31.267256104Z I1203 14:09:31.267199 1 shared_informer.go:313] Waiting for caches to sync for garbage collector 2025-12-03T14:09:31.269918715Z I1203 14:09:31.269839 1 reflector.go:368] Caches populated for *v1.ClusterResourceQuota from github.com/openshift/client-go@v0.0.0-20241001162912-da6d55e4611f/quota/informers/externalversions/factory.go:125 2025-12-03T14:09:31.272619356Z I1203 14:09:31.272487 1 reflector.go:368] Caches populated for *v1.UserOAuthAccessToken from github.com/openshift/client-go@v0.0.0-20241001162912-da6d55e4611f/oauth/informers/externalversions/factory.go:125 2025-12-03T14:09:31.272684598Z I1203 14:09:31.272564 1 reflector.go:368] Caches populated for *v1.RangeAllocation from github.com/openshift/client-go@v0.0.0-20241001162912-da6d55e4611f/security/informers/externalversions/factory.go:125 2025-12-03T14:09:31.274545424Z I1203 14:09:31.272780 1 reflector.go:368] Caches populated for *v1.BrokerTemplateInstance from github.com/openshift/client-go@v0.0.0-20241001162912-da6d55e4611f/template/informers/externalversions/factory.go:125 2025-12-03T14:09:31.274545424Z I1203 14:09:31.274511 1 reflector.go:368] Caches populated for *v1.SecurityContextConstraints from github.com/openshift/client-go@v0.0.0-20241001162912-da6d55e4611f/security/informers/externalversions/factory.go:125 2025-12-03T14:09:31.370893336Z I1203 14:09:31.368752 1 shared_informer.go:320] Caches are synced for garbage collector 2025-12-03T14:09:31.370893336Z I1203 14:09:31.368832 1 garbagecollector.go:281] "synced garbage collector" logger="garbage-collector-controller" 2025-12-03T14:09:31.370893336Z I1203 14:09:31.368937 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[route.openshift.io/v1/Route, namespace: openshift-ingress-canary, name: canary, uid: 00c92983-a7a6-44d0-9768-6e258e8c0bc6]" virtual=false 2025-12-03T14:09:31.609918209Z I1203 14:09:31.609306 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[route.openshift.io/v1/Route, namespace: openshift-ingress-canary, name: canary, uid: 00c92983-a7a6-44d0-9768-6e258e8c0bc6]" owner=[{"apiVersion":"apps/v1","kind":"daemonset","name":"ingress-canary","uid":"641599fb-53e3-4282-af60-f5b50eabc7dc","controller":true}] 2025-12-03T14:09:37.555334832Z I1203 14:09:37.554642 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress/router-default-54f97f57" duration="115.503µs" 2025-12-03T14:09:37.586483903Z I1203 14:09:37.586375 1 replica_set.go:477] "pod will be enqueued after a while for availability check" logger="replicaset-controller" duration=30 kind="ReplicaSet" pod="openshift-ingress/router-default-54f97f57-rr9px" 2025-12-03T14:09:37.608966212Z I1203 14:09:37.608872 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress/router-default-54f97f57" duration="21.618694ms" 2025-12-03T14:09:37.609461767Z I1203 14:09:37.609404 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress/router-default-54f97f57" duration="73.832µs" 2025-12-03T14:09:37.633499544Z I1203 14:09:37.632901 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/package-server-manager-75b4d49d4c" duration="21.475089ms" 2025-12-03T14:09:37.633499544Z I1203 14:09:37.633007 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-operator-lifecycle-manager/package-server-manager-75b4d49d4c" duration="62.132µs" 2025-12-03T14:09:37.651523838Z I1203 14:09:37.650161 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-operator-lifecycle-manager/package-server-manager" err="Operation cannot be fulfilled on deployments.apps \"package-server-manager\": the object has been modified; please apply your changes to the latest version and try again" 2025-12-03T14:09:37.676604726Z I1203 14:09:37.675575 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-555496955b" duration="14.053985ms" 2025-12-03T14:09:37.676604726Z I1203 14:09:37.675685 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-555496955b" duration="63.072µs" 2025-12-03T14:09:49.587332885Z I1203 14:09:49.587227 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-console/console-c5d7cd7f9" duration="75.612µs" 2025-12-03T14:09:51.736165170Z I1203 14:09:51.736077 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-console/console-c5d7cd7f9" duration="18.794668ms" 2025-12-03T14:09:51.736273173Z I1203 14:09:51.736243 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-console/console-c5d7cd7f9" duration="107.033µs" 2025-12-03T14:09:51.793230924Z I1203 14:09:51.793135 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-console/console-648d88c756" duration="23.535911ms" 2025-12-03T14:09:51.793394489Z I1203 14:09:51.793351 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-console/console-648d88c756" duration="138.524µs" 2025-12-03T14:09:51.808780774Z I1203 14:09:51.808697 1 replica_set.go:624] "Too many replicas" logger="replicaset-controller" replicaSet="openshift-console/console-c5d7cd7f9" need=0 deleting=1 2025-12-03T14:09:51.808844316Z I1203 14:09:51.808788 1 replica_set.go:251] "Found related ReplicaSets" logger="replicaset-controller" replicaSet="openshift-console/console-c5d7cd7f9" relatedReplicaSets=["openshift-console/console-648d88c756","openshift-console/console-c5d7cd7f9"] 2025-12-03T14:09:51.809010211Z I1203 14:09:51.808977 1 controller_utils.go:608] "Deleting pod" logger="replicaset-controller" controller="console-c5d7cd7f9" pod="openshift-console/console-c5d7cd7f9-2hp75" 2025-12-03T14:09:51.838542143Z I1203 14:09:51.838479 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-console/console-c5d7cd7f9" duration="29.7861ms" 2025-12-03T14:09:51.850216026Z I1203 14:09:51.850140 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-console/console-c5d7cd7f9" duration="11.59053ms" 2025-12-03T14:09:51.850410932Z I1203 14:09:51.850378 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-console/console-c5d7cd7f9" duration="75.383µs" kube-controller-manager_previous.log0000640000000000000000000003171115114042274033765 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02025-12-03T14:07:53.945394844Z I1203 14:07:53.945387 1 flags.go:64] FLAG: --requestheader-allowed-names="[]" 2025-12-03T14:07:53.945403994Z I1203 14:07:53.945393 1 flags.go:64] FLAG: --requestheader-client-ca-file="" 2025-12-03T14:07:53.945403994Z I1203 14:07:53.945397 1 flags.go:64] FLAG: --requestheader-extra-headers-prefix="[x-remote-extra-]" 2025-12-03T14:07:53.945413104Z I1203 14:07:53.945403 1 flags.go:64] FLAG: --requestheader-group-headers="[x-remote-group]" 2025-12-03T14:07:53.945413104Z I1203 14:07:53.945409 1 flags.go:64] FLAG: --requestheader-username-headers="[x-remote-user]" 2025-12-03T14:07:53.945440055Z I1203 14:07:53.945431 1 flags.go:64] FLAG: --resource-quota-sync-period="5m0s" 2025-12-03T14:07:53.945452645Z I1203 14:07:53.945437 1 flags.go:64] FLAG: --root-ca-file="/etc/kubernetes/secrets/kube-apiserver-complete-server-ca-bundle.crt" 2025-12-03T14:07:53.945452645Z I1203 14:07:53.945443 1 flags.go:64] FLAG: --route-reconciliation-period="10s" 2025-12-03T14:07:53.945452645Z I1203 14:07:53.945447 1 flags.go:64] FLAG: --secondary-node-eviction-rate="0.01" 2025-12-03T14:07:53.945462325Z I1203 14:07:53.945451 1 flags.go:64] FLAG: --secure-port="10257" 2025-12-03T14:07:53.945462325Z I1203 14:07:53.945456 1 flags.go:64] FLAG: --service-account-private-key-file="/etc/kubernetes/secrets/service-account.key" 2025-12-03T14:07:53.945471556Z I1203 14:07:53.945460 1 flags.go:64] FLAG: --service-cluster-ip-range="172.30.0.0/16" 2025-12-03T14:07:53.945471556Z I1203 14:07:53.945464 1 flags.go:64] FLAG: --show-hidden-metrics-for-version="" 2025-12-03T14:07:53.945471556Z I1203 14:07:53.945468 1 flags.go:64] FLAG: --terminated-pod-gc-threshold="12500" 2025-12-03T14:07:53.945492726Z I1203 14:07:53.945472 1 flags.go:64] FLAG: --tls-cert-file="" 2025-12-03T14:07:53.945492726Z I1203 14:07:53.945476 1 flags.go:64] FLAG: --tls-cipher-suites="[]" 2025-12-03T14:07:53.945492726Z I1203 14:07:53.945482 1 flags.go:64] FLAG: --tls-min-version="" 2025-12-03T14:07:53.945492726Z I1203 14:07:53.945485 1 flags.go:64] FLAG: --tls-private-key-file="" 2025-12-03T14:07:53.945503327Z I1203 14:07:53.945489 1 flags.go:64] FLAG: --tls-sni-cert-key="[]" 2025-12-03T14:07:53.945503327Z I1203 14:07:53.945495 1 flags.go:64] FLAG: --unhealthy-zone-threshold="0.55" 2025-12-03T14:07:53.945503327Z I1203 14:07:53.945499 1 flags.go:64] FLAG: --unsupported-kube-api-over-localhost="false" 2025-12-03T14:07:53.945512957Z I1203 14:07:53.945503 1 flags.go:64] FLAG: --use-service-account-credentials="true" 2025-12-03T14:07:53.945512957Z I1203 14:07:53.945507 1 flags.go:64] FLAG: --v="2" 2025-12-03T14:07:53.945526377Z I1203 14:07:53.945513 1 flags.go:64] FLAG: --version="false" 2025-12-03T14:07:53.945526377Z I1203 14:07:53.945519 1 flags.go:64] FLAG: --vmodule="" 2025-12-03T14:07:53.945826376Z W1203 14:07:53.945802 1 feature_gate.go:330] unrecognized feature gate: PrivateHostedZoneAWS 2025-12-03T14:07:53.945826376Z W1203 14:07:53.945814 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallAWS 2025-12-03T14:07:53.945826376Z W1203 14:07:53.945818 1 feature_gate.go:330] unrecognized feature gate: ClusterMonitoringConfig 2025-12-03T14:07:53.945826376Z W1203 14:07:53.945823 1 feature_gate.go:330] unrecognized feature gate: NetworkDiagnosticsConfig 2025-12-03T14:07:53.945849366Z W1203 14:07:53.945827 1 feature_gate.go:330] unrecognized feature gate: PlatformOperators 2025-12-03T14:07:53.945849366Z W1203 14:07:53.945831 1 feature_gate.go:330] unrecognized feature gate: MetricsCollectionProfiles 2025-12-03T14:07:53.945849366Z W1203 14:07:53.945834 1 feature_gate.go:330] unrecognized feature gate: VSphereMultiNetworks 2025-12-03T14:07:53.945849366Z W1203 14:07:53.945838 1 feature_gate.go:330] unrecognized feature gate: MinimumKubeletVersion 2025-12-03T14:07:53.945849366Z W1203 14:07:53.945841 1 feature_gate.go:330] unrecognized feature gate: AlibabaPlatform 2025-12-03T14:07:53.945849366Z W1203 14:07:53.945845 1 feature_gate.go:330] unrecognized feature gate: BareMetalLoadBalancer 2025-12-03T14:07:53.945860407Z W1203 14:07:53.945850 1 feature_gate.go:353] Setting GA feature gate DisableKubeletCloudCredentialProviders=true. It will be removed in a future release. 2025-12-03T14:07:53.945860407Z W1203 14:07:53.945855 1 feature_gate.go:330] unrecognized feature gate: SignatureStores 2025-12-03T14:07:53.945869547Z W1203 14:07:53.945859 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallGCP 2025-12-03T14:07:53.945869547Z W1203 14:07:53.945864 1 feature_gate.go:330] unrecognized feature gate: GCPClusterHostedDNS 2025-12-03T14:07:53.945878727Z W1203 14:07:53.945869 1 feature_gate.go:330] unrecognized feature gate: MachineConfigNodes 2025-12-03T14:07:53.945878727Z W1203 14:07:53.945873 1 feature_gate.go:330] unrecognized feature gate: ExternalOIDC 2025-12-03T14:07:53.945878727Z W1203 14:07:53.945876 1 feature_gate.go:330] unrecognized feature gate: InsightsOnDemandDataGather 2025-12-03T14:07:53.945888138Z W1203 14:07:53.945879 1 feature_gate.go:330] unrecognized feature gate: GatewayAPI 2025-12-03T14:07:53.945888138Z W1203 14:07:53.945883 1 feature_gate.go:330] unrecognized feature gate: ChunkSizeMiB 2025-12-03T14:07:53.945990140Z W1203 14:07:53.945886 1 feature_gate.go:330] unrecognized feature gate: BuildCSIVolumes 2025-12-03T14:07:53.945990140Z W1203 14:07:53.945982 1 feature_gate.go:330] unrecognized feature gate: ManagedBootImages 2025-12-03T14:07:53.946002571Z W1203 14:07:53.945988 1 feature_gate.go:330] unrecognized feature gate: InsightsConfig 2025-12-03T14:07:53.946002571Z W1203 14:07:53.945993 1 feature_gate.go:330] unrecognized feature gate: VSphereDriverConfiguration 2025-12-03T14:07:53.946002571Z W1203 14:07:53.945997 1 feature_gate.go:330] unrecognized feature gate: NetworkSegmentation 2025-12-03T14:07:53.946012731Z W1203 14:07:53.946000 1 feature_gate.go:330] unrecognized feature gate: SetEIPForNLBIngressController 2025-12-03T14:07:53.946012731Z W1203 14:07:53.946005 1 feature_gate.go:330] unrecognized feature gate: CSIDriverSharedResource 2025-12-03T14:07:53.946012731Z W1203 14:07:53.946008 1 feature_gate.go:330] unrecognized feature gate: NetworkLiveMigration 2025-12-03T14:07:53.946022561Z W1203 14:07:53.946011 1 feature_gate.go:330] unrecognized feature gate: DNSNameResolver 2025-12-03T14:07:53.946022561Z W1203 14:07:53.946015 1 feature_gate.go:330] unrecognized feature gate: InsightsRuntimeExtractor 2025-12-03T14:07:53.946022561Z W1203 14:07:53.946018 1 feature_gate.go:330] unrecognized feature gate: MachineAPIMigration 2025-12-03T14:07:53.946032142Z W1203 14:07:53.946023 1 feature_gate.go:330] unrecognized feature gate: VolumeGroupSnapshot 2025-12-03T14:07:53.946032142Z W1203 14:07:53.946027 1 feature_gate.go:330] unrecognized feature gate: GCPLabelsTags 2025-12-03T14:07:53.946053582Z W1203 14:07:53.946031 1 feature_gate.go:330] unrecognized feature gate: MixedCPUsAllocation 2025-12-03T14:07:53.946053582Z W1203 14:07:53.946036 1 feature_gate.go:330] unrecognized feature gate: ImageStreamImportMode 2025-12-03T14:07:53.946053582Z W1203 14:07:53.946040 1 feature_gate.go:330] unrecognized feature gate: MachineAPIOperatorDisableMachineHealthCheckController 2025-12-03T14:07:53.946053582Z W1203 14:07:53.946043 1 feature_gate.go:330] unrecognized feature gate: AWSEFSDriverVolumeMetrics 2025-12-03T14:07:53.946053582Z W1203 14:07:53.946047 1 feature_gate.go:330] unrecognized feature gate: MachineAPIProviderOpenStack 2025-12-03T14:07:53.946053582Z W1203 14:07:53.946050 1 feature_gate.go:330] unrecognized feature gate: ManagedBootImagesAWS 2025-12-03T14:07:53.946064713Z W1203 14:07:53.946054 1 feature_gate.go:330] unrecognized feature gate: AWSClusterHostedDNS 2025-12-03T14:07:53.946064713Z W1203 14:07:53.946057 1 feature_gate.go:330] unrecognized feature gate: OpenShiftPodSecurityAdmission 2025-12-03T14:07:53.946064713Z W1203 14:07:53.946060 1 feature_gate.go:330] unrecognized feature gate: NewOLM 2025-12-03T14:07:53.946074253Z W1203 14:07:53.946065 1 feature_gate.go:330] unrecognized feature gate: RouteAdvertisements 2025-12-03T14:07:53.946074253Z W1203 14:07:53.946069 1 feature_gate.go:330] unrecognized feature gate: AutomatedEtcdBackup 2025-12-03T14:07:53.946083513Z W1203 14:07:53.946074 1 feature_gate.go:353] Setting GA feature gate CloudDualStackNodeIPs=true. It will be removed in a future release. 2025-12-03T14:07:53.946083513Z W1203 14:07:53.946079 1 feature_gate.go:330] unrecognized feature gate: NodeDisruptionPolicy 2025-12-03T14:07:53.946092483Z W1203 14:07:53.946082 1 feature_gate.go:330] unrecognized feature gate: HardwareSpeed 2025-12-03T14:07:53.946092483Z W1203 14:07:53.946086 1 feature_gate.go:330] unrecognized feature gate: VSphereStaticIPs 2025-12-03T14:07:53.946101524Z W1203 14:07:53.946091 1 feature_gate.go:353] Setting GA feature gate ValidatingAdmissionPolicy=true. It will be removed in a future release. 2025-12-03T14:07:53.946101524Z W1203 14:07:53.946096 1 feature_gate.go:330] unrecognized feature gate: OVNObservability 2025-12-03T14:07:53.946110684Z W1203 14:07:53.946100 1 feature_gate.go:330] unrecognized feature gate: IngressControllerLBSubnetsAWS 2025-12-03T14:07:53.946110684Z W1203 14:07:53.946104 1 feature_gate.go:330] unrecognized feature gate: SigstoreImageVerification 2025-12-03T14:07:53.946119724Z W1203 14:07:53.946110 1 feature_gate.go:351] Setting deprecated feature gate KMSv1=true. It will be removed in a future release. 2025-12-03T14:07:53.946119724Z W1203 14:07:53.946115 1 feature_gate.go:330] unrecognized feature gate: VSphereControlPlaneMachineSet 2025-12-03T14:07:53.946128854Z W1203 14:07:53.946118 1 feature_gate.go:330] unrecognized feature gate: VSphereMultiVCenters 2025-12-03T14:07:53.946128854Z W1203 14:07:53.946122 1 feature_gate.go:330] unrecognized feature gate: InsightsConfigAPI 2025-12-03T14:07:53.946128854Z W1203 14:07:53.946125 1 feature_gate.go:330] unrecognized feature gate: ClusterAPIInstall 2025-12-03T14:07:53.946138005Z W1203 14:07:53.946129 1 feature_gate.go:330] unrecognized feature gate: IngressControllerDynamicConfigurationManager 2025-12-03T14:07:53.946138005Z W1203 14:07:53.946132 1 feature_gate.go:330] unrecognized feature gate: Example 2025-12-03T14:07:53.946147205Z W1203 14:07:53.946136 1 feature_gate.go:330] unrecognized feature gate: AdditionalRoutingCapabilities 2025-12-03T14:07:53.946147205Z W1203 14:07:53.946140 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallAzure 2025-12-03T14:07:53.946147205Z W1203 14:07:53.946144 1 feature_gate.go:330] unrecognized feature gate: EtcdBackendQuota 2025-12-03T14:07:53.946162065Z W1203 14:07:53.946147 1 feature_gate.go:330] unrecognized feature gate: PinnedImages 2025-12-03T14:07:53.946162065Z W1203 14:07:53.946151 1 feature_gate.go:330] unrecognized feature gate: ConsolePluginContentSecurityPolicy 2025-12-03T14:07:53.946162065Z W1203 14:07:53.946154 1 feature_gate.go:330] unrecognized feature gate: AzureWorkloadIdentity 2025-12-03T14:07:53.946162065Z W1203 14:07:53.946157 1 feature_gate.go:330] unrecognized feature gate: BootcNodeManagement 2025-12-03T14:07:53.946172036Z W1203 14:07:53.946161 1 feature_gate.go:330] unrecognized feature gate: PersistentIPsForVirtualization 2025-12-03T14:07:53.946172036Z W1203 14:07:53.946164 1 feature_gate.go:330] unrecognized feature gate: UpgradeStatus 2025-12-03T14:07:53.946172036Z W1203 14:07:53.946168 1 feature_gate.go:330] unrecognized feature gate: AdminNetworkPolicy 2025-12-03T14:07:53.946181786Z W1203 14:07:53.946171 1 feature_gate.go:330] unrecognized feature gate: ExternalOIDCWithUIDAndExtraClaimMappings 2025-12-03T14:07:53.946181786Z W1203 14:07:53.946175 1 feature_gate.go:330] unrecognized feature gate: OnClusterBuild 2025-12-03T14:07:53.946181786Z W1203 14:07:53.946179 1 feature_gate.go:330] unrecognized feature gate: ClusterAPIInstallIBMCloud 2025-12-03T14:07:53.946191406Z W1203 14:07:53.946183 1 feature_gate.go:330] unrecognized feature gate: NutanixMultiSubnets 2025-12-03T14:07:54.594698864Z I1203 14:07:54.594494 1 serving.go:380] Generated self-signed cert (/var/run/kubernetes/kube-controller-manager.crt, /var/run/kubernetes/kube-controller-manager.key) 2025-12-03T14:07:54.603526766Z I1203 14:07:54.603468 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/kubernetes/kube-controller-manager.crt::/var/run/kubernetes/kube-controller-manager.key" 2025-12-03T14:08:05.191298626Z E1203 14:08:05.191224 1 run.go:72] "command failed" err="unable to load configmap based request-header-client-ca-file: Get \"https://localhost:6443/api/v1/namespaces/kube-system/configmaps/extension-apiserver-authentication\": net/http: TLS handshake timeout" config/pod/kube-system/bootstrap-kube-controller-manager-master-0.json0000640000000000000000000002735215114042274024623 0ustar0000000000000000{"metadata":{"name":"bootstrap-kube-controller-manager-master-0","namespace":"kube-system","uid":"6cb85e17-7e83-4845-834b-381f63dce73e","resourceVersion":"14758","creationTimestamp":"2025-12-03T13:52:50Z","labels":{"openshift.io/component":"controller-manager","openshift.io/control-plane":"true"},"annotations":{"kubernetes.io/config.hash":"7bce50c457ac1f4721bc81a570dd238a","kubernetes.io/config.mirror":"7bce50c457ac1f4721bc81a570dd238a","kubernetes.io/config.seen":"2025-12-03T13:50:50.836008073Z","kubernetes.io/config.source":"file","openshift.io/run-level":"0","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"bd7abe6d-36d2-4ce8-92a1-7fdd9966d574","controller":true}]},"spec":{"volumes":[{"name":"secrets","hostPath":{"path":"/etc/kubernetes/bootstrap-secrets","type":""}},{"name":"etc-kubernetes-cloud","hostPath":{"path":"/etc/kubernetes/cloud","type":""}},{"name":"config","hostPath":{"path":"/etc/kubernetes/bootstrap-configs","type":""}},{"name":"ssl-certs-host","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"logs","hostPath":{"path":"/var/log/bootstrap-control-plane","type":""}}],"containers":[{"name":"kube-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d0bb91faa6e9f82b589a6535665e51517abe4a1b2eb5d0b3a36b36df6a5330a0","command":["hyperkube","kube-controller-manager"],"args":["--openshift-config=/etc/kubernetes/config/kube-controller-manager-config.yaml","--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--v=2","--allocate-node-cidrs=false","--authentication-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--cert-dir=/var/run/kubernetes","--cloud-provider=external","--cluster-cidr=10.128.0.0/16","--cluster-signing-cert-file=/etc/kubernetes/secrets/kubelet-signer.crt","--cluster-signing-duration=720h","--cluster-signing-key-file=/etc/kubernetes/secrets/kubelet-signer.key","--controllers=*","--controllers=-bootstrapsigner","--controllers=-tokencleaner","--controllers=-ttl","--enable-dynamic-provisioning=true","--feature-gates=AWSClusterHostedDNS=false","--feature-gates=AWSEFSDriverVolumeMetrics=true","--feature-gates=AdditionalRoutingCapabilities=false","--feature-gates=AdminNetworkPolicy=true","--feature-gates=AlibabaPlatform=true","--feature-gates=AutomatedEtcdBackup=false","--feature-gates=AzureWorkloadIdentity=true","--feature-gates=BareMetalLoadBalancer=true","--feature-gates=BootcNodeManagement=false","--feature-gates=BuildCSIVolumes=true","--feature-gates=CSIDriverSharedResource=false","--feature-gates=ChunkSizeMiB=true","--feature-gates=CloudDualStackNodeIPs=true","--feature-gates=ClusterAPIInstall=false","--feature-gates=ClusterAPIInstallIBMCloud=false","--feature-gates=ClusterMonitoringConfig=false","--feature-gates=ConsolePluginContentSecurityPolicy=false","--feature-gates=DNSNameResolver=false","--feature-gates=DisableKubeletCloudCredentialProviders=true","--feature-gates=DynamicResourceAllocation=false","--feature-gates=EtcdBackendQuota=false","--feature-gates=EventedPLEG=false","--feature-gates=Example=false","--feature-gates=ExternalOIDC=false","--feature-gates=ExternalOIDCWithUIDAndExtraClaimMappings=false","--feature-gates=GCPClusterHostedDNS=false","--feature-gates=GCPLabelsTags=true","--feature-gates=GatewayAPI=false","--feature-gates=HardwareSpeed=true","--feature-gates=ImageStreamImportMode=false","--feature-gates=IngressControllerDynamicConfigurationManager=false","--feature-gates=IngressControllerLBSubnetsAWS=true","--feature-gates=InsightsConfig=false","--feature-gates=InsightsConfigAPI=false","--feature-gates=InsightsOnDemandDataGather=false","--feature-gates=InsightsRuntimeExtractor=false","--feature-gates=KMSv1=true","--feature-gates=MachineAPIMigration=false","--feature-gates=MachineAPIOperatorDisableMachineHealthCheckController=false","--feature-gates=MachineAPIProviderOpenStack=false","--feature-gates=MachineConfigNodes=false","--feature-gates=ManagedBootImages=true","--feature-gates=ManagedBootImagesAWS=true","--feature-gates=MaxUnavailableStatefulSet=false","--feature-gates=MetricsCollectionProfiles=false","--feature-gates=MinimumKubeletVersion=false","--feature-gates=MixedCPUsAllocation=false","--feature-gates=MultiArchInstallAWS=true","--feature-gates=MultiArchInstallAzure=false","--feature-gates=MultiArchInstallGCP=true","--feature-gates=NetworkDiagnosticsConfig=true","--feature-gates=NetworkLiveMigration=true","--feature-gates=NetworkSegmentation=true","--feature-gates=NewOLM=true","--feature-gates=NodeDisruptionPolicy=true","--feature-gates=NodeSwap=false","--feature-gates=NutanixMultiSubnets=false","--feature-gates=OVNObservability=false","--feature-gates=OnClusterBuild=true","--feature-gates=OpenShiftPodSecurityAdmission=false","--feature-gates=PersistentIPsForVirtualization=true","--feature-gates=PinnedImages=false","--feature-gates=PlatformOperators=false","--feature-gates=PrivateHostedZoneAWS=true","--feature-gates=ProcMountType=false","--feature-gates=RouteAdvertisements=false","--feature-gates=RouteExternalCertificate=false","--feature-gates=ServiceAccountTokenNodeBinding=false","--feature-gates=SetEIPForNLBIngressController=true","--feature-gates=SignatureStores=false","--feature-gates=SigstoreImageVerification=false","--feature-gates=StreamingCollectionEncodingToJSON=false","--feature-gates=StreamingCollectionEncodingToProtobuf=false","--feature-gates=TranslateStreamCloseWebsocketRequests=false","--feature-gates=UpgradeStatus=false","--feature-gates=UserNamespacesPodSecurityStandards=false","--feature-gates=UserNamespacesSupport=false","--feature-gates=VSphereControlPlaneMachineSet=true","--feature-gates=VSphereDriverConfiguration=true","--feature-gates=VSphereMultiNetworks=false","--feature-gates=VSphereMultiVCenters=true","--feature-gates=VSphereStaticIPs=true","--feature-gates=ValidatingAdmissionPolicy=true","--feature-gates=VolumeAttributesClass=false","--feature-gates=VolumeGroupSnapshot=false","--flex-volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec","--kube-api-burst=300","--kube-api-qps=150","--leader-elect-renew-deadline=12s","--leader-elect-resource-lock=leases","--leader-elect-retry-period=3s","--leader-elect=true","--pv-recycler-pod-template-filepath-hostpath=","--pv-recycler-pod-template-filepath-nfs=","--root-ca-file=/etc/kubernetes/secrets/kube-apiserver-complete-server-ca-bundle.crt","--secure-port=10257","--service-account-private-key-file=/etc/kubernetes/secrets/service-account.key","--service-cluster-ip-range=172.30.0.0/16","--use-service-account-credentials=true"],"ports":[{"hostPort":10257,"containerPort":10257,"protocol":"TCP"}],"resources":{"requests":{"cpu":"60m","memory":"200Mi"}},"volumeMounts":[{"name":"ssl-certs-host","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"etc-kubernetes-cloud","readOnly":true,"mountPath":"/etc/kubernetes/cloud"},{"name":"config","readOnly":true,"mountPath":"/etc/kubernetes/config"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"timeoutSeconds":3,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"},{"name":"cluster-policy-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2e254a7fb8a2643817718cfdb54bc819e86eb84232f6e2456548c55c5efb09d2","command":["cluster-policy-controller","start"],"args":["--config=/etc/kubernetes/config/cluster-policy-controller-config.yaml","--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--namespace=$(POD_NAMESPACE)","--v=2"],"ports":[{"hostPort":10357,"containerPort":10357,"protocol":"TCP"}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"200Mi"}},"volumeMounts":[{"name":"ssl-certs-host","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"etc-kubernetes-cloud","readOnly":true,"mountPath":"/etc/kubernetes/cloud"},{"name":"config","readOnly":true,"mountPath":"/etc/kubernetes/config"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"timeoutSeconds":3,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priority":0,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:19Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:19Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:29Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:29Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:19Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2025-12-03T14:08:19Z","containerStatuses":[{"name":"cluster-policy-controller","state":{"running":{"startedAt":"2025-12-03T14:07:53Z"}},"lastState":{},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2e254a7fb8a2643817718cfdb54bc819e86eb84232f6e2456548c55c5efb09d2","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2e254a7fb8a2643817718cfdb54bc819e86eb84232f6e2456548c55c5efb09d2","containerID":"cri-o://fdf56fc794aa77373b36eb33a16bfc344506e67df2fd75e2ef4b6b33e973db68","started":true},{"name":"kube-controller-manager","state":{"running":{"startedAt":"2025-12-03T14:08:05Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","startedAt":"2025-12-03T14:07:53Z","finishedAt":"2025-12-03T14:08:05Z","containerID":"cri-o://1113e5b1c4d5e0ffa93e620a7c8bd750851fb954030c8b620205a79268644060"}},"ready":true,"restartCount":8,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d0bb91faa6e9f82b589a6535665e51517abe4a1b2eb5d0b3a36b36df6a5330a0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d0bb91faa6e9f82b589a6535665e51517abe4a1b2eb5d0b3a36b36df6a5330a0","containerID":"cri-o://dfa3e2a5e850f1c2cd7d301ad8987da02b5536d592d454c2329b18b72b7128b7","started":true}],"qosClass":"Burstable"}}kube-controller-manager-operator_current.log0000640000000000000000000001020415114042274044310 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-b5dddf8f5-kwb742025-12-03T14:09:01.273980611Z I1203 14:09:01.273794 1 cmd.go:253] Using service-serving-cert provided certificates 2025-12-03T14:09:01.274152367Z I1203 14:09:01.273953 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2025-12-03T14:09:01.275743465Z I1203 14:09:01.275695 1 observer_polling.go:159] Starting file observer 2025-12-03T14:09:01.470496170Z I1203 14:09:01.469873 1 builder.go:304] kube-controller-manager-operator version 4.18.0-202510210939.p2.ga2cbb57.assembly.stream.el9-a2cbb57-a2cbb5725fe5e560ba40d884cfd079b3f8391f03 2025-12-03T14:09:02.542560736Z I1203 14:09:02.541330 1 secure_serving.go:57] Forcing use of http/1.1 only 2025-12-03T14:09:02.542560736Z W1203 14:09:02.541368 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2025-12-03T14:09:02.542560736Z W1203 14:09:02.541373 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2025-12-03T14:09:02.542560736Z W1203 14:09:02.541377 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2025-12-03T14:09:02.542560736Z W1203 14:09:02.541381 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2025-12-03T14:09:02.542560736Z W1203 14:09:02.541384 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2025-12-03T14:09:02.542560736Z W1203 14:09:02.541387 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2025-12-03T14:09:02.902848283Z I1203 14:09:02.899902 1 secure_serving.go:213] Serving securely on [::]:8443 2025-12-03T14:09:02.902848283Z I1203 14:09:02.899997 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2025-12-03T14:09:02.902848283Z I1203 14:09:02.900046 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2025-12-03T14:09:02.902848283Z I1203 14:09:02.900118 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2025-12-03T14:09:02.902848283Z I1203 14:09:02.900277 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2025-12-03T14:09:02.902848283Z I1203 14:09:02.900449 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2025-12-03T14:09:02.902848283Z I1203 14:09:02.900455 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2025-12-03T14:09:02.902848283Z I1203 14:09:02.900466 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2025-12-03T14:09:02.902848283Z I1203 14:09:02.900471 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2025-12-03T14:09:02.902848283Z I1203 14:09:02.900802 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2025-12-03T14:09:02.910756202Z I1203 14:09:02.910195 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-controller-manager-operator/kube-controller-manager-operator-lock... 2025-12-03T14:09:03.000782703Z I1203 14:09:03.000656 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2025-12-03T14:09:03.000782703Z I1203 14:09:03.000716 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2025-12-03T14:09:03.000896526Z I1203 14:09:03.000775 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file kube-controller-manager-operator-b5dddf8f5-kwb74.json0000640000000000000000000001416515114042274033434 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator{"metadata":{"name":"kube-controller-manager-operator-b5dddf8f5-kwb74","generateName":"kube-controller-manager-operator-b5dddf8f5-","namespace":"openshift-kube-controller-manager-operator","uid":"b051ae27-7879-448d-b426-4dce76e29739","resourceVersion":"16691","creationTimestamp":"2025-12-03T13:51:43Z","labels":{"app":"kube-controller-manager-operator","pod-template-hash":"b5dddf8f5"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.11/23\"],\"mac_address\":\"0a:58:0a:80:00:0b\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.11/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.11\"\n ],\n \"mac\": \"0a:58:0a:80:00:0b\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-controller-manager-operator-b5dddf8f5","uid":"6a776885-163f-49e8-9373-95119bf9a181","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:58ed827ee19ac91b6f860d307797b24b8aec02e671605388c4afe4fa19ddfc36","command":["cluster-kube-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d0bb91faa6e9f82b589a6535665e51517abe4a1b2eb5d0b3a36b36df6a5330a0"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:58ed827ee19ac91b6f860d307797b24b8aec02e671605388c4afe4fa19ddfc36"},{"name":"CLUSTER_POLICY_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2e254a7fb8a2643817718cfdb54bc819e86eb84232f6e2456548c55c5efb09d2"},{"name":"TOOLS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fdcfa264ad6a1a653f17399845e605dbc99e8f391cfdd940fd684819d6e91001"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.28"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.13"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-controller-manager-operator","serviceAccount":"kube-controller-manager-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:09:02Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T13:54:51Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:09:02Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:09:02Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T13:54:51Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.11","podIPs":[{"ip":"10.128.0.11"}],"startTime":"2025-12-03T13:54:51Z","containerStatuses":[{"name":"kube-controller-manager-operator","state":{"running":{"startedAt":"2025-12-03T14:09:00Z"}},"lastState":{},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:58ed827ee19ac91b6f860d307797b24b8aec02e671605388c4afe4fa19ddfc36","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:58ed827ee19ac91b6f860d307797b24b8aec02e671605388c4afe4fa19ddfc36","containerID":"cri-o://f1e23675313ea31d0d7ab7f575c940a2fa52cf5f2c1440a5117ca457764a1ec2","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-controller-manager/logs/installer-1-master-0/installer_current.log0000640000000000000000000000015615114042274030774 0ustar0000000000000000unable to retrieve container logs for cri-o://329f86c396d464bc38c418b87773619b2eef8fc054593123b01a5e519b0845eeconfig/pod/openshift-kube-controller-manager/installer-1-master-0.json0000640000000000000000000001717115114042274024466 0ustar0000000000000000{"metadata":{"name":"installer-1-master-0","namespace":"openshift-kube-controller-manager","uid":"9477082b-005c-4ff5-812a-7c3230f60da2","resourceVersion":"10237","creationTimestamp":"2025-12-03T13:56:11Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.46/23\"],\"mac_address\":\"0a:58:0a:80:00:2e\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.46/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.46\"\n ],\n \"mac\": \"0a:58:0a:80:00:2e\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-1","uid":"665fcefb-e761-4562-9d6c-f5fdd8fcbb59"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:58ed827ee19ac91b6f860d307797b24b8aec02e671605388c4afe4fa19ddfc36","command":["cluster-kube-controller-manager-operator","installer"],"args":["-v=2","--revision=1","--namespace=openshift-kube-controller-manager","--pod=kube-controller-manager-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-controller-manager-pod","--configmaps=config","--configmaps=cluster-policy-controller-config","--configmaps=controller-manager-kubeconfig","--optional-configmaps=cloud-config","--configmaps=kube-controller-cert-syncer-kubeconfig","--configmaps=serviceaccount-ca","--configmaps=service-ca","--configmaps=recycler-config","--secrets=service-account-private-key","--optional-secrets=serving-cert","--secrets=localhost-recovery-client-token","--cert-dir=/etc/kubernetes/static-pod-resources/kube-controller-manager-certs","--cert-configmaps=aggregator-client-ca","--cert-configmaps=client-ca","--optional-cert-configmaps=trusted-ca-bundle","--cert-secrets=kube-controller-manager-client-cert-key","--cert-secrets=csr-signer"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"imagePullSecrets":[{"name":"installer-sa-dockercfg-4xstp"}],"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2025-12-03T13:57:28Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T13:56:11Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2025-12-03T13:57:27Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2025-12-03T13:57:27Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T13:56:11Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"startTime":"2025-12-03T13:56:11Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"icy-controller-config\",\n (string) (len=29) \"controller-manager-kubeconfig\",\n (string) (len=38) \"kube-controller-cert-syncer-kubeconfig\",\n (string) (len=17) \"serviceaccount-ca\",\n (string) (len=10) \"service-ca\",\n (string) (len=15) \"recycler-config\"\n },\n OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=12) \"cloud-config\"\n },\n CertSecretNames: ([]string) (len=2 cap=2) {\n (string) (len=39) \"kube-controller-manager-client-cert-key\",\n (string) (len=10) \"csr-signer\"\n },\n OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\n CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=66) \"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI1203 13:56:13.378273 1 cmd.go:413] Getting controller reference for node master-0\nI1203 13:56:14.145282 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI1203 13:56:14.145369 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI1203 13:56:14.145384 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI1203 13:56:14.159037 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI1203 13:56:44.159165 1 cmd.go:524] Getting installer pods for node master-0\nF1203 13:56:58.163300 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","startedAt":"2025-12-03T13:56:12Z","finishedAt":"2025-12-03T13:56:58Z","containerID":"cri-o://329f86c396d464bc38c418b87773619b2eef8fc054593123b01a5e519b0845ee"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:58ed827ee19ac91b6f860d307797b24b8aec02e671605388c4afe4fa19ddfc36","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:58ed827ee19ac91b6f860d307797b24b8aec02e671605388c4afe4fa19ddfc36","containerID":"cri-o://329f86c396d464bc38c418b87773619b2eef8fc054593123b01a5e519b0845ee","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}config/pod/openshift-etcd/logs/installer-1-master-0/installer_current.log0000640000000000000000000000015615114042274025174 0ustar0000000000000000unable to retrieve container logs for cri-o://8d134ccd313903414f3c87188621922dd3739a31023f139786ec39623a1f122econfig/pod/openshift-etcd/logs/etcd-master-0/etcd-rev_current.log0000640000000000000000000000015615114042274023474 0ustar00000000000000002025-12-03T14:08:06.632535177Z I1203 14:08:06.629716 1 etcdcli_pool.go:70] creating a new cached client config/pod/openshift-etcd/logs/etcd-master-0/etcd-readyz_current.log0000640000000000000000000000050215114042274024171 0ustar00000000000000002025-12-03T14:07:56.426124711Z I1203 14:07:56.425920 1 readyz.go:175] Listening on 0.0.0.0:9980 2025-12-03T14:08:14.553139396Z I1203 14:08:14.553003 1 etcdcli_pool.go:70] creating a new cached client 2025-12-03T14:09:47.295906391Z I1203 14:09:47.295641 1 etcdcli_pool.go:70] creating a new cached client config/pod/openshift-etcd/logs/etcd-master-0/etcd-metrics_current.log0000640000000000000000000004121615114042274024350 0ustar00000000000000002025-12-03T14:07:56.437389932Z {"level":"info","ts":"2025-12-03T14:07:56.437160Z","caller":"etcdmain/grpc_proxy.go:237","msg":"gRPC proxy server TLS","tls-info":"cert = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.crt, key = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.key, client-cert=, client-key=, trusted-ca = /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/metrics-ca-bundle.crt, client-cert-auth = false, crl-file = "} 2025-12-03T14:07:56.440407308Z {"level":"info","ts":"2025-12-03T14:07:56.440348Z","caller":"etcdmain/grpc_proxy.go:460","msg":"listening for gRPC proxy client requests","address":"127.0.0.1:9977"} 2025-12-03T14:07:56.440603593Z {"level":"info","ts":"2025-12-03T14:07:56.440560Z","caller":"etcdmain/grpc_proxy.go:430","msg":"gRPC proxy client TLS","tls-info":"cert = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt, key = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key, client-cert=, client-key=, trusted-ca = /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt, client-cert-auth = false, crl-file = "} 2025-12-03T14:07:56.440964254Z {"level":"info","ts":"2025-12-03T14:07:56.440665Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel created"} 2025-12-03T14:07:56.447459659Z {"level":"info","ts":"2025-12-03T14:07:56.447384Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] original dial target is: \"etcd-endpoints://0xc000252000/192.168.32.10:9978\""} 2025-12-03T14:07:56.447476679Z {"level":"info","ts":"2025-12-03T14:07:56.447447Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] parsed dial target is: {URL:{Scheme:etcd-endpoints Opaque: User: Host:0xc000252000 Path:/192.168.32.10:9978 RawPath: OmitHost:false ForceQuery:false RawQuery: Fragment: RawFragment:}}"} 2025-12-03T14:07:56.447484299Z {"level":"info","ts":"2025-12-03T14:07:56.447468Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel authority set to \"192.168.32.10:9978\""} 2025-12-03T14:07:56.448564870Z {"level":"info","ts":"2025-12-03T14:07:56.448520Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Resolver state updated: {\n \"Addresses\": [\n {\n \"Addr\": \"192.168.32.10:9978\",\n \"ServerName\": \"192.168.32.10:9978\",\n \"Attributes\": null,\n \"BalancerAttributes\": null,\n \"Metadata\": null\n }\n ],\n \"Endpoints\": [\n {\n \"Addresses\": [\n {\n \"Addr\": \"192.168.32.10:9978\",\n \"ServerName\": \"192.168.32.10:9978\",\n \"Attributes\": null,\n \"BalancerAttributes\": null,\n \"Metadata\": null\n }\n ],\n \"Attributes\": null\n }\n ],\n \"ServiceConfig\": {\n \"Config\": {\n \"Config\": null,\n \"LB\": \"round_robin\",\n \"Methods\": {}\n },\n \"Err\": null\n },\n \"Attributes\": null\n} (service config updated; resolver returned new addresses)"} 2025-12-03T14:07:56.448882579Z {"level":"info","ts":"2025-12-03T14:07:56.448576Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel switches to new LB policy \"round_robin\""} 2025-12-03T14:07:56.448942861Z {"level":"info","ts":"2025-12-03T14:07:56.448918Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: got new ClientConn state: {{[{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }] [{[{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }] }] 0xc000409560 } }"} 2025-12-03T14:07:56.448965331Z {"level":"info","ts":"2025-12-03T14:07:56.448943Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel created"} 2025-12-03T14:07:56.449004683Z {"level":"info","ts":"2025-12-03T14:07:56.448977Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[roundrobin] roundrobinPicker: Build called with info: {map[]}"} 2025-12-03T14:07:56.449004683Z {"level":"info","ts":"2025-12-03T14:07:56.448996Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to CONNECTING"} 2025-12-03T14:07:56.449108575Z {"level":"info","ts":"2025-12-03T14:07:56.449062Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2025-12-03T14:07:56.449360443Z {"level":"info","ts":"2025-12-03T14:07:56.449306Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2025-12-03T14:07:56.449441165Z {"level":"info","ts":"2025-12-03T14:07:56.449380Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000413b60, CONNECTING"} 2025-12-03T14:07:56.451665798Z {"level":"info","ts":"2025-12-03T14:07:56.451568Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-03T14:07:56.451695049Z {"level":"warn","ts":"2025-12-03T14:07:56.451657Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-03T14:07:56.451763921Z {"level":"info","ts":"2025-12-03T14:07:56.451721Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-03T14:07:56.451812843Z {"level":"info","ts":"2025-12-03T14:07:56.451788Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000413b60, TRANSIENT_FAILURE"} 2025-12-03T14:07:56.451822923Z {"level":"info","ts":"2025-12-03T14:07:56.451808Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to TRANSIENT_FAILURE"} 2025-12-03T14:07:56.452189733Z {"level":"info","ts":"2025-12-03T14:07:56.452115Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Server #3] Server created"} 2025-12-03T14:07:56.452238275Z {"level":"info","ts":"2025-12-03T14:07:56.452216Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Server #3 ListenSocket #4] ListenSocket created"} 2025-12-03T14:07:56.452335577Z {"level":"info","ts":"2025-12-03T14:07:56.452300Z","caller":"etcdmain/grpc_proxy.go:614","msg":"gRPC proxy listening for metrics","address":"https://0.0.0.0:9979"} 2025-12-03T14:07:56.452335577Z {"level":"info","ts":"2025-12-03T14:07:56.452324Z","caller":"etcdmain/grpc_proxy.go:287","msg":"started gRPC proxy","address":"127.0.0.1:9977"} 2025-12-03T14:07:56.452344458Z {"level":"info","ts":"2025-12-03T14:07:56.452333Z","caller":"etcdmain/main.go:44","msg":"notifying init daemon"} 2025-12-03T14:07:56.452369548Z {"level":"info","ts":"2025-12-03T14:07:56.452338Z","caller":"etcdmain/main.go:50","msg":"successfully notified init daemon"} 2025-12-03T14:07:56.452627646Z {"level":"info","ts":"2025-12-03T14:07:56.452594Z","caller":"etcdmain/grpc_proxy.go:277","msg":"gRPC proxy server metrics URL serving"} 2025-12-03T14:07:57.452135603Z {"level":"info","ts":"2025-12-03T14:07:57.451950Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-03T14:07:57.452135603Z {"level":"info","ts":"2025-12-03T14:07:57.452073Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000413b60, IDLE"} 2025-12-03T14:07:57.452230626Z {"level":"info","ts":"2025-12-03T14:07:57.452114Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2025-12-03T14:07:57.452230626Z {"level":"info","ts":"2025-12-03T14:07:57.452150Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2025-12-03T14:07:57.452553805Z {"level":"info","ts":"2025-12-03T14:07:57.452378Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000413b60, CONNECTING"} 2025-12-03T14:07:57.452682459Z {"level":"info","ts":"2025-12-03T14:07:57.452599Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-03T14:07:57.452682459Z {"level":"warn","ts":"2025-12-03T14:07:57.452659Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-03T14:07:57.452698799Z {"level":"info","ts":"2025-12-03T14:07:57.452685Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-03T14:07:57.452734110Z {"level":"info","ts":"2025-12-03T14:07:57.452708Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000413b60, TRANSIENT_FAILURE"} 2025-12-03T14:07:59.014295067Z {"level":"info","ts":"2025-12-03T14:07:59.014190Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-03T14:07:59.014295067Z {"level":"info","ts":"2025-12-03T14:07:59.014269Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000413b60, IDLE"} 2025-12-03T14:07:59.014350898Z {"level":"info","ts":"2025-12-03T14:07:59.014299Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2025-12-03T14:07:59.014350898Z {"level":"info","ts":"2025-12-03T14:07:59.014325Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2025-12-03T14:07:59.014544854Z {"level":"info","ts":"2025-12-03T14:07:59.014474Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000413b60, CONNECTING"} 2025-12-03T14:07:59.014790811Z {"level":"info","ts":"2025-12-03T14:07:59.014733Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-03T14:07:59.014790811Z {"level":"warn","ts":"2025-12-03T14:07:59.014781Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-03T14:07:59.014822892Z {"level":"info","ts":"2025-12-03T14:07:59.014805Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-03T14:07:59.014857133Z {"level":"info","ts":"2025-12-03T14:07:59.014832Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000413b60, TRANSIENT_FAILURE"} 2025-12-03T14:08:01.539706433Z {"level":"info","ts":"2025-12-03T14:08:01.539571Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-03T14:08:01.539706433Z {"level":"info","ts":"2025-12-03T14:08:01.539677Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000413b60, IDLE"} 2025-12-03T14:08:01.539803896Z {"level":"info","ts":"2025-12-03T14:08:01.539736Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2025-12-03T14:08:01.539827626Z {"level":"info","ts":"2025-12-03T14:08:01.539805Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2025-12-03T14:08:01.540082674Z {"level":"info","ts":"2025-12-03T14:08:01.539980Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000413b60, CONNECTING"} 2025-12-03T14:08:01.540649400Z {"level":"info","ts":"2025-12-03T14:08:01.540484Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-03T14:08:01.540649400Z {"level":"warn","ts":"2025-12-03T14:08:01.540596Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-03T14:08:01.540697551Z {"level":"info","ts":"2025-12-03T14:08:01.540672Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-03T14:08:01.540927528Z {"level":"info","ts":"2025-12-03T14:08:01.540843Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000413b60, TRANSIENT_FAILURE"} 2025-12-03T14:08:05.498137679Z {"level":"info","ts":"2025-12-03T14:08:05.498002Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-03T14:08:05.498137679Z {"level":"info","ts":"2025-12-03T14:08:05.498105Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000413b60, IDLE"} 2025-12-03T14:08:05.498189331Z {"level":"info","ts":"2025-12-03T14:08:05.498147Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2025-12-03T14:08:05.498212181Z {"level":"info","ts":"2025-12-03T14:08:05.498188Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2025-12-03T14:08:05.498503040Z {"level":"info","ts":"2025-12-03T14:08:05.498346Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000413b60, CONNECTING"} 2025-12-03T14:08:05.506241380Z {"level":"info","ts":"2025-12-03T14:08:05.506097Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to READY"} 2025-12-03T14:08:05.506241380Z {"level":"info","ts":"2025-12-03T14:08:05.506185Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000413b60, READY"} 2025-12-03T14:08:05.506310112Z {"level":"info","ts":"2025-12-03T14:08:05.506240Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[roundrobin] roundrobinPicker: Build called with info: {map[SubConn(id:2):{{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }}]}"} 2025-12-03T14:08:05.506310112Z {"level":"info","ts":"2025-12-03T14:08:05.506269Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to READY"} config/pod/openshift-etcd/logs/etcd-master-0/etcd_current.log0000640000000000000000000013150715114042274022707 0ustar00000000000000002025-12-03T14:09:49.584071096Z {"level":"info","ts":"2025-12-03T14:09:49.584022Z","caller":"traceutil/trace.go:171","msg":"trace[1003814487] range","detail":"{range_begin:/kubernetes.io/apiregistration.k8s.io/apiservices/; range_end:/kubernetes.io/apiregistration.k8s.io/apiservices0; response_count:0; response_revision:16922; }","duration":"2.142925076s","start":"2025-12-03T14:09:47.441083Z","end":"2025-12-03T14:09:49.584009Z","steps":["trace[1003814487] 'agreement among raft nodes before linearized reading' (duration: 2.142253136s)"],"step_count":1} 2025-12-03T14:09:49.584071096Z {"level":"warn","ts":"2025-12-03T14:09:49.583878Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"2.857346726s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/config.openshift.io/clusterversions\" limit:1 ","response":"range_response_count:0 size:6"} 2025-12-03T14:09:49.584071096Z {"level":"warn","ts":"2025-12-03T14:09:49.584061Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"503.00041ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/minions/master-0\" ","response":"range_response_count:1 size:12642"} 2025-12-03T14:09:49.584184690Z {"level":"warn","ts":"2025-12-03T14:09:49.584064Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-03T14:09:47.441016Z","time spent":"2.143029719s","remote":"192.168.32.10:41548","response type":"/etcdserverpb.KV/Range","request count":0,"request size":106,"response count":78,"response size":32,"request content":"key:\"/kubernetes.io/apiregistration.k8s.io/apiservices/\" range_end:\"/kubernetes.io/apiregistration.k8s.io/apiservices0\" count_only:true "} 2025-12-03T14:09:49.584184690Z {"level":"warn","ts":"2025-12-03T14:09:49.584153Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"516.663303ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/\" range_end:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions0\" count_only:true ","response":"range_response_count:0 size:9"} 2025-12-03T14:09:49.584184690Z {"level":"info","ts":"2025-12-03T14:09:49.584171Z","caller":"traceutil/trace.go:171","msg":"trace[1904218263] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/; range_end:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions0; response_count:0; response_revision:16922; }","duration":"516.678313ms","start":"2025-12-03T14:09:49.067485Z","end":"2025-12-03T14:09:49.584164Z","steps":["trace[1904218263] 'agreement among raft nodes before linearized reading' (duration: 516.599151ms)"],"step_count":1} 2025-12-03T14:09:49.584214561Z {"level":"warn","ts":"2025-12-03T14:09:49.584186Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-03T14:09:49.067215Z","time spent":"516.967402ms","remote":"[::1]:57984","response type":"/etcdserverpb.KV/Range","request count":0,"request size":130,"response count":134,"response size":33,"request content":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/\" range_end:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions0\" count_only:true "} 2025-12-03T14:09:49.584214561Z {"level":"warn","ts":"2025-12-03T14:09:49.584181Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"972.619891ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/pods/openshift-ingress/router-default-54f97f57-rr9px\" ","response":"range_response_count:1 size:11049"} 2025-12-03T14:09:49.584279353Z {"level":"info","ts":"2025-12-03T14:09:49.584219Z","caller":"traceutil/trace.go:171","msg":"trace[81398359] range","detail":"{range_begin:/kubernetes.io/pods/openshift-ingress/router-default-54f97f57-rr9px; range_end:; response_count:1; response_revision:16922; }","duration":"972.677853ms","start":"2025-12-03T14:09:48.611529Z","end":"2025-12-03T14:09:49.584206Z","steps":["trace[81398359] 'agreement among raft nodes before linearized reading' (duration: 972.594221ms)"],"step_count":1} 2025-12-03T14:09:49.584279353Z {"level":"warn","ts":"2025-12-03T14:09:49.584031Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-03T14:09:48.602535Z","time spent":"981.49295ms","remote":"[::1]:58134","response type":"/etcdserverpb.KV/Range","request count":0,"request size":74,"response count":1,"response size":1056,"request content":"key:\"/kubernetes.io/serviceaccounts/openshift-marketplace/certified-operators\" "} 2025-12-03T14:09:49.584279353Z {"level":"warn","ts":"2025-12-03T14:09:49.584255Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-03T14:09:48.611517Z","time spent":"972.728375ms","remote":"192.168.32.10:41148","response type":"/etcdserverpb.KV/Range","request count":0,"request size":69,"response count":1,"response size":11073,"request content":"key:\"/kubernetes.io/pods/openshift-ingress/router-default-54f97f57-rr9px\" "} 2025-12-03T14:09:49.584319934Z {"level":"warn","ts":"2025-12-03T14:09:49.584279Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"980.562241ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/serviceaccounts\" limit:1 ","response":"range_response_count:0 size:6"} 2025-12-03T14:09:49.584319934Z {"level":"info","ts":"2025-12-03T14:09:49.584293Z","caller":"traceutil/trace.go:171","msg":"trace[1897842456] range","detail":"{range_begin:/kubernetes.io/serviceaccounts; range_end:; response_count:0; response_revision:16922; }","duration":"980.606963ms","start":"2025-12-03T14:09:48.603681Z","end":"2025-12-03T14:09:49.584288Z","steps":["trace[1897842456] 'agreement among raft nodes before linearized reading' (duration: 980.582722ms)"],"step_count":1} 2025-12-03T14:09:49.584340954Z {"level":"warn","ts":"2025-12-03T14:09:49.584305Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-03T14:09:48.603665Z","time spent":"980.638274ms","remote":"192.168.32.10:41158","response type":"/etcdserverpb.KV/Range","request count":0,"request size":34,"response count":0,"response size":30,"request content":"key:\"/kubernetes.io/serviceaccounts\" limit:1 "} 2025-12-03T14:09:49.584360585Z {"level":"info","ts":"2025-12-03T14:09:49.584075Z","caller":"traceutil/trace.go:171","msg":"trace[1125142924] range","detail":"{range_begin:/kubernetes.io/minions/master-0; range_end:; response_count:1; response_revision:16922; }","duration":"503.040551ms","start":"2025-12-03T14:09:49.081031Z","end":"2025-12-03T14:09:49.584071Z","steps":["trace[1125142924] 'agreement among raft nodes before linearized reading' (duration: 503.00944ms)"],"step_count":1} 2025-12-03T14:09:49.584402336Z {"level":"warn","ts":"2025-12-03T14:09:49.584370Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-03T14:09:49.081013Z","time spent":"503.34664ms","remote":"[::1]:58110","response type":"/etcdserverpb.KV/Range","request count":0,"request size":33,"response count":1,"response size":12666,"request content":"key:\"/kubernetes.io/minions/master-0\" "} 2025-12-03T14:09:49.584402336Z {"level":"warn","ts":"2025-12-03T14:09:49.584380Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"981.328244ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/operators.coreos.com/installplans\" limit:1 ","response":"range_response_count:0 size:6"} 2025-12-03T14:09:49.584532100Z {"level":"info","ts":"2025-12-03T14:09:49.584396Z","caller":"traceutil/trace.go:171","msg":"trace[1484144490] range","detail":"{range_begin:/kubernetes.io/operators.coreos.com/installplans; range_end:; response_count:0; response_revision:16922; }","duration":"981.361046ms","start":"2025-12-03T14:09:48.603029Z","end":"2025-12-03T14:09:49.584390Z","steps":["trace[1484144490] 'agreement among raft nodes before linearized reading' (duration: 981.337595ms)"],"step_count":1} 2025-12-03T14:09:49.584532100Z {"level":"warn","ts":"2025-12-03T14:09:49.584409Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-03T14:09:48.603021Z","time spent":"981.384636ms","remote":"192.168.32.10:56246","response type":"/etcdserverpb.KV/Range","request count":0,"request size":52,"response count":0,"response size":30,"request content":"key:\"/kubernetes.io/operators.coreos.com/installplans\" limit:1 "} 2025-12-03T14:09:49.584582012Z {"level":"info","ts":"2025-12-03T14:09:49.584081Z","caller":"traceutil/trace.go:171","msg":"trace[1112098869] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/clusterversions; range_end:; response_count:0; response_revision:16922; }","duration":"2.857571063s","start":"2025-12-03T14:09:46.726494Z","end":"2025-12-03T14:09:49.584065Z","steps":["trace[1112098869] 'agreement among raft nodes before linearized reading' (duration: 2.857365817s)"],"step_count":1} 2025-12-03T14:09:49.584582012Z {"level":"info","ts":"2025-12-03T14:09:49.583376Z","caller":"traceutil/trace.go:171","msg":"trace[662252217] transaction","detail":"{read_only:false; response_revision:16922; number_of_response:1; }","duration":"968.176257ms","start":"2025-12-03T14:09:48.615192Z","end":"2025-12-03T14:09:49.583369Z","steps":["trace[662252217] 'process raft request' (duration: 967.750044ms)"],"step_count":1} 2025-12-03T14:09:49.584659194Z {"level":"warn","ts":"2025-12-03T14:09:49.584590Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-03T14:09:46.726474Z","time spent":"2.858105439s","remote":"[::1]:53240","response type":"/etcdserverpb.KV/Range","request count":0,"request size":54,"response count":0,"response size":30,"request content":"key:\"/kubernetes.io/config.openshift.io/clusterversions\" limit:1 "} 2025-12-03T14:09:49.584659194Z {"level":"warn","ts":"2025-12-03T14:09:49.584609Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-03T14:09:48.615172Z","time spent":"969.410815ms","remote":"[::1]:58116","response type":"/etcdserverpb.KV/Txn","request count":1,"request size":9135,"response count":0,"response size":42,"request content":"compare: success:> failure: >"} 2025-12-03T14:09:49.584730856Z {"level":"warn","ts":"2025-12-03T14:09:49.584662Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"719.433131ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/machineconfiguration.openshift.io/containerruntimeconfigs/\" range_end:\"/kubernetes.io/machineconfiguration.openshift.io/containerruntimeconfigs0\" count_only:true ","response":"range_response_count:0 size:6"} 2025-12-03T14:09:49.584730856Z {"level":"info","ts":"2025-12-03T14:09:49.584702Z","caller":"traceutil/trace.go:171","msg":"trace[741556710] range","detail":"{range_begin:/kubernetes.io/machineconfiguration.openshift.io/containerruntimeconfigs/; range_end:/kubernetes.io/machineconfiguration.openshift.io/containerruntimeconfigs0; response_count:0; response_revision:16922; }","duration":"719.531813ms","start":"2025-12-03T14:09:48.865160Z","end":"2025-12-03T14:09:49.584691Z","steps":["trace[741556710] 'agreement among raft nodes before linearized reading' (duration: 719.459731ms)"],"step_count":1} 2025-12-03T14:09:49.584767417Z {"level":"warn","ts":"2025-12-03T14:09:49.584731Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-03T14:09:48.865132Z","time spent":"719.590555ms","remote":"[::1]:45566","response type":"/etcdserverpb.KV/Range","request count":0,"request size":152,"response count":0,"response size":30,"request content":"key:\"/kubernetes.io/machineconfiguration.openshift.io/containerruntimeconfigs/\" range_end:\"/kubernetes.io/machineconfiguration.openshift.io/containerruntimeconfigs0\" count_only:true "} 2025-12-03T14:09:49.584767417Z {"level":"warn","ts":"2025-12-03T14:09:49.583304Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"2.491127129s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/leases/openshift-network-operator/network-operator-lock\" ","response":"range_response_count:1 size:539"} 2025-12-03T14:09:49.584811009Z {"level":"info","ts":"2025-12-03T14:09:49.584763Z","caller":"traceutil/trace.go:171","msg":"trace[219046316] range","detail":"{range_begin:/kubernetes.io/leases/openshift-network-operator/network-operator-lock; range_end:; response_count:1; response_revision:16922; }","duration":"2.492620084s","start":"2025-12-03T14:09:47.092131Z","end":"2025-12-03T14:09:49.584752Z","steps":["trace[219046316] 'agreement among raft nodes before linearized reading' (duration: 2.491097058s)"],"step_count":1} 2025-12-03T14:09:49.584811009Z {"level":"warn","ts":"2025-12-03T14:09:49.584792Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-03T14:09:47.092115Z","time spent":"2.492669476s","remote":"[::1]:58208","response type":"/etcdserverpb.KV/Range","request count":0,"request size":72,"response count":1,"response size":563,"request content":"key:\"/kubernetes.io/leases/openshift-network-operator/network-operator-lock\" "} 2025-12-03T14:09:49.585569012Z {"level":"warn","ts":"2025-12-03T14:09:49.585483Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"2.908572964s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/operators.coreos.com/subscriptions\" limit:1 ","response":"range_response_count:0 size:6"} 2025-12-03T14:09:49.585569012Z {"level":"info","ts":"2025-12-03T14:09:49.585520Z","caller":"traceutil/trace.go:171","msg":"trace[1867124485] range","detail":"{range_begin:/kubernetes.io/operators.coreos.com/subscriptions; range_end:; response_count:0; response_revision:16922; }","duration":"2.908989107s","start":"2025-12-03T14:09:46.676520Z","end":"2025-12-03T14:09:49.585509Z","steps":["trace[1867124485] 'agreement among raft nodes before linearized reading' (duration: 2.908576414s)"],"step_count":1} 2025-12-03T14:09:49.585569012Z {"level":"warn","ts":"2025-12-03T14:09:49.585546Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-03T14:09:46.676501Z","time spent":"2.909036658s","remote":"192.168.32.10:56198","response type":"/etcdserverpb.KV/Range","request count":0,"request size":53,"response count":0,"response size":30,"request content":"key:\"/kubernetes.io/operators.coreos.com/subscriptions\" limit:1 "} 2025-12-03T14:09:50.098605945Z {"level":"warn","ts":"2025-12-03T14:09:50.098304Z","caller":"etcdserver/v3_server.go:920","msg":"waiting for ReadIndex response took too long, retrying","sent-request-id":8507470002472458290,"retry-timeout":"500ms"} 2025-12-03T14:09:50.598767999Z {"level":"warn","ts":"2025-12-03T14:09:50.598668Z","caller":"etcdserver/v3_server.go:920","msg":"waiting for ReadIndex response took too long, retrying","sent-request-id":8507470002472458290,"retry-timeout":"500ms"} 2025-12-03T14:09:51.099648365Z {"level":"warn","ts":"2025-12-03T14:09:51.099559Z","caller":"etcdserver/v3_server.go:920","msg":"waiting for ReadIndex response took too long, retrying","sent-request-id":8507470002472458290,"retry-timeout":"500ms"} 2025-12-03T14:09:51.600870702Z {"level":"warn","ts":"2025-12-03T14:09:51.600748Z","caller":"etcdserver/v3_server.go:920","msg":"waiting for ReadIndex response took too long, retrying","sent-request-id":8507470002472458290,"retry-timeout":"500ms"} 2025-12-03T14:09:51.667540436Z {"level":"warn","ts":"2025-12-03T14:09:51.666830Z","caller":"wal/wal.go:822","msg":"slow fdatasync","took":"2.069706745s","expected-duration":"1s"} 2025-12-03T14:09:51.682831879Z {"level":"warn","ts":"2025-12-03T14:09:51.682647Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-03T14:09:51.241491Z","time spent":"441.149761ms","remote":"[::1]:47552","response type":"/etcdserverpb.Maintenance/Status","request count":-1,"request size":-1,"response count":-1,"response size":-1,"request content":""} 2025-12-03T14:09:51.684974463Z {"level":"info","ts":"2025-12-03T14:09:51.684349Z","caller":"traceutil/trace.go:171","msg":"trace[498265149] transaction","detail":"{read_only:false; response_revision:16923; number_of_response:1; }","duration":"2.087282096s","start":"2025-12-03T14:09:49.597041Z","end":"2025-12-03T14:09:51.684323Z","steps":["trace[498265149] 'process raft request' (duration: 2.070101676s)","trace[498265149] 'compare' (duration: 13.962832ms)"],"step_count":2} 2025-12-03T14:09:51.684974463Z {"level":"warn","ts":"2025-12-03T14:09:51.684494Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-03T14:09:49.597029Z","time spent":"2.087379328s","remote":"192.168.32.10:56046","response type":"/etcdserverpb.KV/Txn","request count":1,"request size":3047,"response count":0,"response size":42,"request content":"compare: success:> failure: >"} 2025-12-03T14:09:51.684974463Z {"level":"info","ts":"2025-12-03T14:09:51.684585Z","caller":"traceutil/trace.go:171","msg":"trace[323505732] linearizableReadLoop","detail":"{readStateIndex:17953; appliedIndex:17951; }","duration":"2.08709122s","start":"2025-12-03T14:09:49.597467Z","end":"2025-12-03T14:09:51.684558Z","steps":["trace[323505732] 'read index received' (duration: 2.069701024s)","trace[323505732] 'applied index is now lower than readState.Index' (duration: 17.389126ms)"],"step_count":2} 2025-12-03T14:09:51.684974463Z {"level":"warn","ts":"2025-12-03T14:09:51.684767Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"2.087277895s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/serviceaccounts\" limit:1 ","response":"range_response_count:0 size:6"} 2025-12-03T14:09:51.684974463Z {"level":"info","ts":"2025-12-03T14:09:51.684800Z","caller":"traceutil/trace.go:171","msg":"trace[1873228627] range","detail":"{range_begin:/kubernetes.io/serviceaccounts; range_end:; response_count:0; response_revision:16925; }","duration":"2.087342677s","start":"2025-12-03T14:09:49.597448Z","end":"2025-12-03T14:09:51.684791Z","steps":["trace[1873228627] 'agreement among raft nodes before linearized reading' (duration: 2.087236534s)"],"step_count":1} 2025-12-03T14:09:51.684974463Z {"level":"warn","ts":"2025-12-03T14:09:51.684803Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"2.086065988s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/operators.coreos.com/installplans\" limit:1 ","response":"range_response_count:0 size:6"} 2025-12-03T14:09:51.684974463Z {"level":"warn","ts":"2025-12-03T14:09:51.684820Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.731200575s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/helm.openshift.io/helmchartrepositories/\" range_end:\"/kubernetes.io/helm.openshift.io/helmchartrepositories0\" count_only:true ","response":"range_response_count:0 size:8"} 2025-12-03T14:09:51.684974463Z {"level":"info","ts":"2025-12-03T14:09:51.684871Z","caller":"traceutil/trace.go:171","msg":"trace[730905495] range","detail":"{range_begin:/kubernetes.io/operators.coreos.com/installplans; range_end:; response_count:0; response_revision:16925; }","duration":"2.086158102s","start":"2025-12-03T14:09:49.598697Z","end":"2025-12-03T14:09:51.684855Z","steps":["trace[730905495] 'agreement among raft nodes before linearized reading' (duration: 2.086035188s)"],"step_count":1} 2025-12-03T14:09:51.684974463Z {"level":"info","ts":"2025-12-03T14:09:51.684887Z","caller":"traceutil/trace.go:171","msg":"trace[216353394] range","detail":"{range_begin:/kubernetes.io/helm.openshift.io/helmchartrepositories/; range_end:/kubernetes.io/helm.openshift.io/helmchartrepositories0; response_count:0; response_revision:16925; }","duration":"1.731320098s","start":"2025-12-03T14:09:49.953553Z","end":"2025-12-03T14:09:51.684874Z","steps":["trace[216353394] 'agreement among raft nodes before linearized reading' (duration: 1.731209965s)"],"step_count":1} 2025-12-03T14:09:51.684974463Z {"level":"warn","ts":"2025-12-03T14:09:51.684914Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-03T14:09:49.598688Z","time spent":"2.086216743s","remote":"192.168.32.10:56246","response type":"/etcdserverpb.KV/Range","request count":0,"request size":52,"response count":0,"response size":30,"request content":"key:\"/kubernetes.io/operators.coreos.com/installplans\" limit:1 "} 2025-12-03T14:09:51.684974463Z {"level":"warn","ts":"2025-12-03T14:09:51.684944Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-03T14:09:49.953531Z","time spent":"1.731405251s","remote":"192.168.32.10:56560","response type":"/etcdserverpb.KV/Range","request count":0,"request size":116,"response count":1,"response size":32,"request content":"key:\"/kubernetes.io/helm.openshift.io/helmchartrepositories/\" range_end:\"/kubernetes.io/helm.openshift.io/helmchartrepositories0\" count_only:true "} 2025-12-03T14:09:51.685052166Z {"level":"info","ts":"2025-12-03T14:09:51.684970Z","caller":"traceutil/trace.go:171","msg":"trace[580462178] transaction","detail":"{read_only:false; response_revision:16924; number_of_response:1; }","duration":"2.086628946s","start":"2025-12-03T14:09:49.598319Z","end":"2025-12-03T14:09:51.684948Z","steps":["trace[580462178] 'process raft request' (duration: 2.085883133s)"],"step_count":1} 2025-12-03T14:09:51.685191090Z {"level":"warn","ts":"2025-12-03T14:09:51.685101Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-03T14:09:49.598293Z","time spent":"2.086725739s","remote":"[::1]:45012","response type":"/etcdserverpb.KV/Txn","request count":1,"request size":3043,"response count":0,"response size":42,"request content":"compare: success:> failure: >"} 2025-12-03T14:09:51.685191090Z {"level":"warn","ts":"2025-12-03T14:09:51.685142Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"568.937923ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/snapshot.storage.k8s.io/volumesnapshots/\" range_end:\"/kubernetes.io/snapshot.storage.k8s.io/volumesnapshots0\" count_only:true ","response":"range_response_count:0 size:6"} 2025-12-03T14:09:51.685191090Z {"level":"info","ts":"2025-12-03T14:09:51.685164Z","caller":"traceutil/trace.go:171","msg":"trace[1201375370] range","detail":"{range_begin:/kubernetes.io/snapshot.storage.k8s.io/volumesnapshots/; range_end:/kubernetes.io/snapshot.storage.k8s.io/volumesnapshots0; response_count:0; response_revision:16925; }","duration":"568.989115ms","start":"2025-12-03T14:09:51.116168Z","end":"2025-12-03T14:09:51.685157Z","steps":["trace[1201375370] 'agreement among raft nodes before linearized reading' (duration: 568.946664ms)"],"step_count":1} 2025-12-03T14:09:51.685237431Z {"level":"warn","ts":"2025-12-03T14:09:51.685183Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-03T14:09:51.116151Z","time spent":"569.026305ms","remote":"192.168.32.10:56090","response type":"/etcdserverpb.KV/Range","request count":0,"request size":116,"response count":0,"response size":30,"request content":"key:\"/kubernetes.io/snapshot.storage.k8s.io/volumesnapshots/\" range_end:\"/kubernetes.io/snapshot.storage.k8s.io/volumesnapshots0\" count_only:true "} 2025-12-03T14:09:51.685237431Z {"level":"warn","ts":"2025-12-03T14:09:51.685187Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.762090688s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/replicasets/\" range_end:\"/kubernetes.io/replicasets0\" count_only:true ","response":"range_response_count:0 size:8"} 2025-12-03T14:09:51.685237431Z {"level":"info","ts":"2025-12-03T14:09:51.685217Z","caller":"traceutil/trace.go:171","msg":"trace[585173032] range","detail":"{range_begin:/kubernetes.io/replicasets/; range_end:/kubernetes.io/replicasets0; response_count:0; response_revision:16925; }","duration":"1.76216732s","start":"2025-12-03T14:09:49.923040Z","end":"2025-12-03T14:09:51.685207Z","steps":["trace[585173032] 'agreement among raft nodes before linearized reading' (duration: 1.762064937s)"],"step_count":1} 2025-12-03T14:09:51.685286093Z {"level":"warn","ts":"2025-12-03T14:09:51.685251Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-03T14:09:49.923014Z","time spent":"1.762222302s","remote":"[::1]:58404","response type":"/etcdserverpb.KV/Range","request count":0,"request size":60,"response count":84,"response size":32,"request content":"key:\"/kubernetes.io/replicasets/\" range_end:\"/kubernetes.io/replicasets0\" count_only:true "} 2025-12-03T14:09:51.685365645Z {"level":"warn","ts":"2025-12-03T14:09:51.685328Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.081327847s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/config.openshift.io/clusterversions/version\" ","response":"range_response_count:1 size:4916"} 2025-12-03T14:09:51.685382756Z {"level":"warn","ts":"2025-12-03T14:09:51.684890Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"207.731537ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/monitoring.openshift.io/alertrelabelconfigs/\" range_end:\"/kubernetes.io/monitoring.openshift.io/alertrelabelconfigs0\" count_only:true ","response":"range_response_count:0 size:6"} 2025-12-03T14:09:51.685382756Z {"level":"info","ts":"2025-12-03T14:09:51.685369Z","caller":"traceutil/trace.go:171","msg":"trace[940510098] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/clusterversions/version; range_end:; response_count:1; response_revision:16925; }","duration":"1.081383519s","start":"2025-12-03T14:09:50.603968Z","end":"2025-12-03T14:09:51.685351Z","steps":["trace[940510098] 'agreement among raft nodes before linearized reading' (duration: 1.081320647s)"],"step_count":1} 2025-12-03T14:09:51.685446468Z {"level":"warn","ts":"2025-12-03T14:09:51.685393Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-03T14:09:50.603952Z","time spent":"1.08143491s","remote":"192.168.32.10:45800","response type":"/etcdserverpb.KV/Range","request count":0,"request size":60,"response count":1,"response size":4940,"request content":"key:\"/kubernetes.io/config.openshift.io/clusterversions/version\" "} 2025-12-03T14:09:51.685446468Z {"level":"info","ts":"2025-12-03T14:09:51.685400Z","caller":"traceutil/trace.go:171","msg":"trace[760942402] range","detail":"{range_begin:/kubernetes.io/monitoring.openshift.io/alertrelabelconfigs/; range_end:/kubernetes.io/monitoring.openshift.io/alertrelabelconfigs0; response_count:0; response_revision:16925; }","duration":"208.267474ms","start":"2025-12-03T14:09:51.477116Z","end":"2025-12-03T14:09:51.685384Z","steps":["trace[760942402] 'agreement among raft nodes before linearized reading' (duration: 207.746638ms)"],"step_count":1} 2025-12-03T14:09:51.685582122Z {"level":"warn","ts":"2025-12-03T14:09:51.685471Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.897645045s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/snapshot.storage.k8s.io/volumesnapshotclasses/\" range_end:\"/kubernetes.io/snapshot.storage.k8s.io/volumesnapshotclasses0\" count_only:true ","response":"range_response_count:0 size:6"} 2025-12-03T14:09:51.685582122Z {"level":"info","ts":"2025-12-03T14:09:51.685513Z","caller":"traceutil/trace.go:171","msg":"trace[1511300526] range","detail":"{range_begin:/kubernetes.io/snapshot.storage.k8s.io/volumesnapshotclasses/; range_end:/kubernetes.io/snapshot.storage.k8s.io/volumesnapshotclasses0; response_count:0; response_revision:16925; }","duration":"1.897716057s","start":"2025-12-03T14:09:49.787784Z","end":"2025-12-03T14:09:51.685500Z","steps":["trace[1511300526] 'agreement among raft nodes before linearized reading' (duration: 1.897624714s)"],"step_count":1} 2025-12-03T14:09:51.685582122Z {"level":"warn","ts":"2025-12-03T14:09:51.685545Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-03T14:09:49.787764Z","time spent":"1.897771498s","remote":"[::1]:45762","response type":"/etcdserverpb.KV/Range","request count":0,"request size":128,"response count":0,"response size":30,"request content":"key:\"/kubernetes.io/snapshot.storage.k8s.io/volumesnapshotclasses/\" range_end:\"/kubernetes.io/snapshot.storage.k8s.io/volumesnapshotclasses0\" count_only:true "} 2025-12-03T14:09:51.685684945Z {"level":"warn","ts":"2025-12-03T14:09:51.685630Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.397493961s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/config.openshift.io/schedulers/\" range_end:\"/kubernetes.io/config.openshift.io/schedulers0\" count_only:true ","response":"range_response_count:0 size:8"} 2025-12-03T14:09:51.685684945Z {"level":"info","ts":"2025-12-03T14:09:51.685668Z","caller":"traceutil/trace.go:171","msg":"trace[827421753] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/schedulers/; range_end:/kubernetes.io/config.openshift.io/schedulers0; response_count:0; response_revision:16925; }","duration":"1.397563363s","start":"2025-12-03T14:09:50.288095Z","end":"2025-12-03T14:09:51.685659Z","steps":["trace[827421753] 'agreement among raft nodes before linearized reading' (duration: 1.397482551s)"],"step_count":1} 2025-12-03T14:09:51.685730016Z {"level":"warn","ts":"2025-12-03T14:09:51.685693Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-03T14:09:50.288077Z","time spent":"1.397608994s","remote":"[::1]:45834","response type":"/etcdserverpb.KV/Range","request count":0,"request size":98,"response count":1,"response size":32,"request content":"key:\"/kubernetes.io/config.openshift.io/schedulers/\" range_end:\"/kubernetes.io/config.openshift.io/schedulers0\" count_only:true "} 2025-12-03T14:09:51.685806588Z {"level":"warn","ts":"2025-12-03T14:09:51.685763Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.949344887s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/config.openshift.io/clusteroperators\" limit:1 ","response":"range_response_count:0 size:6"} 2025-12-03T14:09:51.685917682Z {"level":"warn","ts":"2025-12-03T14:09:51.684835Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-03T14:09:49.597413Z","time spent":"2.08741469s","remote":"[::1]:58134","response type":"/etcdserverpb.KV/Range","request count":0,"request size":34,"response count":0,"response size":30,"request content":"key:\"/kubernetes.io/serviceaccounts\" limit:1 "} 2025-12-03T14:09:51.685980534Z {"level":"info","ts":"2025-12-03T14:09:51.685804Z","caller":"traceutil/trace.go:171","msg":"trace[503499593] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/clusteroperators; range_end:; response_count:0; response_revision:16925; }","duration":"1.949419849s","start":"2025-12-03T14:09:49.736375Z","end":"2025-12-03T14:09:51.685795Z","steps":["trace[503499593] 'agreement among raft nodes before linearized reading' (duration: 1.949351727s)"],"step_count":1} 2025-12-03T14:09:51.686020265Z {"level":"warn","ts":"2025-12-03T14:09:51.685980Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-03T14:09:49.736350Z","time spent":"1.949620465s","remote":"192.168.32.10:45858","response type":"/etcdserverpb.KV/Range","request count":0,"request size":55,"response count":0,"response size":30,"request content":"key:\"/kubernetes.io/config.openshift.io/clusteroperators\" limit:1 "} 2025-12-03T14:09:51.686063636Z {"level":"warn","ts":"2025-12-03T14:09:51.686015Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"2.019440165s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/config.openshift.io/consoles/\" range_end:\"/kubernetes.io/config.openshift.io/consoles0\" count_only:true ","response":"range_response_count:0 size:8"} 2025-12-03T14:09:51.686078327Z {"level":"info","ts":"2025-12-03T14:09:51.686058Z","caller":"traceutil/trace.go:171","msg":"trace[1906294841] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/consoles/; range_end:/kubernetes.io/config.openshift.io/consoles0; response_count:0; response_revision:16925; }","duration":"2.019518208s","start":"2025-12-03T14:09:49.666529Z","end":"2025-12-03T14:09:51.686047Z","steps":["trace[1906294841] 'agreement among raft nodes before linearized reading' (duration: 2.019446216s)"],"step_count":1} 2025-12-03T14:09:51.686123038Z {"level":"warn","ts":"2025-12-03T14:09:51.686089Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-03T14:09:49.666502Z","time spent":"2.01957859s","remote":"[::1]:45874","response type":"/etcdserverpb.KV/Range","request count":0,"request size":94,"response count":1,"response size":32,"request content":"key:\"/kubernetes.io/config.openshift.io/consoles/\" range_end:\"/kubernetes.io/config.openshift.io/consoles0\" count_only:true "} 2025-12-03T14:09:51.686223421Z {"level":"warn","ts":"2025-12-03T14:09:51.686180Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"2.084883623s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/pods/openshift-console/console-c5d7cd7f9-2hp75\" ","response":"range_response_count:1 size:9152"} 2025-12-03T14:09:51.686289163Z {"level":"warn","ts":"2025-12-03T14:09:51.686211Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"2.082942174s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/pods/openshift-oauth-apiserver/apiserver-57fd58bc7b-kktql\" ","response":"range_response_count:1 size:12513"} 2025-12-03T14:09:51.686312984Z {"level":"info","ts":"2025-12-03T14:09:51.686284Z","caller":"traceutil/trace.go:171","msg":"trace[42618466] range","detail":"{range_begin:/kubernetes.io/pods/openshift-oauth-apiserver/apiserver-57fd58bc7b-kktql; range_end:; response_count:1; response_revision:16925; }","duration":"2.083032217s","start":"2025-12-03T14:09:49.603237Z","end":"2025-12-03T14:09:51.686269Z","steps":["trace[42618466] 'agreement among raft nodes before linearized reading' (duration: 2.082916864s)"],"step_count":1} 2025-12-03T14:09:51.686366805Z {"level":"warn","ts":"2025-12-03T14:09:51.686323Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-03T14:09:49.603226Z","time spent":"2.083087169s","remote":"192.168.32.10:41148","response type":"/etcdserverpb.KV/Range","request count":0,"request size":74,"response count":1,"response size":12537,"request content":"key:\"/kubernetes.io/pods/openshift-oauth-apiserver/apiserver-57fd58bc7b-kktql\" "} 2025-12-03T14:09:51.686444048Z {"level":"info","ts":"2025-12-03T14:09:51.686342Z","caller":"traceutil/trace.go:171","msg":"trace[974093410] range","detail":"{range_begin:/kubernetes.io/pods/openshift-console/console-c5d7cd7f9-2hp75; range_end:; response_count:1; response_revision:16925; }","duration":"2.085013807s","start":"2025-12-03T14:09:49.601238Z","end":"2025-12-03T14:09:51.686251Z","steps":["trace[974093410] 'agreement among raft nodes before linearized reading' (duration: 2.084535002s)"],"step_count":1} 2025-12-03T14:09:51.686537991Z {"level":"warn","ts":"2025-12-03T14:09:51.686503Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-03T14:09:49.601205Z","time spent":"2.085285885s","remote":"[::1]:58116","response type":"/etcdserverpb.KV/Range","request count":0,"request size":63,"response count":1,"response size":9176,"request content":"key:\"/kubernetes.io/pods/openshift-console/console-c5d7cd7f9-2hp75\" "} 2025-12-03T14:09:52.319494767Z {"level":"info","ts":"2025-12-03T14:09:52.318448Z","caller":"traceutil/trace.go:171","msg":"trace[268841934] transaction","detail":"{read_only:false; response_revision:16951; number_of_response:1; }","duration":"147.428135ms","start":"2025-12-03T14:09:52.170967Z","end":"2025-12-03T14:09:52.318395Z","steps":["trace[268841934] 'process raft request' (duration: 82.441241ms)","trace[268841934] 'compare' (duration: 64.400726ms)"],"step_count":2} 2025-12-03T14:09:52.736122957Z {"level":"warn","ts":"2025-12-03T14:09:52.736043Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"302.425669ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/podtemplates/\" range_end:\"/kubernetes.io/podtemplates0\" count_only:true ","response":"range_response_count:0 size:6"} 2025-12-03T14:09:52.736221730Z {"level":"info","ts":"2025-12-03T14:09:52.736200Z","caller":"traceutil/trace.go:171","msg":"trace[306414815] range","detail":"{range_begin:/kubernetes.io/podtemplates/; range_end:/kubernetes.io/podtemplates0; response_count:0; response_revision:16951; }","duration":"302.629505ms","start":"2025-12-03T14:09:52.433557Z","end":"2025-12-03T14:09:52.736186Z","steps":["trace[306414815] 'count revisions from in-memory index tree' (duration: 302.363487ms)"],"step_count":1} 2025-12-03T14:09:52.736272721Z {"level":"warn","ts":"2025-12-03T14:09:52.736254Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-03T14:09:52.433539Z","time spent":"302.706748ms","remote":"192.168.32.10:41092","response type":"/etcdserverpb.KV/Range","request count":0,"request size":62,"response count":0,"response size":30,"request content":"key:\"/kubernetes.io/podtemplates/\" range_end:\"/kubernetes.io/podtemplates0\" count_only:true "} 2025-12-03T14:09:52.825951511Z {"level":"info","ts":"2025-12-03T14:09:52.825321Z","caller":"traceutil/trace.go:171","msg":"trace[376272371] transaction","detail":"{read_only:false; response_revision:16952; number_of_response:1; }","duration":"364.382681ms","start":"2025-12-03T14:09:52.460918Z","end":"2025-12-03T14:09:52.825301Z","steps":["trace[376272371] 'process raft request' (duration: 364.231686ms)"],"step_count":1} 2025-12-03T14:09:52.825951511Z {"level":"warn","ts":"2025-12-03T14:09:52.825486Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-03T14:09:52.460887Z","time spent":"364.504765ms","remote":"192.168.32.10:41142","response type":"/etcdserverpb.KV/Txn","request count":1,"request size":12627,"response count":0,"response size":42,"request content":"compare: success:> failure: >"} 2025-12-03T14:09:52.825951511Z {"level":"info","ts":"2025-12-03T14:09:52.825766Z","caller":"traceutil/trace.go:171","msg":"trace[1450712732] linearizableReadLoop","detail":"{readStateIndex:17985; appliedIndex:17985; }","duration":"334.858599ms","start":"2025-12-03T14:09:52.490899Z","end":"2025-12-03T14:09:52.825757Z","steps":["trace[1450712732] 'read index received' (duration: 334.855519ms)","trace[1450712732] 'applied index is now lower than readState.Index' (duration: 2.54µs)"],"step_count":2} 2025-12-03T14:09:52.826013213Z {"level":"warn","ts":"2025-12-03T14:09:52.825935Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"335.006764ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/namespaces/openshift-marketplace\" ","response":"range_response_count:1 size:2512"} 2025-12-03T14:09:52.826024474Z {"level":"info","ts":"2025-12-03T14:09:52.826005Z","caller":"traceutil/trace.go:171","msg":"trace[590799244] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-marketplace; range_end:; response_count:1; response_revision:16952; }","duration":"335.122227ms","start":"2025-12-03T14:09:52.490868Z","end":"2025-12-03T14:09:52.825990Z","steps":["trace[590799244] 'agreement among raft nodes before linearized reading' (duration: 334.932481ms)"],"step_count":1} 2025-12-03T14:09:52.826128737Z {"level":"warn","ts":"2025-12-03T14:09:52.826043Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-03T14:09:52.490853Z","time spent":"335.184279ms","remote":"[::1]:58056","response type":"/etcdserverpb.KV/Range","request count":0,"request size":49,"response count":1,"response size":2536,"request content":"key:\"/kubernetes.io/namespaces/openshift-marketplace\" "} 2025-12-03T14:09:52.908199227Z {"level":"info","ts":"2025-12-03T14:09:52.908099Z","caller":"traceutil/trace.go:171","msg":"trace[1868029993] transaction","detail":"{read_only:false; number_of_response:0; response_revision:16952; }","duration":"215.548944ms","start":"2025-12-03T14:09:52.692525Z","end":"2025-12-03T14:09:52.908074Z","steps":["trace[1868029993] 'process raft request' (duration: 215.431311ms)"],"step_count":1} 2025-12-03T14:09:52.908320521Z {"level":"warn","ts":"2025-12-03T14:09:52.908280Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"412.443594ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/pods/openshift-dns-operator/dns-operator-6b7bcd6566-jh9m8\" ","response":"range_response_count:1 size:7791"} 2025-12-03T14:09:52.908350362Z {"level":"info","ts":"2025-12-03T14:09:52.908321Z","caller":"traceutil/trace.go:171","msg":"trace[1740679526] range","detail":"{range_begin:/kubernetes.io/pods/openshift-dns-operator/dns-operator-6b7bcd6566-jh9m8; range_end:; response_count:1; response_revision:16952; }","duration":"412.536286ms","start":"2025-12-03T14:09:52.495775Z","end":"2025-12-03T14:09:52.908311Z","steps":["trace[1740679526] 'agreement among raft nodes before linearized reading' (duration: 412.400902ms)"],"step_count":1} 2025-12-03T14:09:52.908375102Z {"level":"warn","ts":"2025-12-03T14:09:52.908351Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-03T14:09:52.495754Z","time spent":"412.591258ms","remote":"192.168.32.10:41148","response type":"/etcdserverpb.KV/Range","request count":0,"request size":74,"response count":1,"response size":7815,"request content":"key:\"/kubernetes.io/pods/openshift-dns-operator/dns-operator-6b7bcd6566-jh9m8\" "} 2025-12-03T14:09:54.962471926Z {"level":"info","ts":"2025-12-03T14:09:54.962273Z","caller":"traceutil/trace.go:171","msg":"trace[1185270903] transaction","detail":"{read_only:false; response_revision:16954; number_of_response:1; }","duration":"269.096513ms","start":"2025-12-03T14:09:54.693138Z","end":"2025-12-03T14:09:54.962234Z","steps":["trace[1185270903] 'process raft request' (duration: 268.806834ms)"],"step_count":1} 2025-12-03T14:09:54.964751755Z {"level":"info","ts":"2025-12-03T14:09:54.964629Z","caller":"traceutil/trace.go:171","msg":"trace[1491365558] linearizableReadLoop","detail":"{readStateIndex:17991; appliedIndex:17989; }","duration":"268.882606ms","start":"2025-12-03T14:09:54.695714Z","end":"2025-12-03T14:09:54.964597Z","steps":["trace[1491365558] 'read index received' (duration: 266.03728ms)","trace[1491365558] 'applied index is now lower than readState.Index' (duration: 2.843476ms)"],"step_count":2} 2025-12-03T14:09:54.964794236Z {"level":"info","ts":"2025-12-03T14:09:54.964685Z","caller":"traceutil/trace.go:171","msg":"trace[1312748873] transaction","detail":"{read_only:false; number_of_response:0; response_revision:16954; }","duration":"271.040351ms","start":"2025-12-03T14:09:54.693594Z","end":"2025-12-03T14:09:54.964634Z","steps":["trace[1312748873] 'process raft request' (duration: 270.795154ms)"],"step_count":1} 2025-12-03T14:09:54.965301591Z {"level":"warn","ts":"2025-12-03T14:09:54.965186Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"269.441352ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/pods/openshift-etcd/etcd-master-0\" ","response":"range_response_count:1 size:40591"} 2025-12-03T14:09:54.965360243Z {"level":"info","ts":"2025-12-03T14:09:54.965311Z","caller":"traceutil/trace.go:171","msg":"trace[341664389] range","detail":"{range_begin:/kubernetes.io/pods/openshift-etcd/etcd-master-0; range_end:; response_count:1; response_revision:16954; }","duration":"269.619678ms","start":"2025-12-03T14:09:54.695663Z","end":"2025-12-03T14:09:54.965283Z","steps":["trace[341664389] 'agreement among raft nodes before linearized reading' (duration: 269.064821ms)"],"step_count":1} config/pod/openshift-etcd/logs/etcd-master-0/setup_current.log0000640000000000000000000000013715114042274023122 0ustar00000000000000002025-12-03T14:07:53.389607395Z Fixing etcd log permissions.Fixing etcd auto backup permissions.config/pod/openshift-etcd/etcd-master-0.json0000640000000000000000000007205215114042274017451 0ustar0000000000000000{"metadata":{"name":"etcd-master-0","namespace":"openshift-etcd","uid":"3822297c-8245-42f8-ad55-a4be310ba17b","resourceVersion":"14938","creationTimestamp":"2025-12-03T13:57:32Z","labels":{"app":"etcd","etcd":"true","k8s-app":"etcd","revision":"1"},"annotations":{"kubectl.kubernetes.io/default-container":"etcd","kubernetes.io/config.hash":"ebf07eb54db570834b7c9a90b6b07403","kubernetes.io/config.mirror":"ebf07eb54db570834b7c9a90b6b07403","kubernetes.io/config.seen":"2025-12-03T13:56:18.395909364Z","kubernetes.io/config.source":"file","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"bd7abe6d-36d2-4ce8-92a1-7fdd9966d574","controller":true}]},"spec":{"volumes":[{"name":"static-pod-dir","hostPath":{"path":"/etc/kubernetes/manifests","type":""}},{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-pod-1","type":""}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-certs","type":""}},{"name":"data-dir","hostPath":{"path":"/var/lib/etcd","type":""}},{"name":"usr-local-bin","hostPath":{"path":"/usr/local/bin","type":""}},{"name":"log-dir","hostPath":{"path":"/var/log/etcd","type":""}},{"name":"config-dir","hostPath":{"path":"/etc/kubernetes","type":""}},{"name":"etcd-auto-backup-dir","hostPath":{"path":"/var/lib/etcd-auto-backup","type":""}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1","command":["/bin/sh","-c","#!/bin/sh\necho -n \"Fixing etcd log permissions.\"\nmkdir -p /var/log/etcd \u0026\u0026 chmod 0600 /var/log/etcd\necho -n \"Fixing etcd auto backup permissions.\"\nmkdir -p /var/lib/etcd-auto-backup \u0026\u0026 chmod 0600 /var/lib/etcd-auto-backup\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-ensure-env-vars","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\n: \"${NODE_master_0_ETCD_URL_HOST?not set}\"\n: \"${NODE_master_0_ETCD_NAME?not set}\"\n: \"${NODE_master_0_IP?not set}\"\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_IP}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_IP}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected node IP to be ${NODE_IP} got ${NODE_master_0_IP}\" \u003e\u00262\n exit 1\nfi\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_ETCD_URL_HOST}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_ETCD_URL_HOST}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected etcd url host to be ${NODE_IP} got ${NODE_master_0_ETCD_URL_HOST}\" \u003e\u00262\n exit 1\nfi\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"NODE_IP","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"status.podIP"}}}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-resources-copy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nrm -f $(grep -l '^### Created by cluster-etcd-operator' /usr/local/bin/*)\ncp -p /etc/kubernetes/static-pod-certs/configmaps/etcd-scripts/*.sh /usr/local/bin\n"],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"usr-local-bin","mountPath":"/usr/local/bin"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"etcdctl","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1","command":["/bin/bash","-c","trap TERM INT; sleep infinity \u0026 wait"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"etcd","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\netcdctl member list || true\n\n# this has a non-zero return code if the command is non-zero. If you use an export first, it doesn't and you\n# will succeed when you should fail.\nETCD_INITIAL_CLUSTER=$(discover-etcd-initial-cluster \\\n --cacert=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --cert=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --key=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --endpoints=${ALL_ETCD_ENDPOINTS} \\\n --data-dir=/var/lib/etcd \\\n --target-peer-url-host=${NODE_master_0_ETCD_URL_HOST} \\\n --target-name=master-0)\nexport ETCD_INITIAL_CLUSTER\n\n# we cannot use the \"normal\" port conflict initcontainer because when we upgrade, the existing static pod will never yield,\n# so we do the detection in etcd container itself.\necho -n \"Waiting for ports 2379, 2380 and 9978 to be released.\"\ntime while [ -n \"$(ss -Htan '( sport = 2379 or sport = 2380 or sport = 9978 )')\" ]; do\n echo -n \".\"\n sleep 1\ndone\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\nenv | grep ETCD | grep -v NODE\n\nset -x\n# See https://etcd.io/docs/v3.4.0/tuning/ for why we use ionice\nexec nice -n -19 ionice -c2 -n0 etcd \\\n --logger=zap \\\n --log-level=info \\\n --experimental-initial-corrupt-check=true \\\n --snapshot-count=10000 \\\n --initial-advertise-peer-urls=https://${NODE_master_0_IP}:2380 \\\n --cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --client-cert-auth=true \\\n --peer-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --peer-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --peer-trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --peer-client-cert-auth=true \\\n --advertise-client-urls=https://${NODE_master_0_IP}:2379 \\\n --listen-client-urls=https://0.0.0.0:2379,unixs://${NODE_master_0_IP}:0 \\\n --listen-peer-urls=https://0.0.0.0:2380 \\\n --metrics=extensive \\\n --listen-metrics-urls=https://0.0.0.0:9978 || mv /etc/kubernetes/etcd-backup-dir/etcd-member.yaml /etc/kubernetes/manifests\n"],"ports":[{"name":"etcd","hostPort":2379,"containerPort":2379,"protocol":"TCP"},{"name":"etcd-peer","hostPort":2380,"containerPort":2380,"protocol":"TCP"},{"name":"etcd-metrics","hostPort":9978,"containerPort":9978,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"300m","memory":"600Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"livenessProbe":{"httpGet":{"path":"healthz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"readinessProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"startupProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":18},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-metrics","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\n\nexec nice -n -18 etcd grpc-proxy start \\\n --endpoints https://${NODE_master_0_ETCD_URL_HOST}:9978 \\\n --metrics-addr https://0.0.0.0:9979 \\\n --listen-addr 127.0.0.1:9977 \\\n --advertise-client-url \"\" \\\n --key /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --key-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.key \\\n --cert /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --cert-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.crt \\\n --cacert /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --trusted-ca-file /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/metrics-ca-bundle.crt \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --tls-min-version $(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"proxy-metrics","hostPort":9979,"containerPort":9979,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"40m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-readyz","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ca4933b9ba55069205ea53970128c4e8c4b46560ef721c8aaee00aaf736664b5","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexec nice -n -18 cluster-etcd-operator readyz \\\n --target=https://localhost:2379 \\\n --listen-port=9980 \\\n --serving-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --serving-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT) \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --listen-tls-min-version=$(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"readyz","hostPort":9980,"containerPort":9980,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd/"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-rev","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ca4933b9ba55069205ea53970128c4e8c4b46560ef721c8aaee00aaf736664b5","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\ncluster-etcd-operator rev \\\n --endpoints=$(ALL_ETCD_ENDPOINTS) \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT)\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"data-dir","mountPath":"/var/lib/etcd"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:19Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:19Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:36Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:36Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:19Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2025-12-03T14:08:19Z","initContainerStatuses":[{"name":"setup","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2025-12-03T14:07:53Z","finishedAt":"2025-12-03T14:07:53Z","containerID":"cri-o://c9e0f6c4fba7b746fb0ab51cda73a08bf5fc58a8df5f3bbd8cd5ce4137d6eea7"}},"lastState":{},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1","containerID":"cri-o://c9e0f6c4fba7b746fb0ab51cda73a08bf5fc58a8df5f3bbd8cd5ce4137d6eea7","started":false},{"name":"etcd-ensure-env-vars","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2025-12-03T14:07:53Z","finishedAt":"2025-12-03T14:07:53Z","containerID":"cri-o://35b20e43e9a082c8a9782d4f55c367b85100beb901e30942f83d2fb790bf1fc1"}},"lastState":{},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1","containerID":"cri-o://35b20e43e9a082c8a9782d4f55c367b85100beb901e30942f83d2fb790bf1fc1","started":false},{"name":"etcd-resources-copy","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2025-12-03T14:07:54Z","finishedAt":"2025-12-03T14:07:54Z","containerID":"cri-o://5f7a63a2b4be3a20059399481e35c46252d2f747a1e1b654fb036be24aea9045"}},"lastState":{},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1","containerID":"cri-o://5f7a63a2b4be3a20059399481e35c46252d2f747a1e1b654fb036be24aea9045","started":false}],"containerStatuses":[{"name":"etcd","state":{"running":{"startedAt":"2025-12-03T14:07:55Z"}},"lastState":{},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1","containerID":"cri-o://39b194724b77345b65317f5d17b71ea1ee17ffce6a18c2b78922cb6a46386367","started":true},{"name":"etcd-metrics","state":{"running":{"startedAt":"2025-12-03T14:07:56Z"}},"lastState":{},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1","containerID":"cri-o://76a08e3ec9cc1e6cd6cac4448aac141b7ad630135e3b628b941e62318eb50ac3","started":true},{"name":"etcd-readyz","state":{"running":{"startedAt":"2025-12-03T14:07:56Z"}},"lastState":{},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ca4933b9ba55069205ea53970128c4e8c4b46560ef721c8aaee00aaf736664b5","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ca4933b9ba55069205ea53970128c4e8c4b46560ef721c8aaee00aaf736664b5","containerID":"cri-o://e268587eb8a5af6cf98969c62354a10113d556a7fca88b3e241640fda705c49a","started":true},{"name":"etcd-rev","state":{"running":{"startedAt":"2025-12-03T14:07:56Z"}},"lastState":{},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ca4933b9ba55069205ea53970128c4e8c4b46560ef721c8aaee00aaf736664b5","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ca4933b9ba55069205ea53970128c4e8c4b46560ef721c8aaee00aaf736664b5","containerID":"cri-o://79c235878ca06f7083c9ab9750fa9c2d0ddbe2fb0d20ac29a46db097ba311a82","started":true},{"name":"etcdctl","state":{"running":{"startedAt":"2025-12-03T14:07:55Z"}},"lastState":{},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1","containerID":"cri-o://963060bba05fc97ba7868d1912191aac8aa0d1377feaf4f8447a4e2493c685be","started":true}],"qosClass":"Burstable"}}config/pod/openshift-etcd-operator/logs/etcd-operator-7978bf889c-n64v4/etcd-operator_current.log0000640000000000000000000001055315114042274031010 0ustar00000000000000002025-12-03T14:09:01.106437538Z I1203 14:09:01.106135 1 profiler.go:21] Starting profiling endpoint at http://127.0.0.1:6060/debug/pprof/ 2025-12-03T14:09:01.111645696Z I1203 14:09:01.111261 1 observer_polling.go:159] Starting file observer 2025-12-03T14:09:01.113031258Z I1203 14:09:01.112994 1 cmd.go:253] Using service-serving-cert provided certificates 2025-12-03T14:09:01.113079209Z I1203 14:09:01.113047 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2025-12-03T14:09:01.114843802Z I1203 14:09:01.114805 1 observer_polling.go:159] Starting file observer 2025-12-03T14:09:01.467560281Z I1203 14:09:01.464168 1 builder.go:304] openshift-cluster-etcd-operator version 4.18.0-202510210939.p2.g0f87d4a.assembly.stream.el9-0f87d4a-0f87d4a7da8222d0a1fd21c3c8ced0f0ca3927fe 2025-12-03T14:09:03.082859973Z I1203 14:09:03.082294 1 secure_serving.go:57] Forcing use of http/1.1 only 2025-12-03T14:09:03.082859973Z W1203 14:09:03.082326 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2025-12-03T14:09:03.082859973Z W1203 14:09:03.082333 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2025-12-03T14:09:03.082859973Z W1203 14:09:03.082338 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2025-12-03T14:09:03.082859973Z W1203 14:09:03.082342 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2025-12-03T14:09:03.082859973Z W1203 14:09:03.082346 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2025-12-03T14:09:03.082859973Z W1203 14:09:03.082349 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2025-12-03T14:09:03.098485015Z I1203 14:09:03.098341 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2025-12-03T14:09:03.098485015Z I1203 14:09:03.098414 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2025-12-03T14:09:03.098651800Z I1203 14:09:03.098637 1 secure_serving.go:213] Serving securely on [::]:8443 2025-12-03T14:09:03.099332671Z I1203 14:09:03.098747 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2025-12-03T14:09:03.099568218Z I1203 14:09:03.099133 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2025-12-03T14:09:03.099952950Z I1203 14:09:03.099296 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2025-12-03T14:09:03.099990331Z I1203 14:09:03.099978 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2025-12-03T14:09:03.100641340Z I1203 14:09:03.100615 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2025-12-03T14:09:03.100986141Z I1203 14:09:03.100969 1 leaderelection.go:254] attempting to acquire leader lease openshift-etcd-operator/openshift-cluster-etcd-operator-lock... 2025-12-03T14:09:03.101481526Z I1203 14:09:03.101445 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2025-12-03T14:09:03.101481526Z I1203 14:09:03.101477 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2025-12-03T14:09:03.199150007Z I1203 14:09:03.198658 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2025-12-03T14:09:03.200832448Z I1203 14:09:03.200751 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2025-12-03T14:09:03.206853660Z I1203 14:09:03.206761 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file config/pod/openshift-etcd-operator/etcd-operator-7978bf889c-n64v4.json0000640000000000000000000001544415114042274023726 0ustar0000000000000000{"metadata":{"name":"etcd-operator-7978bf889c-n64v4","generateName":"etcd-operator-7978bf889c-","namespace":"openshift-etcd-operator","uid":"52100521-67e9-40c9-887c-eda6560f06e0","resourceVersion":"16659","creationTimestamp":"2025-12-03T13:51:42Z","labels":{"app":"etcd-operator","pod-template-hash":"7978bf889c"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.10/23\"],\"mac_address\":\"0a:58:0a:80:00:0a\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.10/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.10\"\n ],\n \"mac\": \"0a:58:0a:80:00:0a\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"etcd-operator-7978bf889c","uid":"c9934dfb-ad21-436b-a31f-ca343dbbf11b","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"etcd-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"etcd-operator-config","defaultMode":420}},{"name":"etcd-ca","configMap":{"name":"etcd-ca-bundle","defaultMode":420}},{"name":"etcd-service-ca","configMap":{"name":"etcd-service-ca-bundle","defaultMode":420}},{"name":"etcd-client","secret":{"secretName":"etcd-client","defaultMode":420}},{"name":"kube-api-access-cgq6z","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"etcd-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ca4933b9ba55069205ea53970128c4e8c4b46560ef721c8aaee00aaf736664b5","command":["cluster-etcd-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml","--terminate-on-files=/var/run/secrets/serving-cert/tls.crt","--terminate-on-files=/var/run/secrets/serving-cert/tls.key","--terminate-on-files=/var/run/secrets/etcd-client/tls.crt","--terminate-on-files=/var/run/secrets/etcd-client/tls.key","--terminate-on-files=/var/run/configmaps/etcd-ca/ca-bundle.crt","--terminate-on-files=/var/run/configmaps/etcd-service-ca/service-ca.crt"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ca4933b9ba55069205ea53970128c4e8c4b46560ef721c8aaee00aaf736664b5"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.28"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.28"},{"name":"OPENSHIFT_PROFILE","value":"web"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-cgq6z","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":60,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"etcd-operator","serviceAccount":"etcd-operator","nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:09:02Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T13:54:51Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:09:02Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:09:02Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T13:54:51Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.10","podIPs":[{"ip":"10.128.0.10"}],"startTime":"2025-12-03T13:54:51Z","containerStatuses":[{"name":"etcd-operator","state":{"running":{"startedAt":"2025-12-03T14:09:00Z"}},"lastState":{},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ca4933b9ba55069205ea53970128c4e8c4b46560ef721c8aaee00aaf736664b5","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ca4933b9ba55069205ea53970128c4e8c4b46560ef721c8aaee00aaf736664b5","containerID":"cri-o://bd9bf1d9a40db0a69c4725af8b9a8194c4d981c131850180aa86d88426085453","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-cgq6z","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-dns/node-resolver-4xlhs.json0000640000000000000000000001515315114042274020574 0ustar0000000000000000{"metadata":{"name":"node-resolver-4xlhs","generateName":"node-resolver-","namespace":"openshift-dns","uid":"42c95e54-b4ba-4b19-a97c-abcec840ac5d","resourceVersion":"14750","creationTimestamp":"2025-12-03T13:55:58Z","labels":{"controller-revision-hash":"6c486b9f85","dns.operator.openshift.io/daemonset-node-resolver":"","pod-template-generation":"1"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"DaemonSet","name":"node-resolver","uid":"946eff49-9907-403c-97a0-0325ed488b51","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"hosts-file","hostPath":{"path":"/etc/hosts","type":"File"}},{"name":"kube-api-access-b6tjl","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"dns-node-resolver","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:51a4c20765f54b6a6b5513f97cf54bb99631c2abe860949293456886a74f87fe","command":["/bin/bash","-c","#!/bin/bash\nset -uo pipefail\n\ntrap 'jobs -p | xargs kill || true; wait; exit 0' TERM\n\nOPENSHIFT_MARKER=\"openshift-generated-node-resolver\"\nHOSTS_FILE=\"/etc/hosts\"\nTEMP_FILE=\"/etc/hosts.tmp\"\n\nIFS=', ' read -r -a services \u003c\u003c\u003c \"${SERVICES}\"\n\n# Make a temporary file with the old hosts file's attributes.\nif ! cp -f --attributes-only \"${HOSTS_FILE}\" \"${TEMP_FILE}\"; then\n echo \"Failed to preserve hosts file. Exiting.\"\n exit 1\nfi\n\nwhile true; do\n declare -A svc_ips\n for svc in \"${services[@]}\"; do\n # Fetch service IP from cluster dns if present. We make several tries\n # to do it: IPv4, IPv6, IPv4 over TCP and IPv6 over TCP. The two last ones\n # are for deployments with Kuryr on older OpenStack (OSP13) - those do not\n # support UDP loadbalancers and require reaching DNS through TCP.\n cmds=('dig -t A @\"${NAMESERVER}\" +short \"${svc}.${CLUSTER_DOMAIN}\"|grep -v \"^;\"'\n 'dig -t AAAA @\"${NAMESERVER}\" +short \"${svc}.${CLUSTER_DOMAIN}\"|grep -v \"^;\"'\n 'dig -t A +tcp +retry=0 @\"${NAMESERVER}\" +short \"${svc}.${CLUSTER_DOMAIN}\"|grep -v \"^;\"'\n 'dig -t AAAA +tcp +retry=0 @\"${NAMESERVER}\" +short \"${svc}.${CLUSTER_DOMAIN}\"|grep -v \"^;\"')\n for i in ${!cmds[*]}\n do\n ips=($(eval \"${cmds[i]}\"))\n if [[ \"$?\" -eq 0 \u0026\u0026 \"${#ips[@]}\" -ne 0 ]]; then\n svc_ips[\"${svc}\"]=\"${ips[@]}\"\n break\n fi\n done\n done\n\n # Update /etc/hosts only if we get valid service IPs\n # We will not update /etc/hosts when there is coredns service outage or api unavailability\n # Stale entries could exist in /etc/hosts if the service is deleted\n if [[ -n \"${svc_ips[*]-}\" ]]; then\n # Build a new hosts file from /etc/hosts with our custom entries filtered out\n if ! sed --silent \"/# ${OPENSHIFT_MARKER}/d; w ${TEMP_FILE}\" \"${HOSTS_FILE}\"; then\n # Only continue rebuilding the hosts entries if its original content is preserved\n sleep 60 \u0026 wait\n continue\n fi\n\n # Append resolver entries for services\n rc=0\n for svc in \"${!svc_ips[@]}\"; do\n for ip in ${svc_ips[${svc}]}; do\n echo \"${ip} ${svc} ${svc}.${CLUSTER_DOMAIN} # ${OPENSHIFT_MARKER}\" \u003e\u003e \"${TEMP_FILE}\" || rc=$?\n done\n done\n if [[ $rc -ne 0 ]]; then\n sleep 60 \u0026 wait\n continue\n fi\n\n\n # TODO: Update /etc/hosts atomically to avoid any inconsistent behavior\n # Replace /etc/hosts with our modified version if needed\n cmp \"${TEMP_FILE}\" \"${HOSTS_FILE}\" || cp -f \"${TEMP_FILE}\" \"${HOSTS_FILE}\"\n # TEMP_FILE is not removed to avoid file create/delete and attributes copy churn\n fi\n sleep 60 \u0026 wait\n unset svc_ips\ndone\n"],"env":[{"name":"SERVICES","value":"image-registry.openshift-image-registry.svc"},{"name":"NAMESERVER","value":"172.30.0.10"},{"name":"CLUSTER_DOMAIN","value":"cluster.local"}],"resources":{"requests":{"cpu":"5m","memory":"21Mi"}},"volumeMounts":[{"name":"hosts-file","mountPath":"/etc/hosts"},{"name":"kube-api-access-b6tjl","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux"},"serviceAccountName":"node-resolver","serviceAccount":"node-resolver","nodeName":"master-0","hostNetwork":true,"securityContext":{},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchFields":[{"key":"metadata.name","operator":"In","values":["master-0"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T13:56:00Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T13:55:58Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:23Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:23Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T13:55:58Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2025-12-03T13:55:58Z","containerStatuses":[{"name":"dns-node-resolver","state":{"running":{"startedAt":"2025-12-03T14:08:22Z"}},"lastState":{},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:51a4c20765f54b6a6b5513f97cf54bb99631c2abe860949293456886a74f87fe","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:51a4c20765f54b6a6b5513f97cf54bb99631c2abe860949293456886a74f87fe","containerID":"cri-o://bbead94692b339bd07c2e48969b5e8e5d7bc96f40b82a72fbab8051c0835433b","started":true,"volumeMounts":[{"name":"hosts-file","mountPath":"/etc/hosts"},{"name":"kube-api-access-b6tjl","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-dns/logs/dns-default-5m4f8/kube-rbac-proxy_current.log0000640000000000000000000000156615114042274025352 0ustar00000000000000002025-12-03T14:08:54.573920073Z W1203 14:08:54.573682 1 deprecated.go:66] 2025-12-03T14:08:54.573920073Z ==== Removed Flag Warning ====================== 2025-12-03T14:08:54.573920073Z 2025-12-03T14:08:54.573920073Z logtostderr is removed in the k8s upstream and has no effect any more. 2025-12-03T14:08:54.573920073Z 2025-12-03T14:08:54.573920073Z =============================================== 2025-12-03T14:08:54.573920073Z 2025-12-03T14:08:54.574483460Z I1203 14:08:54.574439 1 kube-rbac-proxy.go:233] Valid token audiences: 2025-12-03T14:08:54.575920033Z I1203 14:08:54.575885 1 kube-rbac-proxy.go:347] Reading certificate files 2025-12-03T14:08:54.576298705Z I1203 14:08:54.576246 1 kube-rbac-proxy.go:395] Starting TCP socket on :9154 2025-12-03T14:08:54.576725007Z I1203 14:08:54.576707 1 kube-rbac-proxy.go:402] Listening securely on :9154 config/pod/openshift-dns/logs/dns-default-5m4f8/dns_current.log0000640000000000000000000000070215114042274023113 0ustar00000000000000002025-12-03T14:08:53.838040336Z .:5353 2025-12-03T14:08:53.838040336Z hostname.bind.:5353 2025-12-03T14:08:53.838204071Z [INFO] plugin/reload: Running configuration SHA512 = c40f1fac74a6633c6b1943fe251ad80adf3d5bd9b35c9e7d9b72bc260c5e2455f03e403e3b79d32f0936ff27e81ff6d07c68a95724b1c2c23510644372976718 2025-12-03T14:08:53.838214641Z CoreDNS-1.11.3 2025-12-03T14:08:53.838214641Z linux/amd64, go1.22.12 (Red Hat 1.22.12-3.el9_5) X:strictfipsruntime, config/pod/openshift-dns/dns-default-5m4f8.json0000640000000000000000000001650215114042274020016 0ustar0000000000000000{"metadata":{"name":"dns-default-5m4f8","generateName":"dns-default-","namespace":"openshift-dns","uid":"4669137a-fbc4-41e1-8eeb-5f06b9da2641","resourceVersion":"16741","creationTimestamp":"2025-12-03T13:55:57Z","labels":{"controller-revision-hash":"87b4c75c","dns.operator.openshift.io/daemonset-dns":"default","pod-template-generation":"1"},"annotations":{"cluster-autoscaler.kubernetes.io/enable-ds-eviction":"true","k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.39/23\"],\"mac_address\":\"0a:58:0a:80:00:27\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.39/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.39\"\n ],\n \"mac\": \"0a:58:0a:80:00:27\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"DaemonSet","name":"dns-default","uid":"fe913718-e498-4dd4-a4a4-47dcf45e434a","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config-volume","configMap":{"name":"dns-default","items":[{"key":"Corefile","path":"Corefile"}],"defaultMode":420}},{"name":"metrics-tls","secret":{"secretName":"dns-default-metrics-tls","defaultMode":420}},{"name":"kube-api-access-7cvkj","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"dns","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4a3e2790bda8898df5e4e9cf1878103ac483ea1633819d76ea68976b0b2062b6","command":["coredns"],"args":["-conf","/etc/coredns/Corefile"],"ports":[{"name":"dns","containerPort":5353,"protocol":"UDP"},{"name":"dns-tcp","containerPort":5353,"protocol":"TCP"}],"resources":{"requests":{"cpu":"50m","memory":"70Mi"}},"volumeMounts":[{"name":"config-volume","readOnly":true,"mountPath":"/etc/coredns"},{"name":"kube-api-access-7cvkj","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/health","port":8080,"scheme":"HTTP"},"initialDelaySeconds":60,"timeoutSeconds":5,"periodSeconds":10,"successThreshold":1,"failureThreshold":5},"readinessProbe":{"httpGet":{"path":"/ready","port":8181,"scheme":"HTTP"},"initialDelaySeconds":10,"timeoutSeconds":3,"periodSeconds":3,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","args":["--logtostderr","--secure-listen-address=:9154","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256","--upstream=http://127.0.0.1:9153/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key"],"ports":[{"name":"metrics","containerPort":9154,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"40Mi"}},"volumeMounts":[{"name":"metrics-tls","readOnly":true,"mountPath":"/etc/tls/private"},{"name":"kube-api-access-7cvkj","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"Default","nodeSelector":{"kubernetes.io/os":"linux"},"serviceAccountName":"dns","serviceAccount":"dns","nodeName":"master-0","securityContext":{},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchFields":[{"key":"metadata.name","operator":"In","values":["master-0"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/disk-pressure","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/pid-pressure","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unschedulable","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:55Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T13:55:57Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:09:04Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:09:04Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T13:55:57Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.39","podIPs":[{"ip":"10.128.0.39"}],"startTime":"2025-12-03T13:55:57Z","containerStatuses":[{"name":"dns","state":{"running":{"startedAt":"2025-12-03T14:08:53Z"}},"lastState":{},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4a3e2790bda8898df5e4e9cf1878103ac483ea1633819d76ea68976b0b2062b6","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4a3e2790bda8898df5e4e9cf1878103ac483ea1633819d76ea68976b0b2062b6","containerID":"cri-o://b3c8f5d4f39beb3b9fb9f00d817f68bb3f8dc76e7a783e62c497f6ac9be62874","started":true,"volumeMounts":[{"name":"config-volume","mountPath":"/etc/coredns","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-7cvkj","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2025-12-03T14:08:54Z"}},"lastState":{},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","containerID":"cri-o://8a576ad2831821ea4b6d5602aa70010b115a4dc548df83ef9a7f154f24e78877","started":true,"volumeMounts":[{"name":"metrics-tls","mountPath":"/etc/tls/private","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-7cvkj","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-dns-operator/logs/dns-operator-6b7bcd6566-jh9m8/kube-rbac-proxy_current.log0000640000000000000000000000156615114042274031102 0ustar00000000000000002025-12-03T14:09:03.286504997Z W1203 14:09:03.282869 1 deprecated.go:66] 2025-12-03T14:09:03.286504997Z ==== Removed Flag Warning ====================== 2025-12-03T14:09:03.286504997Z 2025-12-03T14:09:03.286504997Z logtostderr is removed in the k8s upstream and has no effect any more. 2025-12-03T14:09:03.286504997Z 2025-12-03T14:09:03.286504997Z =============================================== 2025-12-03T14:09:03.286504997Z 2025-12-03T14:09:03.286504997Z I1203 14:09:03.283479 1 kube-rbac-proxy.go:233] Valid token audiences: 2025-12-03T14:09:03.286504997Z I1203 14:09:03.285287 1 kube-rbac-proxy.go:347] Reading certificate files 2025-12-03T14:09:03.290461537Z I1203 14:09:03.288535 1 kube-rbac-proxy.go:395] Starting TCP socket on :9393 2025-12-03T14:09:03.290461537Z I1203 14:09:03.289444 1 kube-rbac-proxy.go:402] Listening securely on :9393 config/pod/openshift-dns-operator/logs/dns-operator-6b7bcd6566-jh9m8/dns-operator_current.log0000640000000000000000000002662315114042274030506 0ustar00000000000000002025-12-03T14:09:01.226735134Z I1203 14:09:01.226481 1 simple_featuregate_reader.go:171] Starting feature-gate-detector 2025-12-03T14:09:01.239381706Z I1203 14:09:01.239203 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-dns-operator", Name:"dns-operator", UID:"", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'FeatureGatesInitialized' FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{"AWSEFSDriverVolumeMetrics", "AdminNetworkPolicy", "AlibabaPlatform", "AzureWorkloadIdentity", "BareMetalLoadBalancer", "BuildCSIVolumes", "ChunkSizeMiB", "CloudDualStackNodeIPs", "DisableKubeletCloudCredentialProviders", "GCPLabelsTags", "HardwareSpeed", "IngressControllerLBSubnetsAWS", "KMSv1", "ManagedBootImages", "ManagedBootImagesAWS", "MultiArchInstallAWS", "MultiArchInstallGCP", "NetworkDiagnosticsConfig", "NetworkLiveMigration", "NetworkSegmentation", "NewOLM", "NodeDisruptionPolicy", "OnClusterBuild", "PersistentIPsForVirtualization", "PrivateHostedZoneAWS", "SetEIPForNLBIngressController", "VSphereControlPlaneMachineSet", "VSphereDriverConfiguration", "VSphereMultiVCenters", "VSphereStaticIPs", "ValidatingAdmissionPolicy"}, Disabled:[]v1.FeatureGateName{"AWSClusterHostedDNS", "AdditionalRoutingCapabilities", "AutomatedEtcdBackup", "BootcNodeManagement", "CSIDriverSharedResource", "ClusterAPIInstall", "ClusterAPIInstallIBMCloud", "ClusterMonitoringConfig", "ConsolePluginContentSecurityPolicy", "DNSNameResolver", "DynamicResourceAllocation", "EtcdBackendQuota", "EventedPLEG", "Example", "ExternalOIDC", "ExternalOIDCWithUIDAndExtraClaimMappings", "GCPClusterHostedDNS", "GatewayAPI", "ImageStreamImportMode", "IngressControllerDynamicConfigurationManager", "InsightsConfig", "InsightsConfigAPI", "InsightsOnDemandDataGather", "InsightsRuntimeExtractor", "MachineAPIMigration", "MachineAPIOperatorDisableMachineHealthCheckController", "MachineAPIProviderOpenStack", "MachineConfigNodes", "MaxUnavailableStatefulSet", "MetricsCollectionProfiles", "MinimumKubeletVersion", "MixedCPUsAllocation", "MultiArchInstallAzure", "NodeSwap", "NutanixMultiSubnets", "OVNObservability", "OpenShiftPodSecurityAdmission", "PinnedImages", "PlatformOperators", "ProcMountType", "RouteAdvertisements", "RouteExternalCertificate", "ServiceAccountTokenNodeBinding", "SignatureStores", "SigstoreImageVerification", "StreamingCollectionEncodingToJSON", "StreamingCollectionEncodingToProtobuf", "TranslateStreamCloseWebsocketRequests", "UpgradeStatus", "UserNamespacesPodSecurityStandards", "UserNamespacesSupport", "VSphereMultiNetworks", "VolumeAttributesClass", "VolumeGroupSnapshot"}} 2025-12-03T14:09:01.239381706Z time="2025-12-03T14:09:01Z" level=info msg="FeatureGates initializedknownFeatures[AWSClusterHostedDNS AWSEFSDriverVolumeMetrics AdditionalRoutingCapabilities AdminNetworkPolicy AlibabaPlatform AutomatedEtcdBackup AzureWorkloadIdentity BareMetalLoadBalancer BootcNodeManagement BuildCSIVolumes CSIDriverSharedResource ChunkSizeMiB CloudDualStackNodeIPs ClusterAPIInstall ClusterAPIInstallIBMCloud ClusterMonitoringConfig ConsolePluginContentSecurityPolicy DNSNameResolver DisableKubeletCloudCredentialProviders DynamicResourceAllocation EtcdBackendQuota EventedPLEG Example ExternalOIDC ExternalOIDCWithUIDAndExtraClaimMappings GCPClusterHostedDNS GCPLabelsTags GatewayAPI HardwareSpeed ImageStreamImportMode IngressControllerDynamicConfigurationManager IngressControllerLBSubnetsAWS InsightsConfig InsightsConfigAPI InsightsOnDemandDataGather InsightsRuntimeExtractor KMSv1 MachineAPIMigration MachineAPIOperatorDisableMachineHealthCheckController MachineAPIProviderOpenStack MachineConfigNodes ManagedBootImages ManagedBootImagesAWS MaxUnavailableStatefulSet MetricsCollectionProfiles MinimumKubeletVersion MixedCPUsAllocation MultiArchInstallAWS MultiArchInstallAzure MultiArchInstallGCP NetworkDiagnosticsConfig NetworkLiveMigration NetworkSegmentation NewOLM NodeDisruptionPolicy NodeSwap NutanixMultiSubnets OVNObservability OnClusterBuild OpenShiftPodSecurityAdmission PersistentIPsForVirtualization PinnedImages PlatformOperators PrivateHostedZoneAWS ProcMountType RouteAdvertisements RouteExternalCertificate ServiceAccountTokenNodeBinding SetEIPForNLBIngressController SignatureStores SigstoreImageVerification StreamingCollectionEncodingToJSON StreamingCollectionEncodingToProtobuf TranslateStreamCloseWebsocketRequests UpgradeStatus UserNamespacesPodSecurityStandards UserNamespacesSupport VSphereControlPlaneMachineSet VSphereDriverConfiguration VSphereMultiNetworks VSphereMultiVCenters VSphereStaticIPs ValidatingAdmissionPolicy VolumeAttributesClass VolumeGroupSnapshot]" 2025-12-03T14:09:01.240890931Z 2025-12-03T14:09:01Z INFO controller-runtime.metrics Starting metrics server 2025-12-03T14:09:01.250480471Z 2025-12-03T14:09:01Z INFO Starting EventSource {"controller": "status_controller", "source": "kind source: *v1.DNS"} 2025-12-03T14:09:01.250480471Z 2025-12-03T14:09:01Z INFO Starting EventSource {"controller": "status_controller", "source": "kind source: *v1.DaemonSet"} 2025-12-03T14:09:01.250480471Z 2025-12-03T14:09:01Z INFO Starting EventSource {"controller": "status_controller", "source": "kind source: *v1.ClusterOperator"} 2025-12-03T14:09:01.250480471Z 2025-12-03T14:09:01Z INFO Starting Controller {"controller": "status_controller"} 2025-12-03T14:09:01.250480471Z 2025-12-03T14:09:01Z INFO Starting EventSource {"controller": "dns_controller", "source": "kind source: *v1.DNS"} 2025-12-03T14:09:01.250480471Z 2025-12-03T14:09:01Z INFO Starting EventSource {"controller": "dns_controller", "source": "kind source: *v1.DaemonSet"} 2025-12-03T14:09:01.250480471Z 2025-12-03T14:09:01Z INFO Starting EventSource {"controller": "dns_controller", "source": "kind source: *v1.Service"} 2025-12-03T14:09:01.250480471Z 2025-12-03T14:09:01Z INFO Starting EventSource {"controller": "dns_controller", "source": "kind source: *v1.ConfigMap"} 2025-12-03T14:09:01.250480471Z 2025-12-03T14:09:01Z INFO Starting EventSource {"controller": "dns_controller", "source": "kind source: *v1.ConfigMap"} 2025-12-03T14:09:01.250480471Z 2025-12-03T14:09:01Z INFO Starting EventSource {"controller": "dns_controller", "source": "kind source: *v1.Node"} 2025-12-03T14:09:01.250480471Z 2025-12-03T14:09:01Z INFO Starting Controller {"controller": "dns_controller"} 2025-12-03T14:09:01.250480471Z 2025-12-03T14:09:01Z INFO controller-runtime.metrics Serving metrics server {"bindAddress": "127.0.0.1:60000", "secure": false} 2025-12-03T14:09:01.497330451Z 2025-12-03T14:09:01Z INFO Starting workers {"controller": "status_controller", "worker count": 1} 2025-12-03T14:09:01.606303344Z 2025-12-03T14:09:01Z INFO Starting workers {"controller": "dns_controller", "worker count": 1} 2025-12-03T14:09:01.606303344Z time="2025-12-03T14:09:01Z" level=info msg="reconciling request: /default" 2025-12-03T14:09:01.860485264Z time="2025-12-03T14:09:01Z" level=info msg="updated DNS default status: old: v1.DNSStatus{ClusterIP:\"172.30.0.10\", ClusterDomain:\"cluster.local\", Conditions:[]v1.OperatorCondition{v1.OperatorCondition{Type:\"Degraded\", Status:\"False\", LastTransitionTime:time.Date(2025, time.December, 3, 13, 57, 49, 0, time.Local), Reason:\"AsExpected\", Message:\"Enough DNS pods are available, and the DNS service has a cluster IP address.\"}, v1.OperatorCondition{Type:\"Progressing\", Status:\"False\", LastTransitionTime:time.Date(2025, time.December, 3, 13, 57, 49, 0, time.Local), Reason:\"AsExpected\", Message:\"All DNS and node-resolver pods are available, and the DNS service has a cluster IP address.\"}, v1.OperatorCondition{Type:\"Available\", Status:\"True\", LastTransitionTime:time.Date(2025, time.December, 3, 13, 57, 49, 0, time.Local), Reason:\"AsExpected\", Message:\"The DNS daemonset has available pods, and the DNS service has a cluster IP address.\"}, v1.OperatorCondition{Type:\"Upgradeable\", Status:\"True\", LastTransitionTime:time.Date(2025, time.December, 3, 13, 55, 58, 0, time.Local), Reason:\"AsExpected\", Message:\"DNS Operator can be upgraded\"}}}, new: v1.DNSStatus{ClusterIP:\"172.30.0.10\", ClusterDomain:\"cluster.local\", Conditions:[]v1.OperatorCondition{v1.OperatorCondition{Type:\"Degraded\", Status:\"True\", LastTransitionTime:time.Date(2025, time.December, 3, 14, 9, 1, 0, time.Local), Reason:\"NoDNSPodsAvailable\", Message:\"No DNS pods are available.\"}, v1.OperatorCondition{Type:\"Progressing\", Status:\"True\", LastTransitionTime:time.Date(2025, time.December, 3, 14, 9, 1, 0, time.Local), Reason:\"Reconciling\", Message:\"Have 0 available DNS pods, want 1.\"}, v1.OperatorCondition{Type:\"Available\", Status:\"False\", LastTransitionTime:time.Date(2025, time.December, 3, 14, 9, 1, 0, time.Local), Reason:\"NoDaemonSetPods\", Message:\"The DNS daemonset has no pods available.\"}, v1.OperatorCondition{Type:\"Upgradeable\", Status:\"True\", LastTransitionTime:time.Date(2025, time.December, 3, 13, 55, 58, 0, time.Local), Reason:\"AsExpected\", Message:\"DNS Operator can be upgraded\"}}}" 2025-12-03T14:09:01.872498927Z time="2025-12-03T14:09:01Z" level=info msg="reconciling request: /default" 2025-12-03T14:09:05.057449223Z time="2025-12-03T14:09:05Z" level=info msg="reconciling request: /default" 2025-12-03T14:09:15.031565718Z time="2025-12-03T14:09:15Z" level=info msg="reconciling request: /default" 2025-12-03T14:09:26.250616338Z time="2025-12-03T14:09:26Z" level=info msg="updated DNS default status: old: v1.DNSStatus{ClusterIP:\"172.30.0.10\", ClusterDomain:\"cluster.local\", Conditions:[]v1.OperatorCondition{v1.OperatorCondition{Type:\"Degraded\", Status:\"True\", LastTransitionTime:time.Date(2025, time.December, 3, 14, 9, 1, 0, time.Local), Reason:\"NoDNSPodsAvailable\", Message:\"No DNS pods are available.\"}, v1.OperatorCondition{Type:\"Progressing\", Status:\"True\", LastTransitionTime:time.Date(2025, time.December, 3, 14, 9, 1, 0, time.Local), Reason:\"Reconciling\", Message:\"Have 0 available DNS pods, want 1.\"}, v1.OperatorCondition{Type:\"Available\", Status:\"False\", LastTransitionTime:time.Date(2025, time.December, 3, 14, 9, 1, 0, time.Local), Reason:\"NoDaemonSetPods\", Message:\"The DNS daemonset has no pods available.\"}, v1.OperatorCondition{Type:\"Upgradeable\", Status:\"True\", LastTransitionTime:time.Date(2025, time.December, 3, 13, 55, 58, 0, time.Local), Reason:\"AsExpected\", Message:\"DNS Operator can be upgraded\"}}}, new: v1.DNSStatus{ClusterIP:\"172.30.0.10\", ClusterDomain:\"cluster.local\", Conditions:[]v1.OperatorCondition{v1.OperatorCondition{Type:\"Degraded\", Status:\"False\", LastTransitionTime:time.Date(2025, time.December, 3, 14, 9, 26, 0, time.Local), Reason:\"AsExpected\", Message:\"Enough DNS pods are available, and the DNS service has a cluster IP address.\"}, v1.OperatorCondition{Type:\"Progressing\", Status:\"False\", LastTransitionTime:time.Date(2025, time.December, 3, 14, 9, 26, 0, time.Local), Reason:\"AsExpected\", Message:\"All DNS and node-resolver pods are available, and the DNS service has a cluster IP address.\"}, v1.OperatorCondition{Type:\"Available\", Status:\"True\", LastTransitionTime:time.Date(2025, time.December, 3, 14, 9, 26, 0, time.Local), Reason:\"AsExpected\", Message:\"The DNS daemonset has available pods, and the DNS service has a cluster IP address.\"}, v1.OperatorCondition{Type:\"Upgradeable\", Status:\"True\", LastTransitionTime:time.Date(2025, time.December, 3, 13, 55, 58, 0, time.Local), Reason:\"AsExpected\", Message:\"DNS Operator can be upgraded\"}}}" 2025-12-03T14:09:26.268755056Z time="2025-12-03T14:09:26Z" level=info msg="reconciling request: /default" config/pod/openshift-dns-operator/dns-operator-6b7bcd6566-jh9m8.json0000640000000000000000000001563615114042274023555 0ustar0000000000000000{"metadata":{"name":"dns-operator-6b7bcd6566-jh9m8","generateName":"dns-operator-6b7bcd6566-","namespace":"openshift-dns-operator","uid":"98392f8e-0285-4bc3-95a9-d29033639ca3","resourceVersion":"16719","creationTimestamp":"2025-12-03T13:51:42Z","labels":{"name":"dns-operator","pod-template-hash":"6b7bcd6566"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.20/23\"],\"mac_address\":\"0a:58:0a:80:00:14\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.20/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.20\"\n ],\n \"mac\": \"0a:58:0a:80:00:14\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"dns-operator-6b7bcd6566","uid":"32d149fb-61a4-4ce5-b6bd-5b392aa06ec3","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420}},{"name":"kube-api-access-djxkd","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"dns-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:656fe650bac2929182cd0cf7d7e566d089f69e06541b8329c6d40b89346c03ca","command":["dns-operator"],"env":[{"name":"RELEASE_VERSION","value":"4.18.28"},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4a3e2790bda8898df5e4e9cf1878103ac483ea1633819d76ea68976b0b2062b6"},{"name":"OPENSHIFT_CLI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:51a4c20765f54b6a6b5513f97cf54bb99631c2abe860949293456886a74f87fe"},{"name":"KUBE_RBAC_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d"}],"resources":{"requests":{"cpu":"10m","memory":"29Mi"}},"volumeMounts":[{"name":"kube-api-access-djxkd","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","args":["--logtostderr","--secure-listen-address=:9393","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256","--upstream=http://127.0.0.1:60000/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key"],"ports":[{"name":"metrics","containerPort":9393,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"40Mi"}},"volumeMounts":[{"name":"metrics-tls","readOnly":true,"mountPath":"/etc/tls/private"},{"name":"kube-api-access-djxkd","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":2,"dnsPolicy":"Default","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"dns-operator","serviceAccount":"dns-operator","nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:09:03Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T13:54:51Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:09:03Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:09:03Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T13:54:51Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.20","podIPs":[{"ip":"10.128.0.20"}],"startTime":"2025-12-03T13:54:51Z","containerStatuses":[{"name":"dns-operator","state":{"running":{"startedAt":"2025-12-03T14:09:00Z"}},"lastState":{},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:656fe650bac2929182cd0cf7d7e566d089f69e06541b8329c6d40b89346c03ca","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:656fe650bac2929182cd0cf7d7e566d089f69e06541b8329c6d40b89346c03ca","containerID":"cri-o://f702f47197a7be997d18ff5a17914c0f7a106fc6c0ef420b592e9470e20aa846","started":true,"volumeMounts":[{"name":"kube-api-access-djxkd","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2025-12-03T14:09:02Z"}},"lastState":{},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","containerID":"cri-o://1813e95aa9179f1c5292e5b2348000ccebe08276790c97d9ea0ab42ce9345f9c","started":true,"volumeMounts":[{"name":"metrics-tls","mountPath":"/etc/tls/private","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-djxkd","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-console/logs/downloads-6f5db8559b-96ljh/download-server_current.log0000640000000000000000000000143015114042274027575 0ustar00000000000000002025-12-03T14:09:13.552969597Z ::ffff:10.128.0.2 - - [03/Dec/2025 14:09:13] "GET / HTTP/1.1" 200 - 2025-12-03T14:09:13.553297997Z ::ffff:10.128.0.2 - - [03/Dec/2025 14:09:13] "GET / HTTP/1.1" 200 - 2025-12-03T14:09:23.539398177Z ::ffff:10.128.0.2 - - [03/Dec/2025 14:09:23] "GET / HTTP/1.1" 200 - 2025-12-03T14:09:23.539584422Z ::ffff:10.128.0.2 - - [03/Dec/2025 14:09:23] "GET / HTTP/1.1" 200 - 2025-12-03T14:09:33.539510950Z ::ffff:10.128.0.2 - - [03/Dec/2025 14:09:33] "GET / HTTP/1.1" 200 - 2025-12-03T14:09:33.539735486Z ::ffff:10.128.0.2 - - [03/Dec/2025 14:09:33] "GET / HTTP/1.1" 200 - 2025-12-03T14:09:43.538823526Z ::ffff:10.128.0.2 - - [03/Dec/2025 14:09:43] "GET / HTTP/1.1" 200 - 2025-12-03T14:09:43.539666381Z ::ffff:10.128.0.2 - - [03/Dec/2025 14:09:43] "GET / HTTP/1.1" 200 - config/pod/openshift-console/downloads-6f5db8559b-96ljh.json0000640000000000000000000002271615114042274022156 0ustar0000000000000000{"metadata":{"name":"downloads-6f5db8559b-96ljh","generateName":"downloads-6f5db8559b-","namespace":"openshift-console","uid":"6dd61097-7ea1-4d1d-9d4d-a781a0a59e7d","resourceVersion":"16847","creationTimestamp":"2025-12-03T14:00:40Z","labels":{"app":"console","component":"downloads","pod-template-hash":"6f5db8559b"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.80/23\"],\"mac_address\":\"0a:58:0a:80:00:50\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.80/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.80\"\n ],\n \"mac\": \"0a:58:0a:80:00:50\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"downloads-6f5db8559b","uid":"c7fe21fa-491f-4d4e-b47f-a0a329f8eb19","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"kube-api-access-c5nch","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"download-server","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3d886210d2faa9ace5750adfc70c0c3c5512cdf492f19d1c536a446db659aabb","command":["/bin/sh"],"args":["-c","cat \u003c\u003cEOF \u003e\u003e/tmp/serve.py\nimport errno, http.server, os, re, signal, socket, sys, tarfile, tempfile, threading, time, zipfile\n\nsignal.signal(signal.SIGTERM, lambda signum, frame: sys.exit(0))\n\ndef write_index(path, message):\n with open(path, 'wb') as f:\n f.write('\\n'.join([\n '\u003c!doctype html\u003e',\n '\u003chtml lang=\"en\"\u003e',\n '\u003chead\u003e',\n ' \u003cmeta charset=\"utf-8\"\u003e',\n '\u003c/head\u003e',\n '\u003cbody\u003e',\n ' {}'.format(message),\n '\u003c/body\u003e',\n '\u003c/html\u003e',\n '',\n ]).encode('utf-8'))\n\n# Launch multiple listeners as threads\nclass Thread(threading.Thread):\n def __init__(self, i, socket):\n threading.Thread.__init__(self)\n self.i = i\n self.socket = socket\n self.daemon = True\n self.start()\n\n def run(self):\n server = http.server.SimpleHTTPRequestHandler\n server.server_version = \"OpenShift Downloads Server\"\n server.sys_version = \"\"\n httpd = http.server.HTTPServer(addr, server, False)\n\n # Prevent the HTTP server from re-binding every handler.\n # https://stackoverflow.com/questions/46210672/\n httpd.socket = self.socket\n httpd.server_bind = self.server_close = lambda self: None\n\n httpd.serve_forever()\n\ntemp_dir = tempfile.mkdtemp()\nprint('serving from {}'.format(temp_dir))\nos.chdir(temp_dir)\nfor arch in ['amd64', 'arm64', 'ppc64le', 's390x']:\n os.mkdir(arch)\ncontent = ['\u003ca href=\"oc-license\"\u003elicense\u003c/a\u003e']\nos.symlink('/usr/share/openshift/LICENSE', 'oc-license')\n\nfor arch, operating_system, path in [\n ('amd64', 'linux', '/usr/share/openshift/linux_amd64/oc'),\n ('amd64', 'mac', '/usr/share/openshift/mac/oc'),\n ('amd64', 'windows', '/usr/share/openshift/windows/oc.exe'),\n ('arm64', 'linux', '/usr/share/openshift/linux_arm64/oc'),\n ('arm64', 'mac', '/usr/share/openshift/mac_arm64/oc'),\n ('ppc64le', 'linux', '/usr/share/openshift/linux_ppc64le/oc'),\n ('s390x', 'linux', '/usr/share/openshift/linux_s390x/oc'),\n ]:\n basename = os.path.basename(path)\n target_path = os.path.join(arch, operating_system, basename)\n os.mkdir(os.path.join(arch, operating_system))\n os.symlink(path, target_path)\n base_root, _ = os.path.splitext(basename)\n archive_path_root = os.path.join(arch, operating_system, base_root)\n with tarfile.open('{}.tar'.format(archive_path_root), 'w') as tar:\n tar.add(path, basename)\n with zipfile.ZipFile('{}.zip'.format(archive_path_root), 'w') as zip:\n zip.write(path, basename)\n content.append(\n '\u003ca href=\"{0}\"\u003eoc ({1} {2})\u003c/a\u003e (\u003ca href=\"{3}.tar\"\u003etar\u003c/a\u003e \u003ca href=\"{3}.zip\"\u003ezip\u003c/a\u003e)'.format(\n target_path, arch, operating_system, archive_path_root\n )\n )\n\nfor root, directories, filenames in os.walk(temp_dir):\n root_link = os.path.relpath(temp_dir, os.path.join(root, 'child')).replace(os.path.sep, '/')\n for directory in directories:\n write_index(\n path=os.path.join(root, directory, 'index.html'),\n message='\u003cp\u003eDirectory listings are disabled. See \u003ca href=\"{}\"\u003ehere\u003c/a\u003e for available content.\u003c/p\u003e'.format(root_link),\n )\n\nwrite_index(\n path=os.path.join(temp_dir, 'index.html'),\n message='\\n'.join(\n ['\u003cul\u003e'] +\n [' \u003cli\u003e{}\u003c/li\u003e'.format(entry) for entry in content] +\n ['\u003c/ul\u003e']\n ),\n)\n\n# Create socket\n# IPv6 should handle IPv4 passively so long as it is not bound to a\n# specific address or set to IPv6_ONLY\n# https://stackoverflow.com/questions/25817848/python-3-does-http-server-support-ipv6\ntry:\n addr = ('::', 8080)\n sock = socket.socket(socket.AF_INET6, socket.SOCK_STREAM)\nexcept socket.error as err:\n # errno.EAFNOSUPPORT is \"socket.error: [Errno 97] Address family not supported by protocol\"\n # When IPv6 is disabled, socket will bind using IPv4.\n if err.errno == errno.EAFNOSUPPORT:\n addr = ('', 8080)\n sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)\n else:\n raise \nsock.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)\nsock.bind(addr)\nsock.listen(5)\n\n[Thread(i, socket=sock) for i in range(100)]\ntime.sleep(9e9)\nEOF\nexec python3 /tmp/serve.py\n"],"ports":[{"name":"http","containerPort":8080,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"kube-api-access-c5nch","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/","port":8080,"scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/","port":8080,"scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000700000,"readOnlyRootFilesystem":false,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":0,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"default","serviceAccount":"default","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c26,c25"},"runAsNonRoot":true,"fsGroup":1000700000,"seccompProfile":{"type":"RuntimeDefault"}},"imagePullSecrets":[{"name":"default-dockercfg-2blfd"}],"affinity":{},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:09:02Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:00:40Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:09:13Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:09:13Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:00:40Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.80","podIPs":[{"ip":"10.128.0.80"}],"startTime":"2025-12-03T14:00:40Z","containerStatuses":[{"name":"download-server","state":{"running":{"startedAt":"2025-12-03T14:09:00Z"}},"lastState":{},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3d886210d2faa9ace5750adfc70c0c3c5512cdf492f19d1c536a446db659aabb","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3d886210d2faa9ace5750adfc70c0c3c5512cdf492f19d1c536a446db659aabb","containerID":"cri-o://6f164a6df1bde5320ab22b53ded4e042f338dc219f6766493bf70ff678182ddd","started":true,"volumeMounts":[{"name":"kube-api-access-c5nch","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-console/logs/console-c5d7cd7f9-2hp75/console_current.log0000640000000000000000000000270715114042274025511 0ustar00000000000000002025-12-03T14:09:00.373968354Z I1203 14:09:00.373880 1 main.go:217] The following console plugins are enabled: 2025-12-03T14:09:00.373968354Z I1203 14:09:00.373910 1 main.go:219] - monitoring-plugin 2025-12-03T14:09:00.373968354Z W1203 14:09:00.373953 1 authoptions.go:112] Flag inactivity-timeout is set to less then 300 seconds and will be ignored! 2025-12-03T14:09:35.856058473Z I1203 14:09:35.855891 1 main.go:659] Binding to [::]:8443... 2025-12-03T14:09:35.856058473Z I1203 14:09:35.855996 1 main.go:661] using TLS 2025-12-03T14:09:38.858928955Z I1203 14:09:38.858786 1 metrics.go:133] serverconfig.Metrics: Update ConsolePlugin metrics... 2025-12-03T14:09:38.859002347Z I1203 14:09:38.858943 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2025-12-03T14:09:38.859002347Z I1203 14:09:38.858958 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2025-12-03T14:09:38.870976599Z I1203 14:09:38.870865 1 metrics.go:143] serverconfig.Metrics: Update ConsolePlugin metrics: &map[monitoring:map[enabled:1]] (took 12.025193ms) 2025-12-03T14:09:40.856894422Z I1203 14:09:40.856773 1 metrics.go:80] usage.Metrics: Count console users... 2025-12-03T14:09:44.628477783Z I1203 14:09:44.628273 1 metrics.go:156] usage.Metrics: Update console users metrics: 0 kubeadmin, 0 cluster-admins, 0 developers, 0 unknown/errors (took 3.771426577s) config/pod/openshift-console/console-c5d7cd7f9-2hp75.json0000640000000000000000000001721315114042274021527 0ustar0000000000000000{"metadata":{"name":"console-c5d7cd7f9-2hp75","generateName":"console-c5d7cd7f9-","namespace":"openshift-console","uid":"4dd1d142-6569-438d-b0c2-582aed44812d","resourceVersion":"16594","creationTimestamp":"2025-12-03T14:00:46Z","labels":{"app":"console","component":"ui","pod-template-hash":"c5d7cd7f9"},"annotations":{"console.openshift.io/authn-ca-trust-config-version":"12236","console.openshift.io/console-config-version":"12714","console.openshift.io/image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:da806db797ef2b291ff0ce5f302e88a0cb74e57f253b8fe76296f969512cd79e","console.openshift.io/infrastructure-config-version":"541","console.openshift.io/oauth-secret-version":"12289","console.openshift.io/proxy-config-version":"558","console.openshift.io/service-ca-config-version":"12715","console.openshift.io/trusted-ca-config-version":"12717","k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.86/23\"],\"mac_address\":\"0a:58:0a:80:00:56\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.86/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.86\"\n ],\n \"mac\": \"0a:58:0a:80:00:56\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"console-c5d7cd7f9","uid":"0e969fc0-3e84-49ec-8911-c0e62c781c3d","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"console-serving-cert","secret":{"secretName":"console-serving-cert","defaultMode":420}},{"name":"console-oauth-config","secret":{"secretName":"console-oauth-config","defaultMode":420}},{"name":"console-config","configMap":{"name":"console-config","defaultMode":420}},{"name":"service-ca","configMap":{"name":"service-ca","defaultMode":420}},{"name":"oauth-serving-cert","configMap":{"name":"oauth-serving-cert","defaultMode":420}},{"name":"kube-api-access-gfzrw","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"console","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:da806db797ef2b291ff0ce5f302e88a0cb74e57f253b8fe76296f969512cd79e","command":["/opt/bridge/bin/bridge","--public-dir=/opt/bridge/static","--config=/var/console-config/console-config.yaml","--service-ca-file=/var/service-ca/service-ca.crt","--v=2"],"ports":[{"name":"https","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"100Mi"}},"volumeMounts":[{"name":"console-serving-cert","readOnly":true,"mountPath":"/var/serving-cert"},{"name":"console-oauth-config","readOnly":true,"mountPath":"/var/oauth-config"},{"name":"console-config","readOnly":true,"mountPath":"/var/console-config"},{"name":"service-ca","readOnly":true,"mountPath":"/var/service-ca"},{"name":"oauth-serving-cert","readOnly":true,"mountPath":"/var/oauth-serving-cert"},{"name":"kube-api-access-gfzrw","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/health","port":8443,"scheme":"HTTPS"},"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":1},"readinessProbe":{"httpGet":{"path":"/health","port":8443,"scheme":"HTTPS"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"/health","port":8443,"scheme":"HTTPS"},"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":30},"lifecycle":{"preStop":{"exec":{"command":["sleep","25"]}}},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000700000,"readOnlyRootFilesystem":false,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":40,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"console","serviceAccount":"console","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c26,c25"},"runAsNonRoot":true,"fsGroup":1000700000,"seccompProfile":{"type":"RuntimeDefault"}},"imagePullSecrets":[{"name":"console-dockercfg-twpdm"}],"affinity":{},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:09:01Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:00:46Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:00:46Z","reason":"ContainersNotReady","message":"containers with unready status: [console]"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:00:46Z","reason":"ContainersNotReady","message":"containers with unready status: [console]"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:00:46Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.86","podIPs":[{"ip":"10.128.0.86"}],"startTime":"2025-12-03T14:00:46Z","containerStatuses":[{"name":"console","state":{"running":{"startedAt":"2025-12-03T14:09:00Z"}},"lastState":{},"ready":false,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:da806db797ef2b291ff0ce5f302e88a0cb74e57f253b8fe76296f969512cd79e","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:da806db797ef2b291ff0ce5f302e88a0cb74e57f253b8fe76296f969512cd79e","containerID":"cri-o://c01edad1db506ce1a440eec485368dc53175e475c8c14d77a9938e14bf9c40c8","started":false,"volumeMounts":[{"name":"console-serving-cert","mountPath":"/var/serving-cert","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"console-oauth-config","mountPath":"/var/oauth-config","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"console-config","mountPath":"/var/console-config","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca","mountPath":"/var/service-ca","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"oauth-serving-cert","mountPath":"/var/oauth-serving-cert","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-gfzrw","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-console/logs/console-648d88c756-vswh8/console_current.log0000640000000000000000000000270615114042274025575 0ustar00000000000000002025-12-03T14:09:00.575894036Z I1203 14:09:00.575786 1 main.go:217] The following console plugins are enabled: 2025-12-03T14:09:00.575894036Z I1203 14:09:00.575817 1 main.go:219] - monitoring-plugin 2025-12-03T14:09:00.575894036Z W1203 14:09:00.575851 1 authoptions.go:112] Flag inactivity-timeout is set to less then 300 seconds and will be ignored! 2025-12-03T14:09:35.852257849Z I1203 14:09:35.852114 1 main.go:659] Binding to [::]:8443... 2025-12-03T14:09:35.852257849Z I1203 14:09:35.852179 1 main.go:661] using TLS 2025-12-03T14:09:38.855523772Z I1203 14:09:38.855359 1 metrics.go:133] serverconfig.Metrics: Update ConsolePlugin metrics... 2025-12-03T14:09:38.855607945Z I1203 14:09:38.855578 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2025-12-03T14:09:38.855607945Z I1203 14:09:38.855600 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2025-12-03T14:09:38.868475943Z I1203 14:09:38.868336 1 metrics.go:143] serverconfig.Metrics: Update ConsolePlugin metrics: &map[monitoring:map[enabled:1]] (took 12.91209ms) 2025-12-03T14:09:40.853836649Z I1203 14:09:40.853460 1 metrics.go:80] usage.Metrics: Count console users... 2025-12-03T14:09:44.627556066Z I1203 14:09:44.627399 1 metrics.go:156] usage.Metrics: Update console users metrics: 0 kubeadmin, 0 cluster-admins, 0 developers, 0 unknown/errors (took 3.773871971s) config/pod/openshift-console/console-648d88c756-vswh8.json0000640000000000000000000001777115114042274021625 0ustar0000000000000000{"metadata":{"name":"console-648d88c756-vswh8","generateName":"console-648d88c756-","namespace":"openshift-console","uid":"62f94ae7-6043-4761-a16b-e0f072b1364b","resourceVersion":"16643","creationTimestamp":"2025-12-03T14:00:55Z","labels":{"app":"console","component":"ui","pod-template-hash":"648d88c756"},"annotations":{"console.openshift.io/authn-ca-trust-config-version":"12236","console.openshift.io/console-config-version":"12994","console.openshift.io/image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:da806db797ef2b291ff0ce5f302e88a0cb74e57f253b8fe76296f969512cd79e","console.openshift.io/infrastructure-config-version":"541","console.openshift.io/oauth-secret-version":"12289","console.openshift.io/proxy-config-version":"558","console.openshift.io/service-ca-config-version":"12718","console.openshift.io/trusted-ca-config-version":"12747","k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.91/23\"],\"mac_address\":\"0a:58:0a:80:00:5b\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.91/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.91\"\n ],\n \"mac\": \"0a:58:0a:80:00:5b\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"console-648d88c756","uid":"f223dc4b-30cf-4da6-aa75-5362dd58ec3b","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"console-serving-cert","secret":{"secretName":"console-serving-cert","defaultMode":420}},{"name":"console-oauth-config","secret":{"secretName":"console-oauth-config","defaultMode":420}},{"name":"console-config","configMap":{"name":"console-config","defaultMode":420}},{"name":"service-ca","configMap":{"name":"service-ca","defaultMode":420}},{"name":"trusted-ca-bundle","configMap":{"name":"trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420}},{"name":"oauth-serving-cert","configMap":{"name":"oauth-serving-cert","defaultMode":420}},{"name":"kube-api-access-nddv9","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"console","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:da806db797ef2b291ff0ce5f302e88a0cb74e57f253b8fe76296f969512cd79e","command":["/opt/bridge/bin/bridge","--public-dir=/opt/bridge/static","--config=/var/console-config/console-config.yaml","--service-ca-file=/var/service-ca/service-ca.crt","--v=2"],"ports":[{"name":"https","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"100Mi"}},"volumeMounts":[{"name":"console-serving-cert","readOnly":true,"mountPath":"/var/serving-cert"},{"name":"console-oauth-config","readOnly":true,"mountPath":"/var/oauth-config"},{"name":"console-config","readOnly":true,"mountPath":"/var/console-config"},{"name":"service-ca","readOnly":true,"mountPath":"/var/service-ca"},{"name":"trusted-ca-bundle","readOnly":true,"mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"oauth-serving-cert","readOnly":true,"mountPath":"/var/oauth-serving-cert"},{"name":"kube-api-access-nddv9","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/health","port":8443,"scheme":"HTTPS"},"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":1},"readinessProbe":{"httpGet":{"path":"/health","port":8443,"scheme":"HTTPS"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"/health","port":8443,"scheme":"HTTPS"},"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":30},"lifecycle":{"preStop":{"exec":{"command":["sleep","25"]}}},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000700000,"readOnlyRootFilesystem":false,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":40,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"console","serviceAccount":"console","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c26,c25"},"runAsNonRoot":true,"fsGroup":1000700000,"seccompProfile":{"type":"RuntimeDefault"}},"imagePullSecrets":[{"name":"console-dockercfg-twpdm"}],"affinity":{},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:09:01Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:00:55Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:00:55Z","reason":"ContainersNotReady","message":"containers with unready status: [console]"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:00:55Z","reason":"ContainersNotReady","message":"containers with unready status: [console]"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:00:55Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.91","podIPs":[{"ip":"10.128.0.91"}],"startTime":"2025-12-03T14:00:55Z","containerStatuses":[{"name":"console","state":{"running":{"startedAt":"2025-12-03T14:09:00Z"}},"lastState":{},"ready":false,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:da806db797ef2b291ff0ce5f302e88a0cb74e57f253b8fe76296f969512cd79e","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:da806db797ef2b291ff0ce5f302e88a0cb74e57f253b8fe76296f969512cd79e","containerID":"cri-o://113fc17037ed6814061d8e6003d126d84ffb64ce5d368f93c8fa094292f35bc6","started":false,"volumeMounts":[{"name":"console-serving-cert","mountPath":"/var/serving-cert","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"console-oauth-config","mountPath":"/var/oauth-config","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"console-config","mountPath":"/var/console-config","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca","mountPath":"/var/service-ca","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"trusted-ca-bundle","mountPath":"/etc/pki/ca-trust/extracted/pem","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"oauth-serving-cert","mountPath":"/var/oauth-serving-cert","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-nddv9","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}console-operator_current.log0000640000000000000000000000776115114042274033224 0ustar0000000000000000config/pod/openshift-console-operator/logs/console-operator-77df56447c-vsrxx2025-12-03T14:09:00.823541440Z I1203 14:09:00.821156 1 cmd.go:250] Using service-serving-cert provided certificates 2025-12-03T14:09:00.823541440Z I1203 14:09:00.821331 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2025-12-03T14:09:00.823724255Z I1203 14:09:00.823604 1 observer_polling.go:159] Starting file observer 2025-12-03T14:09:01.471610814Z I1203 14:09:01.470860 1 builder.go:298] console-operator version - 2025-12-03T14:09:03.078099589Z I1203 14:09:03.076411 1 secure_serving.go:57] Forcing use of http/1.1 only 2025-12-03T14:09:03.078204172Z W1203 14:09:03.078190 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2025-12-03T14:09:03.078243813Z W1203 14:09:03.078232 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2025-12-03T14:09:03.078273224Z W1203 14:09:03.078263 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2025-12-03T14:09:03.078299525Z W1203 14:09:03.078289 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2025-12-03T14:09:03.078326606Z W1203 14:09:03.078316 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2025-12-03T14:09:03.078352777Z W1203 14:09:03.078342 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2025-12-03T14:09:03.084484542Z I1203 14:09:03.083738 1 builder.go:439] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2025-12-03T14:09:03.084484542Z I1203 14:09:03.084199 1 leaderelection.go:254] attempting to acquire leader lease openshift-console-operator/console-operator-lock... 2025-12-03T14:09:03.101786755Z I1203 14:09:03.100699 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2025-12-03T14:09:03.101786755Z I1203 14:09:03.100784 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2025-12-03T14:09:03.101786755Z I1203 14:09:03.100861 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2025-12-03T14:09:03.101786755Z I1203 14:09:03.100888 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2025-12-03T14:09:03.101786755Z I1203 14:09:03.100914 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2025-12-03T14:09:03.101786755Z I1203 14:09:03.100923 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2025-12-03T14:09:03.104501297Z I1203 14:09:03.102156 1 secure_serving.go:213] Serving securely on [::]:8443 2025-12-03T14:09:03.104501297Z I1203 14:09:03.102227 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2025-12-03T14:09:03.104501297Z I1203 14:09:03.102478 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2025-12-03T14:09:03.206512300Z I1203 14:09:03.201369 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2025-12-03T14:09:03.206512300Z I1203 14:09:03.201508 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2025-12-03T14:09:03.206512300Z I1203 14:09:03.201619 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file config/pod/openshift-console-operator/console-operator-77df56447c-vsrxx.json0000640000000000000000000001474115114042274025466 0ustar0000000000000000{"metadata":{"name":"console-operator-77df56447c-vsrxx","generateName":"console-operator-77df56447c-","namespace":"openshift-console-operator","uid":"a8dc6511-7339-4269-9d43-14ce53bb4e7f","resourceVersion":"16672","creationTimestamp":"2025-12-03T14:00:30Z","labels":{"name":"console-operator","pod-template-hash":"77df56447c"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.75/23\"],\"mac_address\":\"0a:58:0a:80:00:4b\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.75/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.75\"\n ],\n \"mac\": \"0a:58:0a:80:00:4b\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"console-operator-77df56447c","uid":"96ea8527-cee5-4d23-b820-fdcf8c3e89f1","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config","configMap":{"name":"console-operator-config","defaultMode":420}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"trusted-ca","configMap":{"name":"trusted-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420}},{"name":"kube-api-access-p5mrw","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"console-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:89b279931fe13f3b33c9dd6cdf0f5e7fc3e5384b944f998034d35af7242a47fa","command":["console","operator"],"args":["--config=/var/run/configmaps/config/controller-config.yaml"],"ports":[{"name":"metrics","containerPort":60000,"protocol":"TCP"}],"env":[{"name":"CONSOLE_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:da806db797ef2b291ff0ce5f302e88a0cb74e57f253b8fe76296f969512cd79e"},{"name":"DOWNLOADS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3d886210d2faa9ace5750adfc70c0c3c5512cdf492f19d1c536a446db659aabb"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.28"},{"name":"OPERATOR_NAME","value":"console-operator"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"100Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca","mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"kube-api-access-p5mrw","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000710000,"readOnlyRootFilesystem":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"console-operator","serviceAccount":"console-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c27,c4"},"runAsNonRoot":true,"fsGroup":1000710000,"seccompProfile":{"type":"RuntimeDefault"}},"imagePullSecrets":[{"name":"console-operator-dockercfg-7n524"}],"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:09:01Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:00:30Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:09:03Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:09:03Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:00:30Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.75","podIPs":[{"ip":"10.128.0.75"}],"startTime":"2025-12-03T14:00:30Z","containerStatuses":[{"name":"console-operator","state":{"running":{"startedAt":"2025-12-03T14:09:00Z"}},"lastState":{},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:89b279931fe13f3b33c9dd6cdf0f5e7fc3e5384b944f998034d35af7242a47fa","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:89b279931fe13f3b33c9dd6cdf0f5e7fc3e5384b944f998034d35af7242a47fa","containerID":"cri-o://c809768d9f5c1be51c102ade94741e729d18869874debc05a750c4f2d9789d3d","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca","mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"kube-api-access-p5mrw","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-oauth-apiserver/logs/apiserver-57fd58bc7b-kktql/oauth-apiserver_current.log0000640000000000000000000005037315114042274031543 0ustar00000000000000002025-12-03T14:09:03.165570422Z I1203 14:09:03.165562 1 flags.go:64] FLAG: --storage-backend="" 2025-12-03T14:09:03.165570422Z I1203 14:09:03.165566 1 flags.go:64] FLAG: --storage-initialization-timeout="1m0s" 2025-12-03T14:09:03.165577763Z I1203 14:09:03.165570 1 flags.go:64] FLAG: --storage-media-type="application/json" 2025-12-03T14:09:03.165585213Z I1203 14:09:03.165575 1 flags.go:64] FLAG: --strict-transport-security-directives="[]" 2025-12-03T14:09:03.165585213Z I1203 14:09:03.165580 1 flags.go:64] FLAG: --tls-cert-file="/var/run/secrets/serving-cert/tls.crt" 2025-12-03T14:09:03.165610194Z I1203 14:09:03.165585 1 flags.go:64] FLAG: --tls-cipher-suites="[TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256]" 2025-12-03T14:09:03.165610194Z I1203 14:09:03.165603 1 flags.go:64] FLAG: --tls-min-version="VersionTLS12" 2025-12-03T14:09:03.165618014Z I1203 14:09:03.165609 1 flags.go:64] FLAG: --tls-private-key-file="/var/run/secrets/serving-cert/tls.key" 2025-12-03T14:09:03.165718897Z I1203 14:09:03.165614 1 flags.go:64] FLAG: --tls-sni-cert-key="[]" 2025-12-03T14:09:03.165718897Z I1203 14:09:03.165622 1 flags.go:64] FLAG: --tracing-config-file="" 2025-12-03T14:09:03.165718897Z I1203 14:09:03.165626 1 flags.go:64] FLAG: --v="2" 2025-12-03T14:09:03.165718897Z I1203 14:09:03.165630 1 flags.go:64] FLAG: --vmodule="" 2025-12-03T14:09:03.165718897Z I1203 14:09:03.165634 1 flags.go:64] FLAG: --watch-cache="true" 2025-12-03T14:09:03.165718897Z I1203 14:09:03.165638 1 flags.go:64] FLAG: --watch-cache-sizes="[]" 2025-12-03T14:09:03.165731767Z W1203 14:09:03.165710 1 registry.go:345] setting componentGlobalsRegistry in SetFallback. We recommend calling componentGlobalsRegistry.Set() right after parsing flags to avoid using feature gates before their final values are set by the flags. 2025-12-03T14:09:03.165742228Z I1203 14:09:03.165735 1 registry.go:379] setting kube:feature gate emulation version to 1.31 2025-12-03T14:09:03.192695032Z I1203 14:09:03.192618 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2025-12-03T14:09:03.618707456Z I1203 14:09:03.618627 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2025-12-03T14:09:03.622838361Z I1203 14:09:03.622765 1 audit.go:340] Using audit backend: ignoreErrors 2025-12-03T14:09:03.628351877Z I1203 14:09:03.628279 1 shared_informer.go:313] Waiting for caches to sync for *generic.policySource[*k8s.io/api/admissionregistration/v1.ValidatingAdmissionPolicy,*k8s.io/api/admissionregistration/v1.ValidatingAdmissionPolicyBinding,k8s.io/apiserver/pkg/admission/plugin/policy/validating.Validator] 2025-12-03T14:09:03.651710653Z I1203 14:09:03.651627 1 plugins.go:157] Loaded 2 mutating admission controller(s) successfully in the following order: NamespaceLifecycle,MutatingAdmissionWebhook. 2025-12-03T14:09:03.651710653Z I1203 14:09:03.651663 1 plugins.go:160] Loaded 2 validating admission controller(s) successfully in the following order: ValidatingAdmissionPolicy,ValidatingAdmissionWebhook. 2025-12-03T14:09:03.663034045Z I1203 14:09:03.662934 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2025-12-03T14:09:03.663802629Z I1203 14:09:03.663117 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2025-12-03T14:09:03.663802629Z I1203 14:09:03.663183 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2025-12-03T14:09:03.663802629Z I1203 14:09:03.663189 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2025-12-03T14:09:03.690969450Z I1203 14:09:03.690891 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2025-12-03T14:09:03.690969450Z I1203 14:09:03.690919 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2025-12-03T14:09:03.691015791Z I1203 14:09:03.690974 1 store.go:1641] "Monitoring resource count at path" resource="oauthclients.oauth.openshift.io" path="//oauth/clients" 2025-12-03T14:09:03.700061444Z I1203 14:09:03.699840 1 cacher.go:463] cacher (oauthclients.oauth.openshift.io): initialized 2025-12-03T14:09:03.700061444Z I1203 14:09:03.699882 1 reflector.go:368] Caches populated for *oauth.OAuthClient from storage/cacher.go:/oauth/clients 2025-12-03T14:09:03.704263401Z I1203 14:09:03.703894 1 store.go:1641] "Monitoring resource count at path" resource="oauthauthorizetokens.oauth.openshift.io" path="//oauth/authorizetokens" 2025-12-03T14:09:03.714486630Z I1203 14:09:03.714372 1 cacher.go:463] cacher (oauthauthorizetokens.oauth.openshift.io): initialized 2025-12-03T14:09:03.714486630Z I1203 14:09:03.714430 1 reflector.go:368] Caches populated for *oauth.OAuthAuthorizeToken from storage/cacher.go:/oauth/authorizetokens 2025-12-03T14:09:03.715933854Z I1203 14:09:03.715042 1 store.go:1641] "Monitoring resource count at path" resource="oauthaccesstokens.oauth.openshift.io" path="//oauth/accesstokens" 2025-12-03T14:09:03.724155682Z I1203 14:09:03.724085 1 cacher.go:463] cacher (oauthaccesstokens.oauth.openshift.io): initialized 2025-12-03T14:09:03.724155682Z I1203 14:09:03.724125 1 reflector.go:368] Caches populated for *oauth.OAuthAccessToken from storage/cacher.go:/oauth/accesstokens 2025-12-03T14:09:03.732795453Z I1203 14:09:03.732725 1 store.go:1641] "Monitoring resource count at path" resource="oauthclientauthorizations.oauth.openshift.io" path="//oauth/clientauthorizations" 2025-12-03T14:09:03.735647630Z I1203 14:09:03.735589 1 cacher.go:463] cacher (oauthclientauthorizations.oauth.openshift.io): initialized 2025-12-03T14:09:03.735647630Z I1203 14:09:03.735627 1 reflector.go:368] Caches populated for *oauth.OAuthClientAuthorization from storage/cacher.go:/oauth/clientauthorizations 2025-12-03T14:09:03.736379482Z I1203 14:09:03.735828 1 handler.go:286] Adding GroupVersion oauth.openshift.io v1 to ResourceManager 2025-12-03T14:09:03.736507376Z I1203 14:09:03.736416 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2025-12-03T14:09:03.736507376Z I1203 14:09:03.736486 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2025-12-03T14:09:03.747907330Z I1203 14:09:03.747832 1 store.go:1641] "Monitoring resource count at path" resource="users.user.openshift.io" path="//users" 2025-12-03T14:09:03.753830089Z I1203 14:09:03.753467 1 cacher.go:463] cacher (users.user.openshift.io): initialized 2025-12-03T14:09:03.753830089Z I1203 14:09:03.753515 1 reflector.go:368] Caches populated for *user.User from storage/cacher.go:/users 2025-12-03T14:09:03.756085577Z I1203 14:09:03.755738 1 store.go:1641] "Monitoring resource count at path" resource="identities.user.openshift.io" path="//useridentities" 2025-12-03T14:09:03.761012066Z I1203 14:09:03.760266 1 cacher.go:463] cacher (identities.user.openshift.io): initialized 2025-12-03T14:09:03.761012066Z I1203 14:09:03.760303 1 reflector.go:368] Caches populated for *user.Identity from storage/cacher.go:/useridentities 2025-12-03T14:09:03.766915705Z I1203 14:09:03.766620 1 store.go:1641] "Monitoring resource count at path" resource="groups.user.openshift.io" path="//groups" 2025-12-03T14:09:03.768702599Z I1203 14:09:03.768659 1 handler.go:286] Adding GroupVersion user.openshift.io v1 to ResourceManager 2025-12-03T14:09:03.769297106Z I1203 14:09:03.768751 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2025-12-03T14:09:03.769297106Z I1203 14:09:03.768766 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2025-12-03T14:09:03.769297106Z I1203 14:09:03.769208 1 cacher.go:463] cacher (groups.user.openshift.io): initialized 2025-12-03T14:09:03.769297106Z I1203 14:09:03.769241 1 reflector.go:368] Caches populated for *user.Group from storage/cacher.go:/groups 2025-12-03T14:09:03.915327699Z I1203 14:09:03.915257 1 genericapiserver.go:570] "[graceful-termination] using HTTP Server shutdown timeout" shutdownTimeout="2s" 2025-12-03T14:09:03.915387101Z I1203 14:09:03.915339 1 genericapiserver.go:538] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2025-12-03T14:09:03.920446654Z I1203 14:09:03.920392 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"api.openshift-oauth-apiserver.svc\" [serving] validServingFor=[api.openshift-oauth-apiserver.svc,api.openshift-oauth-apiserver.svc.cluster.local] issuer=\"openshift-service-serving-signer@1764770119\" (2025-12-03 13:55:54 +0000 UTC to 2027-12-03 13:55:55 +0000 UTC (now=2025-12-03 14:09:03.92029655 +0000 UTC))" 2025-12-03T14:09:03.920605809Z I1203 14:09:03.920579 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1764770943\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1764770943\" (2025-12-03 13:09:03 +0000 UTC to 2026-12-03 13:09:03 +0000 UTC (now=2025-12-03 14:09:03.920547827 +0000 UTC))" 2025-12-03T14:09:03.920652350Z I1203 14:09:03.920618 1 secure_serving.go:213] Serving securely on [::]:8443 2025-12-03T14:09:03.920664351Z I1203 14:09:03.920657 1 genericapiserver.go:693] [graceful-termination] waiting for shutdown to be initiated 2025-12-03T14:09:03.920717522Z I1203 14:09:03.920696 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2025-12-03T14:09:03.920717522Z I1203 14:09:03.920710 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2025-12-03T14:09:03.920776494Z I1203 14:09:03.920750 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2025-12-03T14:09:03.921067623Z I1203 14:09:03.921041 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2025-12-03T14:09:03.926858788Z I1203 14:09:03.922899 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2025-12-03T14:09:03.926858788Z I1203 14:09:03.922920 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2025-12-03T14:09:03.926858788Z I1203 14:09:03.922942 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2025-12-03T14:09:03.926858788Z I1203 14:09:03.922946 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2025-12-03T14:09:03.926858788Z I1203 14:09:03.925032 1 reflector.go:368] Caches populated for *v1.ValidatingAdmissionPolicyBinding from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2025-12-03T14:09:03.930534419Z I1203 14:09:03.930493 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2025-12-03T14:09:03.930534419Z I1203 14:09:03.930521 1 reflector.go:368] Caches populated for *v1.MutatingWebhookConfiguration from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2025-12-03T14:09:03.932247291Z I1203 14:09:03.932219 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2025-12-03T14:09:03.932337393Z I1203 14:09:03.932309 1 reflector.go:368] Caches populated for *v1.ValidatingAdmissionPolicy from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2025-12-03T14:09:03.932548570Z I1203 14:09:03.932496 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2025-12-03T14:09:03.932918391Z I1203 14:09:03.932833 1 reflector.go:368] Caches populated for *v1.Group from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2025-12-03T14:09:03.933305853Z I1203 14:09:03.933281 1 reflector.go:368] Caches populated for *v1.OAuthClient from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2025-12-03T14:09:03.933996044Z I1203 14:09:03.933951 1 reflector.go:368] Caches populated for *v1.ValidatingWebhookConfiguration from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2025-12-03T14:09:03.936510790Z I1203 14:09:03.936222 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2025-12-03T14:09:04.021614641Z I1203 14:09:04.021525 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2025-12-03T14:09:04.024538170Z I1203 14:09:04.024040 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2025-12-03T14:09:04.024538170Z I1203 14:09:04.024099 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2025-12-03T14:09:04.024538170Z I1203 14:09:04.024299 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2025-12-03 13:37:20 +0000 UTC to 2025-12-04 13:37:20 +0000 UTC (now=2025-12-03 14:09:04.024268262 +0000 UTC))" 2025-12-03T14:09:04.029817989Z I1203 14:09:04.029762 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"api.openshift-oauth-apiserver.svc\" [serving] validServingFor=[api.openshift-oauth-apiserver.svc,api.openshift-oauth-apiserver.svc.cluster.local] issuer=\"openshift-service-serving-signer@1764770119\" (2025-12-03 13:55:54 +0000 UTC to 2027-12-03 13:55:55 +0000 UTC (now=2025-12-03 14:09:04.029719826 +0000 UTC))" 2025-12-03T14:09:04.029937993Z I1203 14:09:04.029919 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1764770943\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1764770943\" (2025-12-03 13:09:03 +0000 UTC to 2026-12-03 13:09:03 +0000 UTC (now=2025-12-03 14:09:04.029893491 +0000 UTC))" 2025-12-03T14:09:04.030116718Z I1203 14:09:04.030099 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2025-12-03 13:29:46 +0000 UTC to 2035-12-01 13:29:46 +0000 UTC (now=2025-12-03 14:09:04.030081907 +0000 UTC))" 2025-12-03T14:09:04.030127539Z I1203 14:09:04.030121 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2025-12-03 13:37:22 +0000 UTC to 2025-12-04 13:37:22 +0000 UTC (now=2025-12-03 14:09:04.030112758 +0000 UTC))" 2025-12-03T14:09:04.030149909Z I1203 14:09:04.030136 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2025-12-03 13:37:22 +0000 UTC to 2026-12-03 13:37:22 +0000 UTC (now=2025-12-03 14:09:04.030125369 +0000 UTC))" 2025-12-03T14:09:04.030161140Z I1203 14:09:04.030155 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2025-12-03 13:37:22 +0000 UTC to 2026-12-03 13:37:22 +0000 UTC (now=2025-12-03 14:09:04.030146649 +0000 UTC))" 2025-12-03T14:09:04.030218331Z I1203 14:09:04.030167 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2025-12-03 13:37:20 +0000 UTC to 2035-12-01 13:37:20 +0000 UTC (now=2025-12-03 14:09:04.03015942 +0000 UTC))" 2025-12-03T14:09:04.030229782Z I1203 14:09:04.030223 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-csr-signer_@1764770129\" [] issuer=\"kubelet-signer\" (2025-12-03 13:55:28 +0000 UTC to 2025-12-04 13:37:22 +0000 UTC (now=2025-12-03 14:09:04.030211331 +0000 UTC))" 2025-12-03T14:09:04.030240122Z I1203 14:09:04.030235 1 tlsconfig.go:181] "Loaded client CA" index=6 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"openshift-kube-apiserver-operator_node-system-admin-signer@1764770095\" [] issuer=\"\" (2025-12-03 13:54:54 +0000 UTC to 2026-12-03 13:54:55 +0000 UTC (now=2025-12-03 14:09:04.030227082 +0000 UTC))" 2025-12-03T14:09:04.030266273Z I1203 14:09:04.030248 1 tlsconfig.go:181] "Loaded client CA" index=7 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2025-12-03 13:37:20 +0000 UTC to 2025-12-04 13:37:20 +0000 UTC (now=2025-12-03 14:09:04.030239712 +0000 UTC))" 2025-12-03T14:09:04.030404047Z I1203 14:09:04.030387 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"api.openshift-oauth-apiserver.svc\" [serving] validServingFor=[api.openshift-oauth-apiserver.svc,api.openshift-oauth-apiserver.svc.cluster.local] issuer=\"openshift-service-serving-signer@1764770119\" (2025-12-03 13:55:54 +0000 UTC to 2027-12-03 13:55:55 +0000 UTC (now=2025-12-03 14:09:04.030372566 +0000 UTC))" 2025-12-03T14:09:04.030539211Z I1203 14:09:04.030521 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1764770943\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1764770943\" (2025-12-03 13:09:03 +0000 UTC to 2026-12-03 13:09:03 +0000 UTC (now=2025-12-03 14:09:04.03050759 +0000 UTC))" 2025-12-03T14:09:04.030579932Z I1203 14:09:04.030564 1 shared_informer.go:320] Caches are synced for *generic.policySource[*k8s.io/api/admissionregistration/v1.ValidatingAdmissionPolicy,*k8s.io/api/admissionregistration/v1.ValidatingAdmissionPolicyBinding,k8s.io/apiserver/pkg/admission/plugin/policy/validating.Validator] 2025-12-03T14:09:04.030604253Z I1203 14:09:04.030587 1 policy_source.go:224] refreshing policies 2025-12-03T14:09:04.078238442Z I1203 14:09:04.078168 1 policy_source.go:419] informer started for config.openshift.io/v1, Kind=Infrastructure 2025-12-03T14:09:04.080558963Z I1203 14:09:04.080518 1 reflector.go:368] Caches populated for config.openshift.io/v1, Resource=infrastructures from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2025-12-03T14:09:05.087653016Z I1203 14:09:05.087588 1 policy_source.go:224] refreshing policies config/pod/openshift-oauth-apiserver/apiserver-57fd58bc7b-kktql.json0000640000000000000000000002542415114042274024106 0ustar0000000000000000{"metadata":{"name":"apiserver-57fd58bc7b-kktql","generateName":"apiserver-57fd58bc7b-","namespace":"openshift-oauth-apiserver","uid":"24dfafc9-86a9-450e-ac62-a871138106c0","resourceVersion":"16771","creationTimestamp":"2025-12-03T13:56:06Z","labels":{"apiserver":"true","app":"openshift-oauth-apiserver","oauth-apiserver-anti-affinity":"true","pod-template-hash":"57fd58bc7b","revision":"1"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.43/23\"],\"mac_address\":\"0a:58:0a:80:00:2b\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.43/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.43\"\n ],\n \"mac\": \"0a:58:0a:80:00:2b\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","operator.openshift.io/dep-openshift-oauth-apiserver.etcd-client.secret":"2kGl6Q==","operator.openshift.io/dep-openshift-oauth-apiserver.etcd-serving-ca.configmap":"X28QRg=="},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"apiserver-57fd58bc7b","uid":"1073ff37-d818-4e36-a396-909b731ef793","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"audit-policies","configMap":{"name":"audit-1","defaultMode":420}},{"name":"etcd-client","secret":{"secretName":"etcd-client","defaultMode":420}},{"name":"etcd-serving-ca","configMap":{"name":"etcd-serving-ca","defaultMode":420}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420}},{"name":"trusted-ca-bundle","configMap":{"name":"trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420,"optional":true}},{"name":"encryption-config","secret":{"secretName":"encryption-config-1","defaultMode":420,"optional":true}},{"name":"audit-dir","hostPath":{"path":"/var/log/oauth-apiserver","type":""}},{"name":"kube-api-access-m789m","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"initContainers":[{"name":"fix-audit-permissions","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:49a6a3308d885301c7718a465f1af2d08a617abbdff23352d5422d1ae4af33cf","command":["sh","-c","chmod 0700 /var/log/oauth-apiserver \u0026\u0026 touch /var/log/oauth-apiserver/audit.log \u0026\u0026 chmod 0600 /var/log/oauth-apiserver/*"],"resources":{"requests":{"cpu":"15m","memory":"50Mi"}},"volumeMounts":[{"name":"audit-dir","mountPath":"/var/log/oauth-apiserver"},{"name":"kube-api-access-m789m","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"containers":[{"name":"oauth-apiserver","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:49a6a3308d885301c7718a465f1af2d08a617abbdff23352d5422d1ae4af33cf","command":["/bin/bash","-ec"],"args":["if [ -s /var/run/configmaps/trusted-ca-bundle/tls-ca-bundle.pem ]; then\n echo \"Copying system trust bundle\"\n cp -f /var/run/configmaps/trusted-ca-bundle/tls-ca-bundle.pem /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\nexec oauth-apiserver start \\\n --secure-port=8443 \\\n --audit-log-path=/var/log/oauth-apiserver/audit.log \\\n --audit-log-format=json \\\n --audit-log-maxsize=100 \\\n --audit-log-maxbackup=10 \\\n --audit-policy-file=/var/run/configmaps/audit/policy.yaml \\\n --etcd-cafile=/var/run/configmaps/etcd-serving-ca/ca-bundle.crt \\\n --etcd-keyfile=/var/run/secrets/etcd-client/tls.key \\\n --etcd-certfile=/var/run/secrets/etcd-client/tls.crt \\\n --etcd-healthcheck-timeout=9s \\\n --etcd-readycheck-timeout=9s \\\n --shutdown-delay-duration=50s \\\n --shutdown-send-retry-after=true \\\n --tls-private-key-file=/var/run/secrets/serving-cert/tls.key \\\n --tls-cert-file=/var/run/secrets/serving-cert/tls.crt \\\n --enable-priority-and-fairness=false \\\n --api-audiences=https://kubernetes.default.svc \\\n --cors-allowed-origins='//127\\.0\\.0\\.1(:|$)' \\\n --cors-allowed-origins='//localhost(:|$)' \\\n --etcd-servers=https://192.168.32.10:2379 \\\n --tls-cipher-suites=TLS_AES_128_GCM_SHA256 \\\n --tls-cipher-suites=TLS_AES_256_GCM_SHA384 \\\n --tls-cipher-suites=TLS_CHACHA20_POLY1305_SHA256 \\\n --tls-cipher-suites=TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 \\\n --tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 \\\n --tls-cipher-suites=TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 \\\n --tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 \\\n --tls-cipher-suites=TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --tls-cipher-suites=TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --tls-min-version=VersionTLS12 \\\n --v=2\n"],"ports":[{"containerPort":8443,"protocol":"TCP"}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"150m","memory":"200Mi"}},"volumeMounts":[{"name":"audit-policies","mountPath":"/var/run/configmaps/audit"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"etcd-serving-ca","mountPath":"/var/run/configmaps/etcd-serving-ca"},{"name":"trusted-ca-bundle","mountPath":"/var/run/configmaps/trusted-ca-bundle"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"encryption-config","mountPath":"/var/run/secrets/encryption-config"},{"name":"audit-dir","mountPath":"/var/log/oauth-apiserver"},{"name":"kube-api-access-m789m","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"livez?exclude=etcd","port":8443,"scheme":"HTTPS"},"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"readyz?exclude=etcd\u0026exclude=etcd-readiness","port":8443,"scheme":"HTTPS"},"timeoutSeconds":10,"periodSeconds":5,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"livez","port":8443,"scheme":"HTTPS"},"timeoutSeconds":10,"periodSeconds":5,"successThreshold":1,"failureThreshold":30},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Always","terminationGracePeriodSeconds":120,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"oauth-apiserver-sa","serviceAccount":"oauth-apiserver-sa","nodeName":"master-0","securityContext":{},"affinity":{"podAntiAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":[{"labelSelector":{"matchLabels":{"apiserver":"true","app":"openshift-oauth-apiserver","oauth-apiserver-anti-affinity":"true"}},"topologyKey":"kubernetes.io/hostname"}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:09:01Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T13:56:18Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:09:05Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:09:05Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T13:56:06Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.43","podIPs":[{"ip":"10.128.0.43"}],"startTime":"2025-12-03T13:56:06Z","initContainerStatuses":[{"name":"fix-audit-permissions","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2025-12-03T14:09:00Z","finishedAt":"2025-12-03T14:09:00Z","containerID":"cri-o://cb245fdd1ded35f84a017fb3d05c897d11b99a2c87637a36de1e92f40b4bd328"}},"lastState":{},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:49a6a3308d885301c7718a465f1af2d08a617abbdff23352d5422d1ae4af33cf","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:49a6a3308d885301c7718a465f1af2d08a617abbdff23352d5422d1ae4af33cf","containerID":"cri-o://cb245fdd1ded35f84a017fb3d05c897d11b99a2c87637a36de1e92f40b4bd328","started":false,"volumeMounts":[{"name":"audit-dir","mountPath":"/var/log/oauth-apiserver"},{"name":"kube-api-access-m789m","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"containerStatuses":[{"name":"oauth-apiserver","state":{"running":{"startedAt":"2025-12-03T14:09:02Z"}},"lastState":{},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:49a6a3308d885301c7718a465f1af2d08a617abbdff23352d5422d1ae4af33cf","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:49a6a3308d885301c7718a465f1af2d08a617abbdff23352d5422d1ae4af33cf","containerID":"cri-o://0ccfb76dcfef4414554f96e7092cd92bace5d1ec302afacff31afb3e00b45190","started":true,"volumeMounts":[{"name":"audit-policies","mountPath":"/var/run/configmaps/audit"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"etcd-serving-ca","mountPath":"/var/run/configmaps/etcd-serving-ca"},{"name":"trusted-ca-bundle","mountPath":"/var/run/configmaps/trusted-ca-bundle"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"encryption-config","mountPath":"/var/run/secrets/encryption-config"},{"name":"audit-dir","mountPath":"/var/log/oauth-apiserver"},{"name":"kube-api-access-m789m","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-ingress/logs/router-default-54f97f57-rr9px/router_current.log0000640000000000000000000002322515114042274026615 0ustar00000000000000002025-12-03T14:08:59.674623730Z [-]has-synced failed: Router not synced 2025-12-03T14:08:59.843075441Z W1203 14:08:59.841306 1 reflector.go:547] github.com/openshift/router/pkg/router/controller/factory/factory.go:124: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2025-12-03T14:08:59.843075441Z E1203 14:08:59.841458 1 reflector.go:150] github.com/openshift/router/pkg/router/controller/factory/factory.go:124: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2025-12-03T14:09:00.673504756Z I1203 14:09:00.673436 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-03T14:09:00.673504756Z [-]backend-http failed: backend reported failure 2025-12-03T14:09:00.673504756Z [-]has-synced failed: Router not synced 2025-12-03T14:09:01.680901667Z I1203 14:09:01.677721 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-03T14:09:01.680901667Z [-]backend-http failed: backend reported failure 2025-12-03T14:09:01.680901667Z [-]has-synced failed: Router not synced 2025-12-03T14:09:02.674380869Z I1203 14:09:02.674298 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-03T14:09:02.674380869Z [-]backend-http failed: backend reported failure 2025-12-03T14:09:02.674380869Z [-]has-synced failed: Router not synced 2025-12-03T14:09:03.672889103Z I1203 14:09:03.672822 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-03T14:09:03.672889103Z [-]backend-http failed: backend reported failure 2025-12-03T14:09:03.672889103Z [-]has-synced failed: Router not synced 2025-12-03T14:09:04.887183468Z I1203 14:09:04.887048 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-03T14:09:04.887183468Z [-]backend-http failed: backend reported failure 2025-12-03T14:09:04.887183468Z [-]has-synced failed: Router not synced 2025-12-03T14:09:05.674047345Z I1203 14:09:05.673957 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-03T14:09:05.674047345Z [-]backend-http failed: backend reported failure 2025-12-03T14:09:05.674047345Z [-]has-synced failed: Router not synced 2025-12-03T14:09:06.674716805Z I1203 14:09:06.674344 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-03T14:09:06.674716805Z [-]backend-http failed: backend reported failure 2025-12-03T14:09:06.674716805Z [-]has-synced failed: Router not synced 2025-12-03T14:09:07.674269260Z I1203 14:09:07.674168 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-03T14:09:07.674269260Z [-]backend-http failed: backend reported failure 2025-12-03T14:09:07.674269260Z [-]has-synced failed: Router not synced 2025-12-03T14:09:08.673382672Z I1203 14:09:08.673149 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-03T14:09:08.673382672Z [-]backend-http failed: backend reported failure 2025-12-03T14:09:08.673382672Z [-]has-synced failed: Router not synced 2025-12-03T14:09:09.673969918Z I1203 14:09:09.673905 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-03T14:09:09.673969918Z [-]backend-http failed: backend reported failure 2025-12-03T14:09:09.673969918Z [-]has-synced failed: Router not synced 2025-12-03T14:09:10.673822623Z I1203 14:09:10.673753 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-03T14:09:10.673822623Z [-]backend-http failed: backend reported failure 2025-12-03T14:09:10.673822623Z [-]has-synced failed: Router not synced 2025-12-03T14:09:11.673677248Z I1203 14:09:11.673603 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-03T14:09:11.673677248Z [-]backend-http failed: backend reported failure 2025-12-03T14:09:11.673677248Z [-]has-synced failed: Router not synced 2025-12-03T14:09:12.673848391Z I1203 14:09:12.673773 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-03T14:09:12.673848391Z [-]backend-http failed: backend reported failure 2025-12-03T14:09:12.673848391Z [-]has-synced failed: Router not synced 2025-12-03T14:09:13.672755997Z I1203 14:09:13.672658 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-03T14:09:13.672755997Z [-]backend-http failed: backend reported failure 2025-12-03T14:09:13.672755997Z [-]has-synced failed: Router not synced 2025-12-03T14:09:14.672953321Z I1203 14:09:14.672874 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-03T14:09:14.672953321Z [-]backend-http failed: backend reported failure 2025-12-03T14:09:14.672953321Z [-]has-synced failed: Router not synced 2025-12-03T14:09:15.674042203Z I1203 14:09:15.673952 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-03T14:09:15.674042203Z [-]backend-http failed: backend reported failure 2025-12-03T14:09:15.674042203Z [-]has-synced failed: Router not synced 2025-12-03T14:09:16.674266178Z I1203 14:09:16.674199 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-03T14:09:16.674266178Z [-]backend-http failed: backend reported failure 2025-12-03T14:09:16.674266178Z [-]has-synced failed: Router not synced 2025-12-03T14:09:17.674153414Z I1203 14:09:17.674073 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-03T14:09:17.674153414Z [-]backend-http failed: backend reported failure 2025-12-03T14:09:17.674153414Z [-]has-synced failed: Router not synced 2025-12-03T14:09:18.674369920Z I1203 14:09:18.674292 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-03T14:09:18.674369920Z [-]backend-http failed: backend reported failure 2025-12-03T14:09:18.674369920Z [-]has-synced failed: Router not synced 2025-12-03T14:09:19.673868053Z I1203 14:09:19.673785 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-03T14:09:19.673868053Z [-]backend-http failed: backend reported failure 2025-12-03T14:09:19.673868053Z [-]has-synced failed: Router not synced 2025-12-03T14:09:20.673666926Z I1203 14:09:20.673590 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-03T14:09:20.673666926Z [-]backend-http failed: backend reported failure 2025-12-03T14:09:20.673666926Z [-]has-synced failed: Router not synced 2025-12-03T14:09:21.674498441Z I1203 14:09:21.674401 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-03T14:09:21.674498441Z [-]backend-http failed: backend reported failure 2025-12-03T14:09:21.674498441Z [-]has-synced failed: Router not synced 2025-12-03T14:09:22.673492859Z I1203 14:09:22.673341 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-03T14:09:22.673492859Z [-]backend-http failed: backend reported failure 2025-12-03T14:09:22.673492859Z [-]has-synced failed: Router not synced 2025-12-03T14:09:23.675721536Z I1203 14:09:23.675610 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-03T14:09:23.675721536Z [-]backend-http failed: backend reported failure 2025-12-03T14:09:23.675721536Z [-]has-synced failed: Router not synced 2025-12-03T14:09:24.673725976Z I1203 14:09:24.673616 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-03T14:09:24.673725976Z [-]backend-http failed: backend reported failure 2025-12-03T14:09:24.673725976Z [-]has-synced failed: Router not synced 2025-12-03T14:09:25.673653912Z I1203 14:09:25.673561 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-03T14:09:25.673653912Z [-]backend-http failed: backend reported failure 2025-12-03T14:09:25.673653912Z [-]has-synced failed: Router not synced 2025-12-03T14:09:26.673829367Z I1203 14:09:26.673723 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-03T14:09:26.673829367Z [-]backend-http failed: backend reported failure 2025-12-03T14:09:26.673829367Z [-]has-synced failed: Router not synced 2025-12-03T14:09:27.675327260Z I1203 14:09:27.675244 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-03T14:09:27.675327260Z [-]backend-http failed: backend reported failure 2025-12-03T14:09:27.675327260Z [-]has-synced failed: Router not synced 2025-12-03T14:09:28.674013269Z I1203 14:09:28.673794 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-03T14:09:28.674013269Z [-]backend-http failed: backend reported failure 2025-12-03T14:09:28.674013269Z [-]has-synced failed: Router not synced 2025-12-03T14:09:29.675505954Z I1203 14:09:29.673608 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-03T14:09:29.675505954Z [-]backend-http failed: backend reported failure 2025-12-03T14:09:29.675505954Z [-]has-synced failed: Router not synced 2025-12-03T14:09:30.673989286Z I1203 14:09:30.673608 1 healthz.go:255] backend-http,has-synced check failed: healthz 2025-12-03T14:09:30.673989286Z [-]backend-http failed: backend reported failure 2025-12-03T14:09:30.673989286Z [-]has-synced failed: Router not synced 2025-12-03T14:09:31.193965749Z E1203 14:09:31.193842 1 haproxy.go:418] can't scrape HAProxy: dial unix /var/lib/haproxy/run/haproxy.sock: connect: no such file or directory 2025-12-03T14:09:31.508957938Z I1203 14:09:31.508849 1 reflector.go:359] Caches populated for *v1.Route from github.com/openshift/router/pkg/router/controller/factory/factory.go:124 2025-12-03T14:09:31.607393453Z E1203 14:09:31.607275 1 haproxy.go:418] can't scrape HAProxy: dial unix /var/lib/haproxy/run/haproxy.sock: connect: no such file or directory 2025-12-03T14:09:31.680321077Z I1203 14:09:31.680230 1 router.go:669] "msg"="router reloaded" "logger"="template" "output"=" - Checking http://localhost:80 ...\n - Health check ok : 0 retry attempt(s).\n" config/pod/openshift-ingress/router-default-54f97f57-rr9px.json0000640000000000000000000002056315114042274022761 0ustar0000000000000000{"metadata":{"name":"router-default-54f97f57-rr9px","generateName":"router-default-54f97f57-","namespace":"openshift-ingress","uid":"5c00a797-4c60-43dd-bd04-16b2c6f1b6a8","resourceVersion":"14139","creationTimestamp":"2025-12-03T13:55:58Z","labels":{"ingresscontroller.operator.openshift.io/deployment-ingresscontroller":"default","ingresscontroller.operator.openshift.io/hash":"657bcb54fb","pod-template-hash":"54f97f57"},"annotations":{"openshift.io/required-scc":"hostnetwork","openshift.io/scc":"hostnetwork"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"router-default-54f97f57","uid":"f7db451d-d975-4493-88b4-aa031fc14d7d","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"default-certificate","secret":{"secretName":"router-certs-default","defaultMode":420}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"defaultMode":420,"optional":false}},{"name":"stats-auth","secret":{"secretName":"router-stats-default","defaultMode":420}},{"name":"metrics-certs","secret":{"secretName":"router-metrics-certs-default","defaultMode":420}},{"name":"kube-api-access-57rrp","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"router","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3ed4dc45b0e0d6229620e2ac6a53ecd180cad44a11daf9f0170d94b4acd35ded","ports":[{"name":"http","hostPort":80,"containerPort":80,"protocol":"TCP"},{"name":"https","hostPort":443,"containerPort":443,"protocol":"TCP"},{"name":"metrics","hostPort":1936,"containerPort":1936,"protocol":"TCP"}],"env":[{"name":"DEFAULT_CERTIFICATE_DIR","value":"/etc/pki/tls/private"},{"name":"DEFAULT_DESTINATION_CA_PATH","value":"/var/run/configmaps/service-ca/service-ca.crt"},{"name":"RELOAD_INTERVAL","value":"5s"},{"name":"ROUTER_ALLOW_WILDCARD_ROUTES","value":"false"},{"name":"ROUTER_CANONICAL_HOSTNAME","value":"router-default.apps.sno.openstack.lab"},{"name":"ROUTER_CIPHERS","value":"ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384"},{"name":"ROUTER_CIPHERSUITES","value":"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256"},{"name":"ROUTER_DISABLE_HTTP2","value":"true"},{"name":"ROUTER_DISABLE_NAMESPACE_OWNERSHIP_CHECK","value":"false"},{"name":"ROUTER_DOMAIN","value":"apps.sno.openstack.lab"},{"name":"ROUTER_IDLE_CLOSE_ON_RESPONSE","value":"true"},{"name":"ROUTER_LOAD_BALANCE_ALGORITHM","value":"random"},{"name":"ROUTER_METRICS_TLS_CERT_FILE","value":"/etc/pki/tls/metrics-certs/tls.crt"},{"name":"ROUTER_METRICS_TLS_KEY_FILE","value":"/etc/pki/tls/metrics-certs/tls.key"},{"name":"ROUTER_METRICS_TYPE","value":"haproxy"},{"name":"ROUTER_SERVICE_HTTPS_PORT","value":"443"},{"name":"ROUTER_SERVICE_HTTP_PORT","value":"80"},{"name":"ROUTER_SERVICE_NAME","value":"default"},{"name":"ROUTER_SERVICE_NAMESPACE","value":"openshift-ingress"},{"name":"ROUTER_SET_FORWARDED_HEADERS","value":"append"},{"name":"ROUTER_TCP_BALANCE_SCHEME","value":"source"},{"name":"ROUTER_THREADS","value":"4"},{"name":"SSL_MIN_VERSION","value":"TLSv1.2"},{"name":"STATS_PASSWORD_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsPassword"},{"name":"STATS_PORT","value":"1936"},{"name":"STATS_USERNAME_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsUsername"}],"resources":{"requests":{"cpu":"100m","memory":"256Mi"}},"volumeMounts":[{"name":"default-certificate","readOnly":true,"mountPath":"/etc/pki/tls/private"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca"},{"name":"stats-auth","readOnly":true,"mountPath":"/var/lib/haproxy/conf/metrics-auth"},{"name":"metrics-certs","readOnly":true,"mountPath":"/etc/pki/tls/metrics-certs"},{"name":"kube-api-access-57rrp","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3,"terminationGracePeriodSeconds":10},"readinessProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":1,"successThreshold":1,"failureThreshold":120},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000660000,"runAsNonRoot":true,"readOnlyRootFilesystem":false,"allowPrivilegeEscalation":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":3600,"dnsPolicy":"ClusterFirstWithHostNet","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"router","serviceAccount":"router","nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c26,c5"},"supplementalGroups":[1000660000],"fsGroup":1000660000},"schedulerName":"default-scheduler","tolerations":[{"key":"kubernetes.io/e2e-evict-taint-key","operator":"Equal","value":"evictTaintVal","effect":"NoExecute"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority","topologySpreadConstraints":[{"maxSkew":1,"topologyKey":"topology.kubernetes.io/zone","whenUnsatisfiable":"ScheduleAnyway","labelSelector":{"matchExpressions":[{"key":"ingresscontroller.operator.openshift.io/hash","operator":"In","values":["657bcb54fb"]}]}}]},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:00:31Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:00:22Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:22Z","reason":"ContainersNotReady","message":"containers with unready status: [router]"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:22Z","reason":"ContainersNotReady","message":"containers with unready status: [router]"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:00:22Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2025-12-03T14:00:22Z","containerStatuses":[{"name":"router","state":{"running":{"startedAt":"2025-12-03T14:08:16Z"}},"lastState":{},"ready":false,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3ed4dc45b0e0d6229620e2ac6a53ecd180cad44a11daf9f0170d94b4acd35ded","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3ed4dc45b0e0d6229620e2ac6a53ecd180cad44a11daf9f0170d94b4acd35ded","containerID":"cri-o://3bedc5e58d7f0ce7e0557174208e5c4d17bd8d207f3a554e12ec072b39154b4a","started":false,"volumeMounts":[{"name":"default-certificate","mountPath":"/etc/pki/tls/private","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca-bundle","mountPath":"/var/run/configmaps/service-ca","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"stats-auth","mountPath":"/var/lib/haproxy/conf/metrics-auth","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"metrics-certs","mountPath":"/etc/pki/tls/metrics-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-57rrp","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}authentication-operator_current.log0000640000000000000000000003253215114042274037544 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-7479ffdf48-hpdzl2025-12-03T14:08:57.947339634Z Copying system trust bundle 2025-12-03T14:08:58.144347257Z W1203 14:08:58.144270 1 cmd.go:167] Unable to read initial content of "/tmp/terminate": open /tmp/terminate: no such file or directory 2025-12-03T14:08:58.144666426Z I1203 14:08:58.144643 1 observer_polling.go:159] Starting file observer 2025-12-03T14:08:58.145150911Z I1203 14:08:58.145121 1 cmd.go:253] Using service-serving-cert provided certificates 2025-12-03T14:08:58.145204623Z I1203 14:08:58.145170 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2025-12-03T14:08:58.159595818Z I1203 14:08:58.158636 1 observer_polling.go:159] Starting file observer 2025-12-03T14:08:58.259644091Z I1203 14:08:58.258059 1 builder.go:304] cluster-authentication-operator version - 2025-12-03T14:08:58.259644091Z I1203 14:08:58.258839 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2025-12-03T14:08:58.600499041Z I1203 14:08:58.600315 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2025-12-03T14:08:58.605481732Z I1203 14:08:58.604515 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2025-12-03T14:08:58.605481732Z I1203 14:08:58.604535 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2025-12-03T14:08:58.605481732Z I1203 14:08:58.604567 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2025-12-03T14:08:58.605481732Z I1203 14:08:58.604573 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2025-12-03T14:08:58.626263390Z I1203 14:08:58.623156 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2025-12-03T14:08:58.626263390Z I1203 14:08:58.623207 1 secure_serving.go:57] Forcing use of http/1.1 only 2025-12-03T14:08:58.626263390Z W1203 14:08:58.623250 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2025-12-03T14:08:58.626263390Z W1203 14:08:58.623257 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2025-12-03T14:08:58.626263390Z W1203 14:08:58.623266 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2025-12-03T14:08:58.626263390Z W1203 14:08:58.623270 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2025-12-03T14:08:58.626263390Z W1203 14:08:58.623274 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2025-12-03T14:08:58.626263390Z W1203 14:08:58.623282 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2025-12-03T14:08:58.628374644Z I1203 14:08:58.628340 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2025-12-03T14:08:58.632656393Z I1203 14:08:58.631031 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1764770119\" (2025-12-03 13:55:23 +0000 UTC to 2027-12-03 13:55:24 +0000 UTC (now=2025-12-03 14:08:58.630984532 +0000 UTC))" 2025-12-03T14:08:58.632656393Z I1203 14:08:58.631186 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1764770938\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1764770938\" (2025-12-03 13:08:58 +0000 UTC to 2026-12-03 13:08:58 +0000 UTC (now=2025-12-03 14:08:58.631156378 +0000 UTC))" 2025-12-03T14:08:58.632656393Z I1203 14:08:58.631205 1 secure_serving.go:213] Serving securely on [::]:8443 2025-12-03T14:08:58.632656393Z I1203 14:08:58.631254 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2025-12-03T14:08:58.632656393Z I1203 14:08:58.631286 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2025-12-03T14:08:58.632656393Z I1203 14:08:58.631338 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2025-12-03T14:08:58.632656393Z I1203 14:08:58.631429 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2025-12-03T14:08:58.632656393Z I1203 14:08:58.631509 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2025-12-03T14:08:58.632656393Z I1203 14:08:58.631786 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2025-12-03T14:08:58.632656393Z I1203 14:08:58.631803 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2025-12-03T14:08:58.632656393Z I1203 14:08:58.632089 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2025-12-03T14:08:58.632656393Z I1203 14:08:58.632098 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2025-12-03T14:08:58.636461088Z I1203 14:08:58.632887 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2025-12-03T14:08:58.636461088Z I1203 14:08:58.632900 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2025-12-03T14:08:58.636461088Z I1203 14:08:58.635056 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2025-12-03T14:08:58.636461088Z I1203 14:08:58.635064 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/authentication/request/headerrequest/requestheader_controller.go:175 2025-12-03T14:08:58.636461088Z I1203 14:08:58.635118 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2025-12-03T14:08:58.637052536Z I1203 14:08:58.636716 1 leaderelection.go:254] attempting to acquire leader lease openshift-authentication-operator/cluster-authentication-operator-lock... 2025-12-03T14:08:58.733539952Z I1203 14:08:58.732880 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2025-12-03T14:08:58.733539952Z I1203 14:08:58.733068 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2025-12-03T14:08:58.733539952Z I1203 14:08:58.733102 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2025-12-03T14:08:58.733539952Z I1203 14:08:58.733287 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2025-12-03 13:37:20 +0000 UTC to 2025-12-04 13:37:20 +0000 UTC (now=2025-12-03 14:08:58.733261213 +0000 UTC))" 2025-12-03T14:08:58.733539952Z I1203 14:08:58.733456 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1764770119\" (2025-12-03 13:55:23 +0000 UTC to 2027-12-03 13:55:24 +0000 UTC (now=2025-12-03 14:08:58.733410828 +0000 UTC))" 2025-12-03T14:08:58.733587693Z I1203 14:08:58.733559 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1764770938\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1764770938\" (2025-12-03 13:08:58 +0000 UTC to 2026-12-03 13:08:58 +0000 UTC (now=2025-12-03 14:08:58.733546412 +0000 UTC))" 2025-12-03T14:08:58.733809910Z I1203 14:08:58.733786 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2025-12-03 13:29:46 +0000 UTC to 2035-12-01 13:29:46 +0000 UTC (now=2025-12-03 14:08:58.733773619 +0000 UTC))" 2025-12-03T14:08:58.733818530Z I1203 14:08:58.733808 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2025-12-03 13:37:22 +0000 UTC to 2025-12-04 13:37:22 +0000 UTC (now=2025-12-03 14:08:58.733797569 +0000 UTC))" 2025-12-03T14:08:58.733842161Z I1203 14:08:58.733830 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2025-12-03 13:37:22 +0000 UTC to 2026-12-03 13:37:22 +0000 UTC (now=2025-12-03 14:08:58.73381298 +0000 UTC))" 2025-12-03T14:08:58.733863211Z I1203 14:08:58.733849 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2025-12-03 13:37:22 +0000 UTC to 2026-12-03 13:37:22 +0000 UTC (now=2025-12-03 14:08:58.733839681 +0000 UTC))" 2025-12-03T14:08:58.733870592Z I1203 14:08:58.733864 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2025-12-03 13:37:20 +0000 UTC to 2035-12-01 13:37:20 +0000 UTC (now=2025-12-03 14:08:58.733855251 +0000 UTC))" 2025-12-03T14:08:58.733884402Z I1203 14:08:58.733875 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-csr-signer_@1764770129\" [] issuer=\"kubelet-signer\" (2025-12-03 13:55:28 +0000 UTC to 2025-12-04 13:37:22 +0000 UTC (now=2025-12-03 14:08:58.733867842 +0000 UTC))" 2025-12-03T14:08:58.733895672Z I1203 14:08:58.733889 1 tlsconfig.go:181] "Loaded client CA" index=6 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"openshift-kube-apiserver-operator_node-system-admin-signer@1764770095\" [] issuer=\"\" (2025-12-03 13:54:54 +0000 UTC to 2026-12-03 13:54:55 +0000 UTC (now=2025-12-03 14:08:58.733881202 +0000 UTC))" 2025-12-03T14:08:58.733914963Z I1203 14:08:58.733901 1 tlsconfig.go:181] "Loaded client CA" index=7 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2025-12-03 13:37:20 +0000 UTC to 2025-12-04 13:37:20 +0000 UTC (now=2025-12-03 14:08:58.733893542 +0000 UTC))" 2025-12-03T14:08:58.734067188Z I1203 14:08:58.734049 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1764770119\" (2025-12-03 13:55:23 +0000 UTC to 2027-12-03 13:55:24 +0000 UTC (now=2025-12-03 14:08:58.734031817 +0000 UTC))" 2025-12-03T14:08:58.734151760Z I1203 14:08:58.734141 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1764770938\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1764770938\" (2025-12-03 13:08:58 +0000 UTC to 2026-12-03 13:08:58 +0000 UTC (now=2025-12-03 14:08:58.73413086 +0000 UTC))" config/pod/openshift-authentication-operator/authentication-operator-7479ffdf48-hpdzl.json0000640000000000000000000001556015114042274030437 0ustar0000000000000000{"metadata":{"name":"authentication-operator-7479ffdf48-hpdzl","generateName":"authentication-operator-7479ffdf48-","namespace":"openshift-authentication-operator","uid":"0535e784-8e28-4090-aa2e-df937910767c","resourceVersion":"16374","creationTimestamp":"2025-12-03T13:51:42Z","labels":{"app":"authentication-operator","pod-template-hash":"7479ffdf48"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.7/23\"],\"mac_address\":\"0a:58:0a:80:00:07\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.7/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.7\"\n ],\n \"mac\": \"0a:58:0a:80:00:07\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"authentication-operator-7479ffdf48","uid":"fe29a9a8-fa9e-4a3f-9d89-13dfcd0ad980","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config","configMap":{"name":"authentication-operator-config","defaultMode":440}},{"name":"trusted-ca-bundle","configMap":{"name":"trusted-ca-bundle","defaultMode":420,"optional":true}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","defaultMode":420,"optional":true}},{"name":"kube-api-access-czfkv","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"authentication-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a2ef63f356c11ba629d8038474ab287797340de1219b4fee97c386975689110","command":["/bin/bash","-ec"],"args":["if [ -s /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\nexec authentication-operator operator --config=/var/run/configmaps/config/operator-config.yaml --v=2 --terminate-on-files=/var/run/configmaps/trusted-ca-bundle/ca-bundle.crt --terminate-on-files=/tmp/terminate\n"],"env":[{"name":"IMAGE_OAUTH_SERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef51f50a9bf1b4dfa6fdb7b484eae9e3126e813b48f380c833dd7eaf4e55853e"},{"name":"IMAGE_OAUTH_APISERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:49a6a3308d885301c7718a465f1af2d08a617abbdff23352d5422d1ae4af33cf"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.28"},{"name":"OPERAND_OAUTH_SERVER_IMAGE_VERSION","value":"4.18.28_openshift"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"20m","memory":"200Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/trusted-ca-bundle"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca-bundle"},{"name":"kube-api-access-czfkv","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]},"runAsUser":0,"readOnlyRootFilesystem":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"authentication-operator","serviceAccount":"authentication-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c13,c12"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:58Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T13:54:51Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:58Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:58Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T13:54:51Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.7","podIPs":[{"ip":"10.128.0.7"}],"startTime":"2025-12-03T13:54:51Z","containerStatuses":[{"name":"authentication-operator","state":{"running":{"startedAt":"2025-12-03T14:08:57Z"}},"lastState":{},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a2ef63f356c11ba629d8038474ab287797340de1219b4fee97c386975689110","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a2ef63f356c11ba629d8038474ab287797340de1219b4fee97c386975689110","containerID":"cri-o://39932b4293aed1db2841e79e74a86e35a0ad31c316d3a89f0383cc16c454c0e6","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","mountPath":"/var/run/configmaps/trusted-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca-bundle","mountPath":"/var/run/configmaps/service-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-czfkv","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}oauth-openshift_current.log0000640000000000000000000003711615114042274032225 0ustar0000000000000000config/pod/openshift-authentication/logs/oauth-openshift-747bdb58b5-mn76f2025-12-03T14:08:57.982960921Z Copying system trust bundle 2025-12-03T14:08:58.174627382Z I1203 14:08:58.174499 1 dynamic_serving_content.go:113] "Loaded a new cert/key pair" name="serving-cert::/var/config/system/secrets/v4-0-config-system-serving-cert/tls.crt::/var/config/system/secrets/v4-0-config-system-serving-cert/tls.key" 2025-12-03T14:08:58.174764466Z I1203 14:08:58.174746 1 dynamic_serving_content.go:113] "Loaded a new cert/key pair" name="sni-serving-cert::/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab::/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab" 2025-12-03T14:08:58.913330035Z I1203 14:08:58.913209 1 audit.go:340] Using audit backend: ignoreErrors 2025-12-03T14:08:58.936379521Z I1203 14:08:58.935824 1 requestheader_controller.go:244] Loaded a new request header values for RequestHeaderAuthRequestController 2025-12-03T14:08:58.957790258Z I1203 14:08:58.957721 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2025-12-03T14:08:58.957875991Z I1203 14:08:58.957865 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2025-12-03T14:08:58.957937893Z I1203 14:08:58.957927 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2025-12-03T14:08:58.957963513Z I1203 14:08:58.957954 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2025-12-03T14:08:58.963004706Z I1203 14:08:58.962886 1 secure_serving.go:57] Forcing use of http/1.1 only 2025-12-03T14:08:58.963150770Z I1203 14:08:58.963102 1 genericapiserver.go:528] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2025-12-03T14:08:58.973497553Z I1203 14:08:58.969914 1 tlsconfig.go:200] "Loaded serving cert" certName="serving-cert::/var/config/system/secrets/v4-0-config-system-serving-cert/tls.crt::/var/config/system/secrets/v4-0-config-system-serving-cert/tls.key" certDetail="\"oauth-openshift.openshift-authentication.svc\" [serving] validServingFor=[oauth-openshift.openshift-authentication.svc,oauth-openshift.openshift-authentication.svc.cluster.local] issuer=\"openshift-service-serving-signer@1764770119\" (2025-12-03 13:56:08 +0000 UTC to 2027-12-03 13:56:09 +0000 UTC (now=2025-12-03 14:08:58.969857423 +0000 UTC))" 2025-12-03T14:08:58.973497553Z I1203 14:08:58.970058 1 named_certificates.go:53] "Loaded SNI cert" index=1 certName="sni-serving-cert::/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab::/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab" certDetail="\"*.apps.sno.openstack.lab\" [serving] validServingFor=[*.apps.sno.openstack.lab] issuer=\"ingress-operator@1764770157\" (2025-12-03 13:55:58 +0000 UTC to 2027-12-03 13:55:59 +0000 UTC (now=2025-12-03 14:08:58.970033788 +0000 UTC))" 2025-12-03T14:08:58.973497553Z I1203 14:08:58.970172 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1764770938\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1764770938\" (2025-12-03 13:08:58 +0000 UTC to 2026-12-03 13:08:58 +0000 UTC (now=2025-12-03 14:08:58.970162472 +0000 UTC))" 2025-12-03T14:08:58.973497553Z I1203 14:08:58.970192 1 secure_serving.go:213] Serving securely on [::]:6443 2025-12-03T14:08:58.973497553Z I1203 14:08:58.970214 1 genericapiserver.go:681] [graceful-termination] waiting for shutdown to be initiated 2025-12-03T14:08:58.973497553Z I1203 14:08:58.970274 1 requestheader_controller.go:169] Starting RequestHeaderAuthRequestController 2025-12-03T14:08:58.973497553Z I1203 14:08:58.970286 1 shared_informer.go:311] Waiting for caches to sync for RequestHeaderAuthRequestController 2025-12-03T14:08:58.973497553Z I1203 14:08:58.970345 1 dynamic_serving_content.go:132] "Starting controller" name="serving-cert::/var/config/system/secrets/v4-0-config-system-serving-cert/tls.crt::/var/config/system/secrets/v4-0-config-system-serving-cert/tls.key" 2025-12-03T14:08:58.973497553Z I1203 14:08:58.970467 1 dynamic_serving_content.go:132] "Starting controller" name="sni-serving-cert::/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab::/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab" 2025-12-03T14:08:58.973497553Z I1203 14:08:58.970517 1 tlsconfig.go:240] "Starting DynamicServingCertificateController" 2025-12-03T14:08:58.974800202Z I1203 14:08:58.974768 1 configmap_cafile_content.go:202] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2025-12-03T14:08:58.974849284Z I1203 14:08:58.974838 1 shared_informer.go:311] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2025-12-03T14:08:58.974890735Z I1203 14:08:58.974880 1 configmap_cafile_content.go:202] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2025-12-03T14:08:58.974920546Z I1203 14:08:58.974912 1 shared_informer.go:311] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2025-12-03T14:08:58.981346900Z W1203 14:08:58.979743 1 reflector.go:539] k8s.io/client-go@v0.29.2/tools/cache/reflector.go:229: failed to list *v1.Group: the server is currently unable to handle the request (get groups.user.openshift.io) 2025-12-03T14:08:58.981346900Z E1203 14:08:58.979796 1 reflector.go:147] k8s.io/client-go@v0.29.2/tools/cache/reflector.go:229: Failed to watch *v1.Group: failed to list *v1.Group: the server is currently unable to handle the request (get groups.user.openshift.io) 2025-12-03T14:08:58.981346900Z I1203 14:08:58.979922 1 reflector.go:351] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.29.2/tools/cache/reflector.go:229 2025-12-03T14:08:58.981346900Z I1203 14:08:58.979998 1 reflector.go:351] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.29.2/tools/cache/reflector.go:229 2025-12-03T14:08:58.981714841Z I1203 14:08:58.981665 1 reflector.go:351] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.29.2/tools/cache/reflector.go:229 2025-12-03T14:08:59.071372461Z I1203 14:08:59.070714 1 shared_informer.go:318] Caches are synced for RequestHeaderAuthRequestController 2025-12-03T14:08:59.076058902Z I1203 14:08:59.076021 1 shared_informer.go:318] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2025-12-03T14:08:59.076139835Z I1203 14:08:59.076129 1 shared_informer.go:318] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2025-12-03T14:08:59.076448274Z I1203 14:08:59.076390 1 tlsconfig.go:178] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2025-12-03 13:37:20 +0000 UTC to 2025-12-04 13:37:20 +0000 UTC (now=2025-12-03 14:08:59.076340861 +0000 UTC))" 2025-12-03T14:08:59.076628069Z I1203 14:08:59.076614 1 tlsconfig.go:200] "Loaded serving cert" certName="serving-cert::/var/config/system/secrets/v4-0-config-system-serving-cert/tls.crt::/var/config/system/secrets/v4-0-config-system-serving-cert/tls.key" certDetail="\"oauth-openshift.openshift-authentication.svc\" [serving] validServingFor=[oauth-openshift.openshift-authentication.svc,oauth-openshift.openshift-authentication.svc.cluster.local] issuer=\"openshift-service-serving-signer@1764770119\" (2025-12-03 13:56:08 +0000 UTC to 2027-12-03 13:56:09 +0000 UTC (now=2025-12-03 14:08:59.076593958 +0000 UTC))" 2025-12-03T14:08:59.076821135Z I1203 14:08:59.076799 1 named_certificates.go:53] "Loaded SNI cert" index=1 certName="sni-serving-cert::/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab::/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab" certDetail="\"*.apps.sno.openstack.lab\" [serving] validServingFor=[*.apps.sno.openstack.lab] issuer=\"ingress-operator@1764770157\" (2025-12-03 13:55:58 +0000 UTC to 2027-12-03 13:55:59 +0000 UTC (now=2025-12-03 14:08:59.076771884 +0000 UTC))" 2025-12-03T14:08:59.077509876Z I1203 14:08:59.076955 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1764770938\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1764770938\" (2025-12-03 13:08:58 +0000 UTC to 2026-12-03 13:08:58 +0000 UTC (now=2025-12-03 14:08:59.076942579 +0000 UTC))" 2025-12-03T14:08:59.079320261Z I1203 14:08:59.079234 1 tlsconfig.go:178] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2025-12-03 13:29:46 +0000 UTC to 2035-12-01 13:29:46 +0000 UTC (now=2025-12-03 14:08:59.079191447 +0000 UTC))" 2025-12-03T14:08:59.079320261Z I1203 14:08:59.079266 1 tlsconfig.go:178] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2025-12-03 13:37:22 +0000 UTC to 2025-12-04 13:37:22 +0000 UTC (now=2025-12-03 14:08:59.079257429 +0000 UTC))" 2025-12-03T14:08:59.079320261Z I1203 14:08:59.079284 1 tlsconfig.go:178] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2025-12-03 13:37:22 +0000 UTC to 2026-12-03 13:37:22 +0000 UTC (now=2025-12-03 14:08:59.079270709 +0000 UTC))" 2025-12-03T14:08:59.079320261Z I1203 14:08:59.079297 1 tlsconfig.go:178] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2025-12-03 13:37:22 +0000 UTC to 2026-12-03 13:37:22 +0000 UTC (now=2025-12-03 14:08:59.07928959 +0000 UTC))" 2025-12-03T14:08:59.079320261Z I1203 14:08:59.079308 1 tlsconfig.go:178] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2025-12-03 13:37:20 +0000 UTC to 2035-12-01 13:37:20 +0000 UTC (now=2025-12-03 14:08:59.07930112 +0000 UTC))" 2025-12-03T14:08:59.079378013Z I1203 14:08:59.079321 1 tlsconfig.go:178] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-csr-signer_@1764770129\" [] issuer=\"kubelet-signer\" (2025-12-03 13:55:28 +0000 UTC to 2025-12-04 13:37:22 +0000 UTC (now=2025-12-03 14:08:59.079313901 +0000 UTC))" 2025-12-03T14:08:59.079378013Z I1203 14:08:59.079336 1 tlsconfig.go:178] "Loaded client CA" index=6 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"openshift-kube-apiserver-operator_node-system-admin-signer@1764770095\" [] issuer=\"\" (2025-12-03 13:54:54 +0000 UTC to 2026-12-03 13:54:55 +0000 UTC (now=2025-12-03 14:08:59.079325681 +0000 UTC))" 2025-12-03T14:08:59.079378013Z I1203 14:08:59.079347 1 tlsconfig.go:178] "Loaded client CA" index=7 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2025-12-03 13:37:20 +0000 UTC to 2025-12-04 13:37:20 +0000 UTC (now=2025-12-03 14:08:59.079339841 +0000 UTC))" 2025-12-03T14:08:59.079515577Z I1203 14:08:59.079471 1 tlsconfig.go:200] "Loaded serving cert" certName="serving-cert::/var/config/system/secrets/v4-0-config-system-serving-cert/tls.crt::/var/config/system/secrets/v4-0-config-system-serving-cert/tls.key" certDetail="\"oauth-openshift.openshift-authentication.svc\" [serving] validServingFor=[oauth-openshift.openshift-authentication.svc,oauth-openshift.openshift-authentication.svc.cluster.local] issuer=\"openshift-service-serving-signer@1764770119\" (2025-12-03 13:56:08 +0000 UTC to 2027-12-03 13:56:09 +0000 UTC (now=2025-12-03 14:08:59.079458985 +0000 UTC))" 2025-12-03T14:08:59.079638710Z I1203 14:08:59.079600 1 named_certificates.go:53] "Loaded SNI cert" index=1 certName="sni-serving-cert::/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab::/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab" certDetail="\"*.apps.sno.openstack.lab\" [serving] validServingFor=[*.apps.sno.openstack.lab] issuer=\"ingress-operator@1764770157\" (2025-12-03 13:55:58 +0000 UTC to 2027-12-03 13:55:59 +0000 UTC (now=2025-12-03 14:08:59.079588479 +0000 UTC))" 2025-12-03T14:08:59.081558938Z I1203 14:08:59.081522 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1764770938\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1764770938\" (2025-12-03 13:08:58 +0000 UTC to 2026-12-03 13:08:58 +0000 UTC (now=2025-12-03 14:08:59.081502057 +0000 UTC))" 2025-12-03T14:08:59.906243260Z W1203 14:08:59.906172 1 reflector.go:539] k8s.io/client-go@v0.29.2/tools/cache/reflector.go:229: failed to list *v1.Group: the server is currently unable to handle the request (get groups.user.openshift.io) 2025-12-03T14:08:59.906243260Z E1203 14:08:59.906212 1 reflector.go:147] k8s.io/client-go@v0.29.2/tools/cache/reflector.go:229: Failed to watch *v1.Group: failed to list *v1.Group: the server is currently unable to handle the request (get groups.user.openshift.io) 2025-12-03T14:09:01.701736027Z W1203 14:09:01.700933 1 reflector.go:539] k8s.io/client-go@v0.29.2/tools/cache/reflector.go:229: failed to list *v1.Group: the server is currently unable to handle the request (get groups.user.openshift.io) 2025-12-03T14:09:01.701736027Z E1203 14:09:01.700980 1 reflector.go:147] k8s.io/client-go@v0.29.2/tools/cache/reflector.go:229: Failed to watch *v1.Group: failed to list *v1.Group: the server is currently unable to handle the request (get groups.user.openshift.io) 2025-12-03T14:09:05.340812485Z W1203 14:09:05.340738 1 reflector.go:539] k8s.io/client-go@v0.29.2/tools/cache/reflector.go:229: failed to list *v1.Group: the server is currently unable to handle the request (get groups.user.openshift.io) 2025-12-03T14:09:05.340812485Z E1203 14:09:05.340789 1 reflector.go:147] k8s.io/client-go@v0.29.2/tools/cache/reflector.go:229: Failed to watch *v1.Group: failed to list *v1.Group: the server is currently unable to handle the request (get groups.user.openshift.io) 2025-12-03T14:09:14.016750902Z I1203 14:09:14.016625 1 reflector.go:351] Caches populated for *v1.Group from k8s.io/client-go@v0.29.2/tools/cache/reflector.go:229 config/pod/openshift-authentication/oauth-openshift-747bdb58b5-mn76f.json0000640000000000000000000002534115114042274024646 0ustar0000000000000000{"metadata":{"name":"oauth-openshift-747bdb58b5-mn76f","generateName":"oauth-openshift-747bdb58b5-","namespace":"openshift-authentication","uid":"b3068c10-8dd5-4bdb-b305-db2c9c9ef3ab","resourceVersion":"16424","creationTimestamp":"2025-12-03T14:01:05Z","labels":{"app":"oauth-openshift","oauth-openshift-anti-affinity":"true","pod-template-hash":"747bdb58b5"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.94/23\"],\"mac_address\":\"0a:58:0a:80:00:5e\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.94/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.94\"\n ],\n \"mac\": \"0a:58:0a:80:00:5e\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","operator.openshift.io/bootstrap-user-exists":"true","operator.openshift.io/rvs-hash":"0Ghay7MQKzH-GmfDV6xX_ZUnhMwXnkSZ2YS3UB_TlewEYv7AWtEGmBs-OE8AkJ126u_UDstyis36KY5hIhP75Q"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"oauth-openshift-747bdb58b5","uid":"f9e9899b-b450-4f9c-9175-0276d17a0490","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"audit-policies","configMap":{"name":"audit","defaultMode":420}},{"name":"audit-dir","hostPath":{"path":"/var/log/oauth-server","type":""}},{"name":"v4-0-config-system-session","secret":{"secretName":"v4-0-config-system-session","defaultMode":420}},{"name":"v4-0-config-system-cliconfig","configMap":{"name":"v4-0-config-system-cliconfig","defaultMode":420}},{"name":"v4-0-config-system-serving-cert","secret":{"secretName":"v4-0-config-system-serving-cert","defaultMode":420}},{"name":"v4-0-config-system-service-ca","configMap":{"name":"v4-0-config-system-service-ca","defaultMode":420}},{"name":"v4-0-config-system-router-certs","secret":{"secretName":"v4-0-config-system-router-certs","defaultMode":420}},{"name":"v4-0-config-system-ocp-branding-template","secret":{"secretName":"v4-0-config-system-ocp-branding-template","defaultMode":420}},{"name":"v4-0-config-user-template-login","secret":{"secretName":"v4-0-config-user-template-login","defaultMode":420,"optional":true}},{"name":"v4-0-config-user-template-provider-selection","secret":{"secretName":"v4-0-config-user-template-provider-selection","defaultMode":420,"optional":true}},{"name":"v4-0-config-user-template-error","secret":{"secretName":"v4-0-config-user-template-error","defaultMode":420,"optional":true}},{"name":"v4-0-config-system-trusted-ca-bundle","configMap":{"name":"v4-0-config-system-trusted-ca-bundle","defaultMode":420,"optional":true}},{"name":"kube-api-access-v7d88","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"oauth-openshift","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef51f50a9bf1b4dfa6fdb7b484eae9e3126e813b48f380c833dd7eaf4e55853e","command":["/bin/bash","-ec"],"args":["if [ -s /var/config/system/configmaps/v4-0-config-system-trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /var/config/system/configmaps/v4-0-config-system-trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\nexec oauth-server osinserver \\\n--config=/var/config/system/configmaps/v4-0-config-system-cliconfig/v4-0-config-system-cliconfig \\\n--v=2 \\\n--audit-log-format=json \\\n--audit-log-maxbackup=10 \\\n--audit-log-maxsize=100 \\\n--audit-log-path=/var/log/oauth-server/audit.log \\\n--audit-policy-file=/var/run/configmaps/audit/audit.yaml\n"],"ports":[{"name":"https","containerPort":6443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"audit-policies","mountPath":"/var/run/configmaps/audit"},{"name":"audit-dir","mountPath":"/var/log/oauth-server"},{"name":"v4-0-config-system-session","readOnly":true,"mountPath":"/var/config/system/secrets/v4-0-config-system-session"},{"name":"v4-0-config-system-cliconfig","readOnly":true,"mountPath":"/var/config/system/configmaps/v4-0-config-system-cliconfig"},{"name":"v4-0-config-system-serving-cert","readOnly":true,"mountPath":"/var/config/system/secrets/v4-0-config-system-serving-cert"},{"name":"v4-0-config-system-service-ca","readOnly":true,"mountPath":"/var/config/system/configmaps/v4-0-config-system-service-ca"},{"name":"v4-0-config-system-router-certs","readOnly":true,"mountPath":"/var/config/system/secrets/v4-0-config-system-router-certs"},{"name":"v4-0-config-system-ocp-branding-template","readOnly":true,"mountPath":"/var/config/system/secrets/v4-0-config-system-ocp-branding-template"},{"name":"v4-0-config-user-template-login","readOnly":true,"mountPath":"/var/config/user/template/secret/v4-0-config-user-template-login"},{"name":"v4-0-config-user-template-provider-selection","readOnly":true,"mountPath":"/var/config/user/template/secret/v4-0-config-user-template-provider-selection"},{"name":"v4-0-config-user-template-error","readOnly":true,"mountPath":"/var/config/user/template/secret/v4-0-config-user-template-error"},{"name":"v4-0-config-system-trusted-ca-bundle","readOnly":true,"mountPath":"/var/config/system/configmaps/v4-0-config-system-trusted-ca-bundle"},{"name":"kube-api-access-v7d88","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":6443,"scheme":"HTTPS"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/healthz","port":6443,"scheme":"HTTPS"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"lifecycle":{"preStop":{"exec":{"command":["sleep","25"]}}},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0,"readOnlyRootFilesystem":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":40,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"oauth-openshift","serviceAccount":"oauth-openshift","nodeName":"master-0","securityContext":{},"imagePullSecrets":[{"name":"oauth-openshift-dockercfg-nqkqh"}],"affinity":{"podAntiAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":[{"labelSelector":{"matchLabels":{"app":"oauth-openshift","oauth-openshift-anti-affinity":"true"}},"topologyKey":"kubernetes.io/hostname"}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:59Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:01:33Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:59Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:59Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:01:33Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.94","podIPs":[{"ip":"10.128.0.94"}],"startTime":"2025-12-03T14:01:33Z","containerStatuses":[{"name":"oauth-openshift","state":{"running":{"startedAt":"2025-12-03T14:08:57Z"}},"lastState":{},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef51f50a9bf1b4dfa6fdb7b484eae9e3126e813b48f380c833dd7eaf4e55853e","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef51f50a9bf1b4dfa6fdb7b484eae9e3126e813b48f380c833dd7eaf4e55853e","containerID":"cri-o://40fb59cfd74e6041170c92f1ee6dc799a6c5d221e4d7a05d6614563d67bc4a19","started":true,"volumeMounts":[{"name":"audit-policies","mountPath":"/var/run/configmaps/audit"},{"name":"audit-dir","mountPath":"/var/log/oauth-server"},{"name":"v4-0-config-system-session","mountPath":"/var/config/system/secrets/v4-0-config-system-session","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"v4-0-config-system-cliconfig","mountPath":"/var/config/system/configmaps/v4-0-config-system-cliconfig","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"v4-0-config-system-serving-cert","mountPath":"/var/config/system/secrets/v4-0-config-system-serving-cert","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"v4-0-config-system-service-ca","mountPath":"/var/config/system/configmaps/v4-0-config-system-service-ca","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"v4-0-config-system-router-certs","mountPath":"/var/config/system/secrets/v4-0-config-system-router-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"v4-0-config-system-ocp-branding-template","mountPath":"/var/config/system/secrets/v4-0-config-system-ocp-branding-template","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"v4-0-config-user-template-login","mountPath":"/var/config/user/template/secret/v4-0-config-user-template-login","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"v4-0-config-user-template-provider-selection","mountPath":"/var/config/user/template/secret/v4-0-config-user-template-provider-selection","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"v4-0-config-user-template-error","mountPath":"/var/config/user/template/secret/v4-0-config-user-template-error","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"v4-0-config-system-trusted-ca-bundle","mountPath":"/var/config/system/configmaps/v4-0-config-system-trusted-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-v7d88","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}events/openshift-route-controller-manager.json0000640000000000000000000004174515114042274020376 0ustar0000000000000000{"items":[{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:55:30Z","reason":"ScalingReplicaSet","message":"Scaled up replica set route-controller-manager-7ffbbcd969 to 1","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:55:30Z","reason":"SuccessfulCreate","message":"Created pod: route-controller-manager-7ffbbcd969-mkclq","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:55:38Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:55:43Z","reason":"ScalingReplicaSet","message":"Scaled down replica set route-controller-manager-7ffbbcd969 to 0 from 1","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:55:44Z","reason":"SuccessfulCreate","message":"Created pod: route-controller-manager-66bd7f46c9-p8fcq","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:55:44Z","reason":"SuccessfulCreate","message":"Created pod: route-controller-manager-7787465f55-49pjz","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:55:44Z","reason":"ScalingReplicaSet","message":"Scaled up replica set route-controller-manager-7787465f55 to 1 from 0","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:55:44Z","reason":"SuccessfulDelete","message":"Deleted pod: route-controller-manager-7787465f55-49pjz","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:55:44Z","reason":"ScalingReplicaSet","message":"Scaled up replica set route-controller-manager-66bd7f46c9 to 1 from 0","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:55:44Z","reason":"SuccessfulDelete","message":"Deleted pod: route-controller-manager-7ffbbcd969-mkclq","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:55:44Z","reason":"ScalingReplicaSet","message":"Scaled down replica set route-controller-manager-7787465f55 to 0 from 1","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:55:46Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : object \"openshift-route-controller-manager\"/\"serving-cert\" not registered","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:55:47Z","reason":"ScalingReplicaSet","message":"Scaled up replica set route-controller-manager-75c7768d99 to 1 from 0","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:55:47Z","reason":"SuccessfulDelete","message":"Deleted pod: route-controller-manager-66bd7f46c9-p8fcq","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:55:47Z","reason":"SuccessfulCreate","message":"Created pod: route-controller-manager-75c7768d99-klvvl","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:55:47Z","reason":"ScalingReplicaSet","message":"Scaled down replica set route-controller-manager-66bd7f46c9 to 0 from 1","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:55:49Z","reason":"SuccessfulDelete","message":"Deleted pod: route-controller-manager-75c7768d99-klvvl","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:55:49Z","reason":"SuccessfulCreate","message":"Created pod: route-controller-manager-5dbcf69784-65p95","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:55:49Z","reason":"ScalingReplicaSet","message":"Scaled up replica set route-controller-manager-5dbcf69784 to 1 from 0","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:55:49Z","reason":"ScalingReplicaSet","message":"Scaled down replica set route-controller-manager-75c7768d99 to 0 from 1","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:55:56Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ebd79294a663cb38370ae81f9cda91cef7fb1370ec5b495b4bdb95e77272e6a8\"","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:55:56Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.34/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:55:57.507069Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:56:03Z","reason":"SuccessfulDelete","message":"Deleted pod: route-controller-manager-5dbcf69784-65p95","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:56:03Z","reason":"ScalingReplicaSet","message":"(combined from similar events): Scaled up replica set route-controller-manager-7f6f54d5f6 to 1 from 0","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:56:03Z","reason":"SuccessfulCreate","message":"Created pod: route-controller-manager-7f6f54d5f6-ch42s","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:56:04Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ebd79294a663cb38370ae81f9cda91cef7fb1370ec5b495b4bdb95e77272e6a8\" in 7.252s (7.253s including waiting). Image size: 481573011 bytes.","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:56:04Z","reason":"Created","message":"Created container: route-controller-manager","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:56:04Z","reason":"Started","message":"Started container route-controller-manager","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:56:05Z","reason":"Killing","message":"Stopping container route-controller-manager","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:56:05Z","reason":"LeaderElection","message":"route-controller-manager-66bd7f46c9-p8fcq_3c04093b-cebf-4999-8030-b8c02ae5b738 became leader","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:56:11Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ebd79294a663cb38370ae81f9cda91cef7fb1370ec5b495b4bdb95e77272e6a8\" already present on machine","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:56:11Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.44/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:56:11Z","reason":"Started","message":"Started container route-controller-manager","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:56:11Z","reason":"Created","message":"Created container: route-controller-manager","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:56:12Z","reason":"LeaderElection","message":"route-controller-manager-7f6f54d5f6-ch42s_4ea95845-2449-4b74-a589-49a41c437349 became leader","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:58:02Z","reason":"ScalingReplicaSet","message":"Scaled down replica set route-controller-manager-7f6f54d5f6 to 0 from 1","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:58:03Z","reason":"ScalingReplicaSet","message":"Scaled up replica set route-controller-manager-6fcd4b8856 to 1 from 0","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:58:03Z","reason":"SuccessfulCreate","message":"Created pod: route-controller-manager-6fcd4b8856-ztns6","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:58:03Z","reason":"SuccessfulDelete","message":"Deleted pod: route-controller-manager-7f6f54d5f6-ch42s","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:58:03Z","reason":"Killing","message":"Stopping container route-controller-manager","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:58:28Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.66/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:58:28Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ebd79294a663cb38370ae81f9cda91cef7fb1370ec5b495b4bdb95e77272e6a8\" already present on machine","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:58:41Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:58:41Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"client-ca\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:58:41Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:58:42Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ebd79294a663cb38370ae81f9cda91cef7fb1370ec5b495b4bdb95e77272e6a8\" already present on machine","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:58:43Z","reason":"Created","message":"Created container: route-controller-manager","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:58:43Z","reason":"Started","message":"Started container route-controller-manager","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T13:58:46Z","reason":"LeaderElection","message":"route-controller-manager-6fcd4b8856-ztns6_a1003e38-f98a-41f8-b15f-91c44d8b8999 became leader","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T14:00:30Z","reason":"ScalingReplicaSet","message":"Scaled down replica set route-controller-manager-6fcd4b8856 to 0 from 1","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T14:00:30Z","reason":"SuccessfulDelete","message":"Deleted pod: route-controller-manager-6fcd4b8856-ztns6","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T14:00:30Z","reason":"Killing","message":"Stopping container route-controller-manager","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T14:00:30Z","reason":"SuccessfulCreate","message":"Created pod: route-controller-manager-84f75d5446-j8tkx","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T14:00:30Z","reason":"ScalingReplicaSet","message":"Scaled up replica set route-controller-manager-84f75d5446 to 1 from 0","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T14:00:33Z","reason":"ProbeError","message":"Readiness probe error: Get \"https://10.128.0.66:8443/healthz\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)\nbody: \n","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T14:00:33Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"https://10.128.0.66:8443/healthz\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T14:00:38.63868Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T14:00:44Z","reason":"Started","message":"Started container route-controller-manager","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T14:00:44Z","reason":"Created","message":"Created container: route-controller-manager","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T14:00:44Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ebd79294a663cb38370ae81f9cda91cef7fb1370ec5b495b4bdb95e77272e6a8\" already present on machine","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T14:00:44Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.83/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T14:00:45Z","reason":"LeaderElection","message":"route-controller-manager-84f75d5446-j8tkx_ceee8b52-d67f-416f-801c-72b196ea0ae7 became leader","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T14:02:43Z","reason":"ScalingReplicaSet","message":"Scaled down replica set route-controller-manager-84f75d5446 to 0 from 1","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T14:02:45Z","reason":"SuccessfulDelete","message":"Deleted pod: route-controller-manager-84f75d5446-j8tkx","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T14:02:45Z","reason":"Killing","message":"Stopping container route-controller-manager","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T14:02:47Z","reason":"ScalingReplicaSet","message":"Scaled up replica set route-controller-manager-678c7f799b to 1 from 0","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T14:02:48Z","reason":"SuccessfulCreate","message":"Created pod: route-controller-manager-678c7f799b-4b7nv","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T14:02:57Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.96/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T14:08:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : object \"openshift-route-controller-manager\"/\"serving-cert\" not registered","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T14:08:28Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"client-ca\" : object \"openshift-route-controller-manager\"/\"client-ca\" not registered","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T14:08:28Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : object \"openshift-route-controller-manager\"/\"config\" not registered","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T14:08:30Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-lq4dz\" : [object \"openshift-route-controller-manager\"/\"kube-root-ca.crt\" not registered, object \"openshift-route-controller-manager\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T14:08:36Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T14:08:57Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.96/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-route-controller-manager","lastTimestamp":"2025-12-03T14:09:01Z","reason":"LeaderElection","message":"route-controller-manager-678c7f799b-4b7nv_c841bc60-7211-4fd2-8f02-c1b7a7cfe287 became leader","type":"Normal"}]}events/openshift-controller-manager.json0000640000000000000000000004414115114042274017233 0ustar0000000000000000{"items":[{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:55:28Z","reason":"ScalingReplicaSet","message":"Scaled up replica set controller-manager-56fb5cd58b to 1","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:55:28Z","reason":"SuccessfulCreate","message":"Created pod: controller-manager-56fb5cd58b-5hnj2","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:55:28Z","reason":"FailedCreate","message":"Error creating: pods \"controller-manager-56fb5cd58b-\" is forbidden: error looking up service account openshift-controller-manager/openshift-controller-manager-sa: serviceaccount \"openshift-controller-manager-sa\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:55:30Z","reason":"ScalingReplicaSet","message":"Scaled down replica set controller-manager-56fb5cd58b to 0 from 1","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:55:30Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"client-ca\" : configmap \"client-ca\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:55:30Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : configmap \"config\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:55:30Z","reason":"SuccessfulCreate","message":"Created pod: controller-manager-6c79f444f7-8rmss","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:55:30Z","reason":"SuccessfulDelete","message":"Deleted pod: controller-manager-56fb5cd58b-5hnj2","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:55:30Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"proxy-ca-bundles\" : configmap \"openshift-global-ca\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:55:30Z","reason":"ScalingReplicaSet","message":"Scaled up replica set controller-manager-6c79f444f7 to 1 from 0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:55:31Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:55:37Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : object \"openshift-controller-manager\"/\"serving-cert\" not registered","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:55:43Z","reason":"SuccessfulDelete","message":"Deleted pod: controller-manager-6c79f444f7-8rmss","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:55:43Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:55:43Z","reason":"ScalingReplicaSet","message":"Scaled down replica set controller-manager-6c79f444f7 to 0 from 1","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:55:43Z","reason":"ScalingReplicaSet","message":"Scaled up replica set controller-manager-595fbb95f7 to 1 from 0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:55:44Z","reason":"SuccessfulCreate","message":"Created pod: controller-manager-595fbb95f7-nqxs8","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:55:44Z","reason":"ScalingReplicaSet","message":"Scaled up replica set controller-manager-688676d587 to 1 from 0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:55:44Z","reason":"SuccessfulDelete","message":"Deleted pod: controller-manager-595fbb95f7-nqxs8","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:55:44Z","reason":"SuccessfulCreate","message":"Created pod: controller-manager-688676d587-z9qm2","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:55:44Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.32/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:55:44Z","reason":"ScalingReplicaSet","message":"Scaled down replica set controller-manager-595fbb95f7 to 0 from 1","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:55:45Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:dc9758be9f0f0a480fb5e119ecb1e1101ef807bdc765a155212a8188d79b9e60\"","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:55:47Z","reason":"ScalingReplicaSet","message":"Scaled down replica set controller-manager-688676d587 to 0 from 1","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:55:47Z","reason":"ScalingReplicaSet","message":"Scaled up replica set controller-manager-569cbcf7fb to 1 from 0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:55:47Z","reason":"SuccessfulCreate","message":"Created pod: controller-manager-569cbcf7fb-99r5f","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:55:47Z","reason":"SuccessfulDelete","message":"Deleted pod: controller-manager-688676d587-z9qm2","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:55:49Z","reason":"SuccessfulDelete","message":"Deleted pod: controller-manager-569cbcf7fb-99r5f","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:55:49Z","reason":"SuccessfulCreate","message":"Created pod: controller-manager-6c4bfbb4d5-77st9","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:55:56Z","reason":"Killing","message":"Stopping container controller-manager","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:55:56Z","reason":"LeaderElection","message":"controller-manager-6c79f444f7-8rmss became leader","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:55:56Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:dc9758be9f0f0a480fb5e119ecb1e1101ef807bdc765a155212a8188d79b9e60\" in 10.978s (10.978s including waiting). Image size: 552687886 bytes.","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:55:56Z","reason":"Created","message":"Created container: controller-manager","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:55:56Z","reason":"Started","message":"Started container controller-manager","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:55:58Z","reason":"Started","message":"Started container controller-manager","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:55:58Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.38/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:55:58Z","reason":"LeaderElection","message":"controller-manager-6c4bfbb4d5-77st9 became leader","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:55:58Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:dc9758be9f0f0a480fb5e119ecb1e1101ef807bdc765a155212a8188d79b9e60\" already present on machine","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:55:58Z","reason":"Created","message":"Created container: controller-manager","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:56:03Z","reason":"SuccessfulCreate","message":"Created pod: controller-manager-6fb5f97c4d-bcdbq","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:56:03Z","reason":"SuccessfulDelete","message":"Deleted pod: controller-manager-6c4bfbb4d5-77st9","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:56:03Z","reason":"ScalingReplicaSet","message":"(combined from similar events): Scaled up replica set controller-manager-6fb5f97c4d to 1 from 0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:56:03Z","reason":"Killing","message":"Stopping container controller-manager","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:56:05Z","reason":"Created","message":"Created container: controller-manager","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:56:05Z","reason":"Started","message":"Started container controller-manager","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:56:05Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:dc9758be9f0f0a480fb5e119ecb1e1101ef807bdc765a155212a8188d79b9e60\" already present on machine","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:56:05Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.42/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:56:06Z","reason":"LeaderElection","message":"controller-manager-6fb5f97c4d-bcdbq became leader","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:58:02Z","reason":"Killing","message":"Stopping container controller-manager","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:58:02Z","reason":"ScalingReplicaSet","message":"Scaled down replica set controller-manager-6fb5f97c4d to 0 from 1","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:58:02Z","reason":"SuccessfulDelete","message":"Deleted pod: controller-manager-6fb5f97c4d-bcdbq","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:58:03Z","reason":"SuccessfulCreate","message":"Created pod: controller-manager-7d8fb964c9-v2h98","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:58:03Z","reason":"ScalingReplicaSet","message":"Scaled up replica set controller-manager-7d8fb964c9 to 1 from 0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:58:28Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.64/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:58:28Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:dc9758be9f0f0a480fb5e119ecb1e1101ef807bdc765a155212a8188d79b9e60\" already present on machine","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:58:41Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:58:41Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:58:41Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"proxy-ca-bundles\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:58:41Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"client-ca\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:58:43Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:dc9758be9f0f0a480fb5e119ecb1e1101ef807bdc765a155212a8188d79b9e60\" already present on machine","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:58:43Z","reason":"Created","message":"Created container: controller-manager","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:58:43Z","reason":"Started","message":"Started container controller-manager","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T13:59:12Z","reason":"LeaderElection","message":"controller-manager-7d8fb964c9-v2h98 became leader","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T14:00:30Z","reason":"ScalingReplicaSet","message":"Scaled down replica set controller-manager-7d8fb964c9 to 0 from 1","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T14:00:30Z","reason":"SuccessfulDelete","message":"Deleted pod: controller-manager-7d8fb964c9-v2h98","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T14:00:30Z","reason":"ScalingReplicaSet","message":"Scaled up replica set controller-manager-5c8b4c9687 to 1 from 0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T14:00:30Z","reason":"Killing","message":"Stopping container controller-manager","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T14:00:30Z","reason":"SuccessfulCreate","message":"Created pod: controller-manager-5c8b4c9687-4pxw5","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T14:00:32Z","reason":"Started","message":"Started container controller-manager","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T14:00:32Z","reason":"LeaderElection","message":"controller-manager-5c8b4c9687-4pxw5 became leader","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T14:00:32Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.78/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T14:00:32Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:dc9758be9f0f0a480fb5e119ecb1e1101ef807bdc765a155212a8188d79b9e60\" already present on machine","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T14:00:32Z","reason":"Created","message":"Created container: controller-manager","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T14:02:43Z","reason":"ScalingReplicaSet","message":"Scaled down replica set controller-manager-5c8b4c9687 to 0 from 1","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T14:02:45Z","reason":"ScalingReplicaSet","message":"Scaled up replica set controller-manager-78d987764b to 1 from 0","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T14:02:45Z","reason":"SuccessfulDelete","message":"Deleted pod: controller-manager-5c8b4c9687-4pxw5","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T14:02:45Z","reason":"Killing","message":"Stopping container controller-manager","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T14:02:48Z","reason":"SuccessfulCreate","message":"Created pod: controller-manager-78d987764b-xcs5w","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T14:02:55Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.95/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T14:08:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-lxlb8\" : [object \"openshift-controller-manager\"/\"kube-root-ca.crt\" not registered, object \"openshift-controller-manager\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T14:08:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"client-ca\" : object \"openshift-controller-manager\"/\"client-ca\" not registered","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T14:08:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : object \"openshift-controller-manager\"/\"config\" not registered","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T14:08:27Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T14:08:28Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"proxy-ca-bundles\" : object \"openshift-controller-manager\"/\"openshift-global-ca\" not registered","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T14:08:28Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : object \"openshift-controller-manager\"/\"serving-cert\" not registered","type":"Warning"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T14:08:57Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.95/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-controller-manager","lastTimestamp":"2025-12-03T14:09:01Z","reason":"LeaderElection","message":"controller-manager-78d987764b-xcs5w became leader","type":"Normal"}]}events/openshift-controller-manager-operator.json0000640000000000000000000012163015114042274021063 0ustar0000000000000000{"items":[{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:45:17Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-controller-manager-operator-7c4697b5f5 to 1","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:45:27Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-controller-manager-operator-7c4697b5f5-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:51:40Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-controller-manager-operator-7c4697b5f5-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:51:43Z","reason":"SuccessfulCreate","message":"Created pod: openshift-controller-manager-operator-7c4697b5f5-9f69p","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:51:44Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:54:52Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.13/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:54:53Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3051af3343018fecbf3a6edacea69de841fc5211c09e7fb6a2499188dc979395\"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:09Z","reason":"Failed","message":"Error: ErrImagePull","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:09Z","reason":"Failed","message":"Failed to pull image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3051af3343018fecbf3a6edacea69de841fc5211c09e7fb6a2499188dc979395\": rpc error: code = Canceled desc = copying config: context canceled","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:24Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3051af3343018fecbf3a6edacea69de841fc5211c09e7fb6a2499188dc979395\"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:25Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3051af3343018fecbf3a6edacea69de841fc5211c09e7fb6a2499188dc979395\" in 887ms (887ms including waiting). Image size: 502450335 bytes.","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:27Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:tokenreview-openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:27Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:27Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:tokenreview-openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Degraded changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:27Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/config -n openshift-controller-manager: namespaces \"openshift-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:27Z","reason":"ConfigMapCreateFailed","message":"Failed to create configmap/openshift-service-ca-n openshift-controller-manager: namespaces \"openshift-controller-manager\" not found","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:27Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:27Z","reason":"RoleCreateFailed","message":"Failed to create Role.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-controller-manager -n openshift-controller-manager: namespaces \"openshift-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:27Z","reason":"LeaderElection","message":"openshift-controller-manager-operator-7c4697b5f5-9f69p_ccc40433-ea89-4ffe-aa9d-0cd46aae4d23 became leader","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [] to [{\"operator.openshift.io\" \"openshiftcontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"openshift-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-route-controller-manager\"}]","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:27Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/openshift-global-ca -n openshift-controller-manager: namespaces \"openshift-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:27Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:27Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated featureGates to BuildCSIVolumes=true","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:27Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"build\": map[string]any{\n+ \t\t\"buildDefaults\": map[string]any{\"resources\": map[string]any{}},\n+ \t\t\"imageTemplateFormat\": map[string]any{\n+ \t\t\t\"format\": string(\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d00e4a8d28\"...),\n+ \t\t},\n+ \t},\n+ \t\"controllers\": []any{\n+ \t\tstring(\"openshift.io/build\"), string(\"openshift.io/build-config-change\"),\n+ \t\tstring(\"openshift.io/builder-rolebindings\"),\n+ \t\tstring(\"openshift.io/builder-serviceaccount\"),\n+ \t\tstring(\"-openshift.io/default-rolebindings\"), string(\"openshift.io/deployer\"),\n+ \t\tstring(\"openshift.io/deployer-rolebindings\"),\n+ \t\tstring(\"openshift.io/deployer-serviceaccount\"),\n+ \t\tstring(\"openshift.io/deploymentconfig\"), string(\"openshift.io/image-import\"),\n+ \t\tstring(\"openshift.io/image-puller-rolebindings\"),\n+ \t\tstring(\"openshift.io/image-signature-import\"),\n+ \t\tstring(\"openshift.io/image-trigger\"), string(\"openshift.io/ingress-ip\"),\n+ \t\tstring(\"openshift.io/ingress-to-route\"),\n+ \t\tstring(\"openshift.io/origin-namespace\"), ...,\n+ \t},\n+ \t\"deployer\": map[string]any{\n+ \t\t\"imageTemplateFormat\": map[string]any{\n+ \t\t\t\"format\": string(\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8f779b92bb\"...),\n+ \t\t},\n+ \t},\n+ \t\"featureGates\": []any{string(\"BuildCSIVolumes=true\")},\n+ \t\"ingress\": map[string]any{\"ingressIPNetworkCIDR\": string(\"\")},\n }\n","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:28Z","reason":"DeploymentCreateFailed","message":"Failed to create Deployment.apps/route-controller-manager -n openshift-route-controller-manager: namespaces \"openshift-route-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:28Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/route-controller-manager-sa -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:28Z","reason":"DeploymentCreated","message":"Created Deployment.apps/controller-manager -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:28Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:28Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/prometheus-k8s -n openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:28Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:sa-creating-route-controller-manager -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:28Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:sa-creating-route-controller-manager -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:28Z","reason":"RoleCreateFailed","message":"Failed to create Role.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-route-controller-manager -n openshift-route-controller-manager: namespaces \"openshift-route-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:28Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:28Z","reason":"RoleBindingCreateFailed","message":"Failed to create RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-route-controller-manager -n openshift-route-controller-manager: namespaces \"openshift-route-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:28Z","reason":"RoleBindingCreateFailed","message":"Failed to create RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-openshift-controller-manager -n openshift-controller-manager: namespaces \"openshift-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:28Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:28Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/config -n openshift-route-controller-manager: namespaces \"openshift-route-controller-manager\" not found","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:28Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:openshift-route-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:33Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3051af3343018fecbf3a6edacea69de841fc5211c09e7fb6a2499188dc979395\" already present on machine","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:37Z","reason":"Created","message":"Created container: openshift-controller-manager-operator","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:38Z","reason":"Started","message":"Started container openshift-controller-manager-operator","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:42Z","reason":"LeaderElection","message":"openshift-controller-manager-operator-7c4697b5f5-9f69p_d4c1ca4d-b97f-4d89-b81a-3f885bee7a2e became leader","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:42Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Degraded message changed from \"All is well\" to \"OpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/leader-role.yaml\\\" (string): namespaces \\\"openshift-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/leader-rolebinding.yaml\\\" (string): namespaces \\\"openshift-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/route-controller-manager-leader-role.yaml\\\" (string): namespaces \\\"openshift-route-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/route-controller-manager-leader-rolebinding.yaml\\\" (string): namespaces \\\"openshift-route-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:43Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-controller-manager:\ncause by changes in data.openshift-controller-manager.client-ca.configmap,data.openshift-controller-manager.openshift-global-ca.configmap","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:44Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-route-controller-manager:\ncause by changes in data.openshift-route-controller-manager.serving-cert.secret","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:44Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-controller-manager:\ncause by changes in data.openshift-controller-manager.serving-cert.secret","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Progressing changed from Unknown to True (\"Progressing: deployment/controller-manager: observed generation is 2, desired generation is 3.\\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: observed generation is 1, desired generation is 2.\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: openshiftcontrollermanagers.operator.openshift.io/cluster: observed generation is 0, desired generation is 2.\"),Available changed from Unknown to False (\"Available: no pods available on any node.\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Progressing message changed from \"Progressing: deployment/controller-manager: observed generation is 2, desired generation is 3.\\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: observed generation is 1, desired generation is 2.\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: openshiftcontrollermanagers.operator.openshift.io/cluster: observed generation is 0, desired generation is 2.\" to \"Progressing: deployment/controller-manager: observed generation is 3, desired generation is 4.\\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: observed generation is 2, desired generation is 3.\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:47Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Degraded message changed from \"OpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/leader-role.yaml\\\" (string): namespaces \\\"openshift-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/leader-rolebinding.yaml\\\" (string): namespaces \\\"openshift-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/route-controller-manager-leader-role.yaml\\\" (string): namespaces \\\"openshift-route-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \\\"assets/openshift-controller-manager/route-controller-manager-leader-rolebinding.yaml\\\" (string): namespaces \\\"openshift-route-controller-manager\\\" not found\\nOpenshiftControllerManagerStaticResourcesDegraded: \" to \"All is well\"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:49Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Progressing message changed from \"Progressing: deployment/controller-manager: observed generation is 3, desired generation is 4.\\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: observed generation is 2, desired generation is 3.\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\" to \"Progressing: deployment/controller-manager: observed generation is 4, desired generation is 5.\\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: observed generation is 3, desired generation is 4.\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:56:03Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/client-ca -n openshift-controller-manager:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:56:03Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Progressing message changed from \"Progressing: deployment/controller-manager: observed generation is 4, desired generation is 5.\\nProgressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: observed generation is 3, desired generation is 4.\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\" to \"Progressing: deployment/controller-manager: observed generation is 6, desired generation is 7.\\nProgressing: deployment/route-controller-manager: observed generation is 5, desired generation is 6.\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\",Available message changed from \"Available: no pods available on any node.\" to \"Available: no route controller manager deployment pods available on any node.\",status.versions changed from [] to [{\"operator\" \"4.18.28\"}]","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:56:03Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-controller-manager version \"operator\" changed from \"\" to \"4.18.28\"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:56:03Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/client-ca -n openshift-route-controller-manager:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:58:02Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-route-controller-manager:\ncause by changes in data.openshift-route-controller-manager.client-ca.configmap","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:58:02Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Progressing message changed from \"Progressing: deployment/controller-manager: observed generation is 6, desired generation is 7.\\nProgressing: deployment/route-controller-manager: observed generation is 5, desired generation is 6.\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\" to \"Progressing: deployment/controller-manager: observed generation is 7, desired generation is 8.\\nProgressing: deployment/route-controller-manager: observed generation is 6, desired generation is 7.\",Available changed from False to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:58:02Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-controller-manager:\ncause by changes in data.openshift-controller-manager.client-ca.configmap","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:58:03Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Progressing message changed from \"Progressing: deployment/controller-manager: observed generation is 7, desired generation is 8.\\nProgressing: deployment/route-controller-manager: observed generation is 6, desired generation is 7.\" to \"Progressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: updated replicas is 0, desired replicas is 1\",Available changed from True to False (\"Available: no pods available on any node.\")","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T13:58:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Progressing message changed from \"Progressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: updated replicas is 0, desired replicas is 1\" to \"Progressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T14:00:20Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Progressing changed from False to True (\"Progressing: deployment/controller-manager: observed generation is 8, desired generation is 9.\\nProgressing: deployment/route-controller-manager: observed generation is 7, desired generation is 8.\\nProgressing: openshiftcontrollermanagers.operator.openshift.io/cluster: observed generation is 2, desired generation is 3.\")","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T14:00:22Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Progressing message changed from \"Progressing: deployment/controller-manager: observed generation is 8, desired generation is 9.\\nProgressing: deployment/route-controller-manager: observed generation is 7, desired generation is 8.\\nProgressing: openshiftcontrollermanagers.operator.openshift.io/cluster: observed generation is 2, desired generation is 3.\" to \"Progressing: deployment/controller-manager: observed generation is 8, desired generation is 9.\\nProgressing: deployment/route-controller-manager: observed generation is 7, desired generation is 8.\"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T14:00:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Progressing message changed from \"Progressing: deployment/controller-manager: observed generation is 8, desired generation is 9.\\nProgressing: deployment/route-controller-manager: observed generation is 7, desired generation is 8.\" to \"Progressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\",Available changed from True to False (\"Available: no route controller manager deployment pods available on any node.\")","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T14:01:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Progressing changed from True to False (\"All is well\"),Available changed from False to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T14:01:43Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n  \t\"build\": map[string]any{\"buildDefaults\": map[string]any{\"resources\": map[string]any{}}, \"imageTemplateFormat\": map[string]any{\"format\": string(\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d00e4a8d28\"...)}},\n  \t\"controllers\": []any{\n  \t\t... // 8 identical elements\n  \t\tstring(\"openshift.io/deploymentconfig\"),\n  \t\tstring(\"openshift.io/image-import\"),\n  \t\tstrings.Join({\n- \t\t\t\"-\",\n  \t\t\t\"openshift.io/image-puller-rolebindings\",\n  \t\t}, \"\"),\n  \t\tstring(\"openshift.io/image-signature-import\"),\n  \t\tstring(\"openshift.io/image-trigger\"),\n  \t\t... // 2 identical elements\n  \t\tstring(\"openshift.io/origin-namespace\"),\n  \t\tstring(\"openshift.io/serviceaccount\"),\n  \t\tstrings.Join({\n- \t\t\t\"-\",\n  \t\t\t\"openshift.io/serviceaccount-pull-secrets\",\n  \t\t}, \"\"),\n  \t\tstring(\"openshift.io/templateinstance\"),\n  \t\tstring(\"openshift.io/templateinstancefinalizer\"),\n  \t\tstring(\"openshift.io/unidling\"),\n  \t},\n  \t\"deployer\": map[string]any{\"imageTemplateFormat\": map[string]any{\"format\": string(\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8f779b92bb\"...)}},\n  \t\"featureGates\": []any{string(\"BuildCSIVolumes=true\")},\n  \t\"ingress\": map[string]any{\"ingressIPNetworkCIDR\": string(\"\")},\n  }\n","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T14:02:05Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T14:02:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Progressing changed from False to True (\"Progressing: deployment/controller-manager: observed generation is 9, desired generation is 10.\\nProgressing: deployment/route-controller-manager: observed generation is 8, desired generation is 9.\\nProgressing: openshiftcontrollermanagers.operator.openshift.io/cluster: observed generation is 3, desired generation is 4.\")","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T14:02:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Progressing message changed from \"Progressing: deployment/controller-manager: observed generation is 9, desired generation is 10.\\nProgressing: deployment/route-controller-manager: observed generation is 8, desired generation is 9.\\nProgressing: openshiftcontrollermanagers.operator.openshift.io/cluster: observed generation is 3, desired generation is 4.\" to \"Progressing: deployment/controller-manager: observed generation is 9, desired generation is 10.\\nProgressing: deployment/route-controller-manager: observed generation is 8, desired generation is 9.\"","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T14:02:06Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/route-controller-manager -n openshift-route-controller-manager because it changed","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T14:02:06Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-route-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T14:02:06Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/controller-manager -n openshift-controller-manager because it changed","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T14:02:49Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n  \t\"build\": map[string]any{\"buildDefaults\": map[string]any{\"resources\": map[string]any{}}, \"imageTemplateFormat\": map[string]any{\"format\": string(\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d00e4a8d28\"...)}},\n  \t\"controllers\": []any{\n  \t\t... // 8 identical elements\n  \t\tstring(\"openshift.io/deploymentconfig\"),\n  \t\tstring(\"openshift.io/image-import\"),\n  \t\tstrings.Join({\n+ \t\t\t\"-\",\n  \t\t\t\"openshift.io/image-puller-rolebindings\",\n  \t\t}, \"\"),\n  \t\tstring(\"openshift.io/image-signature-import\"),\n  \t\tstring(\"openshift.io/image-trigger\"),\n  \t\t... // 2 identical elements\n  \t\tstring(\"openshift.io/origin-namespace\"),\n  \t\tstring(\"openshift.io/serviceaccount\"),\n  \t\tstrings.Join({\n+ \t\t\t\"-\",\n  \t\t\t\"openshift.io/serviceaccount-pull-secrets\",\n  \t\t}, \"\"),\n  \t\tstring(\"openshift.io/templateinstance\"),\n  \t\tstring(\"openshift.io/templateinstancefinalizer\"),\n  \t\tstring(\"openshift.io/unidling\"),\n  \t},\n  \t\"deployer\": map[string]any{\"imageTemplateFormat\": map[string]any{\"format\": string(\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8f779b92bb\"...)}},\n  \t\"featureGates\": []any{string(\"BuildCSIVolumes=true\")},\n  \t\"ingress\": map[string]any{\"ingressIPNetworkCIDR\": string(\"\")},\n  }\n","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T14:02:49Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-controller-manager changed: Progressing message changed from \"Progressing: deployment/controller-manager: observed generation is 9, desired generation is 10.\\nProgressing: deployment/route-controller-manager: observed generation is 8, desired generation is 9.\" to \"Progressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1\",Available changed from True to False (\"Available: no pods available on any node.\")","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T14:08:15Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T14:08:28Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : object \"openshift-controller-manager-operator\"/\"openshift-controller-manager-operator-serving-cert\" not registered","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T14:08:28Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : object \"openshift-controller-manager-operator\"/\"openshift-controller-manager-operator-config\" not registered","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T14:08:37Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-jkbcq\" : [object \"openshift-controller-manager-operator\"/\"kube-root-ca.crt\" not registered, object \"openshift-controller-manager-operator\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T14:08:44Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T14:08:56Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.13/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T14:08:56Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3051af3343018fecbf3a6edacea69de841fc5211c09e7fb6a2499188dc979395\" already present on machine","type":"Normal"},{"namespace":"openshift-controller-manager-operator","lastTimestamp":"2025-12-03T14:08:57Z","reason":"Created","message":"Created container: openshift-controller-manager-operator","type":"Normal"}]}events/openshift-machine-config-operator.json0000640000000000000000000013211315114042274020135 0ustar0000000000000000{"items":[{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:51:44Z","reason":"BackOff","message":"Back-off restarting failed container kube-rbac-proxy-crio in pod kube-rbac-proxy-crio-master-0_openshift-machine-config-operator(b495b0c38f2c54e7cc46282c5f92aab5)","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:51:55Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:51:56Z","reason":"Created","message":"Created container: kube-rbac-proxy-crio","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:51:56Z","reason":"Started","message":"Started container kube-rbac-proxy-crio","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:57:58Z","reason":"SuccessfulCreate","message":"Created pod: machine-config-operator-664c9d94c9-9vfr4","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:57:58Z","reason":"ScalingReplicaSet","message":"Scaled up replica set machine-config-operator-664c9d94c9 to 1","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:57:59Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.57/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:58:00Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:58:00Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a31af646ce5587c051459a88df413dc30be81e7f15399aa909e19effa7de772a\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:58:00Z","reason":"Created","message":"Created container: machine-config-operator","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:58:00Z","reason":"Started","message":"Started container machine-config-operator","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:58:01Z","reason":"OperatorVersionChanged","message":"clusteroperator/machine-config started a version change from [] to [{operator 4.18.28} {operator-image quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a31af646ce5587c051459a88df413dc30be81e7f15399aa909e19effa7de772a}]","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:58:01Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:58:01Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:58:01Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:58:02Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/machine-config-daemon because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:58:02Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/machine-config-daemon-events because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:58:02Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/mcd-prometheus-k8s -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:58:02Z","reason":"SecretCreated","message":"Created Secret/worker-user-data-managed -n openshift-machine-api because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:58:02Z","reason":"SecretCreated","message":"Created Secret/master-user-data-managed -n openshift-machine-api because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:58:02Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/machine-config-daemon -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:58:02Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/machine-config-daemon-events -n default because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:58:03Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/machine-config-daemon -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:58:03Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/machine-config-daemon-events -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:58:03Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/mcd-prometheus-k8s -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:58:04Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/machine-config-daemon because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:58:04Z","reason":"SuccessfulCreate","message":"Created pod: machine-config-daemon-2ztl9","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:58:04Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/machine-config-daemon -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:58:04Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-rbac-proxy -n openshift-machine-config-operator:\ncause by changes in data.config-file.yaml","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:58:04Z","reason":"ValidatingAdmissionPolicyCreated","message":"Created ValidatingAdmissionPolicy.admissionregistration.k8s.io/mcn-guards because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:58:04Z","reason":"ValidatingAdmissionPolicyBindingCreated","message":"Created ValidatingAdmissionPolicyBinding.admissionregistration.k8s.io/mcn-guards-binding because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:58:27Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a31af646ce5587c051459a88df413dc30be81e7f15399aa909e19effa7de772a\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:58:28Z","reason":"Created","message":"Created container: machine-config-daemon","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:58:28Z","reason":"Started","message":"Started container machine-config-daemon","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:58:28Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:58:28Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:58:41Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"proxy-tls\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:58:41Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"mcd-auth-proxy-config\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:58:41Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"auth-proxy-config\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:58:41Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"proxy-tls\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:58:41Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"images\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:58:41Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:59:18Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/machine-config-controller-events because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:59:18Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/machine-config-controller because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:59:18Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/mcc-prometheus-k8s -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:59:18Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/machine-config-controller-events -n default because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:59:19Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/machine-config-controller-events -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:59:19Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/mcc-prometheus-k8s -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:59:20Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/machine-config-controller -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:59:20Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/machine-os-puller-binding -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:59:20Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/machine-os-puller -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:59:20Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/machine-config-controller because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:59:21Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-rbac-proxy -n openshift-machine-config-operator:\ncause by changes in data.config-file.yaml","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:59:21Z","reason":"ValidatingAdmissionPolicyBindingCreated","message":"Created ValidatingAdmissionPolicyBinding.admissionregistration.k8s.io/custom-machine-config-pool-selector-binding because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:59:21Z","reason":"ValidatingAdmissionPolicyBindingCreated","message":"Created ValidatingAdmissionPolicyBinding.admissionregistration.k8s.io/managed-bootimages-platform-check-binding because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:59:21Z","reason":"ValidatingAdmissionPolicyCreated","message":"Created ValidatingAdmissionPolicy.admissionregistration.k8s.io/managed-bootimages-platform-check because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:59:21Z","reason":"ValidatingAdmissionPolicyBindingCreated","message":"Created ValidatingAdmissionPolicyBinding.admissionregistration.k8s.io/machine-configuration-guards-binding because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:59:21Z","reason":"ValidatingAdmissionPolicyCreated","message":"Created ValidatingAdmissionPolicy.admissionregistration.k8s.io/machine-configuration-guards because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:59:21Z","reason":"ValidatingAdmissionPolicyCreated","message":"Created ValidatingAdmissionPolicy.admissionregistration.k8s.io/custom-machine-config-pool-selector because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:59:22Z","reason":"SuccessfulCreate","message":"Created pod: machine-config-controller-74cddd4fb5-phk6r","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T13:59:22Z","reason":"ScalingReplicaSet","message":"Scaled up replica set machine-config-controller-74cddd4fb5 to 1","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:00:11Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.71/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:00:19Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a31af646ce5587c051459a88df413dc30be81e7f15399aa909e19effa7de772a\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:00:20Z","reason":"Created","message":"Created container: machine-config-controller","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:00:21Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:00:21Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:00:21Z","reason":"Started","message":"Started container machine-config-controller","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:00:21Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:00:21Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:00:33Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/machine-config-server because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:00:33Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/machine-config-server because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:00:33Z","reason":"SuccessfulCreate","message":"Created pod: machine-config-server-pvrfs","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:00:33Z","reason":"AnnotationChange","message":"Node master-0 now has machineconfiguration.openshift.io/reason=missing MachineConfig rendered-master-459a0309a4bacb184a38028403c86289\nmachineconfig.machineconfiguration.openshift.io \"rendered-master-459a0309a4bacb184a38028403c86289\" not found","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:00:33Z","reason":"AnnotationChange","message":"Node master-0 now has machineconfiguration.openshift.io/state=Done","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:00:33Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a31af646ce5587c051459a88df413dc30be81e7f15399aa909e19effa7de772a\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:00:33Z","reason":"SecretCreated","message":"Created Secret/node-bootstrapper-token -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:00:33Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/node-bootstrapper -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:00:33Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/machine-config-server -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:00:33Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system-bootstrap-node-renewal because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:00:33Z","reason":"AnnotationChange","message":"Node master-0 now has machineconfiguration.openshift.io/desiredConfig=rendered-master-459a0309a4bacb184a38028403c86289","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:00:33Z","reason":"AnnotationChange","message":"Node master-0 now has machineconfiguration.openshift.io/currentConfig=rendered-master-459a0309a4bacb184a38028403c86289","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:00:34Z","reason":"Created","message":"Created container: machine-config-server","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:00:34Z","reason":"Started","message":"Started container machine-config-server","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:00:38Z","reason":"RenderedConfigGenerated","message":"rendered-worker-337418c1f91a4453abaa311a5ee047f8 successfully generated (release version: 4.18.28, controller version: bb2aa85171d93b2df952ed802a8cb200164e666f)","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:00:38Z","reason":"RenderedConfigGenerated","message":"rendered-master-2072f444cb169be2ed482bc255f04f4f successfully generated (release version: 4.18.28, controller version: bb2aa85171d93b2df952ed802a8cb200164e666f)","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:00:39Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/machine-os-builder because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:00:39Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/machine-os-builder -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:00:39Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/machine-os-builder-events because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:00:39Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/machine-os-builder-events -n default because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:00:39Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/machine-os-builder-events -n openshift-machine-config-operator because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:00:39Z","reason":"OperatorDegraded: RequiredPoolsFailed","message":"Unable to apply 4.18.28: error during syncRequiredMachineConfigPools: context deadline exceeded","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:00:39Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/machine-os-builder-anyuid because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:00:39Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/machine-os-builder because it was missing","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:00:41Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-rbac-proxy -n openshift-machine-config-operator:\ncause by changes in data.config-file.yaml","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:00:43Z","reason":"RenderedConfigGenerated","message":"rendered-worker-ac51e1cc2e343e3be6926ba118fd6150 successfully generated (release version: 4.18.28, controller version: bb2aa85171d93b2df952ed802a8cb200164e666f)","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:00:43Z","reason":"SetDesiredConfig","message":"Targeted node master-0 to MachineConfig: rendered-master-2072f444cb169be2ed482bc255f04f4f","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:00:43Z","reason":"RenderedConfigGenerated","message":"rendered-master-459a0309a4bacb184a38028403c86289 successfully generated (release version: 4.18.28, controller version: bb2aa85171d93b2df952ed802a8cb200164e666f)","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:00:43Z","reason":"AnnotationChange","message":"Node master-0 now has machineconfiguration.openshift.io/desiredConfig=rendered-master-2072f444cb169be2ed482bc255f04f4f","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:01:52Z","reason":"ProbeError","message":"Liveness probe error: Get \"http://127.0.0.1:8798/health\": dial tcp 127.0.0.1:8798: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:01:52Z","reason":"Killing","message":"Container machine-config-daemon failed liveness probe, will be restarted","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:01:52Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"http://127.0.0.1:8798/health\": dial tcp 127.0.0.1:8798: connect: connection refused","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:02:03Z","reason":"Created","message":"Created container: machine-config-daemon","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:02:03Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a31af646ce5587c051459a88df413dc30be81e7f15399aa909e19effa7de772a\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:02:04Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:02:04Z","reason":"Started","message":"Started container machine-config-daemon","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:02:08Z","reason":"BootResync","message":"Booting node master-0, currentConfig rendered-master-459a0309a4bacb184a38028403c86289, desiredConfig rendered-master-2072f444cb169be2ed482bc255f04f4f","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:02:09Z","reason":"AnnotationChange","message":"Node master-0 now has machineconfiguration.openshift.io/state=Working","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:02:09Z","reason":"Drain","message":"Drain not required, skipping","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:02:09Z","reason":"AddSigtermProtection","message":"Adding SIGTERM protection","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:02:56Z","reason":"OSUpgradeSkipped","message":"OS upgrade skipped; new MachineConfig (rendered-master-2072f444cb169be2ed482bc255f04f4f) has same OS image (quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:411b8fa606f0f605401f0a4477f7f5a3e640d42bd145fdc09b8a78272f8e6baf) as old MachineConfig (rendered-master-459a0309a4bacb184a38028403c86289)","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:02:56Z","reason":"OSUpdateStarted","message":"Changing kernel arguments","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:07:52Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:07:53Z","reason":"Started","message":"Started container setup","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:07:53Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:07:53Z","reason":"Created","message":"Created container: kube-rbac-proxy-crio","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:07:53Z","reason":"Started","message":"Started container kube-rbac-proxy-crio","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:07:53Z","reason":"Created","message":"Created container: setup","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:08:19Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:08:20Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a31af646ce5587c051459a88df413dc30be81e7f15399aa909e19effa7de772a\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:08:21Z","reason":"Started","message":"Started container machine-config-server","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:08:21Z","reason":"Created","message":"Created container: machine-config-server","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:08:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"proxy-tls\" : object \"openshift-machine-config-operator\"/\"mcc-proxy-tls\" not registered","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:08:28Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"proxy-tls\" : object \"openshift-machine-config-operator\"/\"mco-proxy-tls\" not registered","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:08:29Z","reason":"NodeNotReady","message":"Node is not ready","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:08:29Z","reason":"NodeNotReady","message":"Node is not ready","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:08:29Z","reason":"NodeNotReady","message":"Node is not ready","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:08:36Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"images\" : object \"openshift-machine-config-operator\"/\"machine-config-operator-images\" not registered","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:08:44Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:08:44Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:08:52Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.71/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:08:53Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a31af646ce5587c051459a88df413dc30be81e7f15399aa909e19effa7de772a\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:08:53Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.57/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:08:53Z","reason":"Created","message":"Created container: machine-config-controller","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:08:53Z","reason":"Started","message":"Started container machine-config-controller","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:08:53Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:08:53Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:08:53Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:08:53Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a31af646ce5587c051459a88df413dc30be81e7f15399aa909e19effa7de772a\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:08:54Z","reason":"Created","message":"Created container: machine-config-operator","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:08:54Z","reason":"Started","message":"Started container machine-config-operator","type":"Normal"},{"namespace":"openshift-machine-config-operator","lastTimestamp":"2025-12-03T14:08:54Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d\" already present on machine","type":"Normal"}]}events/openshift-kube-controller-manager-operator.json0000640000000000000000000016522615114042274022020 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:45:16Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-controller-manager-operator-b5dddf8f5 to 1","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:45:26Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-b5dddf8f5-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:51:40Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-b5dddf8f5-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:51:44Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:51:44Z","reason":"SuccessfulCreate","message":"Created pod: kube-controller-manager-operator-b5dddf8f5-kwb74","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:54:52Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.11/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:54:53Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:58ed827ee19ac91b6f860d307797b24b8aec02e671605388c4afe4fa19ddfc36\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:08Z","reason":"Failed","message":"Failed to pull image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:58ed827ee19ac91b6f860d307797b24b8aec02e671605388c4afe4fa19ddfc36\": rpc error: code = Canceled desc = copying config: context canceled","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:08Z","reason":"Failed","message":"Error: ErrImagePull","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:24Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:58ed827ee19ac91b6f860d307797b24b8aec02e671605388c4afe4fa19ddfc36\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:25Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:58ed827ee19ac91b6f860d307797b24b8aec02e671605388c4afe4fa19ddfc36\" in 889ms (889ms including waiting). Image size: 503354646 bytes.","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:26Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:26Z","reason":"LeaderElection","message":"kube-controller-manager-operator-b5dddf8f5-kwb74_16e67fb2-5322-4e45-8dfd-f575aa47d16c became leader","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:27Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated extendedArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,StreamingCollectionEncodingToJSON=false,StreamingCollectionEncodingToProtobuf=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:27Z","reason":"CABundleUpdateRequired","message":"\"csr-controller-signer-ca\" in \"openshift-kube-controller-manager-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:27Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"extendedArguments\": map[string]any{\n+ \t\t\"cluster-cidr\": []any{string(\"10.128.0.0/16\")},\n+ \t\t\"cluster-name\": []any{string(\"sno-2tgj7\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")},\n+ \t},\n+ \t\"featureGates\": []any{\n+ \t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"),\n+ \t\tstring(\"DisableKubeletCloudCredentialProviders=true\"),\n+ \t\tstring(\"GCPLabelsTags=true\"), string(\"HardwareSpeed=true\"),\n+ \t\tstring(\"IngressControllerLBSubnetsAWS=true\"), string(\"KMSv1=true\"),\n+ \t\tstring(\"ManagedBootImages=true\"), string(\"ManagedBootImagesAWS=true\"),\n+ \t\tstring(\"MultiArchInstallAWS=true\"), ...,\n+ \t},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:27Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated featureGates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,StreamingCollectionEncodingToJSON=false,StreamingCollectionEncodingToProtobuf=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:27Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:27Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"All is well\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\",Progressing changed from Unknown to False (\"All is well\"),Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; \")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:27Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"\" \"nodes\" \"\" \"\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"} {\"\" \"nodes\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.28\"}]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:27Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:27Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-controller-manager version \"raw-internal\" changed from \"\" to \"4.18.28\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:28Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\",Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; \" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:29Z","reason":"TargetUpdateRequired","message":"\"csr-signer\" in \"openshift-kube-controller-manager-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:29Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:29Z","reason":"ConfigMissing","message":"no observedConfig","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:30Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/csr-controller-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:30Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:32Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:32Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-controller-manager because it changed","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:32Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:33Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:33Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:35Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:37Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-controller-manager-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:39Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:42Z","reason":"ObserveServiceCAConfigMap","message":"observed change in config","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:42Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-controller-manager -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:42Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n \t\"extendedArguments\": map[string]any{\"cluster-cidr\": []any{string(\"10.128.0.0/16\")}, \"cluster-name\": []any{string(\"sno-2tgj7\")}, \"feature-gates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...}, \"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")}},\n \t\"featureGates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...},\n+ \t\"serviceServingCert\": map[string]any{\n+ \t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resources/configmaps/service-ca/ca-bundle.crt\"),\n+ \t},\n \t\"servingInfo\": map[string]any{\"cipherSuites\": []any{string(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"), string(\"TLS_CHACHA20_POLY1305_SHA256\"), string(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"), ...}, \"minTLSVersion\": string(\"VersionTLS12\")},\n }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:42Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:42Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:45Z","reason":"ServiceCreated","message":"Created Service/kube-controller-manager -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:47Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/kube-controller-manager-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:48Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-controller-manager-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:48Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/pv-recycler-controller -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:48Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:50Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:54Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/client-ca -n openshift-kube-controller-manager:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:54Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:54Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:54Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:56Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": secret openshift-kube-controller-manager/localhost-recovery-client-token hasn't been populated with SA token yet: missing SA UID\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:55:59Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:56:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:56:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:56:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:56:02Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:56:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:56:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:56:04Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:56:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:56:05Z","reason":"SecretCreated","message":"Created Secret/serving-cert-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:56:06Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:56:07Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:56:07Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:56:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": secret openshift-kube-controller-manager/localhost-recovery-client-token hasn't been populated with SA token yet: missing SA UID\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": secret openshift-kube-controller-manager/localhost-recovery-client-token hasn't been populated with SA token yet: missing SA UID\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:56:07Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/config has changed,required configmap/cluster-policy-controller-config has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:56:07Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:56:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": secret openshift-kube-controller-manager/localhost-recovery-client-token hasn't been populated with SA token yet: missing SA UID\" to \"NodeControllerDegraded: All master nodes are ready\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": secret openshift-kube-controller-manager/localhost-recovery-client-token hasn't been populated with SA token yet: missing SA UID\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:56:08Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:56:09Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:56:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nGarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.11:48709-\u003e172.30.0.10:53: read: connection refused\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": secret openshift-kube-controller-manager/localhost-recovery-client-token hasn't been populated with SA token yet: missing SA UID\" to \"NodeControllerDegraded: All master nodes are ready\\nGarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.11:42336-\u003e172.30.0.10:53: read: connection refused\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": secret openshift-kube-controller-manager/localhost-recovery-client-token hasn't been populated with SA token yet: missing SA UID\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:56:11Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:56:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": secret openshift-kube-controller-manager/localhost-recovery-client-token hasn't been populated with SA token yet: missing SA UID\" to \"NodeControllerDegraded: All master nodes are ready\\nGarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.11:48709-\u003e172.30.0.10:53: read: connection refused\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": secret openshift-kube-controller-manager/localhost-recovery-client-token hasn't been populated with SA token yet: missing SA UID\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:56:11Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:56:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nGarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.11:42336-\u003e172.30.0.10:53: read: connection refused\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": secret openshift-kube-controller-manager/localhost-recovery-client-token hasn't been populated with SA token yet: missing SA UID\" to \"NodeControllerDegraded: All master nodes are ready\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": secret openshift-kube-controller-manager/localhost-recovery-client-token hasn't been populated with SA token yet: missing SA UID\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:56:12Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:56:14Z","reason":"SATokenSignerControllerStuck","message":"unexpected addresses: 192.168.32.10","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:56:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:56:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:56:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:56:17Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": secret openshift-kube-controller-manager/localhost-recovery-client-token hasn't been populated with SA token yet: missing SA UID\" to \"NodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:56:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:57:27Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:58ed827ee19ac91b6f860d307797b24b8aec02e671605388c4afe4fa19ddfc36\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:57:28Z","reason":"Started","message":"Started container kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T13:57:28Z","reason":"Created","message":"Created container: kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T14:02:45Z","reason":"LeaderElection","message":"kube-controller-manager-operator-b5dddf8f5-kwb74_5ca370b2-b833-4ac2-a2ec-714c2181193e became leader","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T14:02:45Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T14:02:49Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/config has changed,required configmap/cluster-policy-controller-config has changed,required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T14:02:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\\nNodeInstallerDegraded: installer: icy-controller-config\\\",\\nNodeInstallerDegraded: (string) (len=29) \\\"controller-manager-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=38) \\\"kube-controller-cert-syncer-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=17) \\\"serviceaccount-ca\\\",\\nNodeInstallerDegraded: (string) (len=10) \\\"service-ca\\\",\\nNodeInstallerDegraded: (string) (len=15) \\\"recycler-config\\\"\\nNodeInstallerDegraded: },\\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=12) \\\"cloud-config\\\"\\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=2 cap=2) {\\nNodeInstallerDegraded: (string) (len=39) \\\"kube-controller-manager-client-cert-key\\\",\\nNodeInstallerDegraded: (string) (len=10) \\\"csr-signer\\\"\\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) {\\nNodeInstallerDegraded: (string) (len=20) \\\"aggregator-client-ca\\\",\\nNodeInstallerDegraded: (string) (len=9) \\\"client-ca\\\"\\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=17) \\\"trusted-ca-bundle\\\"\\nNodeInstallerDegraded: CertDir: (string) (len=66) \\\"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\\\",\\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \\\"/etc/kubernetes/static-pod-resources\\\",\\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \\\"/etc/kubernetes/manifests\\\",\\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \\\"\\\",\\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\\nNodeInstallerDegraded: KubeletVersion: (string) \\\"\\\"\\nNodeInstallerDegraded: })\\nNodeInstallerDegraded: I1203 13:56:13.378273 1 cmd.go:413] Getting controller reference for node master-0\\nNodeInstallerDegraded: I1203 13:56:14.145282 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\\nNodeInstallerDegraded: I1203 13:56:14.145369 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I1203 13:56:14.145384 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I1203 13:56:14.159037 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\\nNodeInstallerDegraded: I1203 13:56:44.159165 1 cmd.go:524] Getting installer pods for node master-0\\nNodeInstallerDegraded: F1203 13:56:58.163300 1 cmd.go:109] Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\nNodeInstallerDegraded: \"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T14:02:53Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T14:02:53Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T14:02:53Z","reason":"InstallerPodFailed","message":"installer errors: installer: icy-controller-config\",\n (string) (len=29) \"controller-manager-kubeconfig\",\n (string) (len=38) \"kube-controller-cert-syncer-kubeconfig\",\n (string) (len=17) \"serviceaccount-ca\",\n (string) (len=10) \"service-ca\",\n (string) (len=15) \"recycler-config\"\n },\n OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=12) \"cloud-config\"\n },\n CertSecretNames: ([]string) (len=2 cap=2) {\n (string) (len=39) \"kube-controller-manager-client-cert-key\",\n (string) (len=10) \"csr-signer\"\n },\n OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\n CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=66) \"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI1203 13:56:13.378273 1 cmd.go:413] Getting controller reference for node master-0\nI1203 13:56:14.145282 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI1203 13:56:14.145369 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI1203 13:56:14.145384 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI1203 13:56:14.159037 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI1203 13:56:44.159165 1 cmd.go:524] Getting installer pods for node master-0\nF1203 13:56:58.163300 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T14:02:53Z","reason":"SATokenSignerControllerOK","message":"found expected kube-apiserver endpoints","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T14:02:54Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T14:02:55Z","reason":"SecretCreated","message":"Created Secret/next-service-account-private-key -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T14:02:56Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T14:02:56Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"required configmap/config has changed,required configmap/cluster-policy-controller-config has changed,required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T14:02:56Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/sa-token-signing-certs -n openshift-config-managed:\ncause by changes in data.service-account-002.pub","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T14:08:15Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T14:08:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : object \"openshift-kube-controller-manager-operator\"/\"kube-controller-manager-operator-config\" not registered","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T14:08:28Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : object \"openshift-kube-controller-manager-operator\"/\"kube-controller-manager-operator-serving-cert\" not registered","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T14:08:38Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access\" : object \"openshift-kube-controller-manager-operator\"/\"kube-root-ca.crt\" not registered","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T14:08:44Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T14:08:57Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.11/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T14:08:58Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:58ed827ee19ac91b6f860d307797b24b8aec02e671605388c4afe4fa19ddfc36\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-03T14:09:00Z","reason":"Created","message":"Created container: kube-controller-manager-operator","type":"Normal"}]}events/openshift-kube-controller-manager.json0000640000000000000000000000147615114042274020163 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2025-12-03T13:56:12Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.46/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2025-12-03T13:56:12Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:58ed827ee19ac91b6f860d307797b24b8aec02e671605388c4afe4fa19ddfc36\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2025-12-03T13:56:12Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2025-12-03T13:56:12Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-etcd.json0000640000000000000000000002361215114042274014357 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T13:55:33Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.29/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T13:55:44Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ca4933b9ba55069205ea53970128c4e8c4b46560ef721c8aaee00aaf736664b5\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T13:55:46Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T13:55:47Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T13:56:18Z","reason":"Killing","message":"Stopping container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T13:56:31Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T13:56:31Z","reason":"Created","message":"Created container: setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T13:56:32Z","reason":"Started","message":"Started container setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T13:56:45Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T13:56:46Z","reason":"Created","message":"Created container: etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T13:56:46Z","reason":"Started","message":"Started container etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T13:56:59Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T13:57:00Z","reason":"Created","message":"Created container: etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T13:57:00Z","reason":"Started","message":"Started container etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T13:57:13Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T13:57:14Z","reason":"Created","message":"Created container: etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T13:57:14Z","reason":"Started","message":"Started container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T13:57:14Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T13:57:14Z","reason":"Created","message":"Created container: etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T13:57:14Z","reason":"Started","message":"Started container etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T13:57:14Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T13:57:15Z","reason":"Created","message":"Created container: etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T13:57:15Z","reason":"Started","message":"Started container etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T13:57:15Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ca4933b9ba55069205ea53970128c4e8c4b46560ef721c8aaee00aaf736664b5\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T13:57:15Z","reason":"Created","message":"Created container: etcd-readyz","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T13:57:15Z","reason":"Started","message":"Started container etcd-readyz","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T13:57:15Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ca4933b9ba55069205ea53970128c4e8c4b46560ef721c8aaee00aaf736664b5\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T13:57:15Z","reason":"Created","message":"Created container: etcd-rev","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T13:57:15Z","reason":"Started","message":"Started container etcd-rev","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T14:07:52Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T14:07:53Z","reason":"Created","message":"Created container: setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T14:07:53Z","reason":"Started","message":"Started container setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T14:07:53Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T14:07:53Z","reason":"Created","message":"Created container: etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T14:07:53Z","reason":"Started","message":"Started container etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T14:07:54Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T14:07:54Z","reason":"Created","message":"Created container: etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T14:07:54Z","reason":"Started","message":"Started container etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T14:07:55Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T14:07:55Z","reason":"Created","message":"Created container: etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T14:07:55Z","reason":"Started","message":"Started container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T14:07:55Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T14:07:55Z","reason":"Created","message":"Created container: etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T14:07:55Z","reason":"Started","message":"Started container etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T14:07:55Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T14:07:56Z","reason":"Created","message":"Created container: etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T14:07:56Z","reason":"Started","message":"Started container etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T14:07:56Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ca4933b9ba55069205ea53970128c4e8c4b46560ef721c8aaee00aaf736664b5\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T14:07:56Z","reason":"Created","message":"Created container: etcd-readyz","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T14:07:56Z","reason":"Started","message":"Started container etcd-readyz","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T14:07:56Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ca4933b9ba55069205ea53970128c4e8c4b46560ef721c8aaee00aaf736664b5\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T14:07:56Z","reason":"Created","message":"Created container: etcd-rev","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-03T14:07:56Z","reason":"Started","message":"Started container etcd-rev","type":"Normal"}]}events/openshift-etcd-operator.json0000640000000000000000000004351215114042274016211 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:45:17Z","reason":"ScalingReplicaSet","message":"Scaled up replica set etcd-operator-7978bf889c to 1","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:45:27Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-7978bf889c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:51:40Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-7978bf889c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:51:42Z","reason":"SuccessfulCreate","message":"Created pod: etcd-operator-7978bf889c-n64v4","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:51:44Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:54:52Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.10/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:54:53Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ca4933b9ba55069205ea53970128c4e8c4b46560ef721c8aaee00aaf736664b5\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:55:01Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ca4933b9ba55069205ea53970128c4e8c4b46560ef721c8aaee00aaf736664b5\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:55:10Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ca4933b9ba55069205ea53970128c4e8c4b46560ef721c8aaee00aaf736664b5\" in 9.561s (9.561s including waiting). Image size: 512852463 bytes.","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:55:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded set to False (\"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"raw-internal\" \"4.18.28\"}]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:55:11Z","reason":"LeaderElection","message":"etcd-operator-7978bf889c-n64v4_77d83e21-5764-429c-929f-db486631a912 became leader","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:55:11Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:55:11Z","reason":"ReportEtcdMembersErrorUpdatingStatus","message":"etcds.operator.openshift.io \"cluster\" not found","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:55:11Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:55:11Z","reason":"OperatorVersionChanged","message":"clusteroperator/etcd version \"raw-internal\" changed from \"\" to \"4.18.28\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:55:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\" to \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\\nScriptControllerDegraded: \\\"configmap/etcd-pod\\\": missing env var values\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:55:12Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:55:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:55:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\\nScriptControllerDegraded: \\\"configmap/etcd-pod\\\": missing env var values\" to \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\\nScriptControllerDegraded: \\\"configmap/etcd-pod\\\": missing env var values\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:55:13Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-config-v1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:55:13Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:55:13Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:55:13Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"controlPlane\": map[string]any{\"replicas\": float64(1)},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:55:14Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:55:14Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-etcd-installer because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:55:14Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/etcd-ca-bundle -n openshift-etcd-operator:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:55:15Z","reason":"EnvVarControllerUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:55:15Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:55:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-ca-bundle -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:55:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:55:16Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: etcd-all-bundles-0,etcd-endpoints-0,etcd-pod-0, secrets: etcd-all-certs-0","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:55:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-metric-serving-ca -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:55:17Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/etcd-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:55:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-scripts -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:55:19Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd-minimal -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:55:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:55:19Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:55:19Z","reason":"ServiceUpdated","message":"Updated Service/etcd -n openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:55:19Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"etcd-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:55:20Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:55:20Z","reason":"ConfigMapCreated","message":"Created ConfigMap/restore-etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:55:20Z","reason":"ReportEtcdMembersErrorUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:55:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-endpoints-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:55:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-all-bundles-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:55:25Z","reason":"SecretCreated","message":"Created Secret/etcd-all-certs-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:57:27Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ca4933b9ba55069205ea53970128c4e8c4b46560ef721c8aaee00aaf736664b5\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:57:28Z","reason":"Created","message":"Created container: etcd-operator","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:57:28Z","reason":"Started","message":"Started container etcd-operator","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:57:39Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.10:8443/healthz\": dial tcp 10.128.0.10:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T13:57:39Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.10:8443/healthz\": dial tcp 10.128.0.10:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T14:08:15Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T14:08:22Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : object \"openshift-etcd-operator\"/\"etcd-operator-config\" not registered","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T14:08:23Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T14:08:23Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-cgq6z\" : [object \"openshift-etcd-operator\"/\"kube-root-ca.crt\" not registered, object \"openshift-etcd-operator\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T14:08:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"etcd-service-ca\" : object \"openshift-etcd-operator\"/\"etcd-service-ca-bundle\" not registered","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T14:08:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : object \"openshift-etcd-operator\"/\"etcd-operator-serving-cert\" not registered","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T14:08:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"etcd-client\" : object \"openshift-etcd-operator\"/\"etcd-client\" not registered","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T14:08:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"etcd-ca\" : object \"openshift-etcd-operator\"/\"etcd-ca-bundle\" not registered","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-03T14:08:57Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.10/23] from ovn-kubernetes","type":"Normal"}]}events/openshift-dns.json0000640000000000000000000001276015114042274014226 0ustar0000000000000000{"items":[{"namespace":"openshift-dns","lastTimestamp":"2025-12-03T13:55:57Z","reason":"SuccessfulCreate","message":"Created pod: dns-default-5m4f8","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2025-12-03T13:55:57Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"metrics-tls\" : secret \"dns-default-metrics-tls\" not found","type":"Warning"},{"namespace":"openshift-dns","lastTimestamp":"2025-12-03T13:55:58Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.39/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2025-12-03T13:55:58Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4a3e2790bda8898df5e4e9cf1878103ac483ea1633819d76ea68976b0b2062b6\"","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2025-12-03T13:55:58Z","reason":"SuccessfulCreate","message":"Created pod: node-resolver-4xlhs","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2025-12-03T13:55:58Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:51a4c20765f54b6a6b5513f97cf54bb99631c2abe860949293456886a74f87fe\" already present on machine","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2025-12-03T13:55:59Z","reason":"Started","message":"Started container dns-node-resolver","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2025-12-03T13:55:59Z","reason":"Created","message":"Created container: dns-node-resolver","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2025-12-03T13:56:04Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2025-12-03T13:56:04Z","reason":"Started","message":"Started container dns","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2025-12-03T13:56:04Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4a3e2790bda8898df5e4e9cf1878103ac483ea1633819d76ea68976b0b2062b6\" in 5.275s (5.275s including waiting). Image size: 478655954 bytes.","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2025-12-03T13:56:04Z","reason":"Created","message":"Created container: dns","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2025-12-03T13:56:04Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2025-12-03T13:56:04Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d\" already present on machine","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2025-12-03T14:08:21Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:51a4c20765f54b6a6b5513f97cf54bb99631c2abe860949293456886a74f87fe\" already present on machine","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2025-12-03T14:08:22Z","reason":"Started","message":"Started container dns-node-resolver","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2025-12-03T14:08:22Z","reason":"Created","message":"Created container: dns-node-resolver","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2025-12-03T14:08:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"metrics-tls\" : object \"openshift-dns\"/\"dns-default-metrics-tls\" not registered","type":"Warning"},{"namespace":"openshift-dns","lastTimestamp":"2025-12-03T14:08:28Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config-volume\" : object \"openshift-dns\"/\"dns-default\" not registered","type":"Warning"},{"namespace":"openshift-dns","lastTimestamp":"2025-12-03T14:08:29Z","reason":"NodeNotReady","message":"Node is not ready","type":"Warning"},{"namespace":"openshift-dns","lastTimestamp":"2025-12-03T14:08:44Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-dns","lastTimestamp":"2025-12-03T14:08:53Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4a3e2790bda8898df5e4e9cf1878103ac483ea1633819d76ea68976b0b2062b6\" already present on machine","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2025-12-03T14:08:53Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d\" already present on machine","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2025-12-03T14:08:53Z","reason":"Started","message":"Started container dns","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2025-12-03T14:08:53Z","reason":"Created","message":"Created container: dns","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2025-12-03T14:08:53Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.39/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2025-12-03T14:08:54Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-dns","lastTimestamp":"2025-12-03T14:08:54Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"}]}events/openshift-dns-operator.json0000640000000000000000000002576715114042274016072 0ustar0000000000000000{"items":[{"namespace":"openshift-dns-operator","lastTimestamp":"2025-12-03T13:45:17Z","reason":"ScalingReplicaSet","message":"Scaled up replica set dns-operator-6b7bcd6566 to 1","type":"Normal"},{"namespace":"openshift-dns-operator","lastTimestamp":"2025-12-03T13:45:27Z","reason":"FailedCreate","message":"Error creating: pods \"dns-operator-6b7bcd6566-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-dns-operator","lastTimestamp":"2025-12-03T13:51:39Z","reason":"FailedCreate","message":"Error creating: pods \"dns-operator-6b7bcd6566-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-dns-operator","lastTimestamp":"2025-12-03T13:51:42Z","reason":"SuccessfulCreate","message":"Created pod: dns-operator-6b7bcd6566-jh9m8","type":"Normal"},{"namespace":"openshift-dns-operator","lastTimestamp":"2025-12-03T13:51:43Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-dns-operator","lastTimestamp":"2025-12-03T13:54:55Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"metrics-tls\" : secret \"metrics-tls\" not found","type":"Warning"},{"namespace":"openshift-dns-operator","lastTimestamp":"2025-12-03T13:55:15Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"metrics-tls\" : secret \"metrics-tls\" not found","type":"Warning"},{"namespace":"openshift-dns-operator","lastTimestamp":"2025-12-03T13:55:33Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.20/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-dns-operator","lastTimestamp":"2025-12-03T13:55:43Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:656fe650bac2929182cd0cf7d7e566d089f69e06541b8329c6d40b89346c03ca\"","type":"Normal"},{"namespace":"openshift-dns-operator","lastTimestamp":"2025-12-03T13:55:56Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d\" already present on machine","type":"Normal"},{"namespace":"openshift-dns-operator","lastTimestamp":"2025-12-03T13:55:56Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-dns-operator","lastTimestamp":"2025-12-03T13:55:56Z","reason":"Started","message":"Started container dns-operator","type":"Normal"},{"namespace":"openshift-dns-operator","lastTimestamp":"2025-12-03T13:55:56Z","reason":"Created","message":"Created container: dns-operator","type":"Normal"},{"namespace":"openshift-dns-operator","lastTimestamp":"2025-12-03T13:55:56Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:656fe650bac2929182cd0cf7d7e566d089f69e06541b8329c6d40b89346c03ca\" in 12.382s (12.382s including waiting). Image size: 462741734 bytes.","type":"Normal"},{"namespace":"openshift-dns-operator","lastTimestamp":"2025-12-03T13:55:57Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-dns-operator","lastTimestamp":"2025-12-03T13:55:57Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-dns-operator","lastTimestamp":"2025-12-03T14:08:15Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-dns-operator","lastTimestamp":"2025-12-03T14:08:28Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"metrics-tls\" : object \"openshift-dns-operator\"/\"metrics-tls\" not registered","type":"Warning"},{"namespace":"openshift-dns-operator","lastTimestamp":"2025-12-03T14:08:38Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-djxkd\" : [object \"openshift-dns-operator\"/\"kube-root-ca.crt\" not registered, object \"openshift-dns-operator\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-dns-operator","lastTimestamp":"2025-12-03T14:08:44Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-dns-operator","lastTimestamp":"2025-12-03T14:08:57Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.20/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-dns-operator","lastTimestamp":"2025-12-03T14:08:58Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:656fe650bac2929182cd0cf7d7e566d089f69e06541b8329c6d40b89346c03ca\" already present on machine","type":"Normal"},{"namespace":"openshift-dns-operator","lastTimestamp":"2025-12-03T14:09:00Z","reason":"Created","message":"Created container: dns-operator","type":"Normal"},{"namespace":"openshift-dns-operator","lastTimestamp":"2025-12-03T14:09:01Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d\" already present on machine","type":"Normal"},{"namespace":"openshift-dns-operator","lastTimestamp":"2025-12-03T14:09:01Z","reason":"Started","message":"Started container dns-operator","type":"Normal"},{"namespace":"openshift-dns-operator","lastTimestamp":"2025-12-03T14:09:01Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-dns-operator","lastTimestamp":"2025-12-03T14:09:02Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-dns-operator","lastTimestamp":"2025-12-03T14:09:03Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"}]}events/openshift-console.json0000640000000000000000000003142015114042274015076 0ustar0000000000000000{"items":[{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:00:40Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.80/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:00:40Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:00:40Z","reason":"ScalingReplicaSet","message":"Scaled up replica set downloads-6f5db8559b to 1","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:00:40Z","reason":"SuccessfulCreate","message":"Created pod: downloads-6f5db8559b-96ljh","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:00:40Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:00:40Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3d886210d2faa9ace5750adfc70c0c3c5512cdf492f19d1c536a446db659aabb\"","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:00:46Z","reason":"SuccessfulCreate","message":"Created pod: console-c5d7cd7f9-2hp75","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:00:46Z","reason":"ScalingReplicaSet","message":"Scaled up replica set console-c5d7cd7f9 to 1","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:00:46Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.86/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:00:47Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:da806db797ef2b291ff0ce5f302e88a0cb74e57f253b8fe76296f969512cd79e\"","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:00:55Z","reason":"ScalingReplicaSet","message":"Scaled up replica set console-648d88c756 to 1","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:00:55Z","reason":"SuccessfulCreate","message":"Created pod: console-648d88c756-vswh8","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:01:05Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:da806db797ef2b291ff0ce5f302e88a0cb74e57f253b8fe76296f969512cd79e\" in 17.838s (17.838s including waiting). Image size: 628318378 bytes.","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:01:17Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.91/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:01:17Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3d886210d2faa9ace5750adfc70c0c3c5512cdf492f19d1c536a446db659aabb\" in 36.701s (36.701s including waiting). Image size: 2890256335 bytes.","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:01:18Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:da806db797ef2b291ff0ce5f302e88a0cb74e57f253b8fe76296f969512cd79e\" already present on machine","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:01:18Z","reason":"Started","message":"Started container download-server","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:01:18Z","reason":"Created","message":"Created container: console","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:01:18Z","reason":"Started","message":"Started container console","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:01:18Z","reason":"Created","message":"Created container: console","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:01:18Z","reason":"Started","message":"Started container console","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:01:18Z","reason":"Created","message":"Created container: download-server","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:01:20Z","reason":"ProbeError","message":"Liveness probe error: Get \"http://10.128.0.80:8080/\": dial tcp 10.128.0.80:8080: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:01:20Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"http://10.128.0.80:8080/\": dial tcp 10.128.0.80:8080: connect: connection refused","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:01:20Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"http://10.128.0.80:8080/\": dial tcp 10.128.0.80:8080: connect: connection refused","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:01:20Z","reason":"ProbeError","message":"Readiness probe error: Get \"http://10.128.0.80:8080/\": dial tcp 10.128.0.80:8080: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:02:46Z","reason":"Unhealthy","message":"Startup probe failed: Get \"https://10.128.0.86:8443/health\": dial tcp 10.128.0.86:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:02:46Z","reason":"ProbeError","message":"Startup probe error: Get \"https://10.128.0.86:8443/health\": dial tcp 10.128.0.86:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:02:55Z","reason":"Unhealthy","message":"Startup probe failed: Get \"https://10.128.0.91:8443/health\": dial tcp 10.128.0.91:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:02:55Z","reason":"ProbeError","message":"Startup probe error: Get \"https://10.128.0.91:8443/health\": dial tcp 10.128.0.91:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:08:22Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"console-serving-cert\" : object \"openshift-console\"/\"console-serving-cert\" not registered","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:08:22Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"trusted-ca-bundle\" : object \"openshift-console\"/\"trusted-ca-bundle\" not registered","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:08:22Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"oauth-serving-cert\" : object \"openshift-console\"/\"oauth-serving-cert\" not registered","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:08:22Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"service-ca\" : object \"openshift-console\"/\"service-ca\" not registered","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:08:22Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"console-oauth-config\" : object \"openshift-console\"/\"console-oauth-config\" not registered","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:08:22Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"console-serving-cert\" : object \"openshift-console\"/\"console-serving-cert\" not registered","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:08:23Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:08:23Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:08:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-nddv9\" : [object \"openshift-console\"/\"kube-root-ca.crt\" not registered, object \"openshift-console\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:08:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"oauth-serving-cert\" : object \"openshift-console\"/\"oauth-serving-cert\" not registered","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:08:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-gfzrw\" : [object \"openshift-console\"/\"kube-root-ca.crt\" not registered, object \"openshift-console\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:08:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"service-ca\" : object \"openshift-console\"/\"service-ca\" not registered","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:08:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"console-config\" : object \"openshift-console\"/\"console-config\" not registered","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:08:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"console-oauth-config\" : object \"openshift-console\"/\"console-oauth-config\" not registered","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:08:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"console-config\" : object \"openshift-console\"/\"console-config\" not registered","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:08:37Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-c5nch\" : [object \"openshift-console\"/\"kube-root-ca.crt\" not registered, object \"openshift-console\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:08:44Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:08:57Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.80/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:08:57Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.86/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:08:57Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.91/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:08:58Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3d886210d2faa9ace5750adfc70c0c3c5512cdf492f19d1c536a446db659aabb\" already present on machine","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:09:00Z","reason":"Created","message":"Created container: download-server","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:09:01Z","reason":"Started","message":"Started container download-server","type":"Normal"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:09:03Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"http://10.128.0.80:8080/\": dial tcp 10.128.0.80:8080: connect: connection refused","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:09:03Z","reason":"ProbeError","message":"Liveness probe error: Get \"http://10.128.0.80:8080/\": dial tcp 10.128.0.80:8080: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:09:03Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"http://10.128.0.80:8080/\": dial tcp 10.128.0.80:8080: connect: connection refused","type":"Warning"},{"namespace":"openshift-console","lastTimestamp":"2025-12-03T14:09:03Z","reason":"ProbeError","message":"Readiness probe error: Get \"http://10.128.0.80:8080/\": dial tcp 10.128.0.80:8080: connect: connection refused\nbody: \n","type":"Warning"}]}events/openshift-console-operator.json0000640000000000000000000003567015114042274016742 0ustar0000000000000000{"items":[{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:00:30Z","reason":"SuccessfulCreate","message":"Created pod: console-operator-77df56447c-vsrxx","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:00:30Z","reason":"ScalingReplicaSet","message":"Scaled up replica set console-operator-77df56447c to 1","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:00:31Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:89b279931fe13f3b33c9dd6cdf0f5e7fc3e5384b944f998034d35af7242a47fa\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:00:31Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.75/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:00:39Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:89b279931fe13f3b33c9dd6cdf0f5e7fc3e5384b944f998034d35af7242a47fa\" in 7.694s (7.694s including waiting). Image size: 506716062 bytes.","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:00:39Z","reason":"Created","message":"Created container: console-operator","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:00:39Z","reason":"Started","message":"Started container console-operator","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:00:39Z","reason":"ProbeError","message":"Readiness probe error: Get \"https://10.128.0.75:8443/readyz\": dial tcp 10.128.0.75:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:00:39Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"https://10.128.0.75:8443/readyz\": dial tcp 10.128.0.75:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:00:39Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:00:39Z","reason":"LeaderElection","message":"console-operator-77df56447c-vsrxx_f50a719a-3cde-4ccc-9eaa-193863189ca8 became leader","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:00:40Z","reason":"OperatorVersionChanged","message":"clusteroperator/console version \"operator\" changed from \"\" to \"4.18.28\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:00:40Z","reason":"FastControllerResync","message":"Controller \"HealthCheckController\" resync interval is set to 30s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:00:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded set to False (\"All is well\"),Progressing set to False (\"All is well\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [] to [{\"operator.openshift.io\" \"consoles\" \"\" \"cluster\"} {\"config.openshift.io\" \"consoles\" \"\" \"cluster\"} {\"config.openshift.io\" \"infrastructures\" \"\" \"cluster\"} {\"config.openshift.io\" \"proxies\" \"\" \"cluster\"} {\"config.openshift.io\" \"oauths\" \"\" \"cluster\"} {\"oauth.openshift.io\" \"oauthclients\" \"\" \"console\"} {\"\" \"namespaces\" \"\" \"openshift-console-operator\"} {\"\" \"namespaces\" \"\" \"openshift-console\"} {\"\" \"configmaps\" \"openshift-config-managed\" \"console-public\"}],status.versions changed from [] to [{\"operator\" \"4.18.28\"}]","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:00:40Z","reason":"PodDisruptionBudgetCreated","message":"Created PodDisruptionBudget.policy/console -n openshift-console because it was missing","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:00:40Z","reason":"PodDisruptionBudgetCreated","message":"Created PodDisruptionBudget.policy/downloads -n openshift-console because it was missing","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:00:40Z","reason":"DeploymentCreated","message":"Created Deployment.apps/downloads -n openshift-console because it was missing","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:00:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/oauth-serving-cert -n openshift-console because it was missing","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:00:41Z","reason":"ServiceCreated","message":"Created Service/console -n openshift-console because it was missing","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:00:41Z","reason":"ServiceCreated","message":"Created Service/downloads -n openshift-console because it was missing","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:00:41Z","reason":"SecretCreated","message":"Created Secret/console-oauth-config -n openshift-console because it was missing","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:00:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"All is well\" to \"OAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:00:41Z","reason":"ConfigMapCreated","message":"Created ConfigMap/default-ingress-cert -n openshift-console because it was missing","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:00:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/console-config -n openshift-console because it was missing","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:00:46Z","reason":"DeploymentCreated","message":"Created Deployment.apps/console -n openshift-console because it was missing","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:00:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/console-public -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:00:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: status.relatedObjects changed from [{\"operator.openshift.io\" \"consoles\" \"\" \"cluster\"} {\"config.openshift.io\" \"consoles\" \"\" \"cluster\"} {\"config.openshift.io\" \"infrastructures\" \"\" \"cluster\"} {\"config.openshift.io\" \"proxies\" \"\" \"cluster\"} {\"config.openshift.io\" \"oauths\" \"\" \"cluster\"} {\"oauth.openshift.io\" \"oauthclients\" \"\" \"console\"} {\"\" \"namespaces\" \"\" \"openshift-console-operator\"} {\"\" \"namespaces\" \"\" \"openshift-console\"} {\"\" \"configmaps\" \"openshift-config-managed\" \"console-public\"}] to [{\"console.openshift.io\" \"consoleplugins\" \"\" \"monitoring-plugin\"} {\"operator.openshift.io\" \"consoles\" \"\" \"cluster\"} {\"config.openshift.io\" \"consoles\" \"\" \"cluster\"} {\"config.openshift.io\" \"infrastructures\" \"\" \"cluster\"} {\"config.openshift.io\" \"proxies\" \"\" \"cluster\"} {\"config.openshift.io\" \"oauths\" \"\" \"cluster\"} {\"oauth.openshift.io\" \"oauthclients\" \"\" \"console\"} {\"\" \"namespaces\" \"\" \"openshift-console-operator\"} {\"\" \"namespaces\" \"\" \"openshift-console\"} {\"\" \"configmaps\" \"openshift-config-managed\" \"console-public\"}]","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:00:49Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/downloads -n openshift-console because it changed","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:00:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"OAuthClientsControllerDegraded: route.route.openshift.io \\\"console\\\" not found\" to \"OAuthClientsControllerDegraded: Operation cannot be fulfilled on consoles.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:00:54Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/console-config -n openshift-console:\ncause by changes in data.console-config.yaml","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:01:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"OAuthClientsControllerDegraded: Operation cannot be fulfilled on consoles.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\" to \"All is well\",Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:01:07Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/console -n openshift-console because it changed","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:01:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Progressing changed from False to True (\"SyncLoopRefreshProgressing: changes made during sync updates, additional sync expected\"),Available changed from Unknown to False (\"DeploymentAvailable: 0 replicas available for console deployment\")","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:01:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Progressing message changed from \"SyncLoopRefreshProgressing: changes made during sync updates, additional sync expected\" to \"SyncLoopRefreshProgressing: working toward version 4.18.28, 0 replicas available\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:01:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/console changed: Degraded message changed from \"All is well\" to \"RouteHealthDegraded: route not yet available, https://console-openshift-console.apps.sno.openstack.lab returns '503 Service Unavailable'\",Available message changed from \"DeploymentAvailable: 0 replicas available for console deployment\" to \"DeploymentAvailable: 0 replicas available for console deployment\\nRouteHealthAvailable: route not yet available, https://console-openshift-console.apps.sno.openstack.lab returns '503 Service Unavailable'\"","type":"Normal"},{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:08:28Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : object \"openshift-console-operator\"/\"serving-cert\" not registered","type":"Warning"},{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:08:28Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"trusted-ca\" : object \"openshift-console-operator\"/\"trusted-ca\" not registered","type":"Warning"},{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:08:28Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : object \"openshift-console-operator\"/\"console-operator-config\" not registered","type":"Warning"},{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:08:30Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-p5mrw\" : [object \"openshift-console-operator\"/\"kube-root-ca.crt\" not registered, object \"openshift-console-operator\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:08:38Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-console-operator","lastTimestamp":"2025-12-03T14:08:57Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.75/23] from ovn-kubernetes","type":"Normal"}]}events/openshift-oauth-apiserver.json0000640000000000000000000001613015114042274016553 0ustar0000000000000000{"items":[{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-03T13:56:06Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-57fd58bc7b-kktql","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-03T13:56:06Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-57fd58bc7b to 1","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-03T13:56:11Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:49a6a3308d885301c7718a465f1af2d08a617abbdff23352d5422d1ae4af33cf\"","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-03T13:56:11Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.43/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-03T13:56:17Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:49a6a3308d885301c7718a465f1af2d08a617abbdff23352d5422d1ae4af33cf\" in 6.595s (6.595s including waiting). Image size: 499812475 bytes.","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-03T13:56:18Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-03T13:56:18Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-03T13:56:18Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:49a6a3308d885301c7718a465f1af2d08a617abbdff23352d5422d1ae4af33cf\" already present on machine","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-03T13:56:20Z","reason":"Created","message":"Created container: oauth-apiserver","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-03T13:56:21Z","reason":"Started","message":"Started container oauth-apiserver","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-03T13:56:42Z","reason":"ProbeError","message":"Startup probe error: Get \"https://10.128.0.43:8443/livez\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\nbody: \n","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-03T13:56:42Z","reason":"Unhealthy","message":"Startup probe failed: Get \"https://10.128.0.43:8443/livez\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-03T13:57:02Z","reason":"ProbeError","message":"Startup probe error: Get \"https://10.128.0.43:8443/livez\": context deadline exceeded\nbody: \n","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-03T13:57:02Z","reason":"Unhealthy","message":"Startup probe failed: Get \"https://10.128.0.43:8443/livez\": context deadline exceeded","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-03T13:57:12Z","reason":"Unhealthy","message":"Startup probe failed: Get \"https://10.128.0.43:8443/livez\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-03T13:57:12Z","reason":"ProbeError","message":"Startup probe error: Get \"https://10.128.0.43:8443/livez\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)\nbody: \n","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-03T13:57:21Z","reason":"ProbeError","message":"Startup probe error: Get \"https://10.128.0.43:8443/livez\": read tcp 10.128.0.2:51468-\u003e10.128.0.43:8443: read: connection reset by peer\nbody: \n","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-03T13:57:21Z","reason":"Unhealthy","message":"Startup probe failed: Get \"https://10.128.0.43:8443/livez\": read tcp 10.128.0.2:51468-\u003e10.128.0.43:8443: read: connection reset by peer","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-03T13:57:27Z","reason":"Unhealthy","message":"Startup probe failed: Get \"https://10.128.0.43:8443/livez\": dial tcp 10.128.0.43:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-03T13:57:27Z","reason":"ProbeError","message":"Startup probe error: Get \"https://10.128.0.43:8443/livez\": dial tcp 10.128.0.43:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-03T14:08:22Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"etcd-serving-ca\" : object \"openshift-oauth-apiserver\"/\"etcd-serving-ca\" not registered","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-03T14:08:22Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"audit-policies\" : object \"openshift-oauth-apiserver\"/\"audit-1\" not registered","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-03T14:08:22Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"encryption-config\" : object \"openshift-oauth-apiserver\"/\"encryption-config-1\" not registered","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-03T14:08:22Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"etcd-client\" : object \"openshift-oauth-apiserver\"/\"etcd-client\" not registered","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-03T14:08:22Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : object \"openshift-oauth-apiserver\"/\"serving-cert\" not registered","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-03T14:08:23Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-03T14:08:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"trusted-ca-bundle\" : object \"openshift-oauth-apiserver\"/\"trusted-ca-bundle\" not registered","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-03T14:08:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-m789m\" : [object \"openshift-oauth-apiserver\"/\"kube-root-ca.crt\" not registered, object \"openshift-oauth-apiserver\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-03T14:08:57Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.43/23] from ovn-kubernetes","type":"Normal"}]}events/openshift-ingress.json0000640000000000000000000000332415114042274015110 0ustar0000000000000000{"items":[{"namespace":"openshift-ingress","lastTimestamp":"2025-12-03T13:55:58Z","reason":"SuccessfulCreate","message":"Created pod: router-default-54f97f57-rr9px","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2025-12-03T13:55:58Z","reason":"ScalingReplicaSet","message":"Scaled up replica set router-default-54f97f57 to 1","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2025-12-03T14:00:23Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3ed4dc45b0e0d6229620e2ac6a53ecd180cad44a11daf9f0170d94b4acd35ded\"","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2025-12-03T14:00:30Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3ed4dc45b0e0d6229620e2ac6a53ecd180cad44a11daf9f0170d94b4acd35ded\" in 6.87s (6.87s including waiting). Image size: 481523147 bytes.","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2025-12-03T14:00:30Z","reason":"Created","message":"Created container: router","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2025-12-03T14:00:30Z","reason":"Started","message":"Started container router","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2025-12-03T14:08:41Z","reason":"ProbeError","message":"Startup probe error: HTTP probe failed with statuscode: 500\nbody: [-]backend-http failed: reason withheld\n[-]has-synced failed: reason withheld\n[+]process-running ok\nhealthz check failed\n\n","type":"Warning"},{"namespace":"openshift-ingress","lastTimestamp":"2025-12-03T14:08:41Z","reason":"Unhealthy","message":"Startup probe failed: HTTP probe failed with statuscode: 500","type":"Warning"}]}events/openshift-authentication-operator.json0000640000000000000000000044154315114042274020317 0ustar0000000000000000{"items":[{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:45:17Z","reason":"ScalingReplicaSet","message":"Scaled up replica set authentication-operator-7479ffdf48 to 1","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:45:28Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-7479ffdf48-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:51:39Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-7479ffdf48-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:51:42Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:51:42Z","reason":"SuccessfulCreate","message":"Created pod: authentication-operator-7479ffdf48-hpdzl","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:54:52Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.7/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:54:53Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a2ef63f356c11ba629d8038474ab287797340de1219b4fee97c386975689110\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:08Z","reason":"Failed","message":"Failed to pull image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a2ef63f356c11ba629d8038474ab287797340de1219b4fee97c386975689110\": rpc error: code = Canceled desc = copying config: context canceled","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:08Z","reason":"Failed","message":"Error: ErrImagePull","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:22Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a2ef63f356c11ba629d8038474ab287797340de1219b4fee97c386975689110\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:24Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a2ef63f356c11ba629d8038474ab287797340de1219b4fee97c386975689110\" in 2.218s (2.218s including waiting). Image size: 507701628 bytes.","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:26Z","reason":"LeaderElection","message":"authentication-operator-7479ffdf48-hpdzl_f4c44c78-9701-431c-a669-2599e86f7f25 became leader","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:33Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a2ef63f356c11ba629d8038474ab287797340de1219b4fee97c386975689110\" already present on machine","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:37Z","reason":"Created","message":"Created container: authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:38Z","reason":"Started","message":"Started container authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:43Z","reason":"LeaderElection","message":"authentication-operator-7479ffdf48-hpdzl_967e7f89-9b7a-4b84-bc62-c6e1399986a0 became leader","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:45Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:46Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:46Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:46Z","reason":"ObserveAPIAudiences","message":"service account issuer changed from to https://kubernetes.default.svc","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:46Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:46Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:46Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthAPIServer\") of observed config: \"\\u00a0\\u00a0map[string]any(\\n-\\u00a0\\tnil,\\n+\\u00a0\\t{\\n+\\u00a0\\t\\t\\\"apiServerArguments\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"api-audiences\\\": []any{string(\\\"https://kubernetes.default.svc\\\")},\\n+\\u00a0\\t\\t\\t\\\"cors-allowed-origins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+\\u00a0\\t\\t\\t\\\"etcd-servers\\\": []any{string(\\\"https://192.168.32.10:2379\\\")},\\n+\\u00a0\\t\\t\\t\\\"tls-cipher-suites\\\": []any{\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t\\t\\\"tls-min-version\\\": string(\\\"VersionTLS12\\\"),\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t},\\n\\u00a0\\u00a0)\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:49Z","reason":"CSRCreated","message":"A csr \"system:openshift:openshift-authenticator-nnrcc\" is created for OpenShiftAuthenticatorCertRequester","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:49Z","reason":"NoValidCertificateFound","message":"No valid client certificate for OpenShiftAuthenticatorCertRequester is found: unable to parse certificate: data does not contain any valid RSA or ECDSA certificates","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:49Z","reason":"CSRApproval","message":"The CSR \"system:openshift:openshift-authenticator-nnrcc\" has been approved","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:49Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/audit -n openshift-authentication: namespaces \"openshift-authentication\" not found","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:49Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/etcd-serving-ca -n openshift-oauth-apiserver: namespaces \"openshift-oauth-apiserver\" not found","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:50Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:50Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:51Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:51Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:54Z","reason":"ClientCertificateCreated","message":"A new client certificate for OpenShiftAuthenticatorCertRequester is available","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:54Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nResourceSyncControllerDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:54Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"All is well\" to \"AuthenticatorCertKeyProgressing: All is well\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:55Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:56Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:56Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:56Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nResourceSyncControllerDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:55:59Z","reason":"ConfigMapCreated","message":"Created ConfigMap/v4-0-config-system-trusted-ca-bundle -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:56:00Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:56:00Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:56:00Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:56:00Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-apiserver-sa -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:56:00Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:56:00Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:56:00Z","reason":"SecretCreated","message":"Created Secret/webhook-authentication-integrated-oauth -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:56:01Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-ocp-branding-template -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:56:05Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:56:06Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:56:06Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-router-certs -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:56:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\",Progressing changed from False to True (\"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\"),Available message changed from \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:56:06Z","reason":"ObserveRouterSecret","message":"namedCertificates changed to []interface {}{map[string]interface {}{\"certFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"keyFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"names\":[]interface {}{\"*.apps.sno.openstack.lab\"}}}","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:56:06Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \"\\u00a0\\u00a0map[string]any{\\n\\u00a0\\u00a0\\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n\\u00a0\\u00a0\\t\\\"oauthConfig\\\": map[string]any{\\\"assetPublicURL\\\": string(\\\"\\\"), \\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"), \\\"templates\\\": map[string]any{\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...)}, \\\"tokenConfig\\\": map[string]any{\\\"accessTokenMaxAgeSeconds\\\": float64(86400), \\\"authorizeTokenMaxAgeSeconds\\\": float64(300)}},\\n\\u00a0\\u00a0\\t\\\"serverArguments\\\": map[string]any{\\\"audit-log-format\\\": []any{string(\\\"json\\\")}, \\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")}, \\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")}, \\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")}, ...},\\n\\u00a0\\u00a0\\t\\\"servingInfo\\\": map[string]any{\\n\\u00a0\\u00a0\\t\\t\\\"cipherSuites\\\": []any{string(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"), string(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"), string(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\\\"), ...},\\n\\u00a0\\u00a0\\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+\\u00a0\\t\\t\\\"namedCertificates\\\": []any{\\n+\\u00a0\\t\\t\\tmap[string]any{\\n+\\u00a0\\t\\t\\t\\t\\\"certFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"keyFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"names\\\": []any{string(\\\"*.apps.sno.openstack.lab\\\")},\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t},\\n\\u00a0\\u00a0\\t},\\n\\u00a0\\u00a0\\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n\\u00a0\\u00a0}\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:56:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:56:09Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:56:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:56:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:56:09Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:56:09Z","reason":"ServiceCreated","message":"Created Service/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:56:10Z","reason":"ConfigMapCreated","message":"Created ConfigMap/oauth-serving-cert -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:56:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:56:12Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:56:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:56:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:56:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:56:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:56:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:56:16Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:57:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nAuditPolicyDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps audit)\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nAPIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps trusted-ca-bundle)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nAuditPolicyDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps audit)\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \",Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\" to \"APIServerDeploymentProgressing: deployment/openshift-oauth-apiserver: could not be retrieved\",Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:57:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nAuditPolicyDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps audit)\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:57:28Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nAPIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps trusted-ca-bundle)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \",Progressing message changed from \"APIServerDeploymentProgressing: deployment/openshift-oauth-apiserver: could not be retrieved\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\",Available message changed from \"APIServerDeploymentAvailable: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:57:28Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nAPIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps trusted-ca-bundle)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nAuditPolicyDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps audit)\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nAPIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps trusted-ca-bundle)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:57:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/oauth-service.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get services oauth-openshift)\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:57:30Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-oauth-apiserver because it changed","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:57:32Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/oauth-service.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get services oauth-openshift)\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:57:34Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nAPIServerStaticResourcesDegraded: \\\"oauth-apiserver/sa.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts oauth-apiserver-sa)\\nAPIServerStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:57:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nAPIServerStaticResourcesDegraded: \\\"oauth-apiserver/sa.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts oauth-apiserver-sa)\\nAPIServerStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:57:48Z","reason":"OpenShiftAPICheckFailed","message":"\"user.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:57:48Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.user.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:57:48Z","reason":"OpenShiftAPICheckFailed","message":"\"oauth.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:57:48Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.oauth.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:57:49Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:57:49Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:57:58Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"oauth-apiserver\" changed from \"\" to \"4.18.28\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:57:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded changed from False to True (\"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\"),status.versions changed from [{\"operator\" \"4.18.28\"}] to [{\"operator\" \"4.18.28\"} {\"oauth-apiserver\" \"4.18.28\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:57:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing changed from True to False (\"AuthenticatorCertKeyProgressing: All is well\"),Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:59:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\" to \"APIServerStaticResourcesDegraded: \\\"oauth-apiserver/ns.yaml\\\" (string): Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-oauth-apiserver\\\": dial tcp 172.30.0.1:443: connect: connection refused\\nAPIServerStaticResourcesDegraded: \\\"oauth-apiserver/apiserver-clusterrolebinding.yaml\\\" (string): Get \\\"https://172.30.0.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:oauth-apiserver\\\": dial tcp 172.30.0.1:443: connect: connection refused\\nAPIServerStaticResourcesDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\",Available message changed from \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.43:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.43:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"OAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:59:13Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerStaticResourcesDegraded: \\\"oauth-apiserver/ns.yaml\\\" (string): Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-oauth-apiserver\\\": dial tcp 172.30.0.1:443: connect: connection refused\\nAPIServerStaticResourcesDegraded: \\\"oauth-apiserver/apiserver-clusterrolebinding.yaml\\\" (string): Get \\\"https://172.30.0.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:oauth-apiserver\\\": dial tcp 172.30.0.1:443: connect: connection refused\\nAPIServerStaticResourcesDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:59:20Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"OAuthServerRouteEndpointAccessibleControllerAvailable: failed to retrieve route from cache: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:59:20Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:59:20Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerDeploymentDegraded: waiting for the oauth-openshift route to appear: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerDeploymentDegraded: \\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerWorkloadDegraded: waiting for the oauth-openshift route to appear: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerWorkloadDegraded: \",Progressing changed from False to True (\"\"),Available message changed from \"OAuthServerRouteEndpointAccessibleControllerAvailable: failed to retrieve route from cache: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"OAuthServerRouteEndpointAccessibleControllerAvailable: failed to retrieve route from cache: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\\nWellKnownAvailable: route.route.openshift.io \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:59:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthClientsControllerDegraded: no ingress for host oauth-openshift.apps.sno.openstack.lab in route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: waiting for the oauth-openshift route to appear: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerDeploymentDegraded: \\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerWorkloadDegraded: waiting for the oauth-openshift route to appear: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerWorkloadDegraded: \\nWellKnownReadyControllerDegraded: route.route.openshift.io \\\"oauth-openshift\\\" not found\" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthClientsControllerDegraded: no ingress for host oauth-openshift.apps.sno.openstack.lab in route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: waiting for the oauth-openshift route to appear: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerDeploymentDegraded: \\nOAuthServerRouteEndpointAccessibleControllerDegraded: route \\\"openshift-authentication/oauth-openshift\\\": status does not have a valid host address\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerWorkloadDegraded: waiting for the oauth-openshift route to appear: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerWorkloadDegraded: \\nWellKnownReadyControllerDegraded: route.route.openshift.io \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:59:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthClientsControllerDegraded: no ingress for host oauth-openshift.apps.sno.openstack.lab in route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: \\nOAuthServerRouteEndpointAccessibleControllerDegraded: route \\\"openshift-authentication/oauth-openshift\\\": status does not have a valid host address\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerWorkloadDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerWorkloadDegraded: \\nWellKnownReadyControllerDegraded: route.route.openshift.io \\\"oauth-openshift\\\" not found\" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthClientsControllerDegraded: no ingress for host oauth-openshift.apps.sno.openstack.lab in route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: \\nOAuthServerRouteEndpointAccessibleControllerDegraded: route \\\"openshift-authentication/oauth-openshift\\\": status does not have a valid host address\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerWorkloadDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerWorkloadDegraded: \\nWellKnownReadyControllerDegraded: failed to get oauth metadata from openshift-config-managed/oauth-openshift ConfigMap: configmap \\\"oauth-openshift\\\" not found (check authentication operator, it is supposed to create this)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:59:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerRouteEndpointAccessibleControllerAvailable: failed to retrieve route from cache: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\\nWellKnownAvailable: route.route.openshift.io \\\"oauth-openshift\\\" not found\" to \"OAuthServerRouteEndpointAccessibleControllerAvailable: failed to retrieve route from cache: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get oauth metadata from openshift-config-managed/oauth-openshift ConfigMap: configmap \\\"oauth-openshift\\\" not found (check authentication operator, it is supposed to create this)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:59:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthClientsControllerDegraded: no ingress for host oauth-openshift.apps.sno.openstack.lab in route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: waiting for the oauth-openshift route to appear: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerDeploymentDegraded: \\nOAuthServerRouteEndpointAccessibleControllerDegraded: route \\\"openshift-authentication/oauth-openshift\\\": status does not have a valid host address\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerWorkloadDegraded: waiting for the oauth-openshift route to appear: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerWorkloadDegraded: \\nWellKnownReadyControllerDegraded: route.route.openshift.io \\\"oauth-openshift\\\" not found\" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthClientsControllerDegraded: no ingress for host oauth-openshift.apps.sno.openstack.lab in route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: \\nOAuthServerRouteEndpointAccessibleControllerDegraded: route \\\"openshift-authentication/oauth-openshift\\\": status does not have a valid host address\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerWorkloadDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerWorkloadDegraded: \\nWellKnownReadyControllerDegraded: route.route.openshift.io \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:59:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerDeploymentDegraded: waiting for the oauth-openshift route to appear: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerDeploymentDegraded: \\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerWorkloadDegraded: waiting for the oauth-openshift route to appear: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerWorkloadDegraded: \" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerDeploymentDegraded: waiting for the oauth-openshift route to appear: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerDeploymentDegraded: \\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerWorkloadDegraded: waiting for the oauth-openshift route to appear: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerWorkloadDegraded: \\nWellKnownReadyControllerDegraded: route.route.openshift.io \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:59:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthClientsControllerDegraded: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerDeploymentDegraded: waiting for the oauth-openshift route to appear: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerDeploymentDegraded: \\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerWorkloadDegraded: waiting for the oauth-openshift route to appear: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerWorkloadDegraded: \\nWellKnownReadyControllerDegraded: route.route.openshift.io \\\"oauth-openshift\\\" not found\" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthClientsControllerDegraded: no ingress for host oauth-openshift.apps.sno.openstack.lab in route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: waiting for the oauth-openshift route to appear: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerDeploymentDegraded: \\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerWorkloadDegraded: waiting for the oauth-openshift route to appear: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerWorkloadDegraded: \\nWellKnownReadyControllerDegraded: route.route.openshift.io \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:59:28Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-session -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T13:59:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/v4-0-config-system-cliconfig -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:00:22Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerRouteEndpointAccessibleControllerAvailable: failed to retrieve route from cache: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get oauth metadata from openshift-config-managed/oauth-openshift ConfigMap: configmap \\\"oauth-openshift\\\" not found (check authentication operator, it is supposed to create this)\" to \"OAuthServerRouteEndpointAccessibleControllerAvailable: failed to retrieve route from cache: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get oauth metadata from openshift-config-managed/oauth-openshift ConfigMap: configmap \\\"oauth-openshift\\\" not found (check authentication operator, it is supposed to create this)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:00:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/v4-0-config-system-metadata -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:00:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/oauth-openshift -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:00:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerRouteEndpointAccessibleControllerAvailable: failed to retrieve route from cache: route.route.openshift.io \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get oauth metadata from openshift-config-managed/oauth-openshift ConfigMap: configmap \\\"oauth-openshift\\\" not found (check authentication operator, it is supposed to create this)\" to \"OAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get oauth metadata from openshift-config-managed/oauth-openshift ConfigMap: configmap \\\"oauth-openshift\\\" not found (check authentication operator, it is supposed to create this)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:00:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthClientsControllerDegraded: no ingress for host oauth-openshift.apps.sno.openstack.lab in route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: \\nOAuthServerRouteEndpointAccessibleControllerDegraded: route \\\"openshift-authentication/oauth-openshift\\\": status does not have a valid host address\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerWorkloadDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerWorkloadDegraded: \\nWellKnownReadyControllerDegraded: failed to get oauth metadata from openshift-config-managed/oauth-openshift ConfigMap: configmap \\\"oauth-openshift\\\" not found (check authentication operator, it is supposed to create this)\" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthClientsControllerDegraded: no ingress for host oauth-openshift.apps.sno.openstack.lab in route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: \\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerWorkloadDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerWorkloadDegraded: \\nWellKnownReadyControllerDegraded: failed to get oauth metadata from openshift-config-managed/oauth-openshift ConfigMap: configmap \\\"oauth-openshift\\\" not found (check authentication operator, it is supposed to create this)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:00:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthClientsControllerDegraded: no ingress for host oauth-openshift.apps.sno.openstack.lab in route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: \\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerWorkloadDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerWorkloadDegraded: \\nWellKnownReadyControllerDegraded: failed to get oauth metadata from openshift-config-managed/oauth-openshift ConfigMap: configmap \\\"oauth-openshift\\\" not found (check authentication operator, it is supposed to create this)\" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerDeploymentDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: \\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerWorkloadDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerWorkloadDegraded: \\nWellKnownReadyControllerDegraded: failed to get oauth metadata from openshift-config-managed/oauth-openshift ConfigMap: configmap \\\"oauth-openshift\\\" not found (check authentication operator, it is supposed to create this)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:00:31Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerDeploymentDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: \\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerWorkloadDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerWorkloadDegraded: \\nWellKnownReadyControllerDegraded: failed to get oauth metadata from openshift-config-managed/oauth-openshift ConfigMap: configmap \\\"oauth-openshift\\\" not found (check authentication operator, it is supposed to create this)\" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerDeploymentDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: \\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerWorkloadDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerWorkloadDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:00:31Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"\" to \"WellKnownReadyControllerProgressing: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\",Available message changed from \"OAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get oauth metadata from openshift-config-managed/oauth-openshift ConfigMap: configmap \\\"oauth-openshift\\\" not found (check authentication operator, it is supposed to create this)\" to \"OAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:00:34Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerDeploymentDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerDeploymentDegraded: \\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerWorkloadDegraded: waiting for the oauth-openshift route to contain an admitted ingress: no admitted ingress for route oauth-openshift in namespace openshift-authentication\\nOAuthServerWorkloadDegraded: \" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\",Progressing message changed from \"WellKnownReadyControllerProgressing: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\" to \"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: observed generation is 0, desired generation is 1.\\nWellKnownReadyControllerProgressing: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\",Available message changed from \"OAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\" to \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:00:34Z","reason":"DeploymentCreated","message":"Created Deployment.apps/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:00:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: observed generation is 0, desired generation is 1.\\nWellKnownReadyControllerProgressing: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\" to \"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available\\nWellKnownReadyControllerProgressing: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:00:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\" to \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:00:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available\\nWellKnownReadyControllerProgressing: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\" to \"WellKnownReadyControllerProgressing: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\",Available message changed from \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\" to \"OAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:00:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: status.versions changed from [{\"operator\" \"4.18.28\"} {\"oauth-apiserver\" \"4.18.28\"}] to [{\"operator\" \"4.18.28\"} {\"oauth-apiserver\" \"4.18.28\"} {\"oauth-openshift\" \"4.18.28_openshift\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:00:43Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"oauth-openshift\" changed from \"\" to \"4.18.28_openshift\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:00:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:00:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\" to \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:00:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:00:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded changed from True to False (\"OAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:00:46Z","reason":"ObserveConsoleURL","message":"assetPublicURL changed from to https://console-openshift-console.apps.sno.openstack.lab","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:00:46Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \"\\u00a0\\u00a0map[string]any{\\n\\u00a0\\u00a0\\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n\\u00a0\\u00a0\\t\\\"oauthConfig\\\": map[string]any{\\n-\\u00a0\\t\\t\\\"assetPublicURL\\\": string(\\\"\\\"),\\n+\\u00a0\\t\\t\\\"assetPublicURL\\\": string(\\\"https://console-openshift-console.apps.sno.openstack.lab\\\"),\\n\\u00a0\\u00a0\\t\\t\\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"),\\n\\u00a0\\u00a0\\t\\t\\\"templates\\\": map[string]any{\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...)},\\n\\u00a0\\u00a0\\t\\t\\\"tokenConfig\\\": map[string]any{\\\"accessTokenMaxAgeSeconds\\\": float64(86400), \\\"authorizeTokenMaxAgeSeconds\\\": float64(300)},\\n\\u00a0\\u00a0\\t},\\n\\u00a0\\u00a0\\t\\\"serverArguments\\\": map[string]any{\\\"audit-log-format\\\": []any{string(\\\"json\\\")}, \\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")}, \\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")}, \\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")}, ...},\\n\\u00a0\\u00a0\\t\\\"servingInfo\\\": map[string]any{\\\"cipherSuites\\\": []any{string(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"), string(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"), string(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\\\"), ...}, \\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"), \\\"namedCertificates\\\": []any{map[string]any{\\\"certFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...), \\\"keyFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...), \\\"names\\\": []any{string(\\\"*.apps.sno.openstack.lab\\\")}}}},\\n\\u00a0\\u00a0\\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n\\u00a0\\u00a0}\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:00:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\" to \"WellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:00:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\" to \"All is well\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:00:53Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/v4-0-config-system-cliconfig -n openshift-authentication:\ncause by changes in data.v4-0-config-system-cliconfig","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:01:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"WellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\" to \"OAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:01:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"WellKnownReadyControllerProgressing: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\" to \"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: observed generation is 1, desired generation is 2.\\nWellKnownReadyControllerProgressing: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:01:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"All is well\" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:01:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:01:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:01:08Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/oauth-openshift -n openshift-authentication because it changed","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:01:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: observed generation is 1, desired generation is 2.\\nWellKnownReadyControllerProgressing: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\" to \"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available\\nWellKnownReadyControllerProgressing: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\",Available message changed from \"OAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\" to \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:02:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:02:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\" to \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:02:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:02:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\",Available message changed from \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\" to \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:02:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\" to \"All is well\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:02:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\" to \"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:02:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps.sno.openstack.lab/healthz\\\": EOF\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.116.158:443/healthz\\\": dial tcp 172.30.116.158:443: connect: connection refused\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:08:15Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:08:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : object \"openshift-authentication-operator\"/\"serving-cert\" not registered","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:08:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"trusted-ca-bundle\" : object \"openshift-authentication-operator\"/\"trusted-ca-bundle\" not registered","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:08:24Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:08:25Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-czfkv\" : [object \"openshift-authentication-operator\"/\"kube-root-ca.crt\" not registered, object \"openshift-authentication-operator\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:08:28Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"service-ca-bundle\" : object \"openshift-authentication-operator\"/\"service-ca-bundle\" not registered","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:08:28Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : object \"openshift-authentication-operator\"/\"authentication-operator-config\" not registered","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-03T14:08:56Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.7/23] from ovn-kubernetes","type":"Normal"}]}events/openshift-authentication.json0000640000000000000000000001665715114042274016472 0ustar0000000000000000{"items":[{"namespace":"openshift-authentication","lastTimestamp":"2025-12-03T14:00:34Z","reason":"SuccessfulCreate","message":"Created pod: oauth-openshift-79f7f4d988-pxd4d","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-03T14:00:34Z","reason":"ScalingReplicaSet","message":"Scaled up replica set oauth-openshift-79f7f4d988 to 1","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-03T14:00:39Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef51f50a9bf1b4dfa6fdb7b484eae9e3126e813b48f380c833dd7eaf4e55853e\"","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-03T14:00:39Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.79/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-03T14:00:41Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef51f50a9bf1b4dfa6fdb7b484eae9e3126e813b48f380c833dd7eaf4e55853e\" in 2.135s (2.135s including waiting). Image size: 475935749 bytes.","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-03T14:00:42Z","reason":"Started","message":"Started container oauth-openshift","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-03T14:00:42Z","reason":"Created","message":"Created container: oauth-openshift","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-03T14:01:05Z","reason":"SuccessfulCreate","message":"Created pod: oauth-openshift-747bdb58b5-mn76f","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-03T14:01:05Z","reason":"ScalingReplicaSet","message":"Scaled down replica set oauth-openshift-79f7f4d988 to 0 from 1","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-03T14:01:05Z","reason":"ScalingReplicaSet","message":"Scaled up replica set oauth-openshift-747bdb58b5 to 1 from 0","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-03T14:01:05Z","reason":"SuccessfulDelete","message":"Deleted pod: oauth-openshift-79f7f4d988-pxd4d","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-03T14:01:05Z","reason":"Killing","message":"Stopping container oauth-openshift","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-03T14:01:34Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.94/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-03T14:02:02Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef51f50a9bf1b4dfa6fdb7b484eae9e3126e813b48f380c833dd7eaf4e55853e\" already present on machine","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-03T14:02:03Z","reason":"Created","message":"Created container: oauth-openshift","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-03T14:02:04Z","reason":"Started","message":"Started container oauth-openshift","type":"Normal"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-03T14:02:05Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"https://10.128.0.94:6443/healthz\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)","type":"Warning"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-03T14:02:05Z","reason":"ProbeError","message":"Readiness probe error: Get \"https://10.128.0.94:6443/healthz\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)\nbody: \n","type":"Warning"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-03T14:08:20Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"v4-0-config-system-router-certs\" : object \"openshift-authentication\"/\"v4-0-config-system-router-certs\" not registered","type":"Warning"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-03T14:08:20Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"v4-0-config-system-cliconfig\" : object \"openshift-authentication\"/\"v4-0-config-system-cliconfig\" not registered","type":"Warning"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-03T14:08:21Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"v4-0-config-system-session\" : object \"openshift-authentication\"/\"v4-0-config-system-session\" not registered","type":"Warning"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-03T14:08:21Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"v4-0-config-user-template-login\" : object \"openshift-authentication\"/\"v4-0-config-user-template-login\" not registered","type":"Warning"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-03T14:08:21Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"v4-0-config-system-serving-cert\" : object \"openshift-authentication\"/\"v4-0-config-system-serving-cert\" not registered","type":"Warning"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-03T14:08:21Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"v4-0-config-system-trusted-ca-bundle\" : object \"openshift-authentication\"/\"v4-0-config-system-trusted-ca-bundle\" not registered","type":"Warning"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-03T14:08:21Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"v4-0-config-system-service-ca\" : object \"openshift-authentication\"/\"v4-0-config-system-service-ca\" not registered","type":"Warning"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-03T14:08:21Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"v4-0-config-user-template-error\" : object \"openshift-authentication\"/\"v4-0-config-user-template-error\" not registered","type":"Warning"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-03T14:08:21Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"audit-policies\" : object \"openshift-authentication\"/\"audit\" not registered","type":"Warning"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-03T14:08:21Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"v4-0-config-user-template-provider-selection\" : object \"openshift-authentication\"/\"v4-0-config-user-template-provider-selection\" not registered","type":"Warning"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-03T14:08:22Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-03T14:08:32Z","reason":"FailedMount","message":"(combined from similar events): MountVolume.SetUp failed for volume \"v4-0-config-system-cliconfig\" : object \"openshift-authentication\"/\"v4-0-config-system-cliconfig\" not registered","type":"Warning"},{"namespace":"openshift-authentication","lastTimestamp":"2025-12-03T14:08:56Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.94/23] from ovn-kubernetes","type":"Normal"}]}events/openshift-config-managed.json0000640000000000000000000000061015114042274016270 0ustar0000000000000000{"items":[{"namespace":"openshift-config-managed","lastTimestamp":"2025-12-03T13:55:59Z","reason":"PublishedRouterCA","message":"Published \"default-ingress-cert\" in \"openshift-config-managed\"","type":"Normal"},{"namespace":"openshift-config-managed","lastTimestamp":"2025-12-03T13:55:59Z","reason":"PublishedRouterCertificates","message":"Published router certificates","type":"Normal"}]}config/serviceaccounts.json0000640000000000000000000003703215114042260014600 0ustar0000000000000000{"serviceAccounts":{"TOTAL_COUNT":364,"namespaces":{"default":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-public":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-system":[{"name":"attachdetach-controller","secrets":1},{"name":"builder","secrets":1},{"name":"certificate-controller","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"clusterrole-aggregation-controller","secrets":1},{"name":"cronjob-controller","secrets":1},{"name":"daemon-set-controller","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"deployment-controller","secrets":1},{"name":"disruption-controller","secrets":1},{"name":"endpoint-controller","secrets":1},{"name":"endpointslice-controller","secrets":1},{"name":"endpointslicemirroring-controller","secrets":1},{"name":"ephemeral-volume-controller","secrets":1},{"name":"expand-controller","secrets":1},{"name":"generic-garbage-collector","secrets":1},{"name":"horizontal-pod-autoscaler","secrets":1},{"name":"job-controller","secrets":1},{"name":"legacy-service-account-token-cleaner","secrets":1},{"name":"namespace-controller","secrets":1},{"name":"node-controller","secrets":1},{"name":"persistent-volume-binder","secrets":1},{"name":"pod-garbage-collector","secrets":1},{"name":"pv-protection-controller","secrets":1},{"name":"pvc-protection-controller","secrets":1},{"name":"replicaset-controller","secrets":1},{"name":"replication-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"root-ca-cert-publisher","secrets":1},{"name":"service-account-controller","secrets":1},{"name":"service-ca-cert-publisher","secrets":1},{"name":"statefulset-controller","secrets":1},{"name":"ttl-after-finished-controller","secrets":1},{"name":"validatingadmissionpolicy-status-controller","secrets":1}],"openshift":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-sa","secrets":1}],"openshift-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-operator","secrets":1}],"openshift-authentication":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-openshift","secrets":1}],"openshift-authentication-operator":[{"name":"authentication-operator","secrets":1},{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-catalogd":[{"name":"builder","secrets":1},{"name":"catalogd-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager":[{"name":"builder","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"cloud-node-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"cluster-cloud-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-credential-operator":[{"name":"builder","secrets":1},{"name":"cloud-credential-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-network-config-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-platform-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-csi-drivers":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-machine-approver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-approver-sa","secrets":1}],"openshift-cluster-node-tuning-operator":[{"name":"builder","secrets":1},{"name":"cluster-node-tuning-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"tuned","secrets":1}],"openshift-cluster-olm-operator":[{"name":"builder","secrets":1},{"name":"cluster-olm-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-samples-operator":[{"name":"builder","secrets":1},{"name":"cluster-samples-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-storage-operator":[{"name":"builder","secrets":1},{"name":"cluster-storage-operator","secrets":1},{"name":"csi-snapshot-controller","secrets":1},{"name":"csi-snapshot-controller-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-version":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-managed":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-config-operator","secrets":1}],"openshift-console":[{"name":"builder","secrets":1},{"name":"console","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-console-operator":[{"name":"builder","secrets":1},{"name":"console-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-console-user-settings":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-sa","secrets":1}],"openshift-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-operator","secrets":1}],"openshift-dns":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns","secrets":1},{"name":"node-resolver","secrets":1}],"openshift-dns-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns-operator","secrets":1}],"openshift-etcd":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-backup-sa","secrets":1},{"name":"etcd-sa","secrets":1},{"name":"installer-sa","secrets":1}],"openshift-etcd-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-operator","secrets":1}],"openshift-host-network":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-image-registry":[{"name":"builder","secrets":1},{"name":"cluster-image-registry-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"node-ca","secrets":1},{"name":"pruner","secrets":1}],"openshift-infra":[{"name":"build-config-change-controller","secrets":1},{"name":"build-controller","secrets":1},{"name":"builder","secrets":1},{"name":"cluster-csr-approver-controller","secrets":1},{"name":"cluster-quota-reconciliation-controller","secrets":1},{"name":"default","secrets":1},{"name":"default-rolebindings-controller","secrets":1},{"name":"deployer","secrets":1},{"name":"deployer-controller","secrets":1},{"name":"deploymentconfig-controller","secrets":1},{"name":"image-import-controller","secrets":1},{"name":"image-trigger-controller","secrets":1},{"name":"ingress-to-route-controller","secrets":1},{"name":"namespace-security-allocation-controller","secrets":1},{"name":"node-bootstrapper","secrets":1},{"name":"origin-namespace-controller","secrets":1},{"name":"podsecurity-admission-label-syncer-controller","secrets":1},{"name":"privileged-namespaces-psa-label-syncer","secrets":1},{"name":"pv-recycler-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"serviceaccount-controller","secrets":1},{"name":"serviceaccount-pull-secrets-controller","secrets":1},{"name":"template-instance-controller","secrets":1},{"name":"template-instance-finalizer-controller","secrets":1},{"name":"unidling-controller","secrets":1}],"openshift-ingress":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"router","secrets":1}],"openshift-ingress-canary":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ingress-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ingress-operator","secrets":1}],"openshift-insights":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"gather","secrets":1},{"name":"operator","secrets":1}],"openshift-kni-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-kube-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-apiserver-operator","secrets":1}],"openshift-kube-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"kube-controller-manager-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-controller-manager-operator","secrets":1}],"openshift-kube-scheduler":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1},{"name":"openshift-kube-scheduler-sa","secrets":1}],"openshift-kube-scheduler-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-kube-scheduler-operator","secrets":1}],"openshift-kube-storage-version-migrator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-sa","secrets":1}],"openshift-kube-storage-version-migrator-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-operator","secrets":1}],"openshift-machine-api":[{"name":"builder","secrets":1},{"name":"cluster-autoscaler","secrets":1},{"name":"cluster-autoscaler-operator","secrets":1},{"name":"cluster-baremetal-operator","secrets":1},{"name":"control-plane-machine-set-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-api-controllers","secrets":1},{"name":"machine-api-operator","secrets":1},{"name":"machine-api-termination-handler","secrets":1}],"openshift-machine-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-config-controller","secrets":1},{"name":"machine-config-daemon","secrets":1},{"name":"machine-config-operator","secrets":1},{"name":"machine-config-server","secrets":1},{"name":"machine-os-builder","secrets":1},{"name":"machine-os-puller","secrets":1},{"name":"node-bootstrapper","secrets":1}],"openshift-marketplace":[{"name":"builder","secrets":1},{"name":"certified-operators","secrets":1},{"name":"community-operators","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"marketplace-operator","secrets":1},{"name":"redhat-marketplace","secrets":1},{"name":"redhat-operators","secrets":1}],"openshift-monitoring":[{"name":"alertmanager-main","secrets":1},{"name":"builder","secrets":1},{"name":"cluster-monitoring-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-state-metrics","secrets":1},{"name":"metrics-server","secrets":1},{"name":"monitoring-plugin","secrets":1},{"name":"node-exporter","secrets":1},{"name":"openshift-state-metrics","secrets":1},{"name":"prometheus-k8s","secrets":1},{"name":"prometheus-operator","secrets":1},{"name":"prometheus-operator-admission-webhook","secrets":1},{"name":"telemeter-client","secrets":1},{"name":"thanos-querier","secrets":1}],"openshift-multus":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"metrics-daemon-sa","secrets":1},{"name":"multus","secrets":1},{"name":"multus-ac","secrets":1},{"name":"multus-ancillary-tools","secrets":1}],"openshift-network-diagnostics":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-diagnostics","secrets":1}],"openshift-network-node-identity":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-node-identity","secrets":1}],"openshift-network-operator":[{"name":"builder","secrets":1},{"name":"cluster-network-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"iptables-alerter","secrets":1}],"openshift-node":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-nutanix-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-oauth-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-apiserver-sa","secrets":1}],"openshift-openstack-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-operator-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"operator-controller-controller-manager","secrets":1}],"openshift-operator-lifecycle-manager":[{"name":"builder","secrets":1},{"name":"collect-profiles","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"olm-operator-serviceaccount","secrets":1}],"openshift-operators":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovirt-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovn-kubernetes":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ovn-kubernetes-control-plane","secrets":1},{"name":"ovn-kubernetes-node","secrets":1}],"openshift-route-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"route-controller-manager-sa","secrets":1}],"openshift-service-ca":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca","secrets":1}],"openshift-service-ca-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca-operator","secrets":1}],"openshift-user-workload-monitoring":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-vsphere-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}]}}}config/installplans.json0000640000000000000000000000010015114042260014066 0ustar0000000000000000{"items":null,"stats":{"TOTAL_COUNT":0,"TOTAL_NONUNIQ_COUNT":0}}config/node/logs/master-0.log0000640000000000000000000003510715114042226014534 0ustar0000000000000000Dec 03 14:08:54.892671 master-0 kubenswrapper[4430]: E1203 14:08:54.891347 4430 projected.go:288] Couldn't get configMap openshift-kube-apiserver/kube-root-ca.crt: object "openshift-kube-apiserver"/"kube-root-ca.crt" not registered Dec 03 14:08:54.892671 master-0 kubenswrapper[4430]: E1203 14:08:54.891402 4430 projected.go:194] Error preparing data for projected volume kube-api-access for pod openshift-kube-apiserver/installer-4-master-0: object "openshift-kube-apiserver"/"kube-root-ca.crt" not registered Dec 03 14:08:54.892671 master-0 kubenswrapper[4430]: E1203 14:08:54.891496 4430 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/0b1e0884-ff54-419b-90d3-25f561a6391d-kube-api-access podName:0b1e0884-ff54-419b-90d3-25f561a6391d nodeName:}" failed. No retries permitted until 2025-12-03 14:09:26.891466618 +0000 UTC m=+67.514380684 (durationBeforeRetry 32s). Error: MountVolume.SetUp failed for volume "kube-api-access" (UniqueName: "kubernetes.io/projected/0b1e0884-ff54-419b-90d3-25f561a6391d-kube-api-access") pod "installer-4-master-0" (UID: "0b1e0884-ff54-419b-90d3-25f561a6391d") : object "openshift-kube-apiserver"/"kube-root-ca.crt" not registered Dec 03 14:08:57.648449 master-0 kubenswrapper[4430]: I1203 14:08:57.641610 4430 patch_prober.go:28] interesting pod/packageserver-7c64dd9d8b-49skr container/packageserver namespace/openshift-operator-lifecycle-manager: Readiness probe status=failure output="Get \"https://10.128.0.90:5443/healthz\": dial tcp 10.128.0.90:5443: connect: connection refused" start-of-body= Dec 03 14:08:57.648449 master-0 kubenswrapper[4430]: I1203 14:08:57.641659 4430 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-operator-lifecycle-manager/packageserver-7c64dd9d8b-49skr" podUID="d8a9c244-f0b3-42e8-ae50-7012c4ecc0ff" containerName="packageserver" probeResult="failure" output="Get \"https://10.128.0.90:5443/healthz\": dial tcp 10.128.0.90:5443: connect: connection refused" Dec 03 14:08:58.962700 master-0 kubenswrapper[4430]: I1203 14:08:58.959707 4430 patch_prober.go:28] interesting pod/marketplace-operator-7d67745bb7-dwcxb container/marketplace-operator namespace/openshift-marketplace: Readiness probe status=failure output="Get \"http://10.128.0.21:8080/healthz\": dial tcp 10.128.0.21:8080: connect: connection refused" start-of-body= Dec 03 14:08:58.962700 master-0 kubenswrapper[4430]: I1203 14:08:58.959798 4430 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-marketplace/marketplace-operator-7d67745bb7-dwcxb" podUID="55351b08-d46d-4327-aa5e-ae17fdffdfb5" containerName="marketplace-operator" probeResult="failure" output="Get \"http://10.128.0.21:8080/healthz\": dial tcp 10.128.0.21:8080: connect: connection refused" Dec 03 14:08:59.116985 master-0 kubenswrapper[4430]: I1203 14:08:59.116930 4430 patch_prober.go:28] interesting pod/olm-operator-76bd5d69c7-fjrrg container/olm-operator namespace/openshift-operator-lifecycle-manager: Readiness probe status=failure output="Get \"https://10.128.0.59:8443/healthz\": dial tcp 10.128.0.59:8443: connect: connection refused" start-of-body= Dec 03 14:08:59.117043 master-0 kubenswrapper[4430]: I1203 14:08:59.116997 4430 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-operator-lifecycle-manager/olm-operator-76bd5d69c7-fjrrg" podUID="b3eef3ef-f954-4e47-92b4-0155bc27332d" containerName="olm-operator" probeResult="failure" output="Get \"https://10.128.0.59:8443/healthz\": dial tcp 10.128.0.59:8443: connect: connection refused" Dec 03 14:09:01.359979 master-0 kubenswrapper[4430]: I1203 14:09:01.359945 4430 patch_prober.go:28] interesting pod/console-operator-77df56447c-vsrxx container/console-operator namespace/openshift-console-operator: Readiness probe status=failure output="Get \"https://10.128.0.75:8443/readyz\": dial tcp 10.128.0.75:8443: connect: connection refused" start-of-body= Dec 03 14:09:01.360055 master-0 kubenswrapper[4430]: I1203 14:09:01.359988 4430 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-console-operator/console-operator-77df56447c-vsrxx" podUID="a8dc6511-7339-4269-9d43-14ce53bb4e7f" containerName="console-operator" probeResult="failure" output="Get \"https://10.128.0.75:8443/readyz\": dial tcp 10.128.0.75:8443: connect: connection refused" Dec 03 14:09:02.535104 master-0 kubenswrapper[4430]: I1203 14:09:02.534751 4430 patch_prober.go:28] interesting pod/downloads-6f5db8559b-96ljh container/download-server namespace/openshift-console: Readiness probe status=failure output="Get \"http://10.128.0.80:8080/\": dial tcp 10.128.0.80:8080: connect: connection refused" start-of-body= Dec 03 14:09:02.535104 master-0 kubenswrapper[4430]: I1203 14:09:02.534814 4430 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-console/downloads-6f5db8559b-96ljh" podUID="6dd61097-7ea1-4d1d-9d4d-a781a0a59e7d" containerName="download-server" probeResult="failure" output="Get \"http://10.128.0.80:8080/\": dial tcp 10.128.0.80:8080: connect: connection refused" Dec 03 14:09:03.542039 master-0 kubenswrapper[4430]: I1203 14:09:03.537631 4430 patch_prober.go:28] interesting pod/downloads-6f5db8559b-96ljh container/download-server namespace/openshift-console: Readiness probe status=failure output="Get \"http://10.128.0.80:8080/\": dial tcp 10.128.0.80:8080: connect: connection refused" start-of-body= Dec 03 14:09:03.542039 master-0 kubenswrapper[4430]: I1203 14:09:03.537697 4430 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-console/downloads-6f5db8559b-96ljh" podUID="6dd61097-7ea1-4d1d-9d4d-a781a0a59e7d" containerName="download-server" probeResult="failure" output="Get \"http://10.128.0.80:8080/\": dial tcp 10.128.0.80:8080: connect: connection refused" Dec 03 14:09:03.542039 master-0 kubenswrapper[4430]: I1203 14:09:03.538071 4430 patch_prober.go:28] interesting pod/downloads-6f5db8559b-96ljh container/download-server namespace/openshift-console: Liveness probe status=failure output="Get \"http://10.128.0.80:8080/\": dial tcp 10.128.0.80:8080: connect: connection refused" start-of-body= Dec 03 14:09:03.542039 master-0 kubenswrapper[4430]: I1203 14:09:03.538096 4430 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-console/downloads-6f5db8559b-96ljh" podUID="6dd61097-7ea1-4d1d-9d4d-a781a0a59e7d" containerName="download-server" probeResult="failure" output="Get \"http://10.128.0.80:8080/\": dial tcp 10.128.0.80:8080: connect: connection refused" Dec 03 14:09:03.790184 master-0 kubenswrapper[4430]: I1203 14:09:03.789719 4430 patch_prober.go:28] interesting pod/downloads-6f5db8559b-96ljh container/download-server namespace/openshift-console: Readiness probe status=failure output="Get \"http://10.128.0.80:8080/\": dial tcp 10.128.0.80:8080: connect: connection refused" start-of-body= Dec 03 14:09:03.790356 master-0 kubenswrapper[4430]: I1203 14:09:03.790323 4430 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-console/downloads-6f5db8559b-96ljh" podUID="6dd61097-7ea1-4d1d-9d4d-a781a0a59e7d" containerName="download-server" probeResult="failure" output="Get \"http://10.128.0.80:8080/\": dial tcp 10.128.0.80:8080: connect: connection refused" Dec 03 14:09:05.102636 master-0 kubenswrapper[4430]: I1203 14:09:05.102559 4430 patch_prober.go:28] interesting pod/console-c5d7cd7f9-2hp75 container/console namespace/openshift-console: Startup probe status=failure output="Get \"https://10.128.0.86:8443/health\": dial tcp 10.128.0.86:8443: connect: connection refused" start-of-body= Dec 03 14:09:05.102807 master-0 kubenswrapper[4430]: I1203 14:09:05.102712 4430 prober.go:107] "Probe failed" probeType="Startup" pod="openshift-console/console-c5d7cd7f9-2hp75" podUID="4dd1d142-6569-438d-b0c2-582aed44812d" containerName="console" probeResult="failure" output="Get \"https://10.128.0.86:8443/health\": dial tcp 10.128.0.86:8443: connect: connection refused" Dec 03 14:09:05.123160 master-0 kubenswrapper[4430]: I1203 14:09:05.123125 4430 patch_prober.go:28] interesting pod/console-648d88c756-vswh8 container/console namespace/openshift-console: Startup probe status=failure output="Get \"https://10.128.0.91:8443/health\": dial tcp 10.128.0.91:8443: connect: connection refused" start-of-body= Dec 03 14:09:05.123243 master-0 kubenswrapper[4430]: I1203 14:09:05.123188 4430 prober.go:107] "Probe failed" probeType="Startup" pod="openshift-console/console-648d88c756-vswh8" podUID="62f94ae7-6043-4761-a16b-e0f072b1364b" containerName="console" probeResult="failure" output="Get \"https://10.128.0.91:8443/health\": dial tcp 10.128.0.91:8443: connect: connection refused" Dec 03 14:09:15.101851 master-0 kubenswrapper[4430]: I1203 14:09:15.101774 4430 patch_prober.go:28] interesting pod/console-c5d7cd7f9-2hp75 container/console namespace/openshift-console: Startup probe status=failure output="Get \"https://10.128.0.86:8443/health\": dial tcp 10.128.0.86:8443: connect: connection refused" start-of-body= Dec 03 14:09:15.102538 master-0 kubenswrapper[4430]: I1203 14:09:15.101862 4430 prober.go:107] "Probe failed" probeType="Startup" pod="openshift-console/console-c5d7cd7f9-2hp75" podUID="4dd1d142-6569-438d-b0c2-582aed44812d" containerName="console" probeResult="failure" output="Get \"https://10.128.0.86:8443/health\": dial tcp 10.128.0.86:8443: connect: connection refused" Dec 03 14:09:15.118514 master-0 kubenswrapper[4430]: I1203 14:09:15.118397 4430 patch_prober.go:28] interesting pod/console-648d88c756-vswh8 container/console namespace/openshift-console: Startup probe status=failure output="Get \"https://10.128.0.91:8443/health\": dial tcp 10.128.0.91:8443: connect: connection refused" start-of-body= Dec 03 14:09:15.118685 master-0 kubenswrapper[4430]: I1203 14:09:15.118535 4430 prober.go:107] "Probe failed" probeType="Startup" pod="openshift-console/console-648d88c756-vswh8" podUID="62f94ae7-6043-4761-a16b-e0f072b1364b" containerName="console" probeResult="failure" output="Get \"https://10.128.0.91:8443/health\": dial tcp 10.128.0.91:8443: connect: connection refused" Dec 03 14:09:19.576398 master-0 kubenswrapper[4430]: E1203 14:09:19.576316 4430 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"813dd332500baa3dae137b264e731ab5d5fefc6606d6f8e74cb17b1560c794df\": container with ID starting with 813dd332500baa3dae137b264e731ab5d5fefc6606d6f8e74cb17b1560c794df not found: ID does not exist" containerID="813dd332500baa3dae137b264e731ab5d5fefc6606d6f8e74cb17b1560c794df" Dec 03 14:09:19.578355 master-0 kubenswrapper[4430]: E1203 14:09:19.578306 4430 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"a4385a7541f9927488a891c23b4996ceca84cd73c8e1b66324c3afa4f9d782da\": container with ID starting with a4385a7541f9927488a891c23b4996ceca84cd73c8e1b66324c3afa4f9d782da not found: ID does not exist" containerID="a4385a7541f9927488a891c23b4996ceca84cd73c8e1b66324c3afa4f9d782da" Dec 03 14:09:19.578884 master-0 kubenswrapper[4430]: E1203 14:09:19.578820 4430 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"d68dcfb959b0dddfbea8315d0bffa626c1c4fc0c9c58630e2de05efb596926c7\": container with ID starting with d68dcfb959b0dddfbea8315d0bffa626c1c4fc0c9c58630e2de05efb596926c7 not found: ID does not exist" containerID="d68dcfb959b0dddfbea8315d0bffa626c1c4fc0c9c58630e2de05efb596926c7" Dec 03 14:09:19.579689 master-0 kubenswrapper[4430]: E1203 14:09:19.579635 4430 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"88a354f91773dbe3823dbf041333b9ec1da17d5142bf375d1bbcbb8d8a0249cc\": container with ID starting with 88a354f91773dbe3823dbf041333b9ec1da17d5142bf375d1bbcbb8d8a0249cc not found: ID does not exist" containerID="88a354f91773dbe3823dbf041333b9ec1da17d5142bf375d1bbcbb8d8a0249cc" Dec 03 14:09:19.580162 master-0 kubenswrapper[4430]: E1203 14:09:19.580125 4430 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"a38a864ba7f51b82dc4a496a126b4c1e7efe0a94d4f6aebb149e4ed57d8a4b33\": container with ID starting with a38a864ba7f51b82dc4a496a126b4c1e7efe0a94d4f6aebb149e4ed57d8a4b33 not found: ID does not exist" containerID="a38a864ba7f51b82dc4a496a126b4c1e7efe0a94d4f6aebb149e4ed57d8a4b33" Dec 03 14:09:19.580647 master-0 kubenswrapper[4430]: E1203 14:09:19.580617 4430 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"f5af02d5f16eab1071f5ef7ff439fd0d0879735855af5016940cfe8a66bc28ac\": container with ID starting with f5af02d5f16eab1071f5ef7ff439fd0d0879735855af5016940cfe8a66bc28ac not found: ID does not exist" containerID="f5af02d5f16eab1071f5ef7ff439fd0d0879735855af5016940cfe8a66bc28ac" Dec 03 14:09:19.583831 master-0 kubenswrapper[4430]: E1203 14:09:19.583774 4430 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"7df8bd3ffc93e8d3da9e6a143630f0e6dffdbb70d630f04b6359cdc930fcd07f\": container with ID starting with 7df8bd3ffc93e8d3da9e6a143630f0e6dffdbb70d630f04b6359cdc930fcd07f not found: ID does not exist" containerID="7df8bd3ffc93e8d3da9e6a143630f0e6dffdbb70d630f04b6359cdc930fcd07f" Dec 03 14:09:25.101106 master-0 kubenswrapper[4430]: I1203 14:09:25.101025 4430 patch_prober.go:28] interesting pod/console-c5d7cd7f9-2hp75 container/console namespace/openshift-console: Startup probe status=failure output="Get \"https://10.128.0.86:8443/health\": dial tcp 10.128.0.86:8443: connect: connection refused" start-of-body= Dec 03 14:09:25.101106 master-0 kubenswrapper[4430]: I1203 14:09:25.101101 4430 prober.go:107] "Probe failed" probeType="Startup" pod="openshift-console/console-c5d7cd7f9-2hp75" podUID="4dd1d142-6569-438d-b0c2-582aed44812d" containerName="console" probeResult="failure" output="Get \"https://10.128.0.86:8443/health\": dial tcp 10.128.0.86:8443: connect: connection refused" Dec 03 14:09:25.118761 master-0 kubenswrapper[4430]: I1203 14:09:25.118673 4430 patch_prober.go:28] interesting pod/console-648d88c756-vswh8 container/console namespace/openshift-console: Startup probe status=failure output="Get \"https://10.128.0.91:8443/health\": dial tcp 10.128.0.91:8443: connect: connection refused" start-of-body= Dec 03 14:09:25.119120 master-0 kubenswrapper[4430]: I1203 14:09:25.118755 4430 prober.go:107] "Probe failed" probeType="Startup" pod="openshift-console/console-648d88c756-vswh8" podUID="62f94ae7-6043-4761-a16b-e0f072b1364b" containerName="console" probeResult="failure" output="Get \"https://10.128.0.91:8443/health\": dial tcp 10.128.0.91:8443: connect: connection refused"aggregated/unused_machine_configs_count.json0000640000000000000000000000004215114042226020125 0ustar0000000000000000{"unused_machineconfigs_count":22}config/machineconfigs/rendered-worker-ac51e1cc2e343e3be6926ba118fd6150.json0000640000000000000000000004054015114042226024071 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","metadata":{"annotations":{"machineconfiguration.openshift.io/generated-by-controller-version":"bb2aa85171d93b2df952ed802a8cb200164e666f","machineconfiguration.openshift.io/release-image-version":"4.18.28"},"creationTimestamp":"2025-12-03T14:00:43Z","generation":1,"name":"rendered-worker-ac51e1cc2e343e3be6926ba118fd6150","ownerReferences":[{"apiVersion":"machineconfiguration.openshift.io/v1","blockOwnerDeletion":true,"controller":true,"kind":"MachineConfigPool","name":"worker","uid":"33c53b37-225d-4aa3-811a-ca85a617d583"}],"resourceVersion":"12596","uid":"7f58af47-a0be-4132-b04b-2e7156e836b9"},"spec":{"baseOSExtensionsContainerImage":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:72b0a0c9efb387b7bc098327fb451c359aa613f41cd90a7651d11588dee986a5","config":{"ignition":{"version":"3.4.0"},"passwd":{"users":null},"storage":{"files":null},"systemd":{"units":[{"contents":"[Unit]\nDescription=Cleans NetworkManager state generated by dracut\n# Removal of this file signals firstboot completion\nConditionPathExists=!/etc/ignition-machine-config-encapsulated.json\n# This is opt-in for some deployment types, and opt-out for others.\nConditionPathExists=/var/lib/mco/nm-clean-initrd-state\nWants=network-pre.target\nBefore=network-pre.target\n\n[Service]\nType=oneshot\n# Remove any existing state possibly generated NM run by dracut. We want NM to\n# consider all profiles autoconnect priority when it starts instead of\n# remembering which profile was a device activated with when NM is run by\n# dracut.\nExecStart=/usr/local/bin/nm-clean-initrd-state.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"NetworkManager-clean-initrd-state.service"},{"dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"ENABLE_PROFILE_UNIX_SOCKET=true\"\n","name":"10-mco-profile-unix-socket.conf"},{"contents":"[Unit]\nAfter=kubelet-dependencies.target\nRequires=kubelet-dependencies.target\n","name":"05-mco-ordering.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"name":"crio.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"docker.socket"},{"contents":"[Unit]\nDescription=The firstboot OS update has completed\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target\n\n[Install]\nWantedBy=default.target\n","enabled":true,"name":"firstboot-osupdate.target"},{"dropins":[{"contents":"[Unit]\nAfter=ovs-configuration.service\nBefore=crio.service\n","name":"01-after-configure-ovs.conf"}],"name":"ipsec.service"},{"contents":"[Unit]\nDescription=Dynamically sets the system reserved for the kubelet\nWants=network-online.target\nAfter=network-online.target firstboot-osupdate.target\nBefore=kubelet-dependencies.target\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nRemainAfterExit=yes\nEnvironmentFile=/etc/node-sizing-enabled.env\nExecStart=/bin/bash /usr/local/sbin/dynamic-system-reserved-calc.sh ${NODE_SIZING_ENABLED} ${SYSTEM_RESERVED_MEMORY} ${SYSTEM_RESERVED_CPU} ${SYSTEM_RESERVED_ES}\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"kubelet-auto-node-size.service"},{"contents":"[Unit]\nDescription=Dependencies necessary to run kubelet\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target network-online.target\nWants=NetworkManager-wait-online.service crio-wipe.service\nWants=rpc-statd.service chrony-wait.service\n","name":"kubelet-dependencies.target"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet\nRequires=crio.service kubelet-dependencies.target\nAfter=kubelet-dependencies.target\nAfter=ostree-finalize-staged.service\n\n[Service]\nType=notify\nExecStartPre=/bin/mkdir --parents /etc/kubernetes/manifests\nExecStartPre=-/usr/sbin/restorecon -ri /var/lib/kubelet/pod-resources /usr/local/bin/kubenswrapper /usr/bin/kubensenter\nEnvironment=\"KUBELET_NODE_IP=0.0.0.0\"\nEnvironmentFile=/etc/os-release\nEnvironmentFile=-/etc/kubernetes/kubelet-workaround\nEnvironmentFile=-/etc/kubernetes/kubelet-env\nEnvironmentFile=/etc/node-sizing.env\n\nExecStart=/usr/local/bin/kubenswrapper \\\n /usr/bin/kubelet \\\n --config=/etc/kubernetes/kubelet.conf \\\n --bootstrap-kubeconfig=/etc/kubernetes/kubeconfig \\\n --kubeconfig=/var/lib/kubelet/kubeconfig \\\n --container-runtime-endpoint=/var/run/crio/crio.sock \\\n --runtime-cgroups=/system.slice/crio.service \\\n --node-labels=node-role.kubernetes.io/worker,node.openshift.io/os_id=${ID} \\\n --node-ip=${KUBELET_NODE_IP} \\\n --minimum-container-ttl-duration=6m0s \\\n --volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec \\\n --cloud-provider= \\\n \\\n --hostname-override=${KUBELET_NODE_NAME} \\\n --provider-id=${KUBELET_PROVIDERID} \\\n --pod-infra-container-image=quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fff930cf757e23d388d86d05942b76e44d3bda5e387b299c239e4d12545d26dd \\\n --system-reserved=cpu=${SYSTEM_RESERVED_CPU},memory=${SYSTEM_RESERVED_MEMORY},ephemeral-storage=${SYSTEM_RESERVED_ES} \\\n --v=${KUBELET_LOG_LEVEL}\n\nRestart=always\nRestartSec=10\n\n[Install]\nWantedBy=multi-user.target\n","dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"enabled":true,"name":"kubelet.service"},{"contents":"[Unit]\nDescription=Manages a mount namespace for kubernetes-specific mounts\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nRuntimeDirectory=kubens\nEnvironment=RUNTIME_DIRECTORY=%t/kubens\nEnvironment=BIND_POINT=%t/kubens/mnt\nEnvironment=ENVFILE=%t/kubens/env\n\n# Set up the runtime directory as an unbindable mountpoint\nExecStartPre=bash -c \"findmnt ${RUNTIME_DIRECTORY} || mount --make-unbindable --bind ${RUNTIME_DIRECTORY} ${RUNTIME_DIRECTORY}\"\n# Ensure the bind point exists\nExecStartPre=touch ${BIND_POINT}\n# Use 'unshare' to create the new mountpoint, then 'mount --make-rshared' so it cascades internally\nExecStart=unshare --mount=${BIND_POINT} --propagation slave mount --make-rshared /\n# Finally, set an env pointer for ease-of-use\nExecStartPost=bash -c 'echo \"KUBENSMNT=${BIND_POINT}\" \u003e \"${ENVFILE}\"'\n\n# On stop, a recursive unmount cleans up the namespace and bind-mounted unbindable parent directory\nExecStop=umount -R ${RUNTIME_DIRECTORY}\n\n[Install]\nWantedBy=multi-user.target\n","enabled":false,"name":"kubens.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Firstboot\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# Removal of this file signals firstboot completion\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\nAfter=machine-config-daemon-pull.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\n# Disable existing repos (if any) so that OS extensions would use embedded RPMs only\nExecStartPre=-/usr/bin/sh -c \"sed -i 's/enabled=1/enabled=0/' /etc/yum.repos.d/*.repo\"\n# Run this via podman because we want to use the nmstatectl binary in our container\nExecStart=/usr/bin/podman run --rm --privileged --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a31af646ce5587c051459a88df413dc30be81e7f15399aa909e19effa7de772a' firstboot-complete-machineconfig --persist-nics\nExecStart=/usr/bin/podman run --rm --privileged --pid=host --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a31af646ce5587c051459a88df413dc30be81e7f15399aa909e19effa7de772a' firstboot-complete-machineconfig\n[Install]\nRequiredBy=firstboot-osupdate.target\n","enabled":true,"name":"machine-config-daemon-firstboot.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Pull\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# This \"stamp file\" is unlinked when we complete\n# machine-config-daemon-firstboot.service\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\n# Run after crio-wipe so the pulled MCD image is protected against a corrupted storage from a forced shutdown\nWants=crio-wipe.service NetworkManager-wait-online.service\nAfter=crio-wipe.service NetworkManager-wait-online.service network.service\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nExecStartPre=/etc/machine-config-daemon/generate_podman_policy_args.sh\nExecStart=/bin/sh -c \"while ! /usr/bin/podman pull $(cat /tmp/podman_policy_args) --authfile=/var/lib/kubelet/config.json 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a31af646ce5587c051459a88df413dc30be81e7f15399aa909e19effa7de772a'; do sleep 1; done\"\n\n[Install]\nRequiredBy=machine-config-daemon-firstboot.service\n","enabled":true,"name":"machine-config-daemon-pull.service"},{"contents":"[Unit]\nDescription=Applies per-node NMState network configuration\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service\nBefore=nmstate.service kubelet-dependencies.target ovs-configuration.service node-valid-hostname.service\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/usr/local/bin/nmstate-configuration.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"nmstate-configuration.service"},{"contents":"[Unit]\nDescription=Apply nmstate on-disk state\nDocumentation=man:nmstate.service(8) https://www.nmstate.io\nAfter=NetworkManager-wait-online.service\nBefore=network-online.target\nWants=NetworkManager-wait-online.service\nRequires=NetworkManager.service\n\n[Service]\nType=oneshot\nExecStart=/usr/bin/nmstatectl service\nRemainAfterExit=yes\n\n[Install]\nWantedBy=NetworkManager.service\n","enabled":true,"name":"nmstate.service"},{"contents":"[Unit]\nDescription=Wait for a non-localhost hostname\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nUser=root\nExecStart=/usr/local/bin/mco-hostname --wait\n\n# Wait up to 5min for the node to get a non-localhost name\nTimeoutSec=300\n\n[Install]\n# TODO: Change this to RequiredBy after we fix https://github.com/openshift/machine-config-operator/pull/3865#issuecomment-1746963115\nWantedBy=kubelet-dependencies.target\n","enabled":true,"name":"node-valid-hostname.service"},{"contents":"[Unit]\nDescription=Writes IP address configuration so that kubelet and crio services select a valid node IP\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service firstboot-osupdate.target\nBefore=kubelet-dependencies.target ovs-configuration.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/bin/podman run --rm \\\n --authfile /var/lib/kubelet/config.json \\\n --env 'ENABLE_NODEIP_DEBUG=true' \\\n --net=host \\\n --security-opt label=disable \\\n --volume /etc/systemd/system:/etc/systemd/system \\\n --volume /run/nodeip-configuration:/run/nodeip-configuration \\\n quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0e5c0acdd03dc840d7345ae397feaf6147a32a8fef89a0ac2ddc8d14b068c9ff \\\n node-ip \\\n set \\\n --retry-on-failure \\\n --network-type OVNKubernetes \\\n ${NODEIP_HINT:-${KUBELET_NODEIP_HINT:-}}; \\\n do \\\n sleep 5; \\\n done\"\nExecStart=/bin/systemctl daemon-reload\nExecStartPre=/bin/mkdir -p /run/nodeip-configuration\nStandardOutput=journal+console\nStandardError=journal+console\n\nEnvironmentFile=-/etc/default/nodeip-configuration\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"nodeip-configuration.service"},{"enabled":true,"name":"openvswitch.service"},{"contents":"[Unit]\n# Kdump will generate it's initramfs based on the running state when kdump.service run\n# If OVS has already run, the kdump fails to gather a working network config,\n# which prevent network log exports, sush as SSH.\n# See https://issues.redhat.com/browse/OCPBUGS-28239\nAfter=kdump.service\nDescription=Configures OVS with proper host networking configuration\n# This service is used to move a physical NIC into OVS and reconfigure OVS to use the host IP\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=firstboot-osupdate.target\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service nmstate.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nExecStart=/usr/local/bin/configure-ovs.sh OVNKubernetes\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"ovs-configuration.service"},{"dropins":[{"contents":"[Service]\nRestart=always\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /var/lib/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /etc/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /run/openvswitch'\nExecStartPost=-/usr/bin/ovs-appctl vlog/set syslog:info\nExecReload=-/usr/bin/ovs-appctl vlog/set syslog:info\n","name":"10-ovs-vswitchd-restart.conf"}],"name":"ovs-vswitchd.service"},{"dropins":[{"contents":"[Service]\nRestart=always\n","name":"10-ovsdb-restart.conf"}],"enabled":true,"name":"ovsdb-server.service"},{"dropins":[{"contents":"","name":"10-mco-default-env.conf"}],"name":"rpm-ostreed.service"},{"contents":"[Unit]\nDescription=Ensure IKE SA established for existing IPsec connections.\nAfter=ipsec.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\nType=oneshot\nExecStart=/usr/local/bin/ipsec-connect-wait.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=ipsec.service\n","enabled":true,"name":"wait-for-ipsec-connect.service"},{"contents":"[Unit]\nDescription=Ensure primary IP is assigned and usable\nRequires=nmstate.service\nAfter=nmstate.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/local/bin/wait-for-primary-ip.sh; \\\n do \\\n sleep 10; \\\n done\"\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"wait-for-primary-ip.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"zincati.service"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet After Reboot Cleanup\nBefore=kubelet.service\n\n[Service]\nType=oneshot\nExecStart=/bin/rm -f /var/lib/kubelet/cpu_manager_state\nExecStart=/bin/rm -f /var/lib/kubelet/memory_manager_state\nExecStart=-/bin/rm -f /var/lib/kubelet/dra_manager_state\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"kubelet-cleanup.service"}]}},"extensions":[],"fips":false,"kernelArguments":["systemd.unified_cgroup_hierarchy=1","cgroup_no_v1=\"all\"","psi=0"],"kernelType":"default","osImageURL":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:411b8fa606f0f605401f0a4477f7f5a3e640d42bd145fdc09b8a78272f8e6baf"}}config/machineconfigs/rendered-master-459a0309a4bacb184a38028403c86289.json0000640000000000000000000004333015114042226023505 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","metadata":{"annotations":{"machineconfiguration.openshift.io/generated-by-controller-version":"bb2aa85171d93b2df952ed802a8cb200164e666f","machineconfiguration.openshift.io/release-image-version":"4.18.28"},"creationTimestamp":"2025-12-03T14:00:43Z","generation":1,"name":"rendered-master-459a0309a4bacb184a38028403c86289","ownerReferences":[{"apiVersion":"machineconfiguration.openshift.io/v1","blockOwnerDeletion":true,"controller":true,"kind":"MachineConfigPool","name":"master","uid":"38c58006-59fd-4b95-8140-8c6cd4237522"}],"resourceVersion":"12597","uid":"04c1ab73-9f9a-44dd-8f4b-68ae44987a0b"},"spec":{"baseOSExtensionsContainerImage":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:72b0a0c9efb387b7bc098327fb451c359aa613f41cd90a7651d11588dee986a5","config":{"ignition":{"version":"3.4.0"},"passwd":{"users":null},"storage":{"disks":[{"device":"/dev/vdc","wipeTable":true},{"device":"/dev/vdd","wipeTable":true},{"device":"/dev/vde","wipeTable":true}],"files":null},"systemd":{"units":[{"contents":"[Unit]\nDescription=Cleans NetworkManager state generated by dracut\n# Removal of this file signals firstboot completion\nConditionPathExists=!/etc/ignition-machine-config-encapsulated.json\n# This is opt-in for some deployment types, and opt-out for others.\nConditionPathExists=/var/lib/mco/nm-clean-initrd-state\nWants=network-pre.target\nBefore=network-pre.target\n\n[Service]\nType=oneshot\n# Remove any existing state possibly generated NM run by dracut. We want NM to\n# consider all profiles autoconnect priority when it starts instead of\n# remembering which profile was a device activated with when NM is run by\n# dracut.\nExecStart=/usr/local/bin/nm-clean-initrd-state.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"NetworkManager-clean-initrd-state.service"},{"dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"ENABLE_PROFILE_UNIX_SOCKET=true\"\n","name":"10-mco-profile-unix-socket.conf"},{"contents":"[Unit]\nAfter=kubelet-dependencies.target\nRequires=kubelet-dependencies.target\n","name":"05-mco-ordering.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"name":"crio.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"docker.socket"},{"contents":"[Unit]\nDescription=The firstboot OS update has completed\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target\n\n[Install]\nWantedBy=default.target\n","enabled":true,"name":"firstboot-osupdate.target"},{"dropins":[{"contents":"[Unit]\nAfter=ovs-configuration.service\nBefore=crio.service\n","name":"01-after-configure-ovs.conf"}],"name":"ipsec.service"},{"contents":"[Unit]\nDescription=Dynamically sets the system reserved for the kubelet\nWants=network-online.target\nAfter=network-online.target firstboot-osupdate.target\nBefore=kubelet-dependencies.target\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nRemainAfterExit=yes\nEnvironmentFile=/etc/node-sizing-enabled.env\nExecStart=/bin/bash /usr/local/sbin/dynamic-system-reserved-calc.sh ${NODE_SIZING_ENABLED} ${SYSTEM_RESERVED_MEMORY} ${SYSTEM_RESERVED_CPU} ${SYSTEM_RESERVED_ES}\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"kubelet-auto-node-size.service"},{"contents":"[Unit]\nDescription=Dependencies necessary to run kubelet\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target network-online.target\nWants=NetworkManager-wait-online.service crio-wipe.service\nWants=rpc-statd.service chrony-wait.service\n","name":"kubelet-dependencies.target"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet\nRequires=crio.service kubelet-dependencies.target\nAfter=kubelet-dependencies.target\nAfter=ostree-finalize-staged.service\n\n[Service]\nType=notify\nExecStartPre=/bin/mkdir --parents /etc/kubernetes/manifests\nExecStartPre=-/usr/sbin/restorecon -ri /var/lib/kubelet/pod-resources /usr/local/bin/kubenswrapper /usr/bin/kubensenter\nEnvironment=\"KUBELET_NODE_IP=0.0.0.0\"\nEnvironmentFile=/etc/os-release\nEnvironmentFile=-/etc/kubernetes/kubelet-workaround\nEnvironmentFile=-/etc/kubernetes/kubelet-env\nEnvironmentFile=/etc/node-sizing.env\n\nExecStart=/usr/local/bin/kubenswrapper \\\n /usr/bin/kubelet \\\n --config=/etc/kubernetes/kubelet.conf \\\n --bootstrap-kubeconfig=/etc/kubernetes/kubeconfig \\\n --kubeconfig=/var/lib/kubelet/kubeconfig \\\n --container-runtime-endpoint=/var/run/crio/crio.sock \\\n --runtime-cgroups=/system.slice/crio.service \\\n --node-labels=node-role.kubernetes.io/control-plane,node-role.kubernetes.io/master,node.openshift.io/os_id=${ID} \\\n --node-ip=${KUBELET_NODE_IP} \\\n --minimum-container-ttl-duration=6m0s \\\n --cloud-provider= \\\n --volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec \\\n \\\n --hostname-override=${KUBELET_NODE_NAME} \\\n --provider-id=${KUBELET_PROVIDERID} \\\n --register-with-taints=node-role.kubernetes.io/master=:NoSchedule \\\n --pod-infra-container-image=quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fff930cf757e23d388d86d05942b76e44d3bda5e387b299c239e4d12545d26dd \\\n --system-reserved=cpu=${SYSTEM_RESERVED_CPU},memory=${SYSTEM_RESERVED_MEMORY},ephemeral-storage=${SYSTEM_RESERVED_ES} \\\n --v=${KUBELET_LOG_LEVEL}\n\nRestart=always\nRestartSec=10\n\n[Install]\nWantedBy=multi-user.target\n","dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"enabled":true,"name":"kubelet.service"},{"contents":"[Unit]\nDescription=Manages a mount namespace for kubernetes-specific mounts\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nRuntimeDirectory=kubens\nEnvironment=RUNTIME_DIRECTORY=%t/kubens\nEnvironment=BIND_POINT=%t/kubens/mnt\nEnvironment=ENVFILE=%t/kubens/env\n\n# Set up the runtime directory as an unbindable mountpoint\nExecStartPre=bash -c \"findmnt ${RUNTIME_DIRECTORY} || mount --make-unbindable --bind ${RUNTIME_DIRECTORY} ${RUNTIME_DIRECTORY}\"\n# Ensure the bind point exists\nExecStartPre=touch ${BIND_POINT}\n# Use 'unshare' to create the new mountpoint, then 'mount --make-rshared' so it cascades internally\nExecStart=unshare --mount=${BIND_POINT} --propagation slave mount --make-rshared /\n# Finally, set an env pointer for ease-of-use\nExecStartPost=bash -c 'echo \"KUBENSMNT=${BIND_POINT}\" \u003e \"${ENVFILE}\"'\n\n# On stop, a recursive unmount cleans up the namespace and bind-mounted unbindable parent directory\nExecStop=umount -R ${RUNTIME_DIRECTORY}\n\n[Install]\nWantedBy=multi-user.target\n","enabled":false,"name":"kubens.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Firstboot\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# Removal of this file signals firstboot completion\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\nAfter=machine-config-daemon-pull.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\n# Disable existing repos (if any) so that OS extensions would use embedded RPMs only\nExecStartPre=-/usr/bin/sh -c \"sed -i 's/enabled=1/enabled=0/' /etc/yum.repos.d/*.repo\"\n# Run this via podman because we want to use the nmstatectl binary in our container\nExecStart=/usr/bin/podman run --rm --privileged --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a31af646ce5587c051459a88df413dc30be81e7f15399aa909e19effa7de772a' firstboot-complete-machineconfig --persist-nics\nExecStart=/usr/bin/podman run --rm --privileged --pid=host --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a31af646ce5587c051459a88df413dc30be81e7f15399aa909e19effa7de772a' firstboot-complete-machineconfig\n[Install]\nRequiredBy=firstboot-osupdate.target\n","enabled":true,"name":"machine-config-daemon-firstboot.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Pull\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# This \"stamp file\" is unlinked when we complete\n# machine-config-daemon-firstboot.service\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\n# Run after crio-wipe so the pulled MCD image is protected against a corrupted storage from a forced shutdown\nWants=crio-wipe.service NetworkManager-wait-online.service\nAfter=crio-wipe.service NetworkManager-wait-online.service network.service\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nExecStartPre=/etc/machine-config-daemon/generate_podman_policy_args.sh\nExecStart=/bin/sh -c \"while ! /usr/bin/podman pull $(cat /tmp/podman_policy_args) --authfile=/var/lib/kubelet/config.json 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a31af646ce5587c051459a88df413dc30be81e7f15399aa909e19effa7de772a'; do sleep 1; done\"\n\n[Install]\nRequiredBy=machine-config-daemon-firstboot.service\n","enabled":true,"name":"machine-config-daemon-pull.service"},{"contents":"[Unit]\nDescription=Applies per-node NMState network configuration\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service\nBefore=nmstate.service kubelet-dependencies.target ovs-configuration.service node-valid-hostname.service\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/usr/local/bin/nmstate-configuration.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"nmstate-configuration.service"},{"contents":"[Unit]\nDescription=Apply nmstate on-disk state\nDocumentation=man:nmstate.service(8) https://www.nmstate.io\nAfter=NetworkManager-wait-online.service\nBefore=network-online.target\nWants=NetworkManager-wait-online.service\nRequires=NetworkManager.service\n\n[Service]\nType=oneshot\nExecStart=/usr/bin/nmstatectl service\nRemainAfterExit=yes\n\n[Install]\nWantedBy=NetworkManager.service\n","enabled":true,"name":"nmstate.service"},{"contents":"[Unit]\nDescription=Wait for a non-localhost hostname\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nUser=root\nExecStart=/usr/local/bin/mco-hostname --wait\n\n# Wait up to 5min for the node to get a non-localhost name\nTimeoutSec=300\n\n[Install]\n# TODO: Change this to RequiredBy after we fix https://github.com/openshift/machine-config-operator/pull/3865#issuecomment-1746963115\nWantedBy=kubelet-dependencies.target\n","enabled":true,"name":"node-valid-hostname.service"},{"contents":"[Unit]\nDescription=Writes IP address configuration so that kubelet and crio services select a valid node IP\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service firstboot-osupdate.target\nBefore=kubelet-dependencies.target ovs-configuration.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/bin/podman run --rm \\\n --authfile /var/lib/kubelet/config.json \\\n --env 'ENABLE_NODEIP_DEBUG=true' \\\n --net=host \\\n --security-opt label=disable \\\n --volume /etc/systemd/system:/etc/systemd/system \\\n --volume /run/nodeip-configuration:/run/nodeip-configuration \\\n quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0e5c0acdd03dc840d7345ae397feaf6147a32a8fef89a0ac2ddc8d14b068c9ff \\\n node-ip \\\n set \\\n --retry-on-failure \\\n --network-type OVNKubernetes \\\n ${NODEIP_HINT:-${KUBELET_NODEIP_HINT:-}}; \\\n do \\\n sleep 5; \\\n done\"\nExecStart=/bin/systemctl daemon-reload\nExecStartPre=/bin/mkdir -p /run/nodeip-configuration\nStandardOutput=journal+console\nStandardError=journal+console\n\nEnvironmentFile=-/etc/default/nodeip-configuration\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"nodeip-configuration.service"},{"enabled":true,"name":"openvswitch.service"},{"contents":"[Unit]\n# Kdump will generate it's initramfs based on the running state when kdump.service run\n# If OVS has already run, the kdump fails to gather a working network config,\n# which prevent network log exports, sush as SSH.\n# See https://issues.redhat.com/browse/OCPBUGS-28239\nAfter=kdump.service\nDescription=Configures OVS with proper host networking configuration\n# This service is used to move a physical NIC into OVS and reconfigure OVS to use the host IP\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=firstboot-osupdate.target\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service nmstate.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nExecStart=/usr/local/bin/configure-ovs.sh OVNKubernetes\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"ovs-configuration.service"},{"dropins":[{"contents":"[Service]\nRestart=always\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /var/lib/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /etc/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /run/openvswitch'\nExecStartPost=-/usr/bin/ovs-appctl vlog/set syslog:info\nExecReload=-/usr/bin/ovs-appctl vlog/set syslog:info\n","name":"10-ovs-vswitchd-restart.conf"}],"name":"ovs-vswitchd.service"},{"dropins":[{"contents":"[Service]\nRestart=always\n","name":"10-ovsdb-restart.conf"}],"enabled":true,"name":"ovsdb-server.service"},{"dropins":[{"contents":"","name":"10-mco-default-env.conf"},{"contents":"# See https://github.com/openshift/machine-config-operator/issues/1897\n[Service]\nNice=10\nIOSchedulingClass=best-effort\nIOSchedulingPriority=6\n","name":"mco-controlplane-nice.conf"}],"name":"rpm-ostreed.service"},{"contents":"[Unit]\nDescription=Ensure IKE SA established for existing IPsec connections.\nAfter=ipsec.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\nType=oneshot\nExecStart=/usr/local/bin/ipsec-connect-wait.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=ipsec.service\n","enabled":true,"name":"wait-for-ipsec-connect.service"},{"contents":"[Unit]\nDescription=Ensure primary IP is assigned and usable\nRequires=nmstate.service\nAfter=nmstate.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/local/bin/wait-for-primary-ip.sh; \\\n do \\\n sleep 10; \\\n done\"\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"wait-for-primary-ip.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"zincati.service"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet After Reboot Cleanup\nBefore=kubelet.service\n\n[Service]\nType=oneshot\nExecStart=/bin/rm -f /var/lib/kubelet/cpu_manager_state\nExecStart=/bin/rm -f /var/lib/kubelet/memory_manager_state\nExecStart=-/bin/rm -f /var/lib/kubelet/dra_manager_state\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"kubelet-cleanup.service"},{"contents":"[Unit]\nDescription=Run dnsmasq to provide local dns for Single Node OpenShift\nBefore=kubelet.service crio.service\nAfter=network.target ovs-configuration.service\n\n[Service]\nTimeoutStartSec=30\nExecStartPre=/usr/local/bin/dnsmasq_config.sh\nExecStart=/usr/sbin/dnsmasq -k\nRestart=always\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"dnsmasq.service"},{"enabled":true,"name":"iscsid.service"},{"contents":"[Unit]\nDescription=Create logical volume with name cinder-volumes.\nAfter=var.mount systemd-udev-settle.service\n\n[Service]\nType=oneshot\nExecCondition=/bin/bash -c '! /usr/sbin/vgdisplay cinder-volumes'\nExecStartPre=/usr/sbin/pvcreate /dev/vdc /dev/vdd /dev/vde\nExecStart=/usr/sbin/vgcreate cinder-volumes /dev/vdc /dev/vdd /dev/vde\nRemainAfterExit=yes\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"lv-cinder-volumes.service"},{"enabled":true,"name":"multipathd.service"}]}},"extensions":[],"fips":false,"kernelArguments":["net.ifnames=0","systemd.unified_cgroup_hierarchy=1","cgroup_no_v1=\"all\"","psi=0"],"kernelType":"default","osImageURL":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:411b8fa606f0f605401f0a4477f7f5a3e640d42bd145fdc09b8a78272f8e6baf"}}config/machineconfigs/rendered-master-2072f444cb169be2ed482bc255f04f4f.json0000640000000000000000000004322415114042226024012 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","metadata":{"annotations":{"machineconfiguration.openshift.io/generated-by-controller-version":"bb2aa85171d93b2df952ed802a8cb200164e666f","machineconfiguration.openshift.io/release-image-version":"4.18.28"},"creationTimestamp":"2025-12-03T14:00:37Z","generation":1,"name":"rendered-master-2072f444cb169be2ed482bc255f04f4f","ownerReferences":[{"apiVersion":"machineconfiguration.openshift.io/v1","blockOwnerDeletion":true,"controller":true,"kind":"MachineConfigPool","name":"master","uid":"38c58006-59fd-4b95-8140-8c6cd4237522"}],"resourceVersion":"12120","uid":"63eeefd9-f495-4d01-a844-8ed7f38c476b"},"spec":{"baseOSExtensionsContainerImage":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:72b0a0c9efb387b7bc098327fb451c359aa613f41cd90a7651d11588dee986a5","config":{"ignition":{"version":"3.4.0"},"passwd":{"users":null},"storage":{"disks":[{"device":"/dev/vdc","wipeTable":true},{"device":"/dev/vdd","wipeTable":true},{"device":"/dev/vde","wipeTable":true}],"files":null},"systemd":{"units":[{"contents":"[Unit]\nDescription=Cleans NetworkManager state generated by dracut\n# Removal of this file signals firstboot completion\nConditionPathExists=!/etc/ignition-machine-config-encapsulated.json\n# This is opt-in for some deployment types, and opt-out for others.\nConditionPathExists=/var/lib/mco/nm-clean-initrd-state\nWants=network-pre.target\nBefore=network-pre.target\n\n[Service]\nType=oneshot\n# Remove any existing state possibly generated NM run by dracut. We want NM to\n# consider all profiles autoconnect priority when it starts instead of\n# remembering which profile was a device activated with when NM is run by\n# dracut.\nExecStart=/usr/local/bin/nm-clean-initrd-state.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"NetworkManager-clean-initrd-state.service"},{"dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"ENABLE_PROFILE_UNIX_SOCKET=true\"\n","name":"10-mco-profile-unix-socket.conf"},{"contents":"[Unit]\nAfter=kubelet-dependencies.target\nRequires=kubelet-dependencies.target\n","name":"05-mco-ordering.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"name":"crio.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"docker.socket"},{"contents":"[Unit]\nDescription=The firstboot OS update has completed\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target\n\n[Install]\nWantedBy=default.target\n","enabled":true,"name":"firstboot-osupdate.target"},{"dropins":[{"contents":"[Unit]\nAfter=ovs-configuration.service\nBefore=crio.service\n","name":"01-after-configure-ovs.conf"}],"name":"ipsec.service"},{"contents":"[Unit]\nDescription=Dynamically sets the system reserved for the kubelet\nWants=network-online.target\nAfter=network-online.target firstboot-osupdate.target\nBefore=kubelet-dependencies.target\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nRemainAfterExit=yes\nEnvironmentFile=/etc/node-sizing-enabled.env\nExecStart=/bin/bash /usr/local/sbin/dynamic-system-reserved-calc.sh ${NODE_SIZING_ENABLED} ${SYSTEM_RESERVED_MEMORY} ${SYSTEM_RESERVED_CPU} ${SYSTEM_RESERVED_ES}\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"kubelet-auto-node-size.service"},{"contents":"[Unit]\nDescription=Dependencies necessary to run kubelet\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target network-online.target\nWants=NetworkManager-wait-online.service crio-wipe.service\nWants=rpc-statd.service chrony-wait.service\n","name":"kubelet-dependencies.target"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet\nRequires=crio.service kubelet-dependencies.target\nAfter=kubelet-dependencies.target\nAfter=ostree-finalize-staged.service\n\n[Service]\nType=notify\nExecStartPre=/bin/mkdir --parents /etc/kubernetes/manifests\nExecStartPre=-/usr/sbin/restorecon -ri /var/lib/kubelet/pod-resources /usr/local/bin/kubenswrapper /usr/bin/kubensenter\nEnvironment=\"KUBELET_NODE_IP=0.0.0.0\"\nEnvironmentFile=/etc/os-release\nEnvironmentFile=-/etc/kubernetes/kubelet-workaround\nEnvironmentFile=-/etc/kubernetes/kubelet-env\nEnvironmentFile=/etc/node-sizing.env\n\nExecStart=/usr/local/bin/kubenswrapper \\\n /usr/bin/kubelet \\\n --config=/etc/kubernetes/kubelet.conf \\\n --bootstrap-kubeconfig=/etc/kubernetes/kubeconfig \\\n --kubeconfig=/var/lib/kubelet/kubeconfig \\\n --container-runtime-endpoint=/var/run/crio/crio.sock \\\n --runtime-cgroups=/system.slice/crio.service \\\n --node-labels=node-role.kubernetes.io/control-plane,node-role.kubernetes.io/master,node.openshift.io/os_id=${ID} \\\n --node-ip=${KUBELET_NODE_IP} \\\n --minimum-container-ttl-duration=6m0s \\\n --cloud-provider= \\\n --volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec \\\n \\\n --hostname-override=${KUBELET_NODE_NAME} \\\n --provider-id=${KUBELET_PROVIDERID} \\\n --register-with-taints=node-role.kubernetes.io/master=:NoSchedule \\\n --pod-infra-container-image=quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fff930cf757e23d388d86d05942b76e44d3bda5e387b299c239e4d12545d26dd \\\n --system-reserved=cpu=${SYSTEM_RESERVED_CPU},memory=${SYSTEM_RESERVED_MEMORY},ephemeral-storage=${SYSTEM_RESERVED_ES} \\\n --v=${KUBELET_LOG_LEVEL}\n\nRestart=always\nRestartSec=10\n\n[Install]\nWantedBy=multi-user.target\n","dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"enabled":true,"name":"kubelet.service"},{"contents":"[Unit]\nDescription=Manages a mount namespace for kubernetes-specific mounts\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nRuntimeDirectory=kubens\nEnvironment=RUNTIME_DIRECTORY=%t/kubens\nEnvironment=BIND_POINT=%t/kubens/mnt\nEnvironment=ENVFILE=%t/kubens/env\n\n# Set up the runtime directory as an unbindable mountpoint\nExecStartPre=bash -c \"findmnt ${RUNTIME_DIRECTORY} || mount --make-unbindable --bind ${RUNTIME_DIRECTORY} ${RUNTIME_DIRECTORY}\"\n# Ensure the bind point exists\nExecStartPre=touch ${BIND_POINT}\n# Use 'unshare' to create the new mountpoint, then 'mount --make-rshared' so it cascades internally\nExecStart=unshare --mount=${BIND_POINT} --propagation slave mount --make-rshared /\n# Finally, set an env pointer for ease-of-use\nExecStartPost=bash -c 'echo \"KUBENSMNT=${BIND_POINT}\" \u003e \"${ENVFILE}\"'\n\n# On stop, a recursive unmount cleans up the namespace and bind-mounted unbindable parent directory\nExecStop=umount -R ${RUNTIME_DIRECTORY}\n\n[Install]\nWantedBy=multi-user.target\n","enabled":false,"name":"kubens.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Firstboot\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# Removal of this file signals firstboot completion\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\nAfter=machine-config-daemon-pull.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\n# Disable existing repos (if any) so that OS extensions would use embedded RPMs only\nExecStartPre=-/usr/bin/sh -c \"sed -i 's/enabled=1/enabled=0/' /etc/yum.repos.d/*.repo\"\n# Run this via podman because we want to use the nmstatectl binary in our container\nExecStart=/usr/bin/podman run --rm --privileged --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a31af646ce5587c051459a88df413dc30be81e7f15399aa909e19effa7de772a' firstboot-complete-machineconfig --persist-nics\nExecStart=/usr/bin/podman run --rm --privileged --pid=host --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a31af646ce5587c051459a88df413dc30be81e7f15399aa909e19effa7de772a' firstboot-complete-machineconfig\n[Install]\nRequiredBy=firstboot-osupdate.target\n","enabled":true,"name":"machine-config-daemon-firstboot.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Pull\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# This \"stamp file\" is unlinked when we complete\n# machine-config-daemon-firstboot.service\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\n# Run after crio-wipe so the pulled MCD image is protected against a corrupted storage from a forced shutdown\nWants=crio-wipe.service NetworkManager-wait-online.service\nAfter=crio-wipe.service NetworkManager-wait-online.service network.service\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nExecStartPre=/etc/machine-config-daemon/generate_podman_policy_args.sh\nExecStart=/bin/sh -c \"while ! /usr/bin/podman pull $(cat /tmp/podman_policy_args) --authfile=/var/lib/kubelet/config.json 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a31af646ce5587c051459a88df413dc30be81e7f15399aa909e19effa7de772a'; do sleep 1; done\"\n\n[Install]\nRequiredBy=machine-config-daemon-firstboot.service\n","enabled":true,"name":"machine-config-daemon-pull.service"},{"contents":"[Unit]\nDescription=Applies per-node NMState network configuration\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service\nBefore=nmstate.service kubelet-dependencies.target ovs-configuration.service node-valid-hostname.service\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/usr/local/bin/nmstate-configuration.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"nmstate-configuration.service"},{"contents":"[Unit]\nDescription=Apply nmstate on-disk state\nDocumentation=man:nmstate.service(8) https://www.nmstate.io\nAfter=NetworkManager-wait-online.service\nBefore=network-online.target\nWants=NetworkManager-wait-online.service\nRequires=NetworkManager.service\n\n[Service]\nType=oneshot\nExecStart=/usr/bin/nmstatectl service\nRemainAfterExit=yes\n\n[Install]\nWantedBy=NetworkManager.service\n","enabled":true,"name":"nmstate.service"},{"contents":"[Unit]\nDescription=Wait for a non-localhost hostname\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nUser=root\nExecStart=/usr/local/bin/mco-hostname --wait\n\n# Wait up to 5min for the node to get a non-localhost name\nTimeoutSec=300\n\n[Install]\n# TODO: Change this to RequiredBy after we fix https://github.com/openshift/machine-config-operator/pull/3865#issuecomment-1746963115\nWantedBy=kubelet-dependencies.target\n","enabled":true,"name":"node-valid-hostname.service"},{"contents":"[Unit]\nDescription=Writes IP address configuration so that kubelet and crio services select a valid node IP\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service firstboot-osupdate.target\nBefore=kubelet-dependencies.target ovs-configuration.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/bin/podman run --rm \\\n --authfile /var/lib/kubelet/config.json \\\n --env 'ENABLE_NODEIP_DEBUG=true' \\\n --net=host \\\n --security-opt label=disable \\\n --volume /etc/systemd/system:/etc/systemd/system \\\n --volume /run/nodeip-configuration:/run/nodeip-configuration \\\n quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0e5c0acdd03dc840d7345ae397feaf6147a32a8fef89a0ac2ddc8d14b068c9ff \\\n node-ip \\\n set \\\n --retry-on-failure \\\n --network-type OVNKubernetes \\\n ${NODEIP_HINT:-${KUBELET_NODEIP_HINT:-}}; \\\n do \\\n sleep 5; \\\n done\"\nExecStart=/bin/systemctl daemon-reload\nExecStartPre=/bin/mkdir -p /run/nodeip-configuration\nStandardOutput=journal+console\nStandardError=journal+console\n\nEnvironmentFile=-/etc/default/nodeip-configuration\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"nodeip-configuration.service"},{"enabled":true,"name":"openvswitch.service"},{"contents":"[Unit]\n# Kdump will generate it's initramfs based on the running state when kdump.service run\n# If OVS has already run, the kdump fails to gather a working network config,\n# which prevent network log exports, sush as SSH.\n# See https://issues.redhat.com/browse/OCPBUGS-28239\nAfter=kdump.service\nDescription=Configures OVS with proper host networking configuration\n# This service is used to move a physical NIC into OVS and reconfigure OVS to use the host IP\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=firstboot-osupdate.target\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service nmstate.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nExecStart=/usr/local/bin/configure-ovs.sh OVNKubernetes\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"ovs-configuration.service"},{"dropins":[{"contents":"[Service]\nRestart=always\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /var/lib/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /etc/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /run/openvswitch'\nExecStartPost=-/usr/bin/ovs-appctl vlog/set syslog:info\nExecReload=-/usr/bin/ovs-appctl vlog/set syslog:info\n","name":"10-ovs-vswitchd-restart.conf"}],"name":"ovs-vswitchd.service"},{"dropins":[{"contents":"[Service]\nRestart=always\n","name":"10-ovsdb-restart.conf"}],"enabled":true,"name":"ovsdb-server.service"},{"dropins":[{"contents":"","name":"10-mco-default-env.conf"},{"contents":"# See https://github.com/openshift/machine-config-operator/issues/1897\n[Service]\nNice=10\nIOSchedulingClass=best-effort\nIOSchedulingPriority=6\n","name":"mco-controlplane-nice.conf"}],"name":"rpm-ostreed.service"},{"contents":"[Unit]\nDescription=Ensure IKE SA established for existing IPsec connections.\nAfter=ipsec.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\nType=oneshot\nExecStart=/usr/local/bin/ipsec-connect-wait.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=ipsec.service\n","enabled":true,"name":"wait-for-ipsec-connect.service"},{"contents":"[Unit]\nDescription=Ensure primary IP is assigned and usable\nRequires=nmstate.service\nAfter=nmstate.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/local/bin/wait-for-primary-ip.sh; \\\n do \\\n sleep 10; \\\n done\"\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"wait-for-primary-ip.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"zincati.service"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet After Reboot Cleanup\nBefore=kubelet.service\n\n[Service]\nType=oneshot\nExecStart=/bin/rm -f /var/lib/kubelet/cpu_manager_state\nExecStart=/bin/rm -f /var/lib/kubelet/memory_manager_state\nExecStart=-/bin/rm -f /var/lib/kubelet/dra_manager_state\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"kubelet-cleanup.service"},{"contents":"[Unit]\nDescription=Run dnsmasq to provide local dns for Single Node OpenShift\nBefore=kubelet.service crio.service\nAfter=network.target ovs-configuration.service\n\n[Service]\nTimeoutStartSec=30\nExecStartPre=/usr/local/bin/dnsmasq_config.sh\nExecStart=/usr/sbin/dnsmasq -k\nRestart=always\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"dnsmasq.service"},{"enabled":true,"name":"iscsid.service"},{"contents":"[Unit]\nDescription=Create logical volume with name cinder-volumes.\nAfter=var.mount systemd-udev-settle.service\n\n[Service]\nType=oneshot\nExecCondition=/bin/bash -c '! /usr/sbin/vgdisplay cinder-volumes'\nExecStartPre=/usr/sbin/pvcreate /dev/vdc /dev/vdd /dev/vde\nExecStart=/usr/sbin/vgcreate cinder-volumes /dev/vdc /dev/vdd /dev/vde\nRemainAfterExit=yes\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"lv-cinder-volumes.service"},{"enabled":true,"name":"multipathd.service"}]}},"extensions":[],"fips":false,"kernelArguments":["net.ifnames=0"],"kernelType":"default","osImageURL":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:411b8fa606f0f605401f0a4477f7f5a3e640d42bd145fdc09b8a78272f8e6baf"}}aggregated/ingress_controllers_certs.json0000640000000000000000000000045715114042226017530 0ustar0000000000000000[{"name":"router-ca","namespace":"openshift-ingress-operator","not_before":"2025-12-03T13:55:57Z","not_after":"2027-12-03T13:55:58Z","controllers":[]},{"name":"router-certs-default","namespace":"openshift-ingress","not_before":"2025-12-03T13:55:58Z","not_after":"2027-12-03T13:55:59Z","controllers":[]}]config/running_containers.json0000640000000000000000000001470615114042226015312 0ustar0000000000000000{"images":{"0":"sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","1":"sha256:a17e9d83aeb6de5f0851aaacd1a9ebddbc8a4ac3ece2e4af8670aa0c33b8fc9c","10":"sha256:3d835ce07d1bec4a4b13f0bca5ea20ea5c781ea7853d7b42310f4ad8aeba6d7c","11":"sha256:ff94e909d3b037c815e8ae67989a7616936e67195b758abac6b5d3f0d59562c8","12":"sha256:68dbccdff76515d5b659c9c2d031235073d292cb56a5385f8e69d24ac5f48b8f","13":"sha256:51a4c20765f54b6a6b5513f97cf54bb99631c2abe860949293456886a74f87fe","14":"sha256:da806db797ef2b291ff0ce5f302e88a0cb74e57f253b8fe76296f969512cd79e","15":"sha256:da6f62afd2795d1b0af69532a5534c099bbb81d4e7abd2616b374db191552c51","16":"sha256:debbfa579e627e291b629851278c9e608e080a1642a6e676d023f218252a3ed0","17":"sha256:3ef6fd8a728768571ca93950ec6d7222c9304a98d81b58329eeb7974fa2c8dc8","18":"sha256:492103a8365ef9a1d5f237b4ba90aff87369167ec91db29ff0251ba5aab2b419","19":"sha256:e8f313372fe49afad871cc56225dcd4d31bed249abeab55fb288e1f854138fbf","2":"sha256:dc72da7f7930eb09abf6f8dbe577bb537e3a2a59dc0e14a4319b42c0212218d1","20":"sha256:e955ac7de27deecd1a88d06c08a1b7a43e867cadf4289f20a6ab982fa647e6b7","21":"sha256:b99ce0f31213291444482af4af36345dc93acdbe965868073e8232797b8a2f14","22":"sha256:912759ba49a70e63f7585b351b1deed008b5815d275f478f052c8c2880101d3c","23":"sha256:eefdc67602b8bc3941001b030ab95d82e10432f814634b80eb8ce45bc9ebd3de","24":"sha256:98ce2d349f8bc693d76d9a68097b758b987cf17ea3beb66bbd09d12fa78b4d0c","25":"sha256:6199be91b821875ba2609cf7fa886b74b9a8b573622fe33cc1bc39cd55acac08","26":"sha256:49a6a3308d885301c7718a465f1af2d08a617abbdff23352d5422d1ae4af33cf","27":"sha256:32236659da74056138c839429f304a96ba36dd304d7eefb6b2618ecfdf6308e3","28":"sha256:6dd80564094a262c1bb53c037288c9c69a46b22dc7dd3ee5c52384404ebfdc81","29":"sha256:ae8c6193ace2c439dd93d8129f68f3704727650851a628c906bff9290940ef03","3":"sha256:0c921698d30c8175da0c124f72748e93551d6903b0f34d26743b60cb12d25cb1","30":"sha256:7825952834ade266ce08d1a9eb0665e4661dea0a40647d3e1de2cf6266665e9d","31":"sha256:dc9758be9f0f0a480fb5e119ecb1e1101ef807bdc765a155212a8188d79b9e60","32":"registry.redhat.io/redhat/redhat-marketplace-index:v4.18","33":"sha256:dfc0403f71f7c926db1084c7fb5fb4f19007271213ee34f6f3d3eecdbe817d6b","34":"sha256:607e31ebb2c85f53775455b38a607a68cb2bdab1e369f03c57e715a4ebb88831","35":"registry.redhat.io/redhat/community-operator-index:v4.18","36":"sha256:2e254a7fb8a2643817718cfdb54bc819e86eb84232f6e2456548c55c5efb09d2","37":"sha256:eac937aae64688cb47b38ad2cbba5aa7e6d41c691df1f3ca4ff81e5117084d1e","38":"sha256:36fa1378b9c26de6d45187b1e7352f3b1147109427fab3669b107d81fd967601","39":"sha256:4a3e2790bda8898df5e4e9cf1878103ac483ea1633819d76ea68976b0b2062b6","4":"sha256:91cbda9693e888881e7c45cd6e504b91ba8a203fe0596237a4a17b3ca4e18eef","40":"sha256:e0e3400f1cb68a205bfb841b6b1a78045e7d80703830aa64979d46418d19c835","41":"sha256:903557bdbb44cf720481cc9b305a8060f327435d303c95e710b92669ff43d055","42":"sha256:89b279931fe13f3b33c9dd6cdf0f5e7fc3e5384b944f998034d35af7242a47fa","43":"sha256:8e8903affdf29401b9a86b9f58795c9f445f34194960c7b2734f30601c48cbdf","44":"sha256:2f86d9ffe13cbab06ff676496b50a26bbc4819d8b81b98fbacca6aee9b56792f","45":"sha256:3ed4dc45b0e0d6229620e2ac6a53ecd180cad44a11daf9f0170d94b4acd35ded","46":"sha256:93145fd0c004dc4fca21435a32c7e55e962f321aff260d702f387cfdebee92a5","47":"sha256:d12d87386ab9c19148c49c1e79d839a6f47f3a2cd7e078d94319d80b6936be13","48":"sha256:0d866f93bed16cfebd8019ad6b89a4dd4abedfc20ee5d28d7edad045e7df0fda","49":"sha256:58ed827ee19ac91b6f860d307797b24b8aec02e671605388c4afe4fa19ddfc36","5":"sha256:d0bb91faa6e9f82b589a6535665e51517abe4a1b2eb5d0b3a36b36df6a5330a0","50":"sha256:84a52132860e74998981b76c08d38543561197c3da77836c670fa8e394c5ec17","51":"sha256:ceaa4102b35e54be54e23c8ea73bb0dac4978cffb54105ad00b51393f47595da","52":"sha256:656fe650bac2929182cd0cf7d7e566d089f69e06541b8329c6d40b89346c03ca","53":"sha256:23aa409d98c18a25b5dd3c14b4c5a88eba2c793d020f2deb3bafd58a2225c328","54":"sha256:44e82a51fce7b5996b183c10c44bd79b0e1ae2257fd5809345fbca1c50aaa08f","55":"sha256:c2b518cb834a0b6ca50d73eceb5f8e64aefb09094d39e4ba0d8e4632f6cdf908","56":"sha256:d0c6de747539dd00ede882fb4f73cead462bf0a7efda7173fd5d443ef7a00251","57":"sha256:3051af3343018fecbf3a6edacea69de841fc5211c09e7fb6a2499188dc979395","58":"sha256:2d41c3e944e86b73b4ba0d037ff016562211988f3206b9deb6cc7dccca708248","59":"sha256:3d886210d2faa9ace5750adfc70c0c3c5512cdf492f19d1c536a446db659aabb","6":"sha256:6363cc3335d2a930fa0e4e6c6c3515fa0ef85e9d7abb3b3007fbb185eabb498f","60":"sha256:3a2ef63f356c11ba629d8038474ab287797340de1219b4fee97c386975689110","61":"sha256:ef51f50a9bf1b4dfa6fdb7b484eae9e3126e813b48f380c833dd7eaf4e55853e","62":"sha256:ee896bce586a3fcd37b4be8165cf1b4a83e88b5d47667de10475ec43e31b7926","63":"sha256:b0737727dcbfb50c3c09b69684ba3c07b5a4ab7652bbe4970a46d6a11c4a2bca","64":"sha256:98c80d92a2ef8d44ee625b229b77b7bfdb1b06cbfe0d4df9e2ca2cba904467f7","65":"sha256:78f6aebe76fa9da71b631ceced1ed159d8b60a6fa8e0325fd098c7b029039e89","66":"sha256:2ad82327a0c3eac3d7a73ca67630eaf63bafc37514ea75cb6e8b51e995458b01","67":"registry.redhat.io/redhat/certified-operator-index:v4.18","68":"sha256:3cc3977d34490059b692d5fbdb89bb9a676db39c88faa35f5d9b4e98f6b0c4e2","69":"sha256:b4e0b20fdb38d516e871ff5d593c4273cc9933cb6a65ec93e727ca4a7777fd20","7":"sha256:a31af646ce5587c051459a88df413dc30be81e7f15399aa909e19effa7de772a","70":"sha256:30948d73ae763e995468b7e0767b855425ccbbbef13667a2fd3ba06b3c40a165","71":"sha256:b294511902fd7a80e135b23895a944570932dc0fab1ee22f296523840740332e","72":"sha256:f870aa3c7bcd039c7905b2c7a9e9c0776d76ed4cf34ccbef872ae7ad8cf2157f","73":"sha256:e39fd49a8aa33e4b750267b4e773492b85c08cc7830cd7b22e64a92bcb5b6729","74":"sha256:ebd79294a663cb38370ae81f9cda91cef7fb1370ec5b495b4bdb95e77272e6a8","75":"sha256:4cb6ecfb89e53653b69ae494ebc940b9fcf7b7db317b156e186435cc541589d9","76":"sha256:f8a38d71a75c4fa803249cc709d60039d14878e218afd88a86083526ee8f78ad","8":"sha256:d3c0962dbbad51633a7d97ef253d0249269bfe3bbef3bfe99a99457470e7a682","9":"sha256:ca4933b9ba55069205ea53970128c4e8c4b46560ef721c8aaee00aaf736664b5"},"containers":{"2025-12":{"0":37,"1":10,"10":3,"11":3,"12":2,"13":2,"14":2,"15":2,"16":2,"17":2,"18":2,"19":2,"2":7,"20":2,"21":2,"22":2,"23":2,"24":2,"25":2,"26":2,"27":2,"28":2,"29":1,"3":6,"30":1,"31":1,"32":1,"33":1,"34":1,"35":1,"36":1,"37":1,"38":1,"39":1,"4":6,"40":1,"41":1,"42":1,"43":1,"44":1,"45":1,"46":1,"47":1,"48":1,"49":1,"5":5,"50":1,"51":1,"52":1,"53":1,"54":1,"55":1,"56":1,"57":1,"58":1,"59":1,"6":4,"60":1,"61":1,"62":1,"63":1,"64":1,"65":1,"66":1,"67":1,"68":1,"69":1,"7":4,"70":1,"71":1,"72":1,"73":1,"74":1,"75":1,"76":1,"8":3,"9":3}}}config/pod/openshift-marketplace/redhat-operators-6z4sc.json0000640000000000000000000002231015114042226022674 0ustar0000000000000000{"metadata":{"name":"redhat-operators-6z4sc","generateName":"redhat-operators-","namespace":"openshift-marketplace","uid":"911f6333-cdb0-425c-b79b-f892444b7097","resourceVersion":"16468","creationTimestamp":"2025-12-03T13:59:15Z","labels":{"olm.catalogSource":"redhat-operators","olm.managed":"true","olm.pod-spec-hash":"9T8zfQVVRXmfHukuRKkZok22u2CUCQxHJmZMvv"},"annotations":{"cluster-autoscaler.kubernetes.io/safe-to-evict":"true","k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.69/23\"],\"mac_address\":\"0a:58:0a:80:00:45\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.69/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.69\"\n ],\n \"mac\": \"0a:58:0a:80:00:45\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","operatorframework.io/managed-by":"marketplace-operator","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"operators.coreos.com/v1alpha1","kind":"CatalogSource","name":"redhat-operators","uid":"d5bd5ea6-42d2-4127-82a5-20787463181c","controller":true,"blockOwnerDeletion":false}]},"spec":{"volumes":[{"name":"utilities","emptyDir":{}},{"name":"catalog-content","emptyDir":{}},{"name":"kube-api-access-mhf9r","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"initContainers":[{"name":"extract-utilities","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:dc72da7f7930eb09abf6f8dbe577bb537e3a2a59dc0e14a4319b42c0212218d1","command":["cp"],"args":["/bin/copy-content","/utilities/copy-content"],"resources":{},"volumeMounts":[{"name":"utilities","mountPath":"/utilities"},{"name":"kube-api-access-mhf9r","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000190000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}},{"name":"extract-content","image":"registry.redhat.io/redhat/redhat-operator-index:v4.18","command":["/utilities/copy-content"],"args":["--catalog.from=/configs","--catalog.to=/extracted-catalog/catalog","--cache.from=/tmp/cache","--cache.to=/extracted-catalog/cache"],"resources":{},"volumeMounts":[{"name":"utilities","mountPath":"/utilities"},{"name":"catalog-content","mountPath":"/extracted-catalog"},{"name":"kube-api-access-mhf9r","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"Always","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000190000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"containers":[{"name":"registry-server","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d3c0962dbbad51633a7d97ef253d0249269bfe3bbef3bfe99a99457470e7a682","command":["/bin/opm"],"args":["serve","/extracted-catalog/catalog","--cache-dir=/extracted-catalog/cache"],"ports":[{"name":"grpc","containerPort":50051,"protocol":"TCP"}],"env":[{"name":"GOMEMLIMIT","value":"30MiB"}],"resources":{"requests":{"cpu":"10m","memory":"30Mi"}},"volumeMounts":[{"name":"catalog-content","mountPath":"/extracted-catalog"},{"name":"kube-api-access-mhf9r","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"exec":{"command":["grpc_health_probe","-addr=:50051"]},"initialDelaySeconds":10,"timeoutSeconds":5,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"exec":{"command":["grpc_health_probe","-addr=:50051"]},"initialDelaySeconds":5,"timeoutSeconds":5,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"exec":{"command":["grpc_health_probe","-addr=:50051"]},"timeoutSeconds":5,"periodSeconds":10,"successThreshold":1,"failureThreshold":10},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"Always","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000190000,"runAsNonRoot":true,"readOnlyRootFilesystem":false,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"redhat-operators","serviceAccount":"redhat-operators","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c14,c4"},"fsGroup":1000190000,"seccompProfile":{"type":"RuntimeDefault"}},"imagePullSecrets":[{"name":"redhat-operators-dockercfg-2fgkw"}],"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:59Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:00:23Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:20Z","reason":"ContainersNotReady","message":"containers with unready status: [registry-server]"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:20Z","reason":"ContainersNotReady","message":"containers with unready status: [registry-server]"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:00:10Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.69","podIPs":[{"ip":"10.128.0.69"}],"startTime":"2025-12-03T14:00:10Z","initContainerStatuses":[{"name":"extract-utilities","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2025-12-03T14:08:59Z","finishedAt":"2025-12-03T14:08:59Z","containerID":"cri-o://5d13d981728eca417e8af84ce65bff50dd0e00356f143352f8595b318e33c624"}},"lastState":{},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:dc72da7f7930eb09abf6f8dbe577bb537e3a2a59dc0e14a4319b42c0212218d1","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:dc72da7f7930eb09abf6f8dbe577bb537e3a2a59dc0e14a4319b42c0212218d1","containerID":"cri-o://5d13d981728eca417e8af84ce65bff50dd0e00356f143352f8595b318e33c624","started":false,"volumeMounts":[{"name":"utilities","mountPath":"/utilities"},{"name":"kube-api-access-mhf9r","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"extract-content","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2025-12-03T14:00:22Z","finishedAt":"2025-12-03T14:00:22Z","containerID":"cri-o://d433101d60e298c30c7d105d80b92d8e74a6cb93a14fb671416c963c3c89b31b"}},"lastState":{},"ready":true,"restartCount":0,"image":"registry.redhat.io/redhat/redhat-operator-index:v4.18","imageID":"registry.redhat.io/redhat/redhat-operator-index@sha256:416a7dc57b2b95775e679e0ab93111baaa063e55a4c6d73856a248d85a2debbd","containerID":"cri-o://d433101d60e298c30c7d105d80b92d8e74a6cb93a14fb671416c963c3c89b31b","started":false,"volumeMounts":[{"name":"utilities","mountPath":"/utilities"},{"name":"catalog-content","mountPath":"/extracted-catalog"},{"name":"kube-api-access-mhf9r","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"containerStatuses":[{"name":"registry-server","state":{"waiting":{"reason":"PodInitializing"}},"lastState":{"terminated":{"exitCode":137,"reason":"ContainerStatusUnknown","message":"The container could not be located when the pod was deleted. The container used to be Running","startedAt":null,"finishedAt":null}},"ready":false,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d3c0962dbbad51633a7d97ef253d0249269bfe3bbef3bfe99a99457470e7a682","imageID":"","started":false,"volumeMounts":[{"name":"catalog-content","mountPath":"/extracted-catalog"},{"name":"kube-api-access-mhf9r","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-apiserver/installer-4-master-0.json0000640000000000000000000001511215114042226022664 0ustar0000000000000000{"metadata":{"name":"installer-4-master-0","namespace":"openshift-kube-apiserver","uid":"0b1e0884-ff54-419b-90d3-25f561a6391d","resourceVersion":"14262","creationTimestamp":"2025-12-03T14:01:21Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.93/23\"],\"mac_address\":\"0a:58:0a:80:00:5d\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.93/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.93\"\n ],\n \"mac\": \"0a:58:0a:80:00:5d\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-4","uid":"9bbdb210-c655-4332-9759-9bc8b8114c55"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:91cbda9693e888881e7c45cd6e504b91ba8a203fe0596237a4a17b3ca4e18eef","command":["cluster-kube-apiserver-operator","installer"],"args":["-v=2","--revision=4","--namespace=openshift-kube-apiserver","--pod=kube-apiserver-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-apiserver-pod","--configmaps=config","--configmaps=kube-apiserver-cert-syncer-kubeconfig","--optional-configmaps=oauth-metadata","--optional-configmaps=cloud-config","--configmaps=bound-sa-token-signing-certs","--configmaps=etcd-serving-ca","--optional-configmaps=kube-apiserver-server-ca","--configmaps=kubelet-serving-ca","--configmaps=sa-token-signing-certs","--configmaps=kube-apiserver-audit-policies","--secrets=etcd-client","--optional-secrets=encryption-config","--secrets=localhost-recovery-serving-certkey","--secrets=localhost-recovery-client-token","--optional-secrets=webhook-authenticator","--cert-dir=/etc/kubernetes/static-pod-resources/kube-apiserver-certs","--cert-configmaps=aggregator-client-ca","--cert-configmaps=client-ca","--optional-cert-configmaps=trusted-ca-bundle","--cert-configmaps=control-plane-node-kubeconfig","--cert-configmaps=check-endpoints-kubeconfig","--cert-secrets=aggregator-client","--cert-secrets=localhost-serving-cert-certkey","--cert-secrets=service-network-serving-certkey","--cert-secrets=external-loadbalancer-serving-certkey","--cert-secrets=internal-loadbalancer-serving-certkey","--cert-secrets=bound-service-account-signing-key","--cert-secrets=control-plane-node-admin-client-cert-key","--cert-secrets=check-endpoints-client-cert-key","--cert-secrets=kubelet-client","--cert-secrets=node-kubeconfigs","--optional-cert-secrets=user-serving-cert","--optional-cert-secrets=user-serving-cert-000","--optional-cert-secrets=user-serving-cert-001","--optional-cert-secrets=user-serving-cert-002","--optional-cert-secrets=user-serving-cert-003","--optional-cert-secrets=user-serving-cert-004","--optional-cert-secrets=user-serving-cert-005","--optional-cert-secrets=user-serving-cert-006","--optional-cert-secrets=user-serving-cert-007","--optional-cert-secrets=user-serving-cert-008","--optional-cert-secrets=user-serving-cert-009"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"imagePullSecrets":[{"name":"installer-sa-dockercfg-x2zgz"}],"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:20Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:01:26Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:20Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:20Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:01:26Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"startTime":"2025-12-03T14:01:26Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":137,"reason":"ContainerStatusUnknown","message":"The container could not be located when the pod was terminated","startedAt":null,"finishedAt":null}},"lastState":{"terminated":{"exitCode":137,"reason":"ContainerStatusUnknown","message":"The container could not be located when the pod was deleted. The container used to be Running","startedAt":null,"finishedAt":null}},"ready":false,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:91cbda9693e888881e7c45cd6e504b91ba8a203fe0596237a4a17b3ca4e18eef","imageID":"","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}config/pod/openshift-cluster-machine-approver/machine-approver-cb84b9cdf-qn94w.json0000640000000000000000000001662015114042226026766 0ustar0000000000000000{"metadata":{"name":"machine-approver-cb84b9cdf-qn94w","generateName":"machine-approver-cb84b9cdf-","namespace":"openshift-cluster-machine-approver","uid":"a9b62b2f-1e7a-4f1b-a988-4355d93dda46","resourceVersion":"15354","creationTimestamp":"2025-12-03T13:59:12Z","labels":{"app":"machine-approver","pod-template-hash":"cb84b9cdf"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"machine-approver-cb84b9cdf","uid":"8ff13078-c23c-4a1c-93f5-dfad6e2a4181","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"auth-proxy-config","configMap":{"name":"kube-rbac-proxy","defaultMode":420}},{"name":"machine-approver-tls","secret":{"secretName":"machine-approver-tls","defaultMode":420}},{"name":"config","configMap":{"name":"machine-approver-config","defaultMode":440,"optional":true}},{"name":"kube-api-access-gsjls","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","args":["--secure-listen-address=0.0.0.0:9192","--upstream=http://127.0.0.1:9191/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key","--config-file=/etc/kube-rbac-proxy/config-file.yaml","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305","--logtostderr=true","--v=3"],"ports":[{"name":"https","hostPort":9192,"containerPort":9192,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"auth-proxy-config","mountPath":"/etc/kube-rbac-proxy"},{"name":"machine-approver-tls","mountPath":"/etc/tls/private"},{"name":"kube-api-access-gsjls","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"machine-approver-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9f4724570795357eb097251a021f20c94c79b3054f3adb3bc0812143ba791dc1","command":["/usr/bin/machine-approver"],"args":["--config=/var/run/configmaps/config/config.yaml","-v=2","--logtostderr","--leader-elect=true","--leader-elect-lease-duration=137s","--leader-elect-renew-deadline=107s","--leader-elect-retry-period=26s","--leader-elect-resource-namespace=openshift-cluster-machine-approver","--api-group-version=machine.openshift.io/v1beta1","--max-concurrent-reconciles=10"],"env":[{"name":"RELEASE_VERSION","value":"4.18.28"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"kube-api-access-gsjls","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"machine-approver-sa","serviceAccount":"machine-approver-sa","nodeName":"master-0","hostNetwork":true,"securityContext":{},"imagePullSecrets":[{"name":"machine-approver-sa-dockercfg-g5njm"}],"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:00:18Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:00:10Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:42Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:42Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:00:10Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2025-12-03T14:00:10Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2025-12-03T14:08:23Z"}},"lastState":{},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d","containerID":"cri-o://d2ca2ee49f1caf825f3be17bc4c4d0dd12b887ed189295e71da9c01631da67fc","started":true,"volumeMounts":[{"name":"auth-proxy-config","mountPath":"/etc/kube-rbac-proxy"},{"name":"machine-approver-tls","mountPath":"/etc/tls/private"},{"name":"kube-api-access-gsjls","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"machine-approver-controller","state":{"running":{"startedAt":"2025-12-03T14:08:42Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"W1203 14:08:27.303702 1 client_config.go:659] Neither --kubeconfig nor --master was specified. Using the inClusterConfig. This might not work.\nW1203 14:08:27.304156 1 client_config.go:659] Neither --kubeconfig nor --master was specified. Using the inClusterConfig. This might not work.\nI1203 14:08:27.304273 1 main.go:152] setting up manager\nF1203 14:08:27.306491 1 main.go:174] failed to index field spec.signerName: failed to get API group resources: unable to retrieve the complete list of server APIs: certificates.k8s.io/v1: Get \"https://172.30.0.1:443/apis/certificates.k8s.io/v1\": dial tcp 172.30.0.1:443: connect: connection refused\n","startedAt":"2025-12-03T14:08:27Z","finishedAt":"2025-12-03T14:08:27Z","containerID":"cri-o://91c459125c51bbf21f0e3ee77e69ce6d33befa01877a485335f7af3fba87e31e"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9f4724570795357eb097251a021f20c94c79b3054f3adb3bc0812143ba791dc1","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9f4724570795357eb097251a021f20c94c79b3054f3adb3bc0812143ba791dc1","containerID":"cri-o://068ddb4d161d39aa30c2725ce031626c21271c908564c6ab6d59dc24ea4c3c49","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"kube-api-access-gsjls","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}events/openshift-cluster-version.json0000640000000000000000000002030615114042226016576 0ustar0000000000000000{"items":[{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-03T13:44:53Z","reason":"ScalingReplicaSet","message":"Scaled up replica set cluster-version-operator-869c786959 to 1","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-03T13:44:57Z","reason":"LeaderElection","message":"master-0_34053b74-5a19-4d42-b1e9-ecd14aa8b608 became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-03T13:44:59Z","reason":"LoadPayload","message":"Loading payload version=\"4.18.28\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:98c80d92a2ef8d44ee625b229b77b7bfdb1b06cbfe0d4df9e2ca2cba904467f7\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-03T13:44:59Z","reason":"RetrievePayload","message":"Retrieving and verifying payload version=\"4.18.28\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:98c80d92a2ef8d44ee625b229b77b7bfdb1b06cbfe0d4df9e2ca2cba904467f7\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-03T13:45:00Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.28\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:98c80d92a2ef8d44ee625b229b77b7bfdb1b06cbfe0d4df9e2ca2cba904467f7\" architecture=\"amd64\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-03T13:45:14Z","reason":"FailedCreate","message":"Error creating: pods \"cluster-version-operator-869c786959-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-03T13:51:40Z","reason":"FailedCreate","message":"Error creating: pods \"cluster-version-operator-869c786959-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-03T13:51:43Z","reason":"SuccessfulCreate","message":"Created pod: cluster-version-operator-869c786959-vrvwt","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-03T13:51:44Z","reason":"Scheduled","message":"Successfully assigned openshift-cluster-version/cluster-version-operator-869c786959-vrvwt to master-0","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-03T13:53:52Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"cluster-version-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-03T13:55:15Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"cluster-version-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-03T13:55:33Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-release@sha256:98c80d92a2ef8d44ee625b229b77b7bfdb1b06cbfe0d4df9e2ca2cba904467f7\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-03T13:55:44Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-release@sha256:98c80d92a2ef8d44ee625b229b77b7bfdb1b06cbfe0d4df9e2ca2cba904467f7\" in 11.437s (11.437s including waiting). Image size: 512468025 bytes.","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-03T13:55:45Z","reason":"Created","message":"Created container: cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-03T13:55:46Z","reason":"LeaderElection","message":"master-0_2b135ec3-4c8b-4fc2-a9c5-8bd06ce6a733 became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-03T13:55:46Z","reason":"Started","message":"Started container cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-03T13:55:49Z","reason":"LoadPayload","message":"Loading payload version=\"4.18.28\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:98c80d92a2ef8d44ee625b229b77b7bfdb1b06cbfe0d4df9e2ca2cba904467f7\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-03T13:55:49Z","reason":"RetrievePayload","message":"Retrieving and verifying payload version=\"4.18.28\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:98c80d92a2ef8d44ee625b229b77b7bfdb1b06cbfe0d4df9e2ca2cba904467f7\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-03T13:55:50Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.28\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:98c80d92a2ef8d44ee625b229b77b7bfdb1b06cbfe0d4df9e2ca2cba904467f7\" architecture=\"amd64\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-03T13:56:01Z","reason":"Killing","message":"Stopping container cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-03T13:56:01Z","reason":"SuccessfulDelete","message":"Deleted pod: cluster-version-operator-869c786959-vrvwt","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-03T13:56:01Z","reason":"ScalingReplicaSet","message":"Scaled down replica set cluster-version-operator-869c786959 to 0 from 1","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-03T13:56:05Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-release@sha256:98c80d92a2ef8d44ee625b229b77b7bfdb1b06cbfe0d4df9e2ca2cba904467f7\" already present on machine","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-03T13:56:05Z","reason":"SuccessfulCreate","message":"Created pod: cluster-version-operator-7c49fbfc6f-7krqx","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-03T13:56:05Z","reason":"ScalingReplicaSet","message":"Scaled up replica set cluster-version-operator-7c49fbfc6f to 1","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-03T13:56:06Z","reason":"Started","message":"Started container cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-03T13:56:06Z","reason":"Created","message":"Created container: cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-03T13:56:06Z","reason":"LeaderElection","message":"master-0_1ca3d2c4-c8a0-4139-928f-7f7774f88234 became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-03T13:56:08Z","reason":"RetrievePayload","message":"Retrieving and verifying payload version=\"4.18.28\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:98c80d92a2ef8d44ee625b229b77b7bfdb1b06cbfe0d4df9e2ca2cba904467f7\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-03T13:56:08Z","reason":"LoadPayload","message":"Loading payload version=\"4.18.28\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:98c80d92a2ef8d44ee625b229b77b7bfdb1b06cbfe0d4df9e2ca2cba904467f7\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-03T13:56:10Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.28\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:98c80d92a2ef8d44ee625b229b77b7bfdb1b06cbfe0d4df9e2ca2cba904467f7\" architecture=\"amd64\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-03T14:08:21Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-release@sha256:98c80d92a2ef8d44ee625b229b77b7bfdb1b06cbfe0d4df9e2ca2cba904467f7\" already present on machine","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-03T14:08:22Z","reason":"Created","message":"Created container: cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-03T14:08:22Z","reason":"Started","message":"Started container cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2025-12-03T14:08:29Z","reason":"NodeNotReady","message":"Node is not ready","type":"Warning"}]}config/pod/openshift-cluster-version/cluster-version-operator-7c49fbfc6f-7krqx.json0000640000000000000000000001342115114042226027131 0ustar0000000000000000{"metadata":{"name":"cluster-version-operator-7c49fbfc6f-7krqx","generateName":"cluster-version-operator-7c49fbfc6f-","namespace":"openshift-cluster-version","uid":"ec89938d-35a5-46ba-8c63-12489db18cbd","resourceVersion":"14732","creationTimestamp":"2025-12-03T13:56:05Z","labels":{"k8s-app":"cluster-version-operator","pod-template-hash":"7c49fbfc6f"},"annotations":{"openshift.io/required-scc":"hostaccess","openshift.io/scc":"hostaccess"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-version-operator-7c49fbfc6f","uid":"5bdb5796-33c7-46c7-9bf6-27233c5cacf9","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"etc-ssl-certs","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"etc-cvo-updatepayloads","hostPath":{"path":"/etc/cvo/updatepayloads","type":""}},{"name":"serving-cert","secret":{"secretName":"cluster-version-operator-serving-cert","defaultMode":420}},{"name":"service-ca","configMap":{"name":"openshift-service-ca.crt","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-version-operator","image":"quay.io/openshift-release-dev/ocp-release@sha256:98c80d92a2ef8d44ee625b229b77b7bfdb1b06cbfe0d4df9e2ca2cba904467f7","args":["start","--release-image=quay.io/openshift-release-dev/ocp-release@sha256:98c80d92a2ef8d44ee625b229b77b7bfdb1b06cbfe0d4df9e2ca2cba904467f7","--enable-auto-update=false","--listen=0.0.0.0:9099","--serving-cert-file=/etc/tls/serving-cert/tls.crt","--serving-key-file=/etc/tls/serving-cert/tls.key","--v=2","--always-enable-capabilities=Ingress"],"env":[{"name":"OPERATOR_IMAGE_VERSION","value":"0.0.1-snapshot"},{"name":"KUBERNETES_SERVICE_PORT","value":"6443"},{"name":"KUBERNETES_SERVICE_HOST","value":"api-int.sno.openstack.lab"},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}},{"name":"CLUSTER_PROFILE","value":"self-managed-high-availability"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-ssl-certs","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"etc-cvo-updatepayloads","readOnly":true,"mountPath":"/etc/cvo/updatepayloads"},{"name":"serving-cert","readOnly":true,"mountPath":"/etc/tls/serving-cert"},{"name":"service-ca","readOnly":true,"mountPath":"/etc/tls/service-ca"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000040000,"runAsNonRoot":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":130,"dnsPolicy":"Default","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"default","serviceAccount":"default","automountServiceAccountToken":false,"nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c6,c5"},"fsGroup":1000040000},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T13:56:06Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T13:56:05Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:23Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T14:08:23Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-03T13:56:05Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2025-12-03T13:56:05Z","containerStatuses":[{"name":"cluster-version-operator","state":{"running":{"startedAt":"2025-12-03T14:08:22Z"}},"lastState":{},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-release@sha256:98c80d92a2ef8d44ee625b229b77b7bfdb1b06cbfe0d4df9e2ca2cba904467f7","imageID":"quay.io/openshift-release-dev/ocp-release@sha256:98c80d92a2ef8d44ee625b229b77b7bfdb1b06cbfe0d4df9e2ca2cba904467f7","containerID":"cri-o://7f832c38908426c04be74049b75276a224a4c272c95ea669c46fb755057dad06","started":true,"volumeMounts":[{"name":"etc-ssl-certs","mountPath":"/etc/ssl/certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-cvo-updatepayloads","mountPath":"/etc/cvo/updatepayloads","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"serving-cert","mountPath":"/etc/tls/serving-cert","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca","mountPath":"/etc/tls/service-ca","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/id0000640000000000000000000000004415114042226011017 0ustar0000000000000000ab9e4945-1d88-457b-9b72-46f80d1900b3config/version.json0000640000000000000000000000576215114042226013074 0ustar0000000000000000{"metadata":{"name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe","resourceVersion":"13555","generation":2,"creationTimestamp":"2025-12-03T13:44:40Z"},"spec":{"clusterID":"ab9e4945-1d88-457b-9b72-46f80d1900b3","channel":"stable-4.18","signatureStores":null},"status":{"desired":{"version":"4.18.28","image":"quay.io/openshift-release-dev/ocp-release@sha256:98c80d92a2ef8d44ee625b229b77b7bfdb1b06cbfe0d4df9e2ca2cba904467f7","url":"https://access.redhat.com/errata/RHBA-2025:19865","channels":["candidate-4.18","candidate-4.19","candidate-4.20","eus-4.18","eus-4.20","fast-4.18","fast-4.19","fast-4.20","stable-4.18","stable-4.19","stable-4.20"]},"history":[{"state":"Partial","startedTime":"2025-12-03T13:45:00Z","completionTime":null,"version":"4.18.28","image":"quay.io/openshift-release-dev/ocp-release@sha256:98c80d92a2ef8d44ee625b229b77b7bfdb1b06cbfe0d4df9e2ca2cba904467f7","verified":false}],"observedGeneration":2,"versionHash":"bhjxdsXWK6M=","capabilities":{"enabledCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"],"knownCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"]},"conditions":[{"type":"RetrievedUpdates","status":"True","lastTransitionTime":"2025-12-03T13:45:00Z"},{"type":"Upgradeable","status":"False","lastTransitionTime":"2025-12-03T13:45:00Z","reason":"AdminAckRequired","message":"Kubernetes 1.32 and therefore OpenShift 4.19 remove several APIs which require admin consideration. Please see the knowledge article https://access.redhat.com/articles/7112216 for details and instructions."},{"type":"ImplicitlyEnabledCapabilities","status":"False","lastTransitionTime":"2025-12-03T13:45:00Z","reason":"AsExpected","message":"Capabilities match configured spec"},{"type":"ReleaseAccepted","status":"True","lastTransitionTime":"2025-12-03T13:45:00Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.28\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:98c80d92a2ef8d44ee625b229b77b7bfdb1b06cbfe0d4df9e2ca2cba904467f7\" architecture=\"amd64\""},{"type":"Available","status":"False","lastTransitionTime":"2025-12-03T13:45:00Z"},{"type":"Failing","status":"True","lastTransitionTime":"2025-12-03T13:58:25Z","reason":"ClusterOperatorsNotAvailable","message":"Cluster operators authentication, console, etcd, image-registry, insights, kube-controller-manager, monitoring, openshift-apiserver are not available"},{"type":"Progressing","status":"True","lastTransitionTime":"2025-12-03T13:45:00Z","reason":"ClusterOperatorsNotAvailable","message":"Unable to apply 4.18.28: some cluster operators are not available"}],"availableUpdates":null}}config/configmaps/kube-system/cluster-config-v1/install-config0000640000000000000000000000155515114042226023212 0ustar0000000000000000apiVersion: v1 baseDomain: xxxxxxxxxxxxx compute: - hyperthreading: Enabled name: worker platform: {} replicas: 0 controlPlane: hyperthreading: Enabled name: master platform: {} replicas: 1 metadata: creationTimestamp: null name: sno networking: clusterNetwork: - cidr: 10.128.0.0/16 hostPrefix: 23 machineNetwork: - cidr: 192.168.32.0/24 networkType: OVNKubernetes serviceNetwork: - 172.30.0.0/16 platform: none: {} publish: External pullSecret: "" sshKey: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt0000640000000000000000000000010115114042226025422 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/openshift-install-manifests/version0000640000000000000000000000000715114042226025131 0ustar0000000000000000v4.18.0config/configmaps/openshift-config/openshift-install-manifests/invoker0000640000000000000000000000001715114042226025122 0ustar0000000000000000agent-installerconfig/configmaps/openshift-config/kube-root-ca.crt/ca.crt0000640000000000000000000000030315114042226022242 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/initial-kube-apiserver-server-ca/ca-bundle.crt0000640000000000000000000000050515114042226026676 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt0000640000000000000000000000010115114042226023401 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt0000640000000000000000000000010115114042226023175 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt0000640000000000000000000000010115114042226025465 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/crd/volumesnapshotcontents.snapshot.storage.k8s.io.json0000640000000000000000000005444315114042226023437 0ustar0000000000000000{"metadata":{"name":"volumesnapshotcontents.snapshot.storage.k8s.io","uid":"a9f884e4-2869-4e9a-9a81-05436b6ef307","resourceVersion":"4835","generation":1,"creationTimestamp":"2025-12-03T13:55:26Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/955","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"scope":"Cluster","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the\nunderlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system.\nRequired.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on\nthe underlying storage system should be deleted when its bound VolumeSnapshot is deleted.\nSupported values are \"Retain\" and \"Delete\".\n\"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept.\n\"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted.\nFor dynamically provisioned snapshots, this field will automatically be filled in by the\nCSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding\nVolumeSnapshotClass.\nFor pre-existing snapshots, users MUST specify this field when creating the\n VolumeSnapshotContent object.\nRequired.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on\nthe underlying storage system.\nThis MUST be the same as the name returned by the CSI GetPluginName() call for\nthat driver.\nRequired.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned\nor already exists, and just requires a Kubernetes object representation.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on\nthe underlying storage system for which a Kubernetes object representation\nwas (or should be) created.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"snapshotHandle is immutable"}]},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot\nshould be dynamically taken from.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeHandle is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.volumeHandle) || has(self.volumeHandle)","message":"volumeHandle is required once set"},{"rule":"!has(oldSelf.snapshotHandle) || has(self.snapshotHandle)","message":"snapshotHandle is required once set"},{"rule":"(has(self.volumeHandle) \u0026\u0026 !has(self.snapshotHandle)) || (!has(self.volumeHandle) \u0026\u0026 has(self.snapshotHandle))","message":"exactly one of volumeHandle and snapshotHandle must be set"}]},"sourceVolumeMode":{"description":"SourceVolumeMode is the mode of the volume whose snapshot is taken.\nCan be either “Filesystem” or “Block”.\nIf not specified, it indicates the source volume's mode is unknown.\nThis field is immutable.\nThis field is an alpha field.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"sourceVolumeMode is immutable"}]},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be)\ncreated.\nNote that after provisioning, the VolumeSnapshotClass may be deleted or\nrecreated with different set of values, and as such, should not be referenced\npost-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this\nVolumeSnapshotContent object is bound.\nVolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to\nthis VolumeSnapshotContent's name for the bidirectional binding to be valid.\nFor a pre-existing VolumeSnapshotContent object, name and namespace of the\nVolumeSnapshot object MUST be provided for binding to happen.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string\nshould contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2].\nFor example, if the object reference is to a container within a pod, this would take on a value like:\n\"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered\nthe event) or if no container name is specified \"spec.containers[2]\" (container with\nindex 2 in this pod). This syntax is chosen only to have some well-defined way of\nreferencing a part of an object.\nTODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}},"x-kubernetes-map-type":"atomic","x-kubernetes-validations":[{"rule":"has(self.name) \u0026\u0026 has(self.__namespace__)","message":"both spec.volumeSnapshotRef.name and spec.volumeSnapshotRef.namespace must be set"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.sourceVolumeMode) || has(self.sourceVolumeMode)","message":"sourceVolumeMode is required once set"}]},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it indicates the creation time is unknown.\nThe format of this field is a Unix nanoseconds time encoded as an int64.\nOn Unix, the command `date +%s%N` returns the current time in nanoseconds\nsince 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nUpon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system.\nIf not specified, it indicates that dynamic snapshot creation has either failed\nor it is still in progress.","type":"string"},"volumeGroupSnapshotHandle":{"description":"VolumeGroupSnapshotHandle is the CSI \"group_snapshot_id\" of a group snapshot\non the underlying storage system.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshotContent is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshotContent","schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the underlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system. Required.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted. Supported values are \"Retain\" and \"Delete\". \"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept. \"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted. For dynamically provisioned snapshots, this field will automatically be filled in by the CSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding VolumeSnapshotClass. For pre-existing snapshots, users MUST specify this field when creating the VolumeSnapshotContent object. Required.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on the underlying storage system. This MUST be the same as the name returned by the CSI GetPluginName() call for that driver. Required.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned or already exists, and just requires a Kubernetes object representation. This field is immutable after creation. Required.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on the underlying storage system for which a Kubernetes object representation was (or should be) created. This field is immutable.","type":"string"},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot should be dynamically taken from. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be) created. Note that after provisioning, the VolumeSnapshotClass may be deleted or recreated with different set of values, and as such, should not be referenced post-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this VolumeSnapshotContent object is bound. VolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to this VolumeSnapshotContent's name for the bidirectional binding to be valid. For a pre-existing VolumeSnapshotContent object, name and namespace of the VolumeSnapshot object MUST be provided for binding to happen. This field is immutable after creation. Required.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string should contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2]. For example, if the object reference is to a container within a pod, this would take on a value like: \"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered the event) or if no container name is specified \"spec.containers[2]\" (container with index 2 in this pod). This syntax is chosen only to have some well-defined way of referencing a part of an object. TODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}}}}},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it indicates the creation time is unknown. The format of this field is a Unix nanoseconds time encoded as an int64. On Unix, the command `date +%s%N` returns the current time in nanoseconds since 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any. Upon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system. If not specified, it indicates that dynamic snapshot creation has either failed or it is still in progress.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"NamesAccepted","status":"True","lastTransitionTime":"2025-12-03T13:55:26Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2025-12-03T13:55:26Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"},{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2025-12-03T13:55:26Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/955"}],"acceptedNames":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"storedVersions":["v1"]}}config/crd/volumesnapshots.snapshot.storage.k8s.io.json0000640000000000000000000004563015114042226022042 0ustar0000000000000000{"metadata":{"name":"volumesnapshots.snapshot.storage.k8s.io","uid":"3781dff6-3da7-49cd-8fbf-b3b2dc3e913f","resourceVersion":"4807","generation":1,"creationTimestamp":"2025-12-03T13:55:26Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/814","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"scope":"Namespaced","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time\nsnapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user.\nMore info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots\nRequired.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim\nobject representing the volume from which a snapshot should be created.\nThis PVC is assumed to be in the same namespace as the VolumeSnapshot\nobject.\nThis field should be set if the snapshot does not exists, and needs to be\ncreated.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"persistentVolumeClaimName is immutable"}]},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent\nobject representing an existing volume snapshot.\nThis field should be set if the snapshot already exists and only needs a representation in Kubernetes.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeSnapshotContentName is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.persistentVolumeClaimName) || has(self.persistentVolumeClaimName)","message":"persistentVolumeClaimName is required once set"},{"rule":"!has(oldSelf.volumeSnapshotContentName) || has(self.volumeSnapshotContentName)","message":"volumeSnapshotContentName is required once set"},{"rule":"(has(self.volumeSnapshotContentName) \u0026\u0026 !has(self.persistentVolumeClaimName)) || (!has(self.volumeSnapshotContentName) \u0026\u0026 has(self.persistentVolumeClaimName))","message":"exactly one of volumeSnapshotContentName and persistentVolumeClaimName must be set"}]},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass\nrequested by the VolumeSnapshot.\nVolumeSnapshotClassName may be left nil to indicate that the default\nSnapshotClass should be used.\nA given cluster may have multiple default Volume SnapshotClasses: one\ndefault per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass,\nVolumeSnapshotSource will be checked to figure out what the associated\nCSI Driver is, and the default VolumeSnapshotClass associated with that\nCSI Driver will be used. If more than one VolumeSnapshotClass exist for\na given CSI Driver and more than one have been marked as default,\nCreateSnapshot will fail and generate an event.\nEmpty string is not allowed for this field.","type":"string","x-kubernetes-validations":[{"rule":"size(self) \u003e 0","message":"volumeSnapshotClassName must not be the empty string when set"}]}}},"status":{"description":"status represents the current information of a snapshot.\nConsumers must verify binding between VolumeSnapshot and\nVolumeSnapshotContent objects is successful (by validating that both\nVolumeSnapshot and VolumeSnapshotContent point at each other) before\nusing this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent\nobject to which this VolumeSnapshot object intends to bind to.\nIf not specified, it indicates that the VolumeSnapshot object has not been\nsuccessfully bound to a VolumeSnapshotContent object yet.\nNOTE: To avoid possible security issues, consumers must verify binding between\nVolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that\nboth VolumeSnapshot and VolumeSnapshotContent point at each other) before using\nthis object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nThis field could be helpful to upper level controllers(i.e., application controller)\nto decide whether they should continue on waiting for the snapshot to be created\nbased on the type of error reported.\nThe snapshot controller will keep retrying when an error occurs during the\nsnapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume\nfrom this snapshot.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"volumeGroupSnapshotName":{"description":"VolumeGroupSnapshotName is the name of the VolumeGroupSnapshot of which this\nVolumeSnapshot is a part of.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshot is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshot","schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time snapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user. More info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots Required.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from. This field is immutable after creation. Required.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim object representing the volume from which a snapshot should be created. This PVC is assumed to be in the same namespace as the VolumeSnapshot object. This field should be set if the snapshot does not exists, and needs to be created. This field is immutable.","type":"string"},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent object representing an existing volume snapshot. This field should be set if the snapshot already exists and only needs a representation in Kubernetes. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass requested by the VolumeSnapshot. VolumeSnapshotClassName may be left nil to indicate that the default SnapshotClass should be used. A given cluster may have multiple default Volume SnapshotClasses: one default per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass, VolumeSnapshotSource will be checked to figure out what the associated CSI Driver is, and the default VolumeSnapshotClass associated with that CSI Driver will be used. If more than one VolumeSnapshotClass exist for a given CSI Driver and more than one have been marked as default, CreateSnapshot will fail and generate an event. Empty string is not allowed for this field.","type":"string"}}},"status":{"description":"status represents the current information of a snapshot. Consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent object to which this VolumeSnapshot object intends to bind to. If not specified, it indicates that the VolumeSnapshot object has not been successfully bound to a VolumeSnapshotContent object yet. NOTE: To avoid possible security issues, consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any. This field could be helpful to upper level controllers(i.e., application controller) to decide whether they should continue on waiting for the snapshot to be created based on the type of error reported. The snapshot controller will keep retrying when an error occurs during the snapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume from this snapshot. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2025-12-03T13:55:26Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/814"},{"type":"NamesAccepted","status":"True","lastTransitionTime":"2025-12-03T13:55:26Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2025-12-03T13:55:26Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"}],"acceptedNames":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"storedVersions":["v1"]}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/edit.json0000640000000000000000000002311515114042226025471 0ustar0000000000000000{"metadata":{"name":"edit","uid":"624afaf2-e274-470d-a009-d32a16559d68","resourceVersion":"13299","creationTimestamp":"2025-12-03T13:43:41Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults","rbac.authorization.k8s.io/aggregate-to-admin":"true"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","update","patch","delete"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests"]},{"verbs":["get","list","update","create","watch","patch","delete"],"apiGroups":["helm.openshift.io"],"resources":["projecthelmchartrepositories"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["get","list","watch"],"apiGroups":["metrics.k8s.io"],"resources":["pods","nodes"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-edit":"true"}}]}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/admin.json0000640000000000000000000002614115114042226025636 0ustar0000000000000000{"metadata":{"name":"admin","uid":"ce5cf25b-2728-461d-874e-034d21363c12","resourceVersion":"13301","creationTimestamp":"2025-12-03T13:43:41Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","update","patch","delete"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests"]},{"verbs":["get","list","update","create","watch","patch","delete"],"apiGroups":["helm.openshift.io"],"resources":["projecthelmchartrepositories"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["get","list","watch"],"apiGroups":["metrics.k8s.io"],"resources":["pods","nodes"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["watch","list","get"],"apiGroups":["k8s.cni.cncf.io"],"resources":["network-attachment-definitions"]},{"verbs":["*"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindings","roles"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["rbac.authorization.k8s.io"],"resources":["rolebindings","roles"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["localresourceaccessreviews","localsubjectaccessreviews","subjectrulesreviews"]},{"verbs":["create"],"apiGroups":["authorization.k8s.io"],"resources":["localsubjectaccessreviews"]},{"verbs":["delete","get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["resourceaccessreviews","subjectaccessreviews"]},{"verbs":["create"],"apiGroups":["","security.openshift.io"],"resources":["podsecuritypolicyreviews","podsecuritypolicyselfsubjectreviews","podsecuritypolicysubjectreviews"]},{"verbs":["get","list","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindingrestrictions"]},{"verbs":["admin","edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["delete","get","patch","update"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["update"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-admin":"true"}}]}}events/openshift-machine-api.json0000640000000000000000000001670715114042226015617 0ustar0000000000000000{"items":[{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-03T13:58:41Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"machine-api-operator-tls\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-03T13:58:41Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"images\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-03T13:58:41Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-03T13:58:41Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"auth-proxy-config\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-03T13:58:41Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"images\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-03T13:58:41Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-03T13:58:41Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cluster-baremetal-operator-tls\" : failed to sync secret cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-03T13:58:45Z","reason":"BackOff","message":"Back-off restarting failed container cluster-baremetal-operator in pod cluster-baremetal-operator-5fdc576499-j2n8j_openshift-machine-api(690d1f81-7b1f-4fd0-9b6e-154c9687c744)","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-03T14:08:23Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-8wh8g\" : [object \"openshift-machine-api\"/\"kube-root-ca.crt\" not registered, object \"openshift-machine-api\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-03T14:08:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"images\" : object \"openshift-machine-api\"/\"machine-api-operator-images\" not registered","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-03T14:08:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cert\" : object \"openshift-machine-api\"/\"cluster-autoscaler-operator-cert\" not registered","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-03T14:08:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : object \"openshift-machine-api\"/\"kube-rbac-proxy\" not registered","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-03T14:08:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cluster-baremetal-operator-tls\" : object \"openshift-machine-api\"/\"cluster-baremetal-operator-tls\" not registered","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-03T14:08:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"images\" : object \"openshift-machine-api\"/\"cluster-baremetal-operator-images\" not registered","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-03T14:08:27Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-03T14:08:28Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cert\" : object \"openshift-machine-api\"/\"cluster-baremetal-webhook-server-cert\" not registered","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-03T14:08:28Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"auth-proxy-config\" : object \"openshift-machine-api\"/\"kube-rbac-proxy-cluster-autoscaler-operator\" not registered","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-03T14:08:28Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"control-plane-machine-set-operator-tls\" : object \"openshift-machine-api\"/\"control-plane-machine-set-operator-tls\" not registered","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-03T14:08:28Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"machine-api-operator-tls\" : object \"openshift-machine-api\"/\"machine-api-operator-tls\" not registered","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-03T14:08:28Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"config\" : object \"openshift-machine-api\"/\"baremetal-kube-rbac-proxy\" not registered","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-03T14:08:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-rjbsl\" : [object \"openshift-machine-api\"/\"kube-root-ca.crt\" not registered, object \"openshift-machine-api\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-03T14:08:33Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-03T14:08:37Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-ltsnd\" : [object \"openshift-machine-api\"/\"kube-root-ca.crt\" not registered, object \"openshift-machine-api\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-03T14:08:38Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-5mk6r\" : [object \"openshift-machine-api\"/\"kube-root-ca.crt\" not registered, object \"openshift-machine-api\"/\"openshift-service-ca.crt\" not registered]","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-03T14:08:44Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-03T14:08:44Z","reason":"NetworkNotReady","message":"network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: no CNI configuration file in /etc/kubernetes/cni/net.d/. Has your network provider started?","type":"Warning"}]}config/machineconfigpools/worker.json0000640000000000000000000001013515114042226016555 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2025-12-03T13:58:02Z","generation":3,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","pools.operator.machineconfiguration.openshift.io/worker":""},"name":"worker","resourceVersion":"13057","uid":"33c53b37-225d-4aa3-811a-ca85a617d583"},"spec":{"configuration":{"name":"rendered-worker-ac51e1cc2e343e3be6926ba118fd6150","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-worker"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-workers-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-ssh"}]},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"worker"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/worker":""}},"paused":false},"status":{"certExpirys":[{"bundle":"KubeAPIServerServingCAData","expiry":"2035-12-01T13:29:46Z","subject":"CN=admin-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2025-12-04T13:37:22Z","subject":"CN=kube-csr-signer_@1764770129"},{"bundle":"KubeAPIServerServingCAData","expiry":"2025-12-04T13:37:22Z","subject":"CN=kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-12-03T13:37:22Z","subject":"CN=kube-apiserver-to-kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-12-03T13:37:22Z","subject":"CN=kube-control-plane-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2035-12-01T13:37:20Z","subject":"CN=kubelet-bootstrap-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-12-03T13:54:55Z","subject":"CN=openshift-kube-apiserver-operator_node-system-admin-signer@1764770095"}],"conditions":[{"lastTransitionTime":"2025-12-03T14:00:43Z","message":"","reason":"","status":"False","type":"Updating"},{"lastTransitionTime":"2025-12-03T14:00:43Z","message":"","reason":"","status":"False","type":"NodeDegraded"},{"lastTransitionTime":"2025-12-03T14:00:43Z","message":"","reason":"","status":"False","type":"Degraded"},{"lastTransitionTime":"2025-12-03T14:00:43Z","message":"All nodes are updated with MachineConfig rendered-worker-ac51e1cc2e343e3be6926ba118fd6150","reason":"","status":"True","type":"Updated"},{"lastTransitionTime":"2025-12-03T14:01:05Z","message":"","reason":"","status":"False","type":"RenderDegraded"}],"configuration":{"name":"rendered-worker-ac51e1cc2e343e3be6926ba118fd6150","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-worker"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-workers-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-ssh"}]},"degradedMachineCount":0,"machineCount":0,"observedGeneration":3,"readyMachineCount":0,"unavailableMachineCount":0,"updatedMachineCount":0}}config/machineconfigpools/master.json0000640000000000000000000000744315114042226016547 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2025-12-03T13:58:02Z","generation":3,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","operator.machineconfiguration.openshift.io/required-for-upgrade":"","pools.operator.machineconfiguration.openshift.io/master":""},"name":"master","resourceVersion":"13140","uid":"38c58006-59fd-4b95-8140-8c6cd4237522"},"spec":{"configuration":{"name":"rendered-master-459a0309a4bacb184a38028403c86289","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-master"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-master-dnsmasq-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-masters-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-nable-iscsi"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-netifnames-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-lv-cinder-volumes"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-multipath-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-ssh"}]},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"master"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/master":""}},"paused":false},"status":{"certExpirys":[{"bundle":"KubeAPIServerServingCAData","expiry":"2035-12-01T13:29:46Z","subject":"CN=admin-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2025-12-04T13:37:22Z","subject":"CN=kube-csr-signer_@1764770129"},{"bundle":"KubeAPIServerServingCAData","expiry":"2025-12-04T13:37:22Z","subject":"CN=kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-12-03T13:37:22Z","subject":"CN=kube-apiserver-to-kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-12-03T13:37:22Z","subject":"CN=kube-control-plane-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2035-12-01T13:37:20Z","subject":"CN=kubelet-bootstrap-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-12-03T13:54:55Z","subject":"CN=openshift-kube-apiserver-operator_node-system-admin-signer@1764770095"}],"conditions":[{"lastTransitionTime":"2025-12-03T14:00:43Z","message":"","reason":"","status":"False","type":"Updated"},{"lastTransitionTime":"2025-12-03T14:00:43Z","message":"","reason":"","status":"False","type":"NodeDegraded"},{"lastTransitionTime":"2025-12-03T14:00:43Z","message":"","reason":"","status":"False","type":"Degraded"},{"lastTransitionTime":"2025-12-03T14:00:43Z","message":"All nodes are updating to MachineConfig rendered-master-459a0309a4bacb184a38028403c86289","reason":"","status":"True","type":"Updating"},{"lastTransitionTime":"2025-12-03T14:01:10Z","message":"","reason":"","status":"False","type":"RenderDegraded"}],"configuration":{},"degradedMachineCount":0,"machineCount":1,"observedGeneration":3,"readyMachineCount":0,"unavailableMachineCount":1,"updatedMachineCount":0}}config/namespaces_with_overlapping_uids.json0000640000000000000000000000000215114042226020171 0ustar0000000000000000[]config/clusteroperator/imageregistry.operator.openshift.io/config/cluster.json0000640000000000000000000000416515114042226026677 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"c8f77f1a-9062-4069-ba32-2ba2bd640191","resourceVersion":"13729","generation":1,"creationTimestamp":"2025-12-03T13:59:09Z","finalizers":["imageregistry.operator.openshift.io/finalizer"]},"spec":{"managementState":"Removed","logLevel":"Normal","operatorLogLevel":"Normal","unsupportedConfigOverrides":null,"observedConfig":null,"proxy":{},"storage":{},"requests":{"read":{"maxWaitInQueue":"0s"},"write":{"maxWaitInQueue":"0s"}},"replicas":1,"rolloutStrategy":"RollingUpdate"},"status":{"observedGeneration":1,"conditions":[{"type":"ImageRegistryCertificatesControllerDegraded","status":"False","lastTransitionTime":"2025-12-03T13:59:11Z","reason":"AsExpected"},{"type":"ImageConfigControllerDegraded","status":"False","lastTransitionTime":"2025-12-03T13:59:12Z","reason":"AsExpected"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-03T14:02:49Z","reason":"Removed","message":"All registry resources are removed"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-03T13:59:12Z","reason":"Removed","message":"The registry is removed"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-03T13:59:12Z","reason":"Removed","message":"The registry is removed"},{"type":"Removed","status":"True","lastTransitionTime":"2025-12-03T13:59:12Z","reason":"Removed","message":"The registry is removed"},{"type":"AzureStackCloudControllerDegraded","status":"False","lastTransitionTime":"2025-12-03T13:59:13Z","reason":"AsExpected"},{"type":"NodeCADaemonAvailable","status":"True","lastTransitionTime":"2025-12-03T14:02:42Z","reason":"AsExpected","message":"The daemon set node-ca has available replicas"},{"type":"NodeCADaemonProgressing","status":"False","lastTransitionTime":"2025-12-03T14:02:42Z","reason":"AsExpected","message":"The daemon set node-ca is deployed"},{"type":"NodeCADaemonControllerDegraded","status":"False","lastTransitionTime":"2025-12-03T14:01:33Z","reason":"AsExpected"}],"readyReplicas":0,"generations":[{"group":"apps","resource":"daemonsets","namespace":"openshift-image-registry","name":"node-ca","lastGeneration":1,"hash":""}],"storageManaged":false,"storage":{}}}config/schedulers/cluster.json0000640000000000000000000000052415114042226015220 0ustar0000000000000000{"kind":"Scheduler","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster","uid":"dc1afccb-3d57-40bd-8183-770278dac56e","resourceVersion":"565","generation":1,"creationTimestamp":"2025-12-03T13:44:38Z"},"spec":{"policy":{"name":""},"profileCustomizations":{"dynamicResourceAllocation":""},"mastersSchedulable":true},"status":{}}config/pdbs/openshift-operator-lifecycle-manager/packageserver-pdb.json0000640000000000000000000000173615114042226025116 0ustar0000000000000000{"metadata":{"name":"packageserver-pdb","namespace":"openshift-operator-lifecycle-manager","uid":"d4e97d51-7f12-496b-a4f7-4e5a4518ee74","resourceVersion":"16418","generation":1,"creationTimestamp":"2025-12-03T13:45:18Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe","controller":true}]},"spec":{"selector":{"matchLabels":{"app":"packageserver"}},"maxUnavailable":1},"status":{"observedGeneration":1,"disruptionsAllowed":1,"currentHealthy":1,"desiredHealthy":0,"expectedPods":1,"conditions":[{"type":"DisruptionAllowed","status":"True","observedGeneration":1,"lastTransitionTime":"2025-12-03T14:08:59Z","reason":"SufficientPods","message":""}]}}config/pdbs/openshift-console/downloads.json0000640000000000000000000000107415114042226017760 0ustar0000000000000000{"metadata":{"name":"downloads","namespace":"openshift-console","uid":"3775eb47-ca34-4278-a910-38cbfc48abd3","resourceVersion":"14438","generation":1,"creationTimestamp":"2025-12-03T14:00:40Z"},"spec":{"selector":{"matchLabels":{"app":"console","component":"downloads"}},"maxUnavailable":1},"status":{"observedGeneration":1,"disruptionsAllowed":0,"currentHealthy":0,"desiredHealthy":0,"expectedPods":1,"conditions":[{"type":"DisruptionAllowed","status":"False","observedGeneration":1,"lastTransitionTime":"2025-12-03T14:08:29Z","reason":"InsufficientPods","message":""}]}}config/pdbs/openshift-console/console.json0000640000000000000000000000106315114042226017426 0ustar0000000000000000{"metadata":{"name":"console","namespace":"openshift-console","uid":"fe846655-6cd6-4c10-be52-651f9a34b3b8","resourceVersion":"12728","generation":1,"creationTimestamp":"2025-12-03T14:00:40Z"},"spec":{"selector":{"matchLabels":{"app":"console","component":"ui"}},"maxUnavailable":1},"status":{"observedGeneration":1,"disruptionsAllowed":0,"currentHealthy":0,"desiredHealthy":0,"expectedPods":1,"conditions":[{"type":"DisruptionAllowed","status":"False","observedGeneration":1,"lastTransitionTime":"2025-12-03T14:00:40Z","reason":"InsufficientPods","message":""}]}}config/network.json0000640000000000000000000000117015114042226013065 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"72d36b13-d4fc-4f57-ad8b-42ebc6f74a5e","resourceVersion":"3217","generation":2,"creationTimestamp":"2025-12-03T13:44:36Z"},"spec":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","externalIP":{"policy":{}},"networkDiagnostics":{"mode":"","sourcePlacement":{"nodeSelector":null,"tolerations":null},"targetPlacement":{"nodeSelector":null,"tolerations":null}}},"status":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","clusterNetworkMTU":8900}}config/machinehealthchecks/openshift-machine-api/machine-api-termination-handler.json0000640000000000000000000000163315114042226027640 0ustar0000000000000000{"apiVersion":"machine.openshift.io/v1beta1","kind":"MachineHealthCheck","metadata":{"annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"creationTimestamp":"2025-12-03T14:00:21Z","generation":1,"labels":{"api":"clusterapi","k8s-app":"termination-handler"},"name":"machine-api-termination-handler","namespace":"openshift-machine-api","ownerReferences":[{"apiVersion":"config.openshift.io/v1","controller":true,"kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe"}],"resourceVersion":"11556","uid":"e43c9ee6-1bc0-451e-9da0-63fb2d99015e"},"spec":{"maxUnhealthy":"100%","nodeStartupTimeout":"0","selector":{"matchLabels":{"machine.openshift.io/interruptible-instance":""}},"unhealthyConditions":[{"status":"True","timeout":"0s","type":"Terminating"}]}}config/node/master-0.json0000640000000000000000000000724115114042226013756 0ustar0000000000000000{"metadata":{"name":"master-0","uid":"bd7abe6d-36d2-4ce8-92a1-7fdd9966d574","resourceVersion":"15748","creationTimestamp":"2025-12-03T13:51:38Z","labels":{"beta.kubernetes.io/arch":"amd64","beta.kubernetes.io/os":"linux","kubernetes.io/arch":"amd64","kubernetes.io/hostname":"master-0","kubernetes.io/os":"linux","node-role.kubernetes.io/control-plane":"","node-role.kubernetes.io/master":"","node-role.kubernetes.io/worker":"","node.openshift.io/os_id":"rhcos"},"annotations":{"k8s.ovn.org/host-cidrs":"","k8s.ovn.org/l3-gateway-config":"","k8s.ovn.org/node-chassis-id":"","k8s.ovn.org/node-encap-ips":"","k8s.ovn.org/node-id":"","k8s.ovn.org/node-masquerade-subnet":"","k8s.ovn.org/node-primary-ifaddr":"","k8s.ovn.org/node-subnets":"","k8s.ovn.org/node-transit-switch-port-ifaddr":"","k8s.ovn.org/remote-zone-migrated":"","k8s.ovn.org/zone-name":"","machineconfiguration.openshift.io/controlPlaneTopology":"SingleReplica","machineconfiguration.openshift.io/currentConfig":"rendered-master-459a0309a4bacb184a38028403c86289","machineconfiguration.openshift.io/desiredConfig":"rendered-master-2072f444cb169be2ed482bc255f04f4f","machineconfiguration.openshift.io/desiredDrain":"uncordon-rendered-master-2072f444cb169be2ed482bc255f04f4f","machineconfiguration.openshift.io/lastObservedServerCAAnnotation":"false","machineconfiguration.openshift.io/lastSyncedControllerConfigResourceVersion":"12685","machineconfiguration.openshift.io/reason":"missing MachineConfig rendered-master-459a0309a4bacb184a38028403c86289\nmachineconfig.machineconfiguration.openshift.io \"rendered-master-459a0309a4bacb184a38028403c86289\" not found","machineconfiguration.openshift.io/state":"Working","volumes.kubernetes.io/controller-managed-attach-detach":"true"}},"spec":{"taints":[{"key":"UpdateInProgress","effect":"PreferNoSchedule"}]},"status":{"capacity":{"cpu":"16","ephemeral-storage":"209124332Ki","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"49330228Ki","pods":"250"},"allocatable":{"cpu":"15500m","ephemeral-storage":"191655242229","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"48179252Ki","pods":"250"},"conditions":[{"type":"MemoryPressure","status":"False","lastHeartbeatTime":"2025-12-03T14:08:50Z","lastTransitionTime":"2025-12-03T13:51:38Z","reason":"KubeletHasSufficientMemory","message":"kubelet has sufficient memory available"},{"type":"DiskPressure","status":"False","lastHeartbeatTime":"2025-12-03T14:08:50Z","lastTransitionTime":"2025-12-03T13:51:38Z","reason":"KubeletHasNoDiskPressure","message":"kubelet has no disk pressure"},{"type":"PIDPressure","status":"False","lastHeartbeatTime":"2025-12-03T14:08:50Z","lastTransitionTime":"2025-12-03T13:51:38Z","reason":"KubeletHasSufficientPID","message":"kubelet has sufficient PID available"},{"type":"Ready","status":"True","lastHeartbeatTime":"2025-12-03T14:08:50Z","lastTransitionTime":"2025-12-03T14:08:50Z","reason":"KubeletReady","message":"kubelet is posting ready status"}],"addresses":[{"type":"InternalIP","address":"192.168.32.10"},{"type":"Hostname","address":"master-0"}],"daemonEndpoints":{"kubeletEndpoint":{"Port":10250}},"nodeInfo":{"machineID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","systemUUID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","bootID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","kernelVersion":"5.14.0-427.97.1.el9_4.x86_64","osImage":"Red Hat Enterprise Linux CoreOS 418.94.202511041748-0","containerRuntimeVersion":"cri-o://1.31.13-2.rhaos4.18.git15789b8.el9","kubeletVersion":"v1.31.13","kubeProxyVersion":"v1.31.13","operatingSystem":"linux","architecture":"amd64"},"runtimeHandlers":[{"name":"crun","features":{"recursiveReadOnlyMounts":true}},{"name":"","features":{"recursiveReadOnlyMounts":true}},{"name":"runc","features":{"recursiveReadOnlyMounts":true}}]}}config/ingress.json0000640000000000000000000000213215114042226013045 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"b10d152c-3bc1-4ccc-bae0-1938b7659590","resourceVersion":"11914","generation":1,"creationTimestamp":"2025-12-03T13:44:35Z"},"spec":{"domain":"apps.sno.openstack.lab","loadBalancer":{"platform":{"type":""}}},"status":{"componentRoutes":[{"namespace":"openshift-authentication","name":"oauth-openshift","defaultHostname":"oauth-openshift.apps.sno.openstack.lab","consumingUsers":["system:serviceaccount:oauth-openshift:authentication-operator"],"currentHostnames":["oauth-openshift.apps.sno.openstack.lab"],"conditions":[{"type":"Progressing","status":"True","lastTransitionTime":"2025-12-03T13:59:20Z","reason":"ErrorReachingOutToService","message":"unexpected error at oauth-openshift.apps.sno.openstack.lab: Get \"https://oauth-openshift.apps.sno.openstack.lab/healthz\": EOF"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-03T13:59:20Z","reason":"AsExpected","message":"All is well"}],"relatedObjects":[{"group":"route.openshift.io","resource":"routes","namespace":"openshift-authentication","name":"oauth-openshift"}]}],"defaultPlacement":"ControlPlane"}}config/infrastructure.json0000640000000000000000000000106515114042226014457 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"32f12138-96d3-4a85-a32f-2bbbd1ea65e0","resourceVersion":"541","generation":1,"creationTimestamp":"2025-12-03T13:44:35Z"},"spec":{"cloudConfig":{"name":""},"platformSpec":{"type":"None"}},"status":{"infrastructureName":"xxx-xxxxx","platform":"None","platformStatus":{"type":"None"},"etcdDiscoveryDomain":"","apiServerURL":"https://api.sno.openstack.lab:6443","apiServerInternalURI":"https://api-int.sno.openstack.lab:6443","controlPlaneTopology":"SingleReplica","infrastructureTopology":"SingleReplica","cpuPartitioning":"None"}}config/apiserver.json0000640000000000000000000000121615114042226013375 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"33d55bfa-6690-4ac1-b147-5fe6437d63f4","resourceVersion":"860","generation":1,"creationTimestamp":"2025-12-03T13:45:02Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","oauth-apiserver.openshift.io/secure-token-storage":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe"}]},"spec":{"servingCerts":{},"clientCA":{"name":""},"encryption":{},"audit":{"profile":"Default"}},"status":{}}config/proxy.json0000640000000000000000000000031315114042226012553 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"36ab9161-5eb8-40c6-b38a-ac68bd988599","resourceVersion":"558","generation":1,"creationTimestamp":"2025-12-03T13:44:36Z"},"spec":{"trustedCA":{"name":""}},"status":{}}config/featuregate.json0000640000000000000000000000613615114042226013677 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"65089724-0acd-401d-ba4b-f91ae1e7de1b","resourceVersion":"642","generation":1,"creationTimestamp":"2025-12-03T13:44:57Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true"}},"spec":{},"status":{"featureGates":[{"version":"4.18.28","enabled":[{"name":"AWSEFSDriverVolumeMetrics"},{"name":"AdminNetworkPolicy"},{"name":"AlibabaPlatform"},{"name":"AzureWorkloadIdentity"},{"name":"BareMetalLoadBalancer"},{"name":"BuildCSIVolumes"},{"name":"ChunkSizeMiB"},{"name":"CloudDualStackNodeIPs"},{"name":"DisableKubeletCloudCredentialProviders"},{"name":"GCPLabelsTags"},{"name":"HardwareSpeed"},{"name":"IngressControllerLBSubnetsAWS"},{"name":"KMSv1"},{"name":"ManagedBootImages"},{"name":"ManagedBootImagesAWS"},{"name":"MultiArchInstallAWS"},{"name":"MultiArchInstallGCP"},{"name":"NetworkDiagnosticsConfig"},{"name":"NetworkLiveMigration"},{"name":"NetworkSegmentation"},{"name":"NewOLM"},{"name":"NodeDisruptionPolicy"},{"name":"OnClusterBuild"},{"name":"PersistentIPsForVirtualization"},{"name":"PrivateHostedZoneAWS"},{"name":"SetEIPForNLBIngressController"},{"name":"VSphereControlPlaneMachineSet"},{"name":"VSphereDriverConfiguration"},{"name":"VSphereMultiVCenters"},{"name":"VSphereStaticIPs"},{"name":"ValidatingAdmissionPolicy"}],"disabled":[{"name":"AWSClusterHostedDNS"},{"name":"AdditionalRoutingCapabilities"},{"name":"AutomatedEtcdBackup"},{"name":"BootcNodeManagement"},{"name":"CSIDriverSharedResource"},{"name":"ClusterAPIInstall"},{"name":"ClusterAPIInstallIBMCloud"},{"name":"ClusterMonitoringConfig"},{"name":"ConsolePluginContentSecurityPolicy"},{"name":"DNSNameResolver"},{"name":"DynamicResourceAllocation"},{"name":"EtcdBackendQuota"},{"name":"EventedPLEG"},{"name":"Example"},{"name":"ExternalOIDC"},{"name":"ExternalOIDCWithUIDAndExtraClaimMappings"},{"name":"GCPClusterHostedDNS"},{"name":"GatewayAPI"},{"name":"ImageStreamImportMode"},{"name":"IngressControllerDynamicConfigurationManager"},{"name":"InsightsConfig"},{"name":"InsightsConfigAPI"},{"name":"InsightsOnDemandDataGather"},{"name":"InsightsRuntimeExtractor"},{"name":"MachineAPIMigration"},{"name":"MachineAPIOperatorDisableMachineHealthCheckController"},{"name":"MachineAPIProviderOpenStack"},{"name":"MachineConfigNodes"},{"name":"MaxUnavailableStatefulSet"},{"name":"MetricsCollectionProfiles"},{"name":"MinimumKubeletVersion"},{"name":"MixedCPUsAllocation"},{"name":"MultiArchInstallAzure"},{"name":"NodeSwap"},{"name":"NutanixMultiSubnets"},{"name":"OVNObservability"},{"name":"OpenShiftPodSecurityAdmission"},{"name":"PinnedImages"},{"name":"PlatformOperators"},{"name":"ProcMountType"},{"name":"RouteAdvertisements"},{"name":"RouteExternalCertificate"},{"name":"ServiceAccountTokenNodeBinding"},{"name":"SignatureStores"},{"name":"SigstoreImageVerification"},{"name":"StreamingCollectionEncodingToJSON"},{"name":"StreamingCollectionEncodingToProtobuf"},{"name":"TranslateStreamCloseWebsocketRequests"},{"name":"UpgradeStatus"},{"name":"UserNamespacesPodSecurityStandards"},{"name":"UserNamespacesSupport"},{"name":"VSphereMultiNetworks"},{"name":"VolumeAttributesClass"},{"name":"VolumeGroupSnapshot"}]}]}}config/image.json0000640000000000000000000000111715114042226012457 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"03e130d8-995e-4288-8713-e983a8f25c27","resourceVersion":"1586","generation":1,"creationTimestamp":"2025-12-03T13:45:17Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe"}]},"spec":{"additionalTrustedCA":{"name":""},"registrySources":{},"imageStreamImportMode":""},"status":{}}config/clusteroperator/imageregistry.operator.openshift.io/imagepruner/cluster.json0000640000000000000000000000163115114042226027743 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"04791db5-1de1-460a-a506-9d487b71fbd1","resourceVersion":"6636","generation":1,"creationTimestamp":"2025-12-03T13:55:57Z"},"spec":{"schedule":"","suspend":false,"keepTagRevisions":3,"successfulJobsHistoryLimit":3,"failedJobsHistoryLimit":3,"ignoreInvalidImageReferences":true,"logLevel":"Normal"},"status":{"observedGeneration":1,"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2025-12-03T13:55:57Z","reason":"AsExpected","message":"Pruner CronJob has been created"},{"type":"Failed","status":"False","lastTransitionTime":"2025-12-03T13:55:57Z","reason":"Complete","message":"Pruner completed successfully"},{"type":"Scheduled","status":"True","lastTransitionTime":"2025-12-03T13:55:57Z","reason":"Scheduled","message":"The pruner job has been scheduled"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-03T13:55:57Z","reason":"AsExpected"}]}}config/validatingwebhookconfigurations/prometheusrules.openshift.io.json0000640000000000000000000000511515114042226025725 0ustar0000000000000000{"metadata":{"name":"prometheusrules.openshift.io","uid":"71f00816-4f6d-4b4b-a446-fac9b23fedb9","resourceVersion":"11975","generation":2,"creationTimestamp":"2025-12-03T14:00:31Z","labels":{"app.kubernetes.io/component":"controller","app.kubernetes.io/managed-by":"cluster-monitoring-operator","app.kubernetes.io/name":"prometheus-operator","app.kubernetes.io/part-of":"openshift-monitoring"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"prometheusrules.openshift.io","clientConfig":{"service":{"namespace":"openshift-monitoring","name":"prometheus-operator-admission-webhook","path":"/admission-prometheusrules/validate","port":8443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["monitoring.coreos.com"],"apiVersions":["v1"],"resources":["prometheusrules"],"scope":"Namespaced"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":5,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/performance-addon-operator.json0000640000000000000000000000552115114042226025271 0ustar0000000000000000{"metadata":{"name":"performance-addon-operator","uid":"88c19ff5-616e-40a2-9d39-ec8feca85ad3","resourceVersion":"4583","generation":2,"creationTimestamp":"2025-12-03T13:45:29Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe","controller":true}]},"webhooks":[{"name":"vwb.performance.openshift.io","clientConfig":{"service":{"namespace":"openshift-cluster-node-tuning-operator","name":"performance-addon-operator-service","path":"/validate-performance-openshift-io-v2-performanceprofile","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["performance.openshift.io"],"apiVersions":["v2"],"resources":["performanceprofiles"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/network-node-identity.openshift.io.json0000640000000000000000000001075515114042226026730 0ustar0000000000000000{"metadata":{"name":"network-node-identity.openshift.io","uid":"bd598d3f-fa76-4dd3-9751-8d35b211d2a2","resourceVersion":"9785","generation":1,"creationTimestamp":"2025-12-03T13:58:03Z","ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"90b2aefe-9034-4695-91f0-552516dd2aa4","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"node.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/node","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["nodes/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"pod.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/pod","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["pods/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/multus.openshift.io.json0000640000000000000000000000506715114042226024016 0ustar0000000000000000{"metadata":{"name":"multus.openshift.io","uid":"9d5e726d-ea51-42e9-aa57-05c2a2f53428","resourceVersion":"4582","generation":2,"creationTimestamp":"2025-12-03T13:52:50Z","labels":{"app":"multus-admission-controller"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"90b2aefe-9034-4695-91f0-552516dd2aa4","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"multus-validating-config.k8s.io","clientConfig":{"service":{"namespace":"openshift-multus","name":"multus-admission-controller","path":"/validate","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["k8s.cni.cncf.io"],"apiVersions":["v1"],"resources":["network-attachment-definitions"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"NoneOnDryRun","timeoutSeconds":30,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io.json0000640000000000000000000000537315114042226030631 0ustar0000000000000000{"metadata":{"name":"controlplanemachineset.machine.openshift.io","uid":"e70d09ee-2356-4bdc-ace9-1dd7882f15cc","resourceVersion":"10669","generation":2,"creationTimestamp":"2025-12-03T13:59:15Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe","controller":true}]},"webhooks":[{"name":"controlplanemachineset.machine.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"control-plane-machine-set-operator","path":"/validate-machine-openshift-io-v1-controlplanemachineset","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["machine.openshift.io"],"apiVersions":["v1"],"resources":["controlplanemachinesets"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration.json0000640000000000000000000000500215114042226032102 0ustar0000000000000000{"metadata":{"name":"cluster-baremetal-validating-webhook-configuration","uid":"c473cc8a-8720-421f-9ff6-36a2dc0ab1b2","resourceVersion":"10947","generation":2,"creationTimestamp":"2025-12-03T13:59:21Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"vprovisioning.kb.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-baremetal-webhook-service","path":"/validate-metal3-io-v1alpha1-provisioning","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["metal3.io"],"apiVersions":["v1alpha1"],"resources":["provisionings"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1","v1beta1"]}]}config/validatingwebhookconfigurations/autoscaling.openshift.io.json0000640000000000000000000001102715114042226024767 0ustar0000000000000000{"metadata":{"name":"autoscaling.openshift.io","uid":"a0f2956f-b855-493a-95d0-bdc7799fbe20","resourceVersion":"10037","generation":2,"creationTimestamp":"2025-12-03T13:58:28Z","labels":{"k8s-app":"cluster-autoscaler-operator"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"clusterautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-clusterautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1"],"resources":["clusterautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"machineautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-machineautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1beta1"],"resources":["machineautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io.json0000640000000000000000000000514315114042226026473 0ustar0000000000000000{"metadata":{"name":"alertmanagerconfigs.openshift.io","uid":"ec229c01-eddf-4a2b-b818-fc90f267ef87","resourceVersion":"11980","generation":2,"creationTimestamp":"2025-12-03T14:00:31Z","labels":{"app.kubernetes.io/component":"controller","app.kubernetes.io/managed-by":"cluster-monitoring-operator","app.kubernetes.io/name":"prometheus-operator","app.kubernetes.io/part-of":"openshift-monitoring"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"alertmanagerconfigs.openshift.io","clientConfig":{"service":{"namespace":"openshift-monitoring","name":"prometheus-operator-admission-webhook","path":"/admission-alertmanagerconfigs/validate","port":8443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["monitoring.coreos.com"],"apiVersions":["v1alpha1"],"resources":["alertmanagerconfigs"],"scope":"Namespaced"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":5,"admissionReviewVersions":["v1"]}]}config/authentication.json0000640000000000000000000000134315114042226014415 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"cd40bae7-e623-494b-9d41-b020cd29bcba","resourceVersion":"11916","generation":2,"creationTimestamp":"2025-12-03T13:45:08Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe"}]},"spec":{"type":"","oauthMetadata":{"name":""},"webhookTokenAuthenticator":{"kubeConfig":{"name":"webhook-authentication-integrated-oauth"}},"serviceAccountIssuer":""},"status":{"integratedOAuthMetadata":{"name":"oauth-openshift"},"oidcClients":null}}config/mutatingwebhookconfigurations/catalogd-mutating-webhook-configuration.json0000640000000000000000000000533615114042226027473 0ustar0000000000000000{"metadata":{"name":"catalogd-mutating-webhook-configuration","uid":"0bd08e0e-1db4-4e95-8b87-7cb7499b0f51","resourceVersion":"6013","generation":2,"creationTimestamp":"2025-12-03T13:55:47Z","annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"inject-metadata-name.olm.operatorframework.io","clientConfig":{"service":{"namespace":"openshift-catalogd","name":"catalogd-service","path":"/mutate-olm-operatorframework-io-v1-clustercatalog","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["olm.operatorframework.io"],"apiVersions":["v1"],"resources":["clustercatalogs"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"],"reinvocationPolicy":"Never","matchConditions":[{"name":"MissingOrIncorrectMetadataNameLabel","expression":"'name' in object.metadata \u0026\u0026 (!has(object.metadata.labels) || !('olm.operatorframework.io/metadata.name' in object.metadata.labels) || object.metadata.labels['olm.operatorframework.io/metadata.name'] != object.metadata.name)"}]}]}config/tsdb.json0000640000000000000000000000377215114042223012337 0ustar0000000000000000{"status":"success","data":{"headStats":{"numSeries":176888,"numLabelPairs":11390,"chunkCount":176888,"minTime":1764770472554,"maxTime":1764770962225},"seriesCountByMetricName":[{"name":"etcd_request_duration_seconds_bucket","value":15096},{"name":"apiserver_request_sli_duration_seconds_bucket","value":11946},{"name":"apiserver_request_duration_seconds_bucket","value":11542},{"name":"resource_verb:apiserver_request_duration_seconds_bucket:rate:5m","value":6498},{"name":"resource_verb:apiserver_request_duration_seconds_bucket:rate:1m","value":6498},{"name":"apiserver_request_body_size_bytes_bucket","value":5184},{"name":"workqueue_work_duration_seconds_bucket","value":4363},{"name":"workqueue_queue_duration_seconds_bucket","value":4363},{"name":"apiserver_response_sizes_bucket","value":3480},{"name":"apiserver_watch_cache_read_wait_seconds_bucket","value":2548}],"labelValueCountByLabelName":[{"name":"__name__","value":2314},{"name":"name","value":964},{"name":"secret","value":534},{"name":"id","value":515},{"name":"resource","value":463},{"name":"type","value":455},{"name":"le","value":427},{"name":"device","value":424},{"name":"owner_name","value":268},{"name":"configmap","value":236}],"memoryInBytesByLabelName":[{"name":"__name__","value":7084528},{"name":"id","value":4467080},{"name":"name","value":2594939},{"name":"instance","value":2587287},{"name":"namespace","value":2501275},{"name":"pod","value":2316130},{"name":"service","value":1570329},{"name":"job","value":1487678},{"name":"apiserver","value":1310946},{"name":"endpoint","value":1193183}],"seriesCountByLabelValuePair":[{"name":"endpoint=https","value":93388},{"name":"apiserver=kube-apiserver","value":81707},{"name":"namespace=default","value":64803},{"name":"service=kubernetes","value":64780},{"name":"job=apiserver","value":64780},{"name":"instance=192.168.32.10:6443","value":63981},{"name":"node=master-0","value":38545},{"name":"service=kubelet","value":37249},{"name":"endpoint=https-metrics","value":37204},{"name":"job=kubelet","value":37033}]}}config/metrics0000640000000000000000000000170715114042223012075 0ustar0000000000000000# TYPE etcd_server_slow_apply_total untyped etcd_server_slow_apply_total{container="etcd-metrics",endpoint="etcd-metrics",instance="192.168.32.10:9979",job="etcd",namespace="openshift-etcd",pod="etcd-master-0",service="etcd",prometheus="openshift-monitoring/k8s",prometheus_replica="prometheus-k8s-0"} 243 1764770949615 # TYPE etcd_server_slow_read_indexes_total untyped etcd_server_slow_read_indexes_total{container="etcd-metrics",endpoint="etcd-metrics",instance="192.168.32.10:9979",job="etcd",namespace="openshift-etcd",pod="etcd-master-0",service="etcd",prometheus="openshift-monitoring/k8s",prometheus_replica="prometheus-k8s-0"} 0 1764770949615 # TYPE virt_platform untyped virt_platform{container="kube-rbac-proxy",endpoint="https",instance="master-0",job="node-exporter",namespace="openshift-monitoring",pod="node-exporter-b62gf",service="node-exporter",type="kvm",prometheus="openshift-monitoring/k8s",prometheus_replica="prometheus-k8s-0"} 1 1764770947954 config/alerts.json0000640000000000000000000000153215114042223012665 0ustar0000000000000000[{"labels":{"alertname":"Watchdog","namespace":"openshift-monitoring","openshift_io_alert_source":"platform","prometheus":"openshift-monitoring/k8s","severity":"none"},"annotations":{"description":"This is an alert meant to ensure that the entire alerting pipeline is functional.\nThis alert is always firing, therefore it should always be firing in Alertmanager\nand always fire against a receiver. There are integrations with various notification\nmechanisms that send a notification when this alert is not firing. For example the\n\"DeadMansSnitch\" integration in PagerDuty.\n","summary":"An alert that should always be firing to certify that Alertmanager is working properly."},"endsAt":"2025-12-03T14:13:06.954Z","startsAt":"2025-12-03T14:09:06.954Z","updatedAt":"2025-12-03T14:09:06.979Z","status":{"inhibitedBy":[],"silencedBy":[],"state":"active"}}]config/silenced_alerts.json0000640000000000000000000000000315114042223014523 0ustar0000000000000000[] config/clusteroperator/storage.json0000640000000000000000000000346715114042222016304 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"storage","uid":"1329a4c7-3ea0-4007-9a63-3d02a40f6460","resourceVersion":"10376","generation":1,"creationTimestamp":"2025-12-03T13:45:00Z","annotations":{"capability.openshift.io/name":"Storage","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-03T13:58:46Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-03T13:58:46Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-03T13:58:46Z","reason":"AsExpected","message":"DefaultStorageClassControllerAvailable: No default StorageClass for this platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-03T13:58:46Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2025-12-03T13:58:45Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.28"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"","resource":"namespaces","name":"openshift-cluster-csi-drivers"},{"group":"operator.openshift.io","resource":"storages","name":"cluster"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"cluster-storage-operator-role"}],"extension":null}}config/clusteroperator/service-ca.json0000640000000000000000000000340315114042222016647 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"service-ca","uid":"62235b60-ad3a-4a84-8ecc-c9d1bb8ce237","resourceVersion":"4560","generation":1,"creationTimestamp":"2025-12-03T13:45:00Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-03T13:55:19Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-03T13:55:23Z","reason":"AsExpected","message":"Progressing: All service-ca-operator deployments updated"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-03T13:55:21Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-03T13:55:21Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2025-12-03T13:55:17Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.28"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"servicecas","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-service-ca-operator"},{"group":"","resource":"namespaces","name":"openshift-service-ca"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-packageserver.json0000640000000000000000000000313315114042222024646 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-packageserver","uid":"6794a802-8e3c-4994-b65b-fcfd67f12731","resourceVersion":"13287","generation":1,"creationTimestamp":"2025-12-03T13:45:02Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-03T13:58:01Z"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-03T14:01:20Z","reason":"ClusterServiceVersionSucceeded","message":"ClusterServiceVersion openshift-operator-lifecycle-manager/packageserver observed in phase Succeeded"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-03T14:01:20Z","message":"Deployed version 0.0.1-snapshot"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-03T14:00:50Z","message":"Safe to upgrade"}],"versions":[{"name":"operator","version":"4.18.28"},{"name":"packageserver","version":"0.0.1-snapshot"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"},{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-catalog.json0000640000000000000000000000255615114042222023446 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-catalog","uid":"77405ad9-90ad-4e83-ad2b-8cd09f33b98b","resourceVersion":"10575","generation":1,"creationTimestamp":"2025-12-03T13:45:02Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-03T13:58:01Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-03T13:59:12Z","message":"Deployed 4.18.0-202510210939.p2.gf295d32.assembly.stream.el9-f295d32"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-03T13:58:01Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-03T13:58:01Z"}],"versions":[{"name":"operator","version":"4.18.28"},{"name":"operator-lifecycle-manager","version":"4.18.0-202510210939.p2.gf295d32.assembly.stream.el9-f295d32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager.json0000640000000000000000000000264115114042222022031 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager","uid":"de4ade71-1d66-41b2-b9cc-8235cead46fa","resourceVersion":"9666","generation":1,"creationTimestamp":"2025-12-03T13:45:00Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-03T13:58:01Z","message":"Deployed 4.18.0-202510210939.p2.gf295d32.assembly.stream.el9-f295d32"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-03T13:58:01Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-03T13:58:01Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-03T13:58:01Z"}],"versions":[{"name":"operator","version":"4.18.28"},{"name":"operator-lifecycle-manager","version":"4.18.0-202510210939.p2.gf295d32.assembly.stream.el9-f295d32"}],"relatedObjects":[{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/openshift-samples.json0000640000000000000000000000260515114042222020272 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-samples","uid":"32c1dcb7-b7be-4269-8992-b2cf09a810a9","resourceVersion":"11615","generation":1,"creationTimestamp":"2025-12-03T13:45:00Z","annotations":{"capability.openshift.io/name":"openshift-samples","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-03T13:59:15Z"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-03T14:00:22Z","message":"Samples installation successful at 4.18.28"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-03T13:59:15Z","message":"Samples installation successful at 4.18.28"}],"versions":[{"name":"operator","version":"4.18.28"}],"relatedObjects":[{"group":"samples.operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-samples-operator"},{"group":"template.openshift.io","resource":"templates","namespace":"openshift","name":""},{"group":"image.openshift.io","resource":"imagestreams","namespace":"openshift","name":""}],"extension":null}}config/clusteroperator/openshift-controller-manager.json0000640000000000000000000000406415114042222022422 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-controller-manager","uid":"a7a3e590-b6d0-47e3-b499-b8a9f7120e83","resourceVersion":"13736","generation":1,"creationTimestamp":"2025-12-03T13:45:00Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-03T13:55:27Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"True","lastTransitionTime":"2025-12-03T14:02:06Z","reason":"_DesiredStateNotYetAchieved","message":"Progressing: deployment/controller-manager: available replicas is 0, desired available replicas \u003e 1\nProgressing: deployment/route-controller-manager: available replicas is 0, desired available replicas \u003e 1"},{"type":"Available","status":"False","lastTransitionTime":"2025-12-03T14:02:49Z","reason":"_NoPodsAvailable","message":"Available: no pods available on any node."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-03T13:55:43Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2025-12-03T13:55:27Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.28"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftcontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-controller-manager-operator"},{"group":"","resource":"namespaces","name":"openshift-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-route-controller-manager"}],"extension":null}}config/clusteroperator/openshift-apiserver.json0000640000000000000000000000552415114042222020631 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-apiserver","uid":"78349756-988a-4256-bd4b-8f739f242612","resourceVersion":"13739","generation":1,"creationTimestamp":"2025-12-03T13:45:00Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-03T13:55:21Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-03T13:56:11Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-03T14:02:49Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-03T13:55:21Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2025-12-03T13:55:21Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.28"},{"name":"openshift-apiserver","version":"4.18.28"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftapiservers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-apiserver"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"endpoints","namespace":"openshift-etcd","name":"host-etcd-2"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-apiserver","name":""},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.apps.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.authorization.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.build.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.image.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.project.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.quota.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.route.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.security.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.template.openshift.io"}],"extension":null}}config/clusteroperator/olm.json0000640000000000000000000001420515114042222015417 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"olm","uid":"d8ab3715-1dc9-495d-a2c5-c88715e5ff4c","resourceVersion":"10674","generation":1,"creationTimestamp":"2025-12-03T13:45:00Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManagerV1","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-03T13:55:30Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-03T13:56:14Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-03T13:56:14Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-03T13:55:30Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2025-12-03T13:55:30Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.28"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-catalogd"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clustercatalogs.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-catalogd","name":"catalogd-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-catalogd","name":"catalogd-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-catalogd","name":"catalogd-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-catalogd","name":"catalogd-service"},{"group":"apps","resource":"deployments","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-certified-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-community-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-marketplace"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-operators"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":"catalogd-mutating-webhook-configuration"},{"group":"","resource":"namespaces","name":"openshift-operator-controller"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusterextensions.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-operator-controller","name":"operator-controller-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager-metrics-service"},{"group":"apps","resource":"deployments","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"operator.openshift.io","resource":"olms","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-olm-operator"}],"extension":null}}config/clusteroperator/node-tuning.json0000640000000000000000000000342115114042222017055 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"node-tuning","uid":"d0b5a695-6c41-416a-915d-5e622591538f","resourceVersion":"6840","generation":1,"creationTimestamp":"2025-12-03T13:45:00Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2025-12-03T13:55:58Z","reason":"AsExpected","message":"Cluster has deployed 1/1 \"4.18.28\" operands"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-03T13:56:00Z","reason":"AsExpected","message":"Cluster version is \"4.18.28\""},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-03T13:55:57Z","reason":"AsExpected","message":"DaemonSet \"tuned\" available"}],"versions":[{"name":"ocp-tuned","version":"4.18.28"},{"name":"operator","version":"4.18.28"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-node-tuning-operator"},{"group":"tuned.openshift.io","resource":"profiles","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"tuned.openshift.io","resource":"tuneds","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"apps","resource":"daemonsets","namespace":"openshift-cluster-node-tuning-operator","name":"tuned"},{"group":"performance.openshift.io","resource":"performanceprofiles","name":""}],"extension":null}}config/clusteroperator/network.json0000640000000000000000000003614415114042222016327 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"network","uid":"1e10c621-86ed-408f-a0e5-926c51b11a1c","resourceVersion":"11487","generation":1,"creationTimestamp":"2025-12-03T13:45:00Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","network.operator.openshift.io/last-seen-state":"{\"DaemonsetStates\":[],\"DeploymentStates\":[],\"StatefulsetStates\":[]}","network.operator.openshift.io/relatedClusterObjects":""},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe","controller":true}]},"spec":{},"status":{"conditions":[{"type":"ManagementStateDegraded","status":"False","lastTransitionTime":"2025-12-03T13:52:48Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-03T14:00:11Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-03T13:52:19Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-03T13:59:12Z"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-03T13:55:03Z"}],"versions":[{"name":"operator","version":"4.18.28"}],"relatedObjects":[{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"applied-cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"network-attachment-definitions.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ippools.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"overlappingrangeipreservations.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"nodeslicepools.whereabouts.cni.cncf.io"},{"group":"","resource":"namespaces","name":"openshift-multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-ancillary-tools"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-transient"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-group"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-cluster-readers"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"net-attach-def-project"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"default-cni-sysctl-allowlist"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"cni-copy-resources"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"whereabouts-config"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"multus-daemon-config"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus-additional-cni-plugins"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"metrics-daemon-sa"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"metrics-daemon-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"metrics-daemon-sa-rolebinding"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"network-metrics-daemon"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-network"},{"group":"","resource":"services","namespace":"openshift-multus","name":"network-metrics-service"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"","resource":"services","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ac"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-admission-controller-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-admission-controller-webhook"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"multus.openshift.io"},{"group":"apps","resource":"deployments","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-multus-admission-controller"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-multus","name":"prometheus-k8s-rules"},{"group":"","resource":"namespaces","name":"openshift-ovn-kubernetes"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressfirewalls.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressips.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressqoses.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminpolicybasedexternalroutes.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressservices.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"baselineadminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ipamclaims.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"userdefinednetworks.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusteruserdefinednetworks.k8s.ovn.org"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-nodes-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-kube-rbac-proxy"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-kube-rbac-proxy"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-config"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"ovn"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"signer"},{"group":"flowcontrol.apiserver.k8s.io","resource":"flowschemas","name":"openshift-ovn-kubernetes"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-cluster-reader"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-script-lib"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-editor"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-viewer"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"master-rules"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"networking-rules"},{"group":"","resource":"configmaps","namespace":"openshift-config-managed","name":"openshift-network-features"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-control-plane-metrics"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-node"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"","resource":"namespaces","name":"openshift-host-network"},{"group":"","resource":"resourcequotas","namespace":"openshift-host-network","name":"host-network-namespace-quotas"},{"group":"apps","resource":"deployments","namespace":"openshift-ovn-kubernetes","name":"ovnkube-control-plane"},{"group":"apps","resource":"daemonsets","namespace":"openshift-ovn-kubernetes","name":"ovnkube-node"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicies","name":"user-defined-networks-namespace-label"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicybindings","name":"user-defined-networks-namespace-label-binding"},{"group":"","resource":"namespaces","name":"openshift-network-diagnostics"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"kube-system","name":"network-diagnostics"},{"group":"apps","resource":"deployments","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config-managed","name":"openshift-network-public-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config-managed","name":"openshift-network-public-role-binding"},{"group":"","resource":"namespaces","name":"openshift-network-node-identity"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"system:openshift:scc:hostnetwork-v2"},{"group":"","resource":"configmaps","namespace":"openshift-network-node-identity","name":"ovnkube-identity-cm"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"network-node-identity.openshift.io"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-network-operator","name":"openshift-network-operator-ipsec-rules"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-iptables-alerter"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-iptables-alerter"},{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"iptables-alerter-script"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"","resource":"namespaces","name":"openshift-network-operator"},{"group":"operator.openshift.io","resource":"networks","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cloud-network-config-controller"}],"extension":null}}config/clusteroperator/monitoring.json0000640000000000000000000000333715114042222017021 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"monitoring","uid":"bd867bd9-5d3e-4fa3-9ebc-21dbfef3ae06","resourceVersion":"7851","generation":1,"creationTimestamp":"2025-12-03T13:45:00Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"Unknown","lastTransitionTime":"2025-12-03T13:56:11Z"},{"type":"Degraded","status":"Unknown","lastTransitionTime":"2025-12-03T13:56:11Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2025-12-03T13:56:11Z","reason":"RollOutInProgress","message":"Rolling out the stack."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-03T13:56:11Z"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-monitoring"},{"group":"","resource":"namespaces","name":"openshift-user-workload-monitoring"},{"group":"monitoring.coreos.com","resource":"servicemonitors","name":""},{"group":"monitoring.coreos.com","resource":"podmonitors","name":""},{"group":"monitoring.coreos.com","resource":"prometheusrules","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagers","name":""},{"group":"monitoring.coreos.com","resource":"prometheuses","name":""},{"group":"monitoring.coreos.com","resource":"thanosrulers","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagerconfigs","name":""}],"extension":null}}config/clusteroperator/marketplace.json0000640000000000000000000000313315114042222017116 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"marketplace","uid":"5348243e-53bd-4ed1-988f-25ee21be8da2","resourceVersion":"8066","generation":1,"creationTimestamp":"2025-12-03T13:45:00Z","annotations":{"capability.openshift.io/name":"marketplace","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-03T13:56:12Z","reason":"OperatorAvailable","message":"Successfully progressed to release version: 4.18.28"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-03T13:56:12Z","reason":"OperatorAvailable","message":"Available release version: 4.18.28"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-03T13:56:12Z","reason":"OperatorAvailable","message":"Marketplace is upgradeable"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-03T13:56:12Z","reason":"OperatorAvailable","message":"Available release version: 4.18.28"}],"versions":[{"name":"operator","version":"4.18.28"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-marketplace"},{"group":"operators.coreos.com","resource":"catalogsources","namespace":"openshift-marketplace","name":""}],"extension":null}}config/clusteroperator/machine-config.json0000640000000000000000000000554615114042222017507 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-config","uid":"82949685-69c9-4081-81d3-3dd5e39c9ad4","resourceVersion":"12990","generation":1,"creationTimestamp":"2025-12-03T13:45:00Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"True","lastTransitionTime":"2025-12-03T13:58:01Z","message":"Working towards 4.18.28"},{"type":"Degraded","status":"True","lastTransitionTime":"2025-12-03T14:00:39Z","reason":"RequiredPoolsFailed","message":"Unable to apply 4.18.28: error during syncRequiredMachineConfigPools: context deadline exceeded"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-03T14:00:39Z","reason":"AsExpected","message":"Cluster has deployed []"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-03T14:00:39Z","reason":"AsExpected"},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2025-12-03T14:00:39Z","reason":"AsExpected"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-config-operator"},{"group":"machineconfiguration.openshift.io","resource":"machineconfigpools","name":""},{"group":"machineconfiguration.openshift.io","resource":"controllerconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"kubeletconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"containerruntimeconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"machineconfigs","name":""},{"group":"operator.openshift.io","resource":"machineconfigurations","name":""},{"group":"","resource":"nodes","name":""},{"group":"","resource":"namespaces","name":"openshift-kni-infra"},{"group":"","resource":"namespaces","name":"openshift-openstack-infra"},{"group":"","resource":"namespaces","name":"openshift-ovirt-infra"},{"group":"","resource":"namespaces","name":"openshift-vsphere-infra"},{"group":"","resource":"namespaces","name":"openshift-nutanix-infra"},{"group":"","resource":"namespaces","name":"openshift-cloud-platform-infra"}],"extension":{"lastSyncError":"MachineConfigPool master has not progressed to latest configuration: configuration status for pool master is empty: 0 (ready 0) out of 1 nodes are updating to latest configuration rendered-master-459a0309a4bacb184a38028403c86289, retrying","master":"0 (ready 0) out of 1 nodes are updating to latest configuration rendered-master-459a0309a4bacb184a38028403c86289","worker":"all 0 nodes are at latest configuration rendered-worker-ac51e1cc2e343e3be6926ba118fd6150"}}}config/clusteroperator/machine-approver.json0000640000000000000000000000253315114042222020071 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-approver","uid":"101a6f89-d4b9-4ded-8486-0615e98c1c7d","resourceVersion":"10046","generation":1,"creationTimestamp":"2025-12-03T13:45:00Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2025-12-03T13:58:28Z","reason":"AsExpected","message":"Cluster Machine Approver is available at 4.18.28"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-03T13:58:28Z","reason":"AsExpected"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-03T13:58:28Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-03T13:58:28Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.28"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-machine-approver"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""}],"extension":null}}config/clusteroperator/machine-api.json0000640000000000000000000000371415114042222017006 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-api","uid":"150ae507-ddde-4517-985b-ce1adb6c89f7","resourceVersion":"10910","generation":1,"creationTimestamp":"2025-12-03T13:45:00Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-03T13:59:21Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-03T13:59:20Z","reason":"AsExpected"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-03T13:59:21Z","reason":"AsExpected","message":"Cluster Machine API Operator is in NoOp mode"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-03T13:59:20Z"}],"versions":[{"name":"operator","version":"4.18.28"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"machines","namespace":"openshift-machine-api","name":""},{"group":"machine.openshift.io","resource":"machinesets","namespace":"openshift-machine-api","name":""},{"group":"machine.openshift.io","resource":"machinehealthchecks","namespace":"openshift-machine-api","name":""},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-machine-api","name":""},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-operator"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-controllers"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/kube-storage-version-migrator.json0000640000000000000000000000325315114042222022526 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-storage-version-migrator","uid":"84fb4478-c0d0-4ec2-afd6-6a2d47b0a62e","resourceVersion":"6083","generation":1,"creationTimestamp":"2025-12-03T13:45:00Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-03T13:55:28Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-03T13:55:47Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-03T13:55:47Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-03T13:55:28Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2025-12-03T13:55:28Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.28"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubestorageversionmigrators","name":"cluster"},{"group":"migration.k8s.io","resource":"storageversionmigrations","name":""},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator"},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator-operator"}],"extension":null}}config/clusteroperator/kube-scheduler.json0000640000000000000000000000414615114042222017535 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-scheduler","uid":"be83dea0-d668-4d9a-9803-574d5c77346a","resourceVersion":"13151","generation":1,"creationTimestamp":"2025-12-03T13:45:00Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-03T13:55:12Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-03T14:01:12Z","reason":"AsExpected","message":"NodeInstallerProgressing: 1 node is at revision 5"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-03T14:01:12Z","reason":"AsExpected","message":"StaticPodsAvailable: 1 nodes are active; 1 node is at revision 5"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-03T13:55:12Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2025-12-03T13:55:12Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.28"},{"name":"kube-scheduler","version":"1.31.13"},{"name":"operator","version":"4.18.28"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeschedulers","name":"cluster"},{"group":"config.openshift.io","resource":"schedulers","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler-operator"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""}],"extension":null}}config/clusteroperator/kube-controller-manager.json0000640000000000000000000001214615114042222021351 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-controller-manager","uid":"c76e28c7-d3eb-4027-9534-a452313934f3","resourceVersion":"13774","generation":1,"creationTimestamp":"2025-12-03T13:45:00Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-03T13:55:27Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: icy-controller-config\",\nNodeInstallerDegraded: (string) (len=29) \"controller-manager-kubeconfig\",\nNodeInstallerDegraded: (string) (len=38) \"kube-controller-cert-syncer-kubeconfig\",\nNodeInstallerDegraded: (string) (len=17) \"serviceaccount-ca\",\nNodeInstallerDegraded: (string) (len=10) \"service-ca\",\nNodeInstallerDegraded: (string) (len=15) \"recycler-config\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=12) \"cloud-config\"\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=39) \"kube-controller-manager-client-cert-key\",\nNodeInstallerDegraded: (string) (len=10) \"csr-signer\"\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=66) \"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I1203 13:56:13.378273 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I1203 13:56:14.145282 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I1203 13:56:14.145369 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I1203 13:56:14.145384 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I1203 13:56:14.159037 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I1203 13:56:44.159165 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F1203 13:56:58.163300 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: "},{"type":"Progressing","status":"True","lastTransitionTime":"2025-12-03T13:56:08Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2025-12-03T13:55:27Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-03T13:55:27Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2025-12-03T13:55:27Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.28"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubecontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager-operator"},{"group":"","resource":"namespaces","name":"kube-system"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""},{"group":"","resource":"nodes","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/kube-apiserver.json0000640000000000000000000000530515114042222017555 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-apiserver","uid":"cfdd0c50-2852-4966-9c05-e72b22813c55","resourceVersion":"13188","generation":1,"creationTimestamp":"2025-12-03T13:45:00Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-03T13:54:56Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2025-12-03T14:01:05Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 2; 0 nodes have achieved new revision 4"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-03T14:00:11Z","reason":"AsExpected","message":"StaticPodsAvailable: 1 nodes are active; 1 node is at revision 2; 0 nodes have achieved new revision 4"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-03T13:54:56Z","reason":"AsExpected","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced."},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2025-12-03T13:54:56Z","reason":"AsExpected","message":"All is well"}],"versions":[{"name":"raw-internal","version":"4.18.28"},{"name":"operator","version":"4.18.28"},{"name":"kube-apiserver","version":"1.31.13"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeapiservers","name":"cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":""},{"group":"security.openshift.io","resource":"securitycontextconstraints","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":""},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":""},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""},{"group":"apiserver.openshift.io","resource":"apirequestcounts","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/insights.json0000640000000000000000000000141415114042222016456 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"insights","uid":"12111b21-d4cf-4130-8956-99f327f12902","resourceVersion":"692","generation":1,"creationTimestamp":"2025-12-03T13:45:00Z","annotations":{"capability.openshift.io/name":"Insights","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/ingress.json0000640000000000000000000000467715114042222016316 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"ingress","uid":"5c8b9ab0-fed6-4127-b071-0f90cfbfa15a","resourceVersion":"16676","generation":1,"creationTimestamp":"2025-12-03T13:45:00Z","annotations":{"capability.openshift.io/name":"Ingress","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2025-12-03T13:55:59Z","reason":"IngressAvailable","message":"The \"default\" ingress controller reports Available=True."},{"type":"Progressing","status":"True","lastTransitionTime":"2025-12-03T14:09:03Z","reason":"Reconciling","message":"ingresscontroller \"default\" is progressing: IngressControllerProgressing: One or more status conditions indicate progressing: DeploymentRollingOut=True (DeploymentRollingOut: Waiting for router deployment rollout to finish: 0 of 1 updated replica(s) are available...\n)."},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-03T14:01:12Z","reason":"IngressNotDegraded","message":"The \"default\" ingress controller reports Degraded=False."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-03T13:55:58Z","reason":"Upgradeable"},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2025-12-03T13:55:58Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.28"},{"name":"ingress-controller","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3ed4dc45b0e0d6229620e2ac6a53ecd180cad44a11daf9f0170d94b4acd35ded"},{"name":"canary-server","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:492103a8365ef9a1d5f237b4ba90aff87369167ec91db29ff0251ba5aab2b419"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-ingress-operator"},{"group":"operator.openshift.io","resource":"ingresscontrollers","namespace":"openshift-ingress-operator","name":""},{"group":"ingress.operator.openshift.io","resource":"dnsrecords","namespace":"openshift-ingress-operator","name":""},{"group":"","resource":"namespaces","name":"openshift-ingress"},{"group":"","resource":"namespaces","name":"openshift-ingress-canary"}],"extension":null}}config/clusteroperator/image-registry.json0000640000000000000000000000373215114042222017563 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"image-registry","uid":"27f1bdfd-10ee-4604-80aa-9cba210abecd","resourceVersion":"13640","generation":1,"creationTimestamp":"2025-12-03T13:45:00Z","annotations":{"capability.openshift.io/name":"ImageRegistry","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2025-12-03T14:02:43Z","reason":"Removed","message":"Available: The registry is removed\nNodeCADaemonAvailable: The daemon set node-ca has available replicas\nImagePrunerAvailable: Pruner CronJob has been created"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-03T14:02:43Z","reason":"Removed","message":"Progressing: All registry resources are removed\nNodeCADaemonProgressing: The daemon set node-ca is deployed"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-03T13:59:11Z","reason":"Removed","message":"Degraded: The registry is removed"}],"versions":[{"name":"operator","version":"4.18.28"}],"relatedObjects":[{"group":"imageregistry.operator.openshift.io","resource":"configs","name":"cluster"},{"group":"imageregistry.operator.openshift.io","resource":"imagepruners","name":"cluster"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"system:registry"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"registry-registry-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-image-registry-pruner"},{"group":"","resource":"namespaces","name":"openshift-image-registry"}],"extension":null}}config/clusteroperator/etcd.json0000640000000000000000000000457015114042222015553 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"etcd","uid":"d43450b5-840f-42bb-a911-262410c74373","resourceVersion":"4988","generation":1,"creationTimestamp":"2025-12-03T13:45:00Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-03T13:55:11Z","reason":"AsExpected","message":"EtcdMembersControllerDegraded: giving up getting a cached client after 3 tries\nNodeControllerDegraded: All master nodes are ready\nClusterMemberRemovalControllerDegraded: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\nClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries"},{"type":"Progressing","status":"True","lastTransitionTime":"2025-12-03T13:55:27Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2025-12-03T13:55:13Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-03T13:55:11Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2025-12-03T13:55:11Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.28"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"etcds","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"namespaces","name":"openshift-etcd"}],"extension":null}}config/clusteroperator/dns.json0000640000000000000000000000401015114042222015405 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"dns","uid":"8d0ce691-4348-4a1c-9ba7-e1c548850257","resourceVersion":"16547","generation":1,"creationTimestamp":"2025-12-03T13:45:00Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"False","lastTransitionTime":"2025-12-03T14:09:01Z","reason":"DNSUnavailable","message":"DNS \"default\" is unavailable."},{"type":"Progressing","status":"True","lastTransitionTime":"2025-12-03T14:09:01Z","reason":"DNSReportsProgressingIsTrue","message":"DNS \"default\" reports Progressing=True: \"Have 0 available DNS pods, want 1.\""},{"type":"Degraded","status":"True","lastTransitionTime":"2025-12-03T14:09:01Z","reason":"DNSDegraded","message":"DNS default is degraded"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-03T13:55:57Z","reason":"DNSUpgradeable","message":"DNS default is upgradeable: DNS Operator can be upgraded"}],"versions":[{"name":"kube-rbac-proxy","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b03d2897e7cc0e8d0c306acb68ca3d9396d502882c14942faadfdb16bc40e17d"},{"name":"operator","version":"4.18.28"},{"name":"coredns","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4a3e2790bda8898df5e4e9cf1878103ac483ea1633819d76ea68976b0b2062b6"},{"name":"openshift-cli","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:51a4c20765f54b6a6b5513f97cf54bb99631c2abe860949293456886a74f87fe"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-dns-operator"},{"group":"operator.openshift.io","resource":"dnses","name":"default"},{"group":"","resource":"namespaces","name":"openshift-dns"}],"extension":null}}config/clusteroperator/csi-snapshot-controller.json0000640000000000000000000000321715114042222021425 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"csi-snapshot-controller","uid":"c6ef4405-fccc-40b8-ad34-aa686b232c4a","resourceVersion":"9141","generation":1,"creationTimestamp":"2025-12-03T13:45:00Z","annotations":{"capability.openshift.io/name":"CSISnapshot","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-03T13:55:26Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-03T13:55:47Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-03T13:55:47Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-03T13:55:26Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2025-12-03T13:55:26Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.28"},{"name":"csi-snapshot-controller","version":"4.18.28"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"operator.openshift.io","resource":"csisnapshotcontrollers","name":"cluster"}],"extension":null}}config/clusteroperator/control-plane-machine-set.json0000640000000000000000000000263615114042222021605 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"control-plane-machine-set","uid":"7f3851d2-d547-40dc-b30d-c6c3dafe710d","resourceVersion":"10060","generation":1,"creationTimestamp":"2025-12-03T13:45:00Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2025-12-03T13:58:28Z","reason":"AsExpected","message":"cluster operator is available"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-03T13:58:28Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-03T13:58:28Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-03T13:58:28Z","reason":"AsExpected","message":"cluster operator is upgradable"}],"versions":[{"name":"operator","version":"4.18.28"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"controlplanemachinesets","name":""},{"group":"machine.openshift.io","resource":"machines","name":""}],"extension":null}}config/clusteroperator/console.json0000640000000000000000000000512515114042222016273 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"console","uid":"f7a4e1ec-c47e-4af0-8189-7d32b53932ae","resourceVersion":"13169","generation":1,"creationTimestamp":"2025-12-03T13:45:00Z","annotations":{"capability.openshift.io/name":"Console","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-03T14:00:40Z","reason":"AsExpected","message":"RouteHealthDegraded: route not yet available, https://console-openshift-console.apps.sno.openstack.lab returns '503 Service Unavailable'"},{"type":"Progressing","status":"True","lastTransitionTime":"2025-12-03T14:01:07Z","reason":"SyncLoopRefresh_InProgress","message":"SyncLoopRefreshProgressing: working toward version 4.18.28, 0 replicas available"},{"type":"Available","status":"False","lastTransitionTime":"2025-12-03T14:01:07Z","reason":"Deployment_InsufficientReplicas::RouteHealth_StatusError","message":"DeploymentAvailable: 0 replicas available for console deployment\nRouteHealthAvailable: route not yet available, https://console-openshift-console.apps.sno.openstack.lab returns '503 Service Unavailable'"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-03T14:01:05Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2025-12-03T14:00:40Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.28"}],"relatedObjects":[{"group":"console.openshift.io","resource":"consoleplugins","name":"monitoring-plugin"},{"group":"operator.openshift.io","resource":"consoles","name":"cluster"},{"group":"config.openshift.io","resource":"consoles","name":"cluster"},{"group":"config.openshift.io","resource":"infrastructures","name":"cluster"},{"group":"config.openshift.io","resource":"proxies","name":"cluster"},{"group":"config.openshift.io","resource":"oauths","name":"cluster"},{"group":"oauth.openshift.io","resource":"oauthclients","name":"console"},{"group":"","resource":"namespaces","name":"openshift-console-operator"},{"group":"","resource":"namespaces","name":"openshift-console"},{"group":"","resource":"configmaps","namespace":"openshift-config-managed","name":"console-public"}],"extension":null}}config/clusteroperator/config-operator.json0000640000000000000000000000311715114042222017726 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"config-operator","uid":"92951606-3c62-4215-aa4a-19bfa05dc734","resourceVersion":"11607","generation":1,"creationTimestamp":"2025-12-03T13:45:00Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-03T14:00:22Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-03T14:00:22Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-03T14:00:22Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-03T14:00:22Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2025-12-03T14:00:22Z","reason":"NoData"}],"versions":[{"name":"feature-gates","version":"4.18.28"},{"name":"operator","version":"4.18.28"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-operator"}],"extension":null}}config/clusteroperator/cluster-autoscaler.json0000640000000000000000000000266015114042222020453 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster-autoscaler","uid":"543b55e4-73d6-4451-976c-2d5b2ed52036","resourceVersion":"11306","generation":1,"creationTimestamp":"2025-12-03T13:45:00Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2025-12-03T13:58:28Z","reason":"AsExpected","message":"at version 4.18.28"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-03T13:59:57Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-03T13:59:57Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-03T13:58:28Z"}],"versions":[{"name":"operator","version":"4.18.28"}],"relatedObjects":[{"group":"autoscaling.openshift.io","resource":"machineautoscalers","namespace":"openshift-machine-api","name":""},{"group":"autoscaling.openshift.io","resource":"clusterautoscalers","namespace":"openshift-machine-api","name":""},{"group":"","resource":"namespaces","name":"openshift-machine-api"}],"extension":null}}config/clusteroperator/cloud-credential.json0000640000000000000000000002022415114042222020044 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-credential","uid":"9a7e3ea1-8a04-4024-aba0-5d1a94c912db","resourceVersion":"13529","generation":1,"creationTimestamp":"2025-12-03T13:45:00Z","annotations":{"capability.openshift.io/name":"CloudCredential","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2025-12-03T13:45:25Z","reason":"AsExpected","message":"All is well"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-03T13:45:25Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-03T14:02:06Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-03T13:45:25Z"}],"versions":[{"name":"operator","version":"4.18.28"}],"relatedObjects":[{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"aws-ebs-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"azure-disk-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"azure-file-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"cloud-credential-operator-gcp-ro-creds"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"cloud-credential-operator-iam-ro"},{"group":"operator.openshift.io","resource":"cloudcredentials","name":"cluster"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ibm-powervs-block-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ibm-vpc-block-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"manila-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-azure-cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-credential-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-aws"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cluster-csi-drivers"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-gcp-ccm"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-gcp-pd-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ibm-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-gcs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-ibmcos"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-ibmcos-powervs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-aws"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-ibmcloud"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-nutanix"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-powervs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-vsphere"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-network"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-nutanix-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-openstack-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-powervs-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vmware-vsphere-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vsphere-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vsphere-problem-detector"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ovirt-csi-driver-operator"}],"extension":null}}config/clusteroperator/cloud-controller-manager.json0000640000000000000000000000440215114042222021525 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-controller-manager","uid":"8de3d167-46ea-429f-b658-aa7bfc9f856a","resourceVersion":"10320","generation":1,"creationTimestamp":"2025-12-03T13:45:00Z","annotations":{"capability.openshift.io/name":"CloudControllerManager","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe","controller":true}]},"spec":{},"status":{"conditions":[{"type":"TrustedCABundleControllerControllerAvailable","status":"True","lastTransitionTime":"2025-12-03T13:58:44Z","reason":"AsExpected","message":"Trusted CA Bundle Controller works as expected"},{"type":"TrustedCABundleControllerControllerDegraded","status":"False","lastTransitionTime":"2025-12-03T13:58:44Z","reason":"AsExpected","message":"Trusted CA Bundle Controller works as expected"},{"type":"CloudConfigControllerAvailable","status":"True","lastTransitionTime":"2025-12-03T13:58:44Z","reason":"AsExpected","message":"Cloud Config Controller works as expected"},{"type":"CloudConfigControllerDegraded","status":"False","lastTransitionTime":"2025-12-03T13:58:44Z","reason":"AsExpected","message":"Cloud Config Controller works as expected"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-03T13:58:46Z","reason":"AsExpected","message":"Cluster Cloud Controller Manager Operator is available at 4.18.28"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-03T13:58:46Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-03T13:58:46Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-03T13:58:46Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.28"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager-operator"},{"group":"config.openshift.io","resource":"clusteroperators","name":"cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager"}],"extension":null}}config/clusteroperator/baremetal.json0000640000000000000000000000427115114042222016566 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"baremetal","uid":"7dbf5327-c601-4621-94f9-49235e12baaa","resourceVersion":"10940","generation":1,"creationTimestamp":"2025-12-03T13:45:00Z","annotations":{"capability.openshift.io/name":"baremetal","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-03T13:59:21Z","reason":"WaitingForProvisioningCR"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-03T13:59:21Z"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-03T13:59:21Z","reason":"WaitingForProvisioningCR","message":"Waiting for Provisioning CR on BareMetal Platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-03T13:59:21Z"},{"type":"Disabled","status":"False","lastTransitionTime":"2025-12-03T13:59:21Z"}],"versions":[{"name":"operator","version":"4.18.28"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"provisioning","name":""},{"group":"metal3.io","resource":"hostfirmwaresettings","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"firmwareschemas","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"preprovisioningimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"bmceventsubscriptions","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostfirmwarecomponents","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"dataimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostupdatepolicies","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/authentication.json0000640000000000000000000000655015114042222017653 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"authentication","uid":"36495783-91cb-4407-afc2-a56a1b2d7b3c","resourceVersion":"13722","generation":1,"creationTimestamp":"2025-12-03T13:45:00Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-03T14:00:45Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"True","lastTransitionTime":"2025-12-03T13:59:20Z","reason":"OAuthServerDeployment_PodsUpdating::WellKnownReadyController_OAuthMetadataNotYetServed","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available\nWellKnownReadyControllerProgressing: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)"},{"type":"Available","status":"False","lastTransitionTime":"2025-12-03T13:55:28Z","reason":"OAuthServerDeployment_NoPod::WellKnown_NotReady","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nWellKnownAvailable: The well-known endpoint is not yet available: kube-apiserver oauth endpoint https://192.168.32.10:6443/.well-known/oauth-authorization-server is not yet served and authentication operator keeps waiting (check kube-apiserver operator, and check that instances roll out successfully, which can take several minutes per instance)"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-03T13:55:26Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2025-12-03T13:55:26Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.28"},{"name":"oauth-apiserver","version":"4.18.28"},{"name":"oauth-openshift","version":"4.18.28_openshift"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"infrastructures","name":"cluster"},{"group":"config.openshift.io","resource":"oauths","name":"cluster"},{"group":"route.openshift.io","resource":"routes","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"services","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-authentication"},{"group":"","resource":"namespaces","name":"openshift-authentication-operator"},{"group":"","resource":"namespaces","name":"openshift-ingress"},{"group":"","resource":"namespaces","name":"openshift-oauth-apiserver"}],"extension":null}}config/oauth.json0000640000000000000000000000114415114042222012511 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"a5631719-b755-41ff-b713-f019aee7291f","resourceVersion":"1706","generation":1,"creationTimestamp":"2025-12-03T13:45:20Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"5205dfe9-721d-4bc1-91a8-be4081323bbe"}]},"spec":{"tokenConfig":{},"templates":{"login":{"name":""},"providerSelection":{"name":""},"error":{"name":""}}},"status":{}}