insights-operator/gathers.json0000640000000000000000000003643415154601576015275 0ustar0000000000000000{"status_reports":[{"name":"clusterconfig/pdbs","duration_in_ms":1008,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/dvo_metrics","duration_in_ms":1021,"records_count":0,"errors":null,"warnings":["warning: no service found with label selector name=deployment-validation-operator"],"panic":null},{"name":"clusterconfig/authentication","duration_in_ms":1024,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/qemu_kubevirt_launcher_logs","duration_in_ms":1021,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_pruners","duration_in_ms":1026,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators","duration_in_ms":1099,"records_count":34,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/infrastructures","duration_in_ms":998,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/oauths","duration_in_ms":975,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress_certificates","duration_in_ms":1840,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"workloads/workload_info","duration_in_ms":4922,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_healthchecks","duration_in_ms":1021,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_runtime_configs","duration_in_ms":1046,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/overlapping_namespace_uids","duration_in_ms":1051,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_classes","duration_in_ms":1027,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators_pods_and_events","duration_in_ms":17815,"records_count":63,"errors":["the record with the same name \"events/openshift-machine-api.json\" was already recorded and had the fingerprint \"5d6c98d2108516e58b18b159025417366abf91eb09afa77642a75659b35ad4aa\", overwriting with the record having fingerprint \"ad31651bf45e91356a2ba7be1b5c6b7bf7e966a130e3ea88460fa0969af2157f\"","the record with the same name \"config/pod/openshift-etcd-operator/etcd-operator-5884b9cd56-bfq7b.json\" was already recorded and had the fingerprint \"3289863ab6f8f3e1a53f6c0a11df274c0578f0585ec42e32831cd1694d69af96\", overwriting with the record having fingerprint \"3289863ab6f8f3e1a53f6c0a11df274c0578f0585ec42e32831cd1694d69af96\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-bfq7b/etcd-operator_previous.log\" was already recorded and had the fingerprint \"118afdfb3c0b0e35ca12d42a813ae43956150b51e262f9e67829739b150dcf23\", overwriting with the record having fingerprint \"118afdfb3c0b0e35ca12d42a813ae43956150b51e262f9e67829739b150dcf23\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-bfq7b/etcd-operator_current.log\" was already recorded and had the fingerprint \"d2149807e4deb97cce5ca38d3283e83068df63773eb70584a1821a5faad7c2bd\", overwriting with the record having fingerprint \"d2149807e4deb97cce5ca38d3283e83068df63773eb70584a1821a5faad7c2bd\""],"warnings":["warning: the record with the same fingerprint \"3289863ab6f8f3e1a53f6c0a11df274c0578f0585ec42e32831cd1694d69af96\" was already recorded at path \"config/pod/openshift-etcd-operator/etcd-operator-5884b9cd56-bfq7b.json\", recording another one with a different path \"config/pod/openshift-etcd-operator/etcd-operator-5884b9cd56-bfq7b.json\"","warning: the record with the same fingerprint \"118afdfb3c0b0e35ca12d42a813ae43956150b51e262f9e67829739b150dcf23\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-bfq7b/etcd-operator_previous.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-bfq7b/etcd-operator_previous.log\"","warning: the record with the same fingerprint \"d2149807e4deb97cce5ca38d3283e83068df63773eb70584a1821a5faad7c2bd\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-bfq7b/etcd-operator_current.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-bfq7b/etcd-operator_current.log\""],"panic":null},{"name":"conditional","duration_in_ms":228,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cost_management_metrics_configs","duration_in_ms":6,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/feature_gates","duration_in_ms":974,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/olm_operators","duration_in_ms":998,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/proxies","duration_in_ms":1027,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/node_logs","duration_in_ms":1705,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_configs","duration_in_ms":1799,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkstates","duration_in_ms":4,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_logging","duration_in_ms":7,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"workloads","duration_in_ms":4923,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanedeployments","duration_in_ms":0,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/silenced_alerts","duration_in_ms":26,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=false\u0026inhibited=false\u0026silenced=true\": dial tcp: lookup alertmanager-main.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/clusterroles","duration_in_ms":1604,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanenodesets","duration_in_ms":5,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_machine_api_events","duration_in_ms":1007,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/aggregated_monitoring_cr_names","duration_in_ms":1583,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ceph_cluster","duration_in_ms":4,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/tsdb_status","duration_in_ms":24,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/api/v1/status/tsdb\": dial tcp: lookup prometheus-k8s.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/install_plans","duration_in_ms":12213,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"conditional/rapid_container_logs","duration_in_ms":0,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machines","duration_in_ms":1023,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig","duration_in_ms":17831,"records_count":152,"errors":["function \"pod_network_connectivity_checks\" failed with an error","function \"machine_autoscalers\" failed with an error","function \"tsdb_status\" failed with an error","function \"silenced_alerts\" failed with an error","function \"active_alerts\" failed with an error","function \"metrics\" failed with an error","function \"support_secret\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","unable to record function \"operators_pods_and_events\" record \"events/openshift-machine-api.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/etcd-operator-5884b9cd56-bfq7b.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-bfq7b/etcd-operator_previous.log\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-bfq7b/etcd-operator_current.log\""],"warnings":null,"panic":null},{"name":"clusterconfig/machine_autoscalers","duration_in_ms":19,"records_count":0,"errors":["machineautoscalers.autoscaling.openshift.io is forbidden: User \"system:serviceaccount:openshift-insights:gather\" cannot list resource \"machineautoscalers\" in API group \"autoscaling.openshift.io\" at the cluster scope"],"warnings":null,"panic":null},{"name":"clusterconfig/machine_sets","duration_in_ms":1020,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cluster_apiserver","duration_in_ms":1026,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/config_maps","duration_in_ms":1839,"records_count":9,"errors":["configmaps \"cluster-monitoring-config\" not found","configmaps \"gateway-mode-config\" not found","configmaps \"insights-config\" not found"],"warnings":["warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt\""],"panic":null},{"name":"clusterconfig/sap_config","duration_in_ms":4,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/jaegers","duration_in_ms":17,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodes","duration_in_ms":1019,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/version","duration_in_ms":1604,"records_count":3,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/service_accounts","duration_in_ms":12815,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_version","duration_in_ms":26,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/metrics","duration_in_ms":5,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/federate?match%5B%5D=cluster_installer\u0026match%5B%5D=namespace%3Acontainer_cpu_usage%3Asum\u0026match%5B%5D=namespace%3Acontainer_memory_usage_bytes%3Asum\u0026match%5B%5D=vsphere_node_hw_version_total\u0026match%5B%5D=virt_platform\u0026match%5B%5D=console_helm_installs_total\u0026match%5B%5D=console_helm_upgrades_total\u0026match%5B%5D=console_helm_uninstalls_total\u0026match%5B%5D=openshift_apps_deploymentconfigs_strategy_total\u0026match%5B%5D=etcd_server_slow_apply_total\u0026match%5B%5D=etcd_server_slow_read_indexes_total\u0026match%5B%5D=haproxy_exporter_server_threshold\": dial tcp: lookup prometheus-k8s.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/machine_config_pools","duration_in_ms":1022,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"workloads/helmchart_info","duration_in_ms":13,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_cluster","duration_in_ms":5,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_pods","duration_in_ms":26,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/validating_webhook_configurations","duration_in_ms":1025,"records_count":6,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/number_of_pods_and_netnamespaces_with_sdn_annotations","duration_in_ms":1082,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/networks","duration_in_ms":1019,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/mutating_webhook_configurations","duration_in_ms":1021,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/monitoring_persistent_volumes","duration_in_ms":1025,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"conditional/conditional_gatherer_rules","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/lokistack","duration_in_ms":21,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/schedulers","duration_in_ms":1019,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_controlplanes","duration_in_ms":5,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/support_secret","duration_in_ms":1002,"records_count":0,"errors":["secrets \"support\" not found"],"warnings":null,"panic":null},{"name":"clusterconfig/image_registries","duration_in_ms":1006,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"conditional/remote_configuration","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pod_network_connectivity_checks","duration_in_ms":4,"records_count":0,"errors":["the server could not find the requested resource (get podnetworkconnectivitychecks.controlplane.operator.openshift.io)"],"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkconfigurationpolicies","duration_in_ms":5,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/active_alerts","duration_in_ms":24,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=true\": dial tcp: lookup alertmanager-main.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/certificate_signing_requests","duration_in_ms":1052,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress","duration_in_ms":1027,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_images","duration_in_ms":1075,"records_count":10,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/crds","duration_in_ms":1608,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_datahubs","duration_in_ms":0,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image","duration_in_ms":1006,"records_count":1,"errors":null,"warnings":null,"panic":null}],"container_memory_bytes_usage":0,"uptime_seconds":27.129,"is_global_obfuscation_enabled":false}insights-operator/remote-configuration.json0000640000000000000000000000443515154601576017774 0ustar0000000000000000{"conditional_gathering_rules":[{"conditions":[{"alert":{"name":"APIRemovedInNextEUSReleaseInUse"},"type":"alert_is_firing"}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedReload"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedToSendAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"KubePodCrashLooping"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","previous":true,"tail_lines":20}}},{"conditions":[{"alert":{"name":"KubePodNotReady"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},{"conditions":[{"alert":{"name":"PrometheusOperatorSyncFailed"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},{"conditions":[{"alert":{"name":"PrometheusRemoteStorageFailures"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},{"conditions":[{"alert":{"name":"PrometheusTargetSyncFailure"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},{"conditions":[{"alert":{"name":"SamplesImagestreamImportFailing"},"type":"alert_is_firing"}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},{"conditions":[{"alert":{"name":"ThanosRuleQueueIsDroppingAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}}],"container_logs":[],"version":"1.2.0"}insights-operator/conditional-gatherer-rules.json0000640000000000000000000000577515154601576021076 0ustar0000000000000000{"version":"1.2.0","conditional_gathering_rules":[{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"APIRemovedInNextEUSReleaseInUse"}}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedReload"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedToSendAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodCrashLooping"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","tail_lines":20,"previous":true}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodNotReady"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusOperatorSyncFailed"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusRemoteStorageFailures"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusTargetSyncFailure"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"SamplesImagestreamImportFailing"}}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"ThanosRuleQueueIsDroppingAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false}],"endpoint":"https://console.redhat.com/api/gathering/v2/%s/gathering_rules"}config/workload_info.json0000640000000000000000000004651515154601576014262 0ustar0000000000000000{"pods":72,"imageCount":59,"namespaces":{"0LiT6ZNtbpYL":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:381e96959e3c3b08a3e2715e6024697ae14af31bd0378b49f583e984b3b9a192","firstCommand":"N9KxLV2avCo2","firstArg":"BuLIUMMJnyP_"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:ac6f0695d3386e6d601f4ae507940981352fa3ad884b0fed6fb25698c5e6f916","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:0c03cb25dc6f6a865529ebc979e8d7d08492b28fd3fb93beddf30e1cb06f1245","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:ace4dcd008420277d915fe983b07bbb50fb3ab0673f28d0166424a75bc2137e7","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:c8f0fda36e9a2040dbe0537361dcd73658df4e669d846f8101a8f9f29f0be9a7","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:e207c762b7802ee0e54507d21ed1f25b19eddc511a4b824934c16c163193be6a","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:e207c762b7802ee0e54507d21ed1f25b19eddc511a4b824934c16c163193be6a","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:381e96959e3c3b08a3e2715e6024697ae14af31bd0378b49f583e984b3b9a192","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:5230462066ab36e3025524e948dd33fa6f51ee29a4f91fa469bfc268568b5fd9","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:89cb093f319eaa04acfe9431b8697bffbc71ab670546f7ed257daa332165c626","firstCommand":"FC0eu9ID58Bm","firstArg":"47DEQpj8HBSa"}]}]},"0h5ohwdJx4S5":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","firstCommand":"buSkac1OkQU4","firstArg":"XV1E-c-gSQmZ"}]}]},"2IqVYeidVUxV":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:8ceca1efee55b9fd5089428476bbc401fe73db7c0b0f5e16d4ad28ed0f0f9d43","firstCommand":"po5yju59c7HJ"}],"containers":[{"imageID":"sha256:76bdc35338c4d0f5e5b9448fb73e3578656f908a962286692e12a0372ec721d5","firstCommand":"UcO4la9rqCTe"}]}]},"43Xz0HbE9FHX":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:1fce8b5c6b0206ecb4ddc7de47062bed853b88d4e34415e9e5a2a6bc99cf6aad","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:ff40e33e63d6c1f4e4393d5506e38def25ba20582d980fec8b81f81c867ceeec","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:896dc34712ba5eb2d9daa6e77a55cb67501435f8f108cc4e5eda3ece5212c2b0","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:ff40e33e63d6c1f4e4393d5506e38def25ba20582d980fec8b81f81c867ceeec","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:b714a7ada1e295b599b432f32e1fd5b74c8cdbe6fe51e95306322b25cb873914","firstCommand":"4MEQ8E7-fUvu","firstArg":"mDEjdpyJDBZ4"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:898c67bf7fc973e99114f3148976a6c21ae0dbe413051415588fa9b995f5b331","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:ff40e33e63d6c1f4e4393d5506e38def25ba20582d980fec8b81f81c867ceeec","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:24fdf6755aec2ff108ceee2e24eee87c6953140e4325a59c8d1ddbf1dca41828","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:ff40e33e63d6c1f4e4393d5506e38def25ba20582d980fec8b81f81c867ceeec","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]}]},"47HAKWqp7-jn":{"count":1,"terminalCount":1,"shapes":[]},"4k7XyKW2A17e":{"count":1,"terminalCount":1,"shapes":[]},"5fn-sCitjq6a":{"count":3,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:9bd0b71d620cf0acbfcd1b58797dc30050bd167cb6b7a7f62c8333dd370c76d5","firstCommand":"HgS-rIunFHfD","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:3a85dab5856916220df6f05ce9d6aa10cd4fa0234093b55355246690bba05ad1","firstArg":"ESRPWfqdsWE1"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:4010a8f9d932615336227e2fd43325d4fa9025dca4bebe032106efea733fcfc3","firstArg":"zO0oxtw_mcI5"}]}]},"6KbiDGNUd_ub":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"}]}]},"6bLpdRMvgXVP":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cf9670d0f269f8d49fd9ef4981999be195f6624a4146aa93d9201eb8acc81053","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"},{"imageID":"sha256:cf9670d0f269f8d49fd9ef4981999be195f6624a4146aa93d9201eb8acc81053","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]}]},"9dJB3pvMrhr8":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:2fe5144b1f72bdcf5d5a52130f02ed86fbec3875cc4ac108ead00eaac1659e06","firstCommand":"51QuNwyM-xYf","firstArg":"r7zEsGNvlNrk"}]}]},"AN3N38xANElq":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"},{"imageID":"sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"},{"imageID":"sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","firstCommand":"FATPL2W-sitV","firstArg":"5gS4z5mOnDuY"},{"imageID":"sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"}]}]},"CMkFy_B6OMUO":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:7220d16ea511c0f0410cf45db45aaafcc64847c9cb5732ad1eff39ceb482cdba","firstCommand":"7aQQEh6Tr2m7","firstArg":"r7zEsGNvlNrk"}]}]},"C_9an18W0cU6":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"ZS9VAWJDvxuf","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"ArvlNzaZtYpC","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"PPJ_dAh1Wl4S","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"5-ZY-7KtGiOe"}]}]},"EOB8Fqt74gVH":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:042e6a37747405da54cf91543d44408c9531327a2cce653c41ca851aa7c896d8","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"}]}]},"EyQn00UhCg7z":{"count":2,"ignoredCount":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","firstCommand":"ZDrZSWYe4Hpn"}]}]},"F-y2qosZEzxd":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:7220d16ea511c0f0410cf45db45aaafcc64847c9cb5732ad1eff39ceb482cdba","firstCommand":"7aQQEh6Tr2m7","firstArg":"gcNszUTvGLqr"}]}]},"ICyEPw5KVYuy":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c54c3f7cffe057ae0bdf26163d5e46744685083ae16fc97112e32beacd2d8955","firstCommand":"ijLlFtdBW-Uk","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460","firstCommand":"N9KxLV2avCo2"}]}]},"KETRwZOPBpF9":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","firstCommand":"buSkac1OkQU4","firstArg":"47DEQpj8HBSa"}]}]},"LBp1kjMRhgCD":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"MBms5agiSYKb":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:b8cb5e0caeca0fb02f3e8c72b7ddf1c49e3c602e42e119ba30c60525f1db1821","firstArg":"zO0oxtw_mcI5"}]}]},"N3z7Gdl4s2xN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:b9b8bc43bac294be3c7669cde049e388ad9d8751242051ba40f83e1c401eceda","firstCommand":"vLhjmt4GJVrQ"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"47DEQpj8HBSa"}]}]},"NJ5StnkN7lNJ":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:3f34dc492c80a3dee4643cc2291044750ac51e6e919b973de8723fa8b70bde70","firstCommand":"euUHIZmT1r6w","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:3f34dc492c80a3dee4643cc2291044750ac51e6e919b973de8723fa8b70bde70","firstCommand":"euUHIZmT1r6w"}]}]},"NuNApgGLWU3S":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:263827a457b3cc707bdd050873234f5d0892a553af5cfab13f8db75de762d4cf","firstCommand":"loDbMsNsNHAN"},{"imageID":"sha256:263827a457b3cc707bdd050873234f5d0892a553af5cfab13f8db75de762d4cf","firstCommand":"BWdk-C4p4WVi","firstArg":"ov8ZFLf4OaCu"}]}]},"QRCRK87Nh9-g":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","firstCommand":"N9KxLV2avCo2","firstArg":"aC8iSHmKHojh"},{"imageID":"sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","firstCommand":"VvlllczXFX2z","firstArg":"Yfg8wToYnj2U"}]}]},"QhwI_DkC7RkW":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"}],"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"}]}]},"WPOX0dN4tqDv":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0","firstCommand":"9RqZYN0XQJuD"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"47DEQpj8HBSa"}]}]},"XStfgPOmHYzB":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d11f13e867f4df046ca6789bb7273da5d0c08895b3dea00949c8a5458f9e22f9","firstCommand":"AiycEq1CClLy","firstArg":"r7zEsGNvlNrk"}]}]},"YgQZCjyI6D9c":{"count":1,"terminalCount":1,"shapes":[]},"cMIdS73ad1cT":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","firstCommand":"09D_XsQaIohy","firstArg":"r7zEsGNvlNrk"}]}]},"cWNZj9dm5f4i":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","firstCommand":"WFJEBSInAJpw","firstArg":"r7zEsGNvlNrk"}]}]},"coRkJ8lvmtSk":{"count":1,"ignoredCount":1,"shapes":[]},"de1zmznD1F_L":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:526c5c02a8fa86a2fa83a7087d4a5c4b1c4072c0f3906163494cc3b3c1295e9b","firstCommand":"rb3iLnl9GmZR","firstArg":"r7zEsGNvlNrk"}]}]},"eCjF12pGOLUF":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d470dba32064cc62b2ab29303d6e00612304548262eaa2f4e5b40a00a26f71ce","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:d470dba32064cc62b2ab29303d6e00612304548262eaa2f4e5b40a00a26f71ce","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"}]}]},"ecUe5cl6bPwX":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:00b591b3820682dc99f16f07a3a0a4ec06dfedba63cd0f79b998ac4509fabea3","firstCommand":"pgaYl1gqTV2L","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:d74fe7cb12c554c120262683d9c4066f33ae4f60a5fad83cba419d851b98c12d","firstCommand":"kwBOP3_4oVMx","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:e9ee63a30a9b95b5801afa36e09fc583ec2cda3c5cb3c8676e478fea016abfa1","firstCommand":"buSkac1OkQU4","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:2508a5f66e509e813cb09825b5456be91b4cdd4d02f470f22a33de42c753f2b7","firstCommand":"Tt12uskXp-TN","firstArg":"zO0oxtw_mcI5"}]}]},"iAB_cGZtvYGo":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","firstCommand":"aC8iSHmKHojh","firstArg":"5gS4z5mOnDuY"}]}]},"inQbBSWydCWk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"ioFx0itCFPcs":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"}],"containers":[{"imageID":"sha256:834063dd26fb3d2489e193489198a0d5fbe9c775a0e30173e5fcef6994fbf0f6","firstCommand":"bFMn8sKmxXTo","firstArg":"zO0oxtw_mcI5"}]}]},"jmuesrd3LOV1":{"count":3,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c","firstCommand":"wCdwTcAdXQ_H","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c","firstArg":"zO0oxtw_mcI5"}]}]},"k2lPYOlQaXUX":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab","firstCommand":"XqE_QmN1P920","firstArg":"r7zEsGNvlNrk"}]}]},"n8ih8iFf25K7":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460","firstCommand":"CX8KiHZjJyVD"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","firstCommand":"N9KxLV2avCo2"}]}]},"nMMaB9HQd060":{"count":2,"ignoredCount":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:4a4c3e6ca0cd26f7eb5270cfafbcf423cf2986d152bf5b9fc6469d40599e104e","firstArg":"aZFPdeh8u0QY"}]}]},"nO8YkKLJMsaW":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","firstCommand":"VvlllczXFX2z","firstArg":"47DEQpj8HBSa"}]}]},"nTf6g7hF1YMN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:28f33d62fd0b94c5ea0ebcd7a4216848c8dd671a38d901ce98f4c399b700e1c7","firstArg":"8DZ1gO9Xqn6d"}]}]},"oNeg9VIL3k3N":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:eb82e437a701ce83b70e56be8477d987da67578714dda3d9fa6628804b1b56f5","firstCommand":"oNeg9VIL3k3N","firstArg":"r7zEsGNvlNrk"}]}]},"pepxDbsB4SPa":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","firstCommand":"VvlllczXFX2z","firstArg":"r7zEsGNvlNrk"}]}]},"q1TpN3EUiKjG":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","firstCommand":"FATPL2W-sitV","firstArg":"r7zEsGNvlNrk"}]}]},"vDGHaQt8x6K_":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","firstArg":"zO0oxtw_mcI5"}]}]}}}packageserver_current.log0000640000000000000000000010725415154601571033415 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/packageserver-694648486f-f89lc2026-03-12T18:18:01.423198798Z I0312 18:18:01.423183 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-12T18:18:01.423266220Z I0312 18:18:01.423243 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-12T18:18:01.423266220Z I0312 18:18:01.423254 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-12T18:18:01.424630125Z I0312 18:18:01.424588 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-12T18:18:01.424630125Z I0312 18:18:01.424620 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-12T18:18:01.425093756Z W0312 18:18:01.425061 1 logging.go:55] [core] [Channel #6 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.210.11:50051: connect: connection refused" 2026-03-12T18:18:01.425183699Z I0312 18:18:01.425153 1 secure_serving.go:213] Serving securely on [::]:5443 2026-03-12T18:18:01.425343723Z I0312 18:18:01.425302 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::apiserver.local.config/certificates/apiserver.crt::apiserver.local.config/certificates/apiserver.key" 2026-03-12T18:18:01.425412104Z I0312 18:18:01.425359 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-12T18:18:01.425640200Z I0312 18:18:01.425340 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-12T18:18:01.425688161Z I0312 18:18:01.425636 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-12T18:18:01.523985009Z I0312 18:18:01.523924 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-12T18:18:01.524077612Z I0312 18:18:01.524055 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-12T18:18:01.525614120Z I0312 18:18:01.525583 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-12T18:18:01.525680182Z I0312 18:18:01.525666 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-12T18:18:01.525724533Z I0312 18:18:01.525715 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-12T18:18:01.525865517Z I0312 18:18:01.525853 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-12T18:18:01.586886705Z E0312 18:18:01.586845 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:01.586944497Z E0312 18:18:01.586926 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:01.586989648Z E0312 18:18:01.586887 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:01.587027169Z E0312 18:18:01.586974 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:01.587068380Z E0312 18:18:01.587049 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:01.603510134Z E0312 18:18:01.603452 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:01.603957075Z E0312 18:18:01.603931 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:01.604141070Z E0312 18:18:01.604118 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:01.604349845Z E0312 18:18:01.604327 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:01.604459678Z E0312 18:18:01.604439 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:01.604488129Z E0312 18:18:01.604471 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:01.610405448Z E0312 18:18:01.610367 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:01.614427839Z E0312 18:18:01.614399 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:01.614466420Z E0312 18:18:01.614444 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:01.614527782Z E0312 18:18:01.614497 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:01.618353468Z E0312 18:18:01.618328 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:01.618938963Z E0312 18:18:01.618915 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:01.630124815Z E0312 18:18:01.630080 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:01.630167386Z E0312 18:18:01.630133 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:01.630266609Z E0312 18:18:01.630240 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:01.630358451Z E0312 18:18:01.630331 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:01.630423083Z E0312 18:18:01.630400 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:01.646970280Z E0312 18:18:01.646917 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:01.647019401Z E0312 18:18:01.646923 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:01.651512264Z E0312 18:18:01.651109 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:01.651512264Z E0312 18:18:01.651172 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:01.651972576Z E0312 18:18:01.651915 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:01.739081592Z E0312 18:18:01.739028 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:01.739127523Z E0312 18:18:01.739092 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:01.739279357Z E0312 18:18:01.739262 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:01.739353709Z E0312 18:18:01.739335 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:01.739379269Z E0312 18:18:01.739033 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:01.906197525Z E0312 18:18:01.906139 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:01.906306938Z E0312 18:18:01.906288 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:01.909417526Z E0312 18:18:01.908794 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:01.909417526Z E0312 18:18:01.908861 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:01.909417526Z E0312 18:18:01.909028 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:01.926294772Z time="2026-03-12T18:18:01Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace 2026-03-12T18:18:02.278061630Z E0312 18:18:02.277925 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:02.278337007Z E0312 18:18:02.278263 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:02.278492161Z E0312 18:18:02.278458 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:02.279169218Z E0312 18:18:02.278751 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:02.279169218Z E0312 18:18:02.278802 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:02.431589540Z W0312 18:18:02.431462 1 logging.go:55] [core] [Channel #6 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.210.11:50051: connect: connection refused" 2026-03-12T18:18:02.944738927Z E0312 18:18:02.944671 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:02.948553933Z E0312 18:18:02.945115 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:02.953102198Z E0312 18:18:02.953069 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:02.953231831Z E0312 18:18:02.953196 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:02.953398785Z E0312 18:18:02.953077 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:03.710901062Z time="2026-03-12T18:18:03Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace 2026-03-12T18:18:03.732593739Z W0312 18:18:03.732156 1 logging.go:55] [core] [Channel #6 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.210.11:50051: connect: connection refused" 2026-03-12T18:18:04.243357815Z E0312 18:18:04.242951 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:04.243357815Z E0312 18:18:04.242994 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:04.243357815Z E0312 18:18:04.243254 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:04.243357815Z E0312 18:18:04.243266 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:04.243881638Z E0312 18:18:04.243489 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:04.244666508Z time="2026-03-12T18:18:04Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace 2026-03-12T18:18:05.448677130Z time="2026-03-12T18:18:05Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-03-12T18:18:05.449420359Z time="2026-03-12T18:18:05Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.210.11:50051: connect: connection refused\"" source="{redhat-operators openshift-marketplace}" 2026-03-12T18:18:06.569068804Z W0312 18:18:06.568985 1 logging.go:55] [core] [Channel #6 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.210.11:50051: connect: connection refused" 2026-03-12T18:18:06.809482553Z E0312 18:18:06.809411 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:06.809618326Z E0312 18:18:06.809578 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:06.809754980Z E0312 18:18:06.809728 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:06.809902893Z E0312 18:18:06.809423 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:06.810047237Z E0312 18:18:06.809980 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.915647640Z E0312 18:18:08.915104 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.915647640Z E0312 18:18:08.915162 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.915647640Z E0312 18:18:08.915407 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.915647640Z E0312 18:18:08.915587 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.915647640Z E0312 18:18:08.915610 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:10.770546332Z W0312 18:18:10.770445 1 logging.go:55] [core] [Channel #6 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.210.11:50051: connect: connection refused" 2026-03-12T18:18:11.936405410Z E0312 18:18:11.935408 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:11.936405410Z E0312 18:18:11.935772 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:11.936405410Z E0312 18:18:11.935978 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:11.936405410Z E0312 18:18:11.936189 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:11.936405410Z E0312 18:18:11.936367 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:17.894663668Z W0312 18:18:17.894605 1 logging.go:55] [core] [Channel #6 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.210.11:50051: connect: connection refused" 2026-03-12T18:18:26.504001671Z W0312 18:18:26.503927 1 logging.go:55] [core] [Channel #6 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.210.11:50051: connect: connection refused" 2026-03-12T18:18:32.419447017Z E0312 18:18:32.419367 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:32.419447017Z E0312 18:18:32.419386 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:32.419447017Z E0312 18:18:32.419390 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:32.419447017Z E0312 18:18:32.419430 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:32.419538970Z E0312 18:18:32.419367 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" package-server-manager_current.log0000640000000000000000000005226415154601571037057 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-854648ff6d-kwv7s2026-03-12T18:14:13.118757492Z 2026-03-12T18:14:13Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-12T18:14:13.118757492Z 2026-03-12T18:14:13Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:14:13.118757492Z 2026-03-12T18:14:13Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-12T18:14:13.118757492Z 2026-03-12T18:14:13Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:14:13.118786462Z 2026-03-12T18:14:13Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:14:13.118832264Z 2026-03-12T18:14:13Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-12T18:14:13.184200028Z 2026-03-12T18:14:13Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-12T18:14:13.184200028Z 2026-03-12T18:14:13Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:14:14.400588153Z 2026-03-12T18:14:14Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-12T18:14:14.400588153Z 2026-03-12T18:14:14Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:14:14.400588153Z 2026-03-12T18:14:14Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:14:14.400588153Z 2026-03-12T18:14:14Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-12T18:14:14.433145067Z 2026-03-12T18:14:14Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-12T18:14:14.433523437Z 2026-03-12T18:14:14Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:14:15.251988222Z 2026-03-12T18:14:15Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-12T18:14:15.251988222Z 2026-03-12T18:14:15Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:14:15.251988222Z 2026-03-12T18:14:15Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:14:15.251988222Z 2026-03-12T18:14:15Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-12T18:14:15.310270897Z 2026-03-12T18:14:15Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-12T18:14:15.310270897Z 2026-03-12T18:14:15Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:14:16.257135820Z 2026-03-12T18:14:16Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-12T18:14:16.257135820Z 2026-03-12T18:14:16Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:14:16.257135820Z 2026-03-12T18:14:16Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:14:16.257135820Z 2026-03-12T18:14:16Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-12T18:14:16.321561210Z 2026-03-12T18:14:16Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-12T18:14:16.321561210Z 2026-03-12T18:14:16Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:14:17.806660047Z 2026-03-12T18:14:17Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-12T18:14:17.806660047Z 2026-03-12T18:14:17Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:14:17.857850042Z 2026-03-12T18:14:17Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:14:17.857850042Z 2026-03-12T18:14:17Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-12T18:14:17.889088573Z 2026-03-12T18:14:17Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-12T18:14:17.889137294Z 2026-03-12T18:14:17Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:14:18.101085438Z 2026-03-12T18:14:18Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-12T18:14:18.101997592Z 2026-03-12T18:14:18Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:14:18.102141395Z 2026-03-12T18:14:18Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:14:18.102209987Z 2026-03-12T18:14:18Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-12T18:14:18.164678888Z 2026-03-12T18:14:18Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-12T18:14:18.164678888Z 2026-03-12T18:14:18Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:14:21.755899287Z 2026-03-12T18:14:21Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-12T18:14:21.755899287Z 2026-03-12T18:14:21Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:14:21.756376759Z 2026-03-12T18:14:21Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:14:21.756459161Z 2026-03-12T18:14:21Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-12T18:14:22.073176306Z 2026-03-12T18:14:22Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-12T18:14:22.073176306Z 2026-03-12T18:14:22Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:14:24.646029872Z 2026-03-12T18:14:24Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-12T18:14:24.646029872Z 2026-03-12T18:14:24Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:14:24.646029872Z 2026-03-12T18:14:24Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:14:24.646029872Z 2026-03-12T18:14:24Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-12T18:14:24.669023894Z 2026-03-12T18:14:24Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-12T18:14:24.669023894Z 2026-03-12T18:14:24Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:14:25.391533940Z 2026-03-12T18:14:25Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-12T18:14:25.391533940Z 2026-03-12T18:14:25Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:14:25.391533940Z 2026-03-12T18:14:25Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:14:25.391533940Z 2026-03-12T18:14:25Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-12T18:14:25.428783493Z 2026-03-12T18:14:25Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-12T18:14:25.428783493Z 2026-03-12T18:14:25Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:14:27.034960455Z 2026-03-12T18:14:27Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-12T18:14:27.034960455Z 2026-03-12T18:14:27Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:14:27.034960455Z 2026-03-12T18:14:27Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:14:27.034960455Z 2026-03-12T18:14:27Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-12T18:14:27.045581774Z 2026-03-12T18:14:27Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-12T18:14:27.045581774Z 2026-03-12T18:14:27Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:14:27.552506992Z 2026-03-12T18:14:27Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-12T18:14:27.552506992Z 2026-03-12T18:14:27Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:14:27.552506992Z 2026-03-12T18:14:27Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:14:27.552506992Z 2026-03-12T18:14:27Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-12T18:14:27.612309986Z 2026-03-12T18:14:27Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-12T18:14:27.612543142Z 2026-03-12T18:14:27Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:15:45.574536605Z E0312 18:15:45.574448 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-03-12T18:16:45.580561811Z E0312 18:16:45.580314 1 leaderelection.go:436] error retrieving resource lock openshift-operator-lifecycle-manager/packageserver-controller-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io packageserver-controller-lock) 2026-03-12T18:17:51.862605157Z 2026-03-12T18:17:51Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-12T18:17:51.862605157Z 2026-03-12T18:17:51Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:17:51.862605157Z 2026-03-12T18:17:51Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:17:51.862605157Z 2026-03-12T18:17:51Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-12T18:17:51.879175405Z 2026-03-12T18:17:51Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-12T18:17:51.879175405Z 2026-03-12T18:17:51Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:17:51.881561055Z 2026-03-12T18:17:51Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-12T18:17:51.881561055Z 2026-03-12T18:17:51Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:17:51.881665938Z 2026-03-12T18:17:51Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:17:51.881665938Z 2026-03-12T18:17:51Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-12T18:17:51.900258997Z 2026-03-12T18:17:51Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-12T18:17:51.900258997Z 2026-03-12T18:17:51Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:17:52.009456889Z 2026-03-12T18:17:52Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-12T18:17:52.009456889Z 2026-03-12T18:17:52Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:17:52.009696705Z 2026-03-12T18:17:52Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:17:52.009767057Z 2026-03-12T18:17:52Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-12T18:17:52.034985673Z 2026-03-12T18:17:52Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-12T18:17:52.034985673Z 2026-03-12T18:17:52Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:17:52.221942726Z 2026-03-12T18:17:52Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-12T18:17:52.221942726Z 2026-03-12T18:17:52Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:17:52.222096430Z 2026-03-12T18:17:52Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:17:52.222161362Z 2026-03-12T18:17:52Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-12T18:17:52.242406562Z 2026-03-12T18:17:52Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-12T18:17:52.242406562Z 2026-03-12T18:17:52Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:17:52.360015427Z 2026-03-12T18:17:52Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-12T18:17:52.360015427Z 2026-03-12T18:17:52Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:17:52.360080559Z 2026-03-12T18:17:52Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T18:17:52.372719637Z 2026-03-12T18:17:52Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-12T18:17:52.418691046Z 2026-03-12T18:17:52Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-12T18:17:52.418691046Z 2026-03-12T18:17:52Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} kube-rbac-proxy_current.log0000640000000000000000000000160415154601571035552 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-854648ff6d-kwv7s2026-03-12T18:13:55.119884990Z W0312 18:13:55.119697 1 deprecated.go:66] 2026-03-12T18:13:55.119884990Z ==== Removed Flag Warning ====================== 2026-03-12T18:13:55.119884990Z 2026-03-12T18:13:55.119884990Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-03-12T18:13:55.119884990Z 2026-03-12T18:13:55.119884990Z =============================================== 2026-03-12T18:13:55.119884990Z 2026-03-12T18:13:55.120259230Z I0312 18:13:55.120232 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-03-12T18:13:55.121432259Z I0312 18:13:55.121411 1 kube-rbac-proxy.go:347] Reading certificate files 2026-03-12T18:13:55.121737417Z I0312 18:13:55.121709 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:8443 2026-03-12T18:13:55.122314222Z I0312 18:13:55.122300 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:8443 olm-operator_current.log0000640000000000000000000005177415154601571033414 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/olm-operator-d64cfc9db-npt4r2026-03-12T18:18:22.177824656Z time="2026-03-12T18:18:22Z" level=info msg="install strategy successful" csv=packageserver id=HBOs8 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:22.277240048Z time="2026-03-12T18:18:22Z" level=info msg="install strategy successful" csv=packageserver id=Lf8t9 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:22.377121123Z time="2026-03-12T18:18:22Z" level=info msg="install strategy successful" csv=packageserver id=Nlo+w namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:22.478090365Z time="2026-03-12T18:18:22Z" level=info msg="install strategy successful" csv=packageserver id=PolAT namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:22.578765840Z time="2026-03-12T18:18:22Z" level=info msg="install strategy successful" csv=packageserver id=2NRq0 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:22.678205834Z time="2026-03-12T18:18:22Z" level=info msg="install strategy successful" csv=packageserver id=BsUOQ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:22.777116843Z time="2026-03-12T18:18:22Z" level=info msg="install strategy successful" csv=packageserver id=m7iya namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:22.877360376Z time="2026-03-12T18:18:22Z" level=info msg="install strategy successful" csv=packageserver id=Ankp5 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:22.977411335Z time="2026-03-12T18:18:22Z" level=info msg="install strategy successful" csv=packageserver id=CykhP namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:23.078410428Z time="2026-03-12T18:18:23Z" level=info msg="install strategy successful" csv=packageserver id=a55Cn namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:23.179108124Z time="2026-03-12T18:18:23Z" level=info msg="install strategy successful" csv=packageserver id=FwjBi namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:23.278109686Z time="2026-03-12T18:18:23Z" level=info msg="install strategy successful" csv=packageserver id=jgD06 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:23.379547970Z time="2026-03-12T18:18:23Z" level=info msg="install strategy successful" csv=packageserver id=6f6Ip namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:23.479675131Z time="2026-03-12T18:18:23Z" level=info msg="install strategy successful" csv=packageserver id=APyYW namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:23.580556071Z time="2026-03-12T18:18:23Z" level=info msg="install strategy successful" csv=packageserver id=HY33w namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:23.679419890Z time="2026-03-12T18:18:23Z" level=info msg="install strategy successful" csv=packageserver id=QQjNo namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:23.779502170Z time="2026-03-12T18:18:23Z" level=info msg="install strategy successful" csv=packageserver id=vDkwU namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:23.878644645Z time="2026-03-12T18:18:23Z" level=info msg="install strategy successful" csv=packageserver id=qQkLG namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:23.980287435Z time="2026-03-12T18:18:23Z" level=info msg="install strategy successful" csv=packageserver id=x1Upo namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:24.077827440Z time="2026-03-12T18:18:24Z" level=info msg="install strategy successful" csv=packageserver id=7uA4/ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:24.178715950Z time="2026-03-12T18:18:24Z" level=info msg="install strategy successful" csv=packageserver id=LyeVg namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:24.278560074Z time="2026-03-12T18:18:24Z" level=info msg="install strategy successful" csv=packageserver id=McDdl namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:24.378659544Z time="2026-03-12T18:18:24Z" level=info msg="install strategy successful" csv=packageserver id=JgEJ1 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:24.478316593Z time="2026-03-12T18:18:24Z" level=info msg="install strategy successful" csv=packageserver id=vT/U5 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:24.578949486Z time="2026-03-12T18:18:24Z" level=info msg="install strategy successful" csv=packageserver id=/Xs8b namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:24.678877922Z time="2026-03-12T18:18:24Z" level=info msg="install strategy successful" csv=packageserver id=BdSwD namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:24.777244988Z time="2026-03-12T18:18:24Z" level=info msg="install strategy successful" csv=packageserver id=EfP7S namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:24.877588655Z time="2026-03-12T18:18:24Z" level=info msg="install strategy successful" csv=packageserver id=Jlgpf namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:24.979594203Z time="2026-03-12T18:18:24Z" level=info msg="install strategy successful" csv=packageserver id=AF9oS namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:25.077694063Z time="2026-03-12T18:18:25Z" level=info msg="install strategy successful" csv=packageserver id=pxnAq namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:25.178296025Z time="2026-03-12T18:18:25Z" level=info msg="install strategy successful" csv=packageserver id=/mbe5 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:25.278603471Z time="2026-03-12T18:18:25Z" level=info msg="install strategy successful" csv=packageserver id=6S6PJ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:25.378620029Z time="2026-03-12T18:18:25Z" level=info msg="install strategy successful" csv=packageserver id=VDTrf namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:25.479476158Z time="2026-03-12T18:18:25Z" level=info msg="install strategy successful" csv=packageserver id=8TYyB namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:25.580889872Z time="2026-03-12T18:18:25Z" level=info msg="install strategy successful" csv=packageserver id=OFPRv namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:25.678384866Z time="2026-03-12T18:18:25Z" level=info msg="install strategy successful" csv=packageserver id=vlqyp namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:25.779664186Z time="2026-03-12T18:18:25Z" level=info msg="install strategy successful" csv=packageserver id=qRoyq namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:25.878628497Z time="2026-03-12T18:18:25Z" level=info msg="install strategy successful" csv=packageserver id=VrQZg namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:25.978621695Z time="2026-03-12T18:18:25Z" level=info msg="install strategy successful" csv=packageserver id=v5mKk namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:26.078351655Z time="2026-03-12T18:18:26Z" level=info msg="install strategy successful" csv=packageserver id=q2yEw namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:26.177941173Z time="2026-03-12T18:18:26Z" level=info msg="install strategy successful" csv=packageserver id=+dt+6 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:26.276722509Z time="2026-03-12T18:18:26Z" level=info msg="install strategy successful" csv=packageserver id=gCUzk namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:26.377282941Z time="2026-03-12T18:18:26Z" level=info msg="install strategy successful" csv=packageserver id=YFGGP namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:26.477213086Z time="2026-03-12T18:18:26Z" level=info msg="install strategy successful" csv=packageserver id=hoXd2 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:26.577758178Z time="2026-03-12T18:18:26Z" level=info msg="install strategy successful" csv=packageserver id=10LLF namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:26.678274558Z time="2026-03-12T18:18:26Z" level=info msg="install strategy successful" csv=packageserver id=8Lif1 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:26.778972304Z time="2026-03-12T18:18:26Z" level=info msg="install strategy successful" csv=packageserver id=+whAX namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:26.877434422Z time="2026-03-12T18:18:26Z" level=info msg="install strategy successful" csv=packageserver id=CvTpj namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:26.978017535Z time="2026-03-12T18:18:26Z" level=info msg="install strategy successful" csv=packageserver id=2ljJt namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:27.077794217Z time="2026-03-12T18:18:27Z" level=info msg="install strategy successful" csv=packageserver id=mgBm1 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:27.178773940Z time="2026-03-12T18:18:27Z" level=info msg="install strategy successful" csv=packageserver id=x7G30 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:27.277201227Z time="2026-03-12T18:18:27Z" level=info msg="install strategy successful" csv=packageserver id=AWwew namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:27.378283522Z time="2026-03-12T18:18:27Z" level=info msg="install strategy successful" csv=packageserver id=8Q7ZT namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:27.480613510Z time="2026-03-12T18:18:27Z" level=info msg="install strategy successful" csv=packageserver id=ASiD2 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:27.578111283Z time="2026-03-12T18:18:27Z" level=info msg="install strategy successful" csv=packageserver id=KS1By namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:27.678038549Z time="2026-03-12T18:18:27Z" level=info msg="install strategy successful" csv=packageserver id=r+KG/ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:27.778061437Z time="2026-03-12T18:18:27Z" level=info msg="install strategy successful" csv=packageserver id=C3mNF namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:27.878094396Z time="2026-03-12T18:18:27Z" level=info msg="install strategy successful" csv=packageserver id=XWaqM namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:27.977791166Z time="2026-03-12T18:18:27Z" level=info msg="install strategy successful" csv=packageserver id=b1/mG namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:28.077746162Z time="2026-03-12T18:18:28Z" level=info msg="install strategy successful" csv=packageserver id=P2Wl2 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:28.178198981Z time="2026-03-12T18:18:28Z" level=info msg="install strategy successful" csv=packageserver id=L/Z8J namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:28.278812145Z time="2026-03-12T18:18:28Z" level=info msg="install strategy successful" csv=packageserver id=ZZjTI namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:28.377533990Z time="2026-03-12T18:18:28Z" level=info msg="install strategy successful" csv=packageserver id=vELB3 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:28.477712052Z time="2026-03-12T18:18:28Z" level=info msg="install strategy successful" csv=packageserver id=b1z+j namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:28.578299455Z time="2026-03-12T18:18:28Z" level=info msg="install strategy successful" csv=packageserver id=GDmsa namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:28.677939733Z time="2026-03-12T18:18:28Z" level=info msg="install strategy successful" csv=packageserver id=tDBXR namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:28.777768666Z time="2026-03-12T18:18:28Z" level=info msg="install strategy successful" csv=packageserver id=OUvQM namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:28.877900547Z time="2026-03-12T18:18:28Z" level=info msg="install strategy successful" csv=packageserver id=LNbsS namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:28.979051575Z time="2026-03-12T18:18:28Z" level=info msg="install strategy successful" csv=packageserver id=bi7wG namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:29.077798010Z time="2026-03-12T18:18:29Z" level=info msg="install strategy successful" csv=packageserver id=nr1Qt namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:29.177463999Z time="2026-03-12T18:18:29Z" level=info msg="install strategy successful" csv=packageserver id=CCs/i namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:29.279001386Z time="2026-03-12T18:18:29Z" level=info msg="install strategy successful" csv=packageserver id=/K4OQ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:29.378014569Z time="2026-03-12T18:18:29Z" level=info msg="install strategy successful" csv=packageserver id=YPO8K namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:29.477949085Z time="2026-03-12T18:18:29Z" level=info msg="install strategy successful" csv=packageserver id=gy+6z namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:29.586215134Z time="2026-03-12T18:18:29Z" level=info msg="install strategy successful" csv=packageserver id=2WYMj namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:29.677409536Z time="2026-03-12T18:18:29Z" level=info msg="install strategy successful" csv=packageserver id=/+LC1 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:29.779162399Z time="2026-03-12T18:18:29Z" level=info msg="install strategy successful" csv=packageserver id=474Jk namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:29.878746576Z time="2026-03-12T18:18:29Z" level=info msg="install strategy successful" csv=packageserver id=rHg9J namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:29.979834841Z time="2026-03-12T18:18:29Z" level=info msg="install strategy successful" csv=packageserver id=UZ3sf namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:30.079658013Z time="2026-03-12T18:18:30Z" level=info msg="install strategy successful" csv=packageserver id=qt9LJ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:30.177132047Z time="2026-03-12T18:18:30Z" level=info msg="install strategy successful" csv=packageserver id=4lRYs namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:30.277011661Z time="2026-03-12T18:18:30Z" level=info msg="install strategy successful" csv=packageserver id=e3BWR namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:30.377570643Z time="2026-03-12T18:18:30Z" level=info msg="install strategy successful" csv=packageserver id=W1+84 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:30.477128889Z time="2026-03-12T18:18:30Z" level=info msg="install strategy successful" csv=packageserver id=HYnJW namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:30.577288221Z time="2026-03-12T18:18:30Z" level=info msg="install strategy successful" csv=packageserver id=w6ST0 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:30.677358951Z time="2026-03-12T18:18:30Z" level=info msg="install strategy successful" csv=packageserver id=H6MMj namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:30.776908887Z time="2026-03-12T18:18:30Z" level=info msg="install strategy successful" csv=packageserver id=nSkDl namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:30.877436288Z time="2026-03-12T18:18:30Z" level=info msg="install strategy successful" csv=packageserver id=Y97p0 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:30.977382564Z time="2026-03-12T18:18:30Z" level=info msg="install strategy successful" csv=packageserver id=4fqIc namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:31.077288349Z time="2026-03-12T18:18:31Z" level=info msg="install strategy successful" csv=packageserver id=Ho+tw namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:31.177252206Z time="2026-03-12T18:18:31Z" level=info msg="install strategy successful" csv=packageserver id=ay6Y/ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:31.277350316Z time="2026-03-12T18:18:31Z" level=info msg="install strategy successful" csv=packageserver id=SY0eK namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:31.377866697Z time="2026-03-12T18:18:31Z" level=info msg="install strategy successful" csv=packageserver id=doktE namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:31.477556017Z time="2026-03-12T18:18:31Z" level=info msg="install strategy successful" csv=packageserver id=rDRBu namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:31.577778310Z time="2026-03-12T18:18:31Z" level=info msg="install strategy successful" csv=packageserver id=DvLDA namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:31.677762178Z time="2026-03-12T18:18:31Z" level=info msg="install strategy successful" csv=packageserver id=I54rf namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:31.778241087Z time="2026-03-12T18:18:31Z" level=info msg="install strategy successful" csv=packageserver id=oTNC7 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:31.877634440Z time="2026-03-12T18:18:31Z" level=info msg="install strategy successful" csv=packageserver id=9Pu2e namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:31.977509704Z time="2026-03-12T18:18:31Z" level=info msg="install strategy successful" csv=packageserver id=BqnY8 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T18:18:32.077816649Z time="2026-03-12T18:18:32Z" level=info msg="install strategy successful" csv=packageserver id=/PLiU namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment catalog-operator_current.log0000640000000000000000000005765215154601571035010 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/catalog-operator-7d9c49f57b-pslh72026-03-12T18:18:02.434346510Z time="2026-03-12T18:18:02Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=ZmeJ6 2026-03-12T18:18:02.434492373Z time="2026-03-12T18:18:02Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-ggkqg current-pod.namespace=openshift-marketplace id=ZmeJ6 2026-03-12T18:18:02.434492373Z time="2026-03-12T18:18:02Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-ggkqg current-pod.namespace=openshift-marketplace id=ZmeJ6 2026-03-12T18:18:02.434533024Z time="2026-03-12T18:18:02Z" level=info msg="checked registry server health" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace health=true id=ZmeJ6 2026-03-12T18:18:02.434533024Z time="2026-03-12T18:18:02Z" level=info msg="registry state good" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=ZmeJ6 2026-03-12T18:18:02.434543935Z time="2026-03-12T18:18:02Z" level=info msg="ensuring registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=ZmeJ6 2026-03-12T18:18:03.038038169Z time="2026-03-12T18:18:03Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=fh508 2026-03-12T18:18:03.038144431Z time="2026-03-12T18:18:03Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-nmmwm current-pod.namespace=openshift-marketplace id=fh508 2026-03-12T18:18:03.038144431Z time="2026-03-12T18:18:03Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-nmmwm current-pod.namespace=openshift-marketplace id=fh508 2026-03-12T18:18:03.038165202Z time="2026-03-12T18:18:03Z" level=info msg="checked registry server health" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace health=true id=fh508 2026-03-12T18:18:03.038165202Z time="2026-03-12T18:18:03Z" level=info msg="registry state good" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=fh508 2026-03-12T18:18:03.038165202Z time="2026-03-12T18:18:03Z" level=info msg="ensuring registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=fh508 2026-03-12T18:18:03.634763662Z time="2026-03-12T18:18:03Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=ZmeJ6 2026-03-12T18:18:03.634913956Z time="2026-03-12T18:18:03Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-ggkqg current-pod.namespace=openshift-marketplace id=ZmeJ6 2026-03-12T18:18:03.634954247Z time="2026-03-12T18:18:03Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-ggkqg current-pod.namespace=openshift-marketplace id=ZmeJ6 2026-03-12T18:18:03.635056640Z time="2026-03-12T18:18:03Z" level=info msg="ensured registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=ZmeJ6 2026-03-12T18:18:03.635056640Z time="2026-03-12T18:18:03Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=ZmeJ6 2026-03-12T18:18:03.644341574Z time="2026-03-12T18:18:03Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=qIeys 2026-03-12T18:18:03.644341574Z time="2026-03-12T18:18:03Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=qIeys 2026-03-12T18:18:04.235976119Z time="2026-03-12T18:18:04Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=fh508 2026-03-12T18:18:04.236111522Z time="2026-03-12T18:18:04Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-nmmwm current-pod.namespace=openshift-marketplace id=fh508 2026-03-12T18:18:04.236124583Z time="2026-03-12T18:18:04Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-nmmwm current-pod.namespace=openshift-marketplace id=fh508 2026-03-12T18:18:04.236225425Z time="2026-03-12T18:18:04Z" level=info msg="ensured registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=fh508 2026-03-12T18:18:04.236225425Z time="2026-03-12T18:18:04Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=fh508 2026-03-12T18:18:04.244288119Z time="2026-03-12T18:18:04Z" level=info msg="syncing catalog source" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=kh595 2026-03-12T18:18:04.244288119Z time="2026-03-12T18:18:04Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=kh595 2026-03-12T18:18:04.435067288Z time="2026-03-12T18:18:04Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=qIeys 2026-03-12T18:18:04.435067288Z time="2026-03-12T18:18:04Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-d5tcw current-pod.namespace=openshift-marketplace id=qIeys 2026-03-12T18:18:04.435067288Z time="2026-03-12T18:18:04Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-d5tcw current-pod.namespace=openshift-marketplace id=qIeys 2026-03-12T18:18:04.435118279Z time="2026-03-12T18:18:04Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=qIeys 2026-03-12T18:18:04.435118279Z time="2026-03-12T18:18:04Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=qIeys 2026-03-12T18:18:04.435118279Z time="2026-03-12T18:18:04Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=qIeys 2026-03-12T18:18:05.304837444Z time="2026-03-12T18:18:05Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=kh595 2026-03-12T18:18:05.304837444Z time="2026-03-12T18:18:05Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-ggkqg current-pod.namespace=openshift-marketplace id=kh595 2026-03-12T18:18:05.304837444Z time="2026-03-12T18:18:05Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-ggkqg current-pod.namespace=openshift-marketplace id=kh595 2026-03-12T18:18:05.304837444Z time="2026-03-12T18:18:05Z" level=info msg="checked registry server health" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace health=true id=kh595 2026-03-12T18:18:05.304837444Z time="2026-03-12T18:18:05Z" level=info msg="registry state good" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=kh595 2026-03-12T18:18:05.304837444Z time="2026-03-12T18:18:05Z" level=info msg="ensuring registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=kh595 2026-03-12T18:18:05.436643727Z time="2026-03-12T18:18:05Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=qIeys 2026-03-12T18:18:05.436786390Z time="2026-03-12T18:18:05Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-d5tcw current-pod.namespace=openshift-marketplace id=qIeys 2026-03-12T18:18:05.436786390Z time="2026-03-12T18:18:05Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-d5tcw current-pod.namespace=openshift-marketplace id=qIeys 2026-03-12T18:18:05.436873693Z time="2026-03-12T18:18:05Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=qIeys 2026-03-12T18:18:05.436873693Z time="2026-03-12T18:18:05Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=qIeys 2026-03-12T18:18:05.449557872Z time="2026-03-12T18:18:05Z" level=info msg="syncing catalog source" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=3VM+p 2026-03-12T18:18:05.449557872Z time="2026-03-12T18:18:05Z" level=info msg="synchronizing registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=3VM+p 2026-03-12T18:18:06.235757489Z time="2026-03-12T18:18:06Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=3VM+p 2026-03-12T18:18:06.235848471Z time="2026-03-12T18:18:06Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-nmmwm current-pod.namespace=openshift-marketplace id=3VM+p 2026-03-12T18:18:06.235848471Z time="2026-03-12T18:18:06Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-nmmwm current-pod.namespace=openshift-marketplace id=3VM+p 2026-03-12T18:18:06.235863032Z time="2026-03-12T18:18:06Z" level=info msg="checked registry server health" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace health=true id=3VM+p 2026-03-12T18:18:06.235873532Z time="2026-03-12T18:18:06Z" level=info msg="registry state good" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=3VM+p 2026-03-12T18:18:06.235873532Z time="2026-03-12T18:18:06Z" level=info msg="ensuring registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=3VM+p 2026-03-12T18:18:06.438545166Z time="2026-03-12T18:18:06Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=kh595 2026-03-12T18:18:06.438545166Z time="2026-03-12T18:18:06Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-ggkqg current-pod.namespace=openshift-marketplace id=kh595 2026-03-12T18:18:06.438545166Z time="2026-03-12T18:18:06Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-ggkqg current-pod.namespace=openshift-marketplace id=kh595 2026-03-12T18:18:06.438545166Z time="2026-03-12T18:18:06Z" level=info msg="ensured registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=kh595 2026-03-12T18:18:06.438545166Z time="2026-03-12T18:18:06Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=kh595 2026-03-12T18:18:06.438545166Z time="2026-03-12T18:18:06Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=MUzmb 2026-03-12T18:18:06.438545166Z time="2026-03-12T18:18:06Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=MUzmb 2026-03-12T18:18:07.350322495Z time="2026-03-12T18:18:07Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=MUzmb 2026-03-12T18:18:07.350473289Z time="2026-03-12T18:18:07Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-d5tcw current-pod.namespace=openshift-marketplace id=MUzmb 2026-03-12T18:18:07.350473289Z time="2026-03-12T18:18:07Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-d5tcw current-pod.namespace=openshift-marketplace id=MUzmb 2026-03-12T18:18:07.350473289Z time="2026-03-12T18:18:07Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=MUzmb 2026-03-12T18:18:07.350473289Z time="2026-03-12T18:18:07Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=MUzmb 2026-03-12T18:18:07.350473289Z time="2026-03-12T18:18:07Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=MUzmb 2026-03-12T18:18:07.434393505Z time="2026-03-12T18:18:07Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=3VM+p 2026-03-12T18:18:07.434580910Z time="2026-03-12T18:18:07Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-nmmwm current-pod.namespace=openshift-marketplace id=3VM+p 2026-03-12T18:18:07.434625441Z time="2026-03-12T18:18:07Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-nmmwm current-pod.namespace=openshift-marketplace id=3VM+p 2026-03-12T18:18:07.434749474Z time="2026-03-12T18:18:07Z" level=info msg="ensured registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=3VM+p 2026-03-12T18:18:07.434749474Z time="2026-03-12T18:18:07Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=3VM+p 2026-03-12T18:18:08.034030332Z time="2026-03-12T18:18:08Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=MUzmb 2026-03-12T18:18:08.034191286Z time="2026-03-12T18:18:08Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-d5tcw current-pod.namespace=openshift-marketplace id=MUzmb 2026-03-12T18:18:08.034191286Z time="2026-03-12T18:18:08Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-d5tcw current-pod.namespace=openshift-marketplace id=MUzmb 2026-03-12T18:18:08.034314599Z time="2026-03-12T18:18:08Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=MUzmb 2026-03-12T18:18:08.034314599Z time="2026-03-12T18:18:08Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=MUzmb 2026-03-12T18:18:17.452421127Z time="2026-03-12T18:18:17Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=VU9F2 2026-03-12T18:18:17.452421127Z time="2026-03-12T18:18:17Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=VU9F2 2026-03-12T18:18:17.457295992Z time="2026-03-12T18:18:17Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=VU9F2 2026-03-12T18:18:17.457454036Z time="2026-03-12T18:18:17Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-d5tcw current-pod.namespace=openshift-marketplace id=VU9F2 2026-03-12T18:18:17.457454036Z time="2026-03-12T18:18:17Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-d5tcw current-pod.namespace=openshift-marketplace id=VU9F2 2026-03-12T18:18:17.457454036Z time="2026-03-12T18:18:17Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=VU9F2 2026-03-12T18:18:17.457454036Z time="2026-03-12T18:18:17Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=VU9F2 2026-03-12T18:18:17.457454036Z time="2026-03-12T18:18:17Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=VU9F2 2026-03-12T18:18:17.466378404Z time="2026-03-12T18:18:17Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=VU9F2 2026-03-12T18:18:17.466691692Z time="2026-03-12T18:18:17Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-d5tcw current-pod.namespace=openshift-marketplace id=VU9F2 2026-03-12T18:18:17.466691692Z time="2026-03-12T18:18:17Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-d5tcw current-pod.namespace=openshift-marketplace id=VU9F2 2026-03-12T18:18:17.466926368Z time="2026-03-12T18:18:17Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=VU9F2 2026-03-12T18:18:17.466926368Z time="2026-03-12T18:18:17Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=VU9F2 2026-03-12T18:18:17.489681380Z time="2026-03-12T18:18:17Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=GHpho 2026-03-12T18:18:17.489815804Z time="2026-03-12T18:18:17Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=GHpho 2026-03-12T18:18:17.498671500Z time="2026-03-12T18:18:17Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=GHpho 2026-03-12T18:18:17.498809444Z time="2026-03-12T18:18:17Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-d5tcw current-pod.namespace=openshift-marketplace id=GHpho 2026-03-12T18:18:17.498817824Z time="2026-03-12T18:18:17Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-d5tcw current-pod.namespace=openshift-marketplace id=GHpho 2026-03-12T18:18:17.498838014Z time="2026-03-12T18:18:17Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=GHpho 2026-03-12T18:18:17.498838014Z time="2026-03-12T18:18:17Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=GHpho 2026-03-12T18:18:17.498845605Z time="2026-03-12T18:18:17Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=GHpho 2026-03-12T18:18:17.508398819Z time="2026-03-12T18:18:17Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=GHpho 2026-03-12T18:18:17.508531052Z time="2026-03-12T18:18:17Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-d5tcw current-pod.namespace=openshift-marketplace id=GHpho 2026-03-12T18:18:17.508531052Z time="2026-03-12T18:18:17Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-d5tcw current-pod.namespace=openshift-marketplace id=GHpho 2026-03-12T18:18:17.508655306Z time="2026-03-12T18:18:17Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=GHpho 2026-03-12T18:18:17.508655306Z time="2026-03-12T18:18:17Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=GHpho config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-bfq7b/etcd-operator_current.log0000640000000000000000000001055315154601571031120 0ustar00000000000000002026-03-12T18:16:42.476432765Z I0312 18:16:42.476219 1 profiler.go:21] Starting profiling endpoint at http://127.0.0.1:6060/debug/pprof/ 2026-03-12T18:16:42.476603249Z I0312 18:16:42.476556 1 observer_polling.go:159] Starting file observer 2026-03-12T18:16:42.476689221Z I0312 18:16:42.476652 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-12T18:16:42.476722412Z I0312 18:16:42.476695 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-12T18:16:42.477090091Z I0312 18:16:42.477041 1 observer_polling.go:159] Starting file observer 2026-03-12T18:17:37.394826876Z I0312 18:17:37.393065 1 builder.go:304] openshift-cluster-etcd-operator version 4.18.0-202602170912.p2.gb7e21f5.assembly.stream.el9-b7e21f5-b7e21f52fab30ac18bb890c61f724332f332b934 2026-03-12T18:17:38.577667996Z I0312 18:17:38.576997 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-12T18:17:38.577667996Z W0312 18:17:38.577036 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-12T18:17:38.577667996Z W0312 18:17:38.577045 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-12T18:17:38.577667996Z W0312 18:17:38.577055 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-12T18:17:38.577667996Z W0312 18:17:38.577062 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-12T18:17:38.577667996Z W0312 18:17:38.577071 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-12T18:17:38.577667996Z W0312 18:17:38.577079 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-12T18:17:38.605133458Z I0312 18:17:38.602173 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-12T18:17:38.605133458Z I0312 18:17:38.602222 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-12T18:17:38.605133458Z I0312 18:17:38.602247 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-12T18:17:38.605133458Z I0312 18:17:38.602276 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-12T18:17:38.605133458Z I0312 18:17:38.602380 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-12T18:17:38.605133458Z I0312 18:17:38.602475 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-12T18:17:38.605133458Z I0312 18:17:38.602480 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-12T18:17:38.605133458Z I0312 18:17:38.602490 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-12T18:17:38.605133458Z I0312 18:17:38.602494 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-12T18:17:38.616012333Z I0312 18:17:38.612221 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-12T18:17:38.616012333Z I0312 18:17:38.612481 1 leaderelection.go:254] attempting to acquire leader lease openshift-etcd-operator/openshift-cluster-etcd-operator-lock... 2026-03-12T18:17:38.707017747Z I0312 18:17:38.705662 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-12T18:17:38.707017747Z I0312 18:17:38.705736 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-12T18:17:38.707017747Z I0312 18:17:38.705761 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-bfq7b/etcd-operator_previous.log0000640000000000000000000004000415154601571031304 0ustar00000000000000002026-03-12T18:14:38.600567915Z I0312 18:14:38.600467 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-12T18:14:38.600567915Z I0312 18:14:38.600536 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-03-12T18:14:38.600567915Z I0312 18:14:38.600539 1 base_controller.go:181] Shutting down GuardController ... 2026-03-12T18:14:38.600567915Z I0312 18:14:38.600551 1 base_controller.go:181] Shutting down etcd-Node ... 2026-03-12T18:14:38.600611526Z I0312 18:14:38.600580 1 base_controller.go:181] Shutting down etcd ... 2026-03-12T18:14:38.600611526Z I0312 18:14:38.600607 1 base_controller.go:181] Shutting down MachineDeletionHooksController ... 2026-03-12T18:14:38.600633806Z I0312 18:14:38.600615 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-12T18:14:38.600633806Z I0312 18:14:38.600621 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-12T18:14:38.600655737Z I0312 18:14:38.600635 1 base_controller.go:181] Shutting down BootstrapTeardownController ... 2026-03-12T18:14:38.600655737Z I0312 18:14:38.600649 1 base_controller.go:181] Shutting down EtcdCertSignerController ... 2026-03-12T18:14:38.600706208Z I0312 18:14:38.600672 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-12T18:14:38.600734039Z I0312 18:14:38.600716 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-12T18:14:38.600777630Z I0312 18:14:38.600756 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-12T18:14:38.600799151Z I0312 18:14:38.600785 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-12T18:14:38.600953954Z I0312 18:14:38.600886 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-12T18:14:38.600953954Z I0312 18:14:38.600893 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-3080387101/tls.crt::/tmp/serving-cert-3080387101/tls.key" 2026-03-12T18:14:38.601287643Z I0312 18:14:38.601052 1 base_controller.go:113] All ClusterMemberController workers have been terminated 2026-03-12T18:14:38.601287643Z I0312 18:14:38.601260 1 base_controller.go:113] All etcd-StaticPodState workers have been terminated 2026-03-12T18:14:38.601287643Z I0312 18:14:38.601266 1 controller_manager.go:54] etcd-StaticPodState controller terminated 2026-03-12T18:14:38.601287643Z I0312 18:14:38.601280 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-03-12T18:14:38.601310894Z I0312 18:14:38.601284 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-03-12T18:14:38.601452827Z I0312 18:14:38.600676 1 base_controller.go:181] Shutting down EtcdStaticResources-StaticResources ... 2026-03-12T18:14:38.601452827Z I0312 18:14:38.601435 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-12T18:14:38.601626742Z I0312 18:14:38.601486 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-12T18:14:38.601626742Z I0312 18:14:38.601495 1 base_controller.go:181] Shutting down Installer ... 2026-03-12T18:14:38.601626742Z I0312 18:14:38.601499 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-12T18:14:38.601626742Z I0312 18:14:38.601539 1 base_controller.go:181] Shutting down ScriptController ... 2026-03-12T18:14:38.601626742Z I0312 18:14:38.601542 1 base_controller.go:123] Shutting down worker of MachineDeletionHooksController controller ... 2026-03-12T18:14:38.601626742Z I0312 18:14:38.601551 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-12T18:14:38.601626742Z I0312 18:14:38.601564 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-03-12T18:14:38.601626742Z I0312 18:14:38.601582 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2026-03-12T18:14:38.601626742Z I0312 18:14:38.601584 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-03-12T18:14:38.601626742Z I0312 18:14:38.601586 1 base_controller.go:181] Shutting down EtcdEndpointsController ... 2026-03-12T18:14:38.601626742Z I0312 18:14:38.601498 1 builder.go:335] server exited 2026-03-12T18:14:38.601626742Z I0312 18:14:38.601604 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-12T18:14:38.601626742Z I0312 18:14:38.601608 1 base_controller.go:123] Shutting down worker of etcd-Node controller ... 2026-03-12T18:14:38.601626742Z I0312 18:14:38.601556 1 base_controller.go:113] All MachineDeletionHooksController workers have been terminated 2026-03-12T18:14:38.601626742Z I0312 18:14:38.601619 1 base_controller.go:113] All etcd-Node workers have been terminated 2026-03-12T18:14:38.601676353Z I0312 18:14:38.601618 1 base_controller.go:181] Shutting down PruneController ... 2026-03-12T18:14:38.601676353Z I0312 18:14:38.601626 1 controller_manager.go:54] etcd-Node controller terminated 2026-03-12T18:14:38.601676353Z I0312 18:14:38.601631 1 envvarcontroller.go:252] Shutting down EnvVarController 2026-03-12T18:14:38.601676353Z I0312 18:14:38.601632 1 base_controller.go:123] Shutting down worker of etcd-InstallerState controller ... 2026-03-12T18:14:38.601676353Z I0312 18:14:38.601598 1 base_controller.go:113] All GuardController workers have been terminated 2026-03-12T18:14:38.601676353Z I0312 18:14:38.601652 1 controller_manager.go:54] GuardController controller terminated 2026-03-12T18:14:38.601676353Z I0312 18:14:38.601654 1 base_controller.go:113] All FSyncController workers have been terminated 2026-03-12T18:14:38.601676353Z I0312 18:14:38.601619 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-12T18:14:38.601676353Z I0312 18:14:38.601671 1 controller_manager.go:54] RevisionController controller terminated 2026-03-12T18:14:38.601703123Z I0312 18:14:38.601567 1 base_controller.go:181] Shutting down etcd-InstallerState ... 2026-03-12T18:14:38.601703123Z I0312 18:14:38.601690 1 base_controller.go:113] All etcd-InstallerState workers have been terminated 2026-03-12T18:14:38.601703123Z I0312 18:14:38.601697 1 controller_manager.go:54] etcd-InstallerState controller terminated 2026-03-12T18:14:38.601726394Z I0312 18:14:38.601622 1 base_controller.go:123] Shutting down worker of ScriptController controller ... 2026-03-12T18:14:38.601726394Z I0312 18:14:38.601710 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-03-12T18:14:38.601726394Z I0312 18:14:38.601719 1 base_controller.go:113] All PruneController workers have been terminated 2026-03-12T18:14:38.601726394Z I0312 18:14:38.601721 1 base_controller.go:113] All ScriptController workers have been terminated 2026-03-12T18:14:38.601756915Z I0312 18:14:38.601724 1 controller_manager.go:54] PruneController controller terminated 2026-03-12T18:14:38.601756915Z I0312 18:14:38.601608 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-03-12T18:14:38.601778205Z I0312 18:14:38.601753 1 base_controller.go:123] Shutting down worker of EtcdCertSignerController controller ... 2026-03-12T18:14:38.601778205Z I0312 18:14:38.601765 1 base_controller.go:113] All EtcdCertSignerController workers have been terminated 2026-03-12T18:14:38.601799366Z I0312 18:14:38.601790 1 base_controller.go:123] Shutting down worker of BootstrapTeardownController controller ... 2026-03-12T18:14:38.601815666Z I0312 18:14:38.601781 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-12T18:14:38.601815666Z I0312 18:14:38.601803 1 base_controller.go:113] All BootstrapTeardownController workers have been terminated 2026-03-12T18:14:38.601832857Z I0312 18:14:38.601642 1 base_controller.go:123] Shutting down worker of etcd controller ... 2026-03-12T18:14:38.601832857Z I0312 18:14:38.601821 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-12T18:14:38.601924519Z I0312 18:14:38.601882 1 base_controller.go:113] All Installer workers have been terminated 2026-03-12T18:14:38.601924519Z I0312 18:14:38.601901 1 controller_manager.go:54] Installer controller terminated 2026-03-12T18:14:38.601995381Z I0312 18:14:38.601958 1 base_controller.go:113] All etcd workers have been terminated 2026-03-12T18:14:38.601995381Z I0312 18:14:38.601987 1 base_controller.go:113] All StatusSyncer_etcd workers have been terminated 2026-03-12T18:14:38.603450178Z E0312 18:14:38.603367 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: [\"manifests/installer-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/serviceaccounts/installer-sa\": context canceled, \"manifests/installer-cluster-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"BackingResourceController-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-12T18:14:38.603801967Z E0312 18:14:38.603725 1 base_controller.go:279] "Unhandled Error" err="EtcdStaticResources-StaticResources reconciliation failed: [\"etcd/svc.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/services/etcd\": context canceled, \"etcd/sm.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/minimal-sm.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/prometheus-role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/prometheus-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/backups-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/backups-cr.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/backups-crb.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"EtcdStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-12T18:14:38.604457553Z I0312 18:14:38.604411 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-03-12T18:14:38.604457553Z I0312 18:14:38.604431 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-03-12T18:14:38.604457553Z I0312 18:14:38.604438 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-12T18:14:38.604921315Z I0312 18:14:38.604849 1 base_controller.go:123] Shutting down worker of EtcdStaticResources-StaticResources controller ... 2026-03-12T18:14:38.604921315Z I0312 18:14:38.604890 1 base_controller.go:113] All EtcdStaticResources-StaticResources workers have been terminated 2026-03-12T18:14:39.732210186Z I0312 18:14:39.732142 1 etcdcli_pool.go:70] creating a new cached client 2026-03-12T18:14:43.336894756Z I0312 18:14:43.336844 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="c44b416dae3e3226ebc68da965a5dda8e004ddc6574ae39ed81ddb549b54d70d") 2026-03-12T18:14:43.336894756Z I0312 18:14:43.336870 1 cmd.go:173] exiting because "/var/run/secrets/serving-cert/tls.crt" changed 2026-03-12T18:14:43.336934607Z I0312 18:14:43.336916 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="f9410da500f609af1de04c5678f27aeeb7147365858cba522bfba9d07ce5746f") 2026-03-12T18:14:43.336934607Z I0312 18:14:43.336921 1 cmd.go:173] exiting because "/var/run/secrets/serving-cert/tls.key" changed 2026-03-12T18:14:43.336977658Z I0312 18:14:43.336961 1 observer_polling.go:120] Observed file "/var/run/secrets/etcd-client/tls.crt" has been modified (old="", new="414b027fffb39c08b331502499933f3c24881d57dbeedd93901668007bf7575a") 2026-03-12T18:14:43.336985808Z I0312 18:14:43.336976 1 cmd.go:173] exiting because "/var/run/secrets/etcd-client/tls.crt" changed 2026-03-12T18:14:43.337061330Z I0312 18:14:43.337012 1 observer_polling.go:120] Observed file "/var/run/secrets/etcd-client/tls.key" has been modified (old="", new="739bbd56e8895a7b5ebd9580a613f8d43d5c5591706562367b6248720e3dc1c4") 2026-03-12T18:14:43.337061330Z I0312 18:14:43.337021 1 cmd.go:173] exiting because "/var/run/secrets/etcd-client/tls.key" changed 2026-03-12T18:14:43.337085401Z I0312 18:14:43.337066 1 observer_polling.go:111] Observed file "/var/run/configmaps/etcd-ca/ca-bundle.crt" has been created (hash="b10e670e571d6b1bd33cfd7fd21a2819ca51a8636a4f1e23d7d4ae579173a8a8") 2026-03-12T18:14:43.337100991Z I0312 18:14:43.337087 1 cmd.go:173] exiting because "/var/run/configmaps/etcd-ca/ca-bundle.crt" changed 2026-03-12T18:14:43.337181473Z I0312 18:14:43.337160 1 observer_polling.go:111] Observed file "/var/run/configmaps/etcd-service-ca/service-ca.crt" has been created (hash="d875c9f02e10f9779bda2e51f9c79ce7eb29fa415b7b540f59f4c557f4d7a95b") 2026-03-12T18:14:43.337181473Z I0312 18:14:43.337173 1 cmd.go:173] exiting because "/var/run/configmaps/etcd-service-ca/service-ca.crt" changed 2026-03-12T18:14:43.600109598Z I0312 18:14:43.600058 1 observer_polling.go:162] Shutting down file observer 2026-03-12T18:14:53.160839653Z W0312 18:14:53.160782 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-12T18:14:53.161053138Z E0312 18:14:53.161032 1 base_controller.go:279] "Unhandled Error" err="EtcdMembersController reconciliation failed: giving up getting a cached client after 3 tries" 2026-03-12T18:14:53.162220158Z I0312 18:14:53.162179 1 base_controller.go:123] Shutting down worker of EtcdMembersController controller ... 2026-03-12T18:14:53.162235348Z I0312 18:14:53.162224 1 base_controller.go:113] All EtcdMembersController workers have been terminated 2026-03-12T18:14:53.479024973Z W0312 18:14:53.478974 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-12T18:14:53.482483210Z E0312 18:14:53.482451 1 base_controller.go:279] "Unhandled Error" err="ClusterMemberRemovalController reconciliation failed: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries" 2026-03-12T18:14:53.484661855Z I0312 18:14:53.484645 1 base_controller.go:123] Shutting down worker of ClusterMemberRemovalController controller ... 2026-03-12T18:14:53.484702666Z I0312 18:14:53.484692 1 base_controller.go:113] All ClusterMemberRemovalController workers have been terminated 2026-03-12T18:14:54.732817652Z W0312 18:14:54.732770 1 etcdcli_pool.go:73] could not create a new cached client after 1 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-12T18:14:58.733000104Z I0312 18:14:58.732944 1 etcdcli_pool.go:70] creating a new cached client 2026-03-12T18:15:12.605907026Z E0312 18:15:12.605838 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-12T18:15:12.606007479Z W0312 18:15:12.605992 1 leaderelection.go:84] leader election lost config/pod/openshift-etcd-operator/etcd-operator-5884b9cd56-bfq7b.json0000640000000000000000000001576315154601571024042 0ustar0000000000000000{"metadata":{"name":"etcd-operator-5884b9cd56-bfq7b","generateName":"etcd-operator-5884b9cd56-","namespace":"openshift-etcd-operator","uid":"e697746f-fb9e-4d10-ab61-33c68e62cc0d","resourceVersion":"8839","creationTimestamp":"2026-03-12T18:11:03Z","labels":{"app":"etcd-operator","pod-template-hash":"5884b9cd56"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.17/23\"],\"mac_address\":\"0a:58:0a:80:00:11\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.17/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.17\"\n ],\n \"mac\": \"0a:58:0a:80:00:11\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"etcd-operator-5884b9cd56","uid":"b5e5f853-ad8c-4f4a-8f51-c4af6650b9b8","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"etcd-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"etcd-operator-config","defaultMode":420}},{"name":"etcd-ca","configMap":{"name":"etcd-ca-bundle","defaultMode":420}},{"name":"etcd-service-ca","configMap":{"name":"etcd-service-ca-bundle","defaultMode":420}},{"name":"etcd-client","secret":{"secretName":"etcd-client","defaultMode":420}},{"name":"kube-api-access-vct98","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"etcd-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","command":["cluster-etcd-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml","--terminate-on-files=/var/run/secrets/serving-cert/tls.crt","--terminate-on-files=/var/run/secrets/serving-cert/tls.key","--terminate-on-files=/var/run/secrets/etcd-client/tls.crt","--terminate-on-files=/var/run/secrets/etcd-client/tls.key","--terminate-on-files=/var/run/configmaps/etcd-ca/ca-bundle.crt","--terminate-on-files=/var/run/configmaps/etcd-service-ca/service-ca.crt"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.34"},{"name":"OPENSHIFT_PROFILE","value":"web"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-vct98","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":60,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"etcd-operator","serviceAccount":"etcd-operator","nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:20Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:06Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:17:19Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:17:19Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:05Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.17","podIPs":[{"ip":"10.128.0.17"}],"startTime":"2026-03-12T18:13:06Z","containerStatuses":[{"name":"etcd-operator","state":{"running":{"startedAt":"2026-03-12T18:16:42Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-12T18:13:23Z","finishedAt":"2026-03-12T18:15:13Z","containerID":"cri-o://2a197e2fe83ed2e384dda0d8770ef6e8d98b56d89ae78066b100f526847a5d4c"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","containerID":"cri-o://4322cdc97f321d2418571282b2d0a02572a0fe1f4c6c9ffe9fbcda76c46d48dc","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-vct98","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-apiserver-check-endpoints_current.log0000640000000000000000000002746215154601571033765 0ustar0000000000000000config/pod/openshift-apiserver/logs/apiserver-5786c989f8-f6jgb2026-03-12T18:13:55.384002065Z W0312 18:13:55.383879 1 cmd.go:257] Using insecure, self-signed certificates 2026-03-12T18:13:55.384234621Z I0312 18:13:55.384209 1 crypto.go:601] Generating new CA for check-endpoints-signer@1773339235 cert, and key in /tmp/serving-cert-2006736986/serving-signer.crt, /tmp/serving-cert-2006736986/serving-signer.key 2026-03-12T18:13:56.057375397Z I0312 18:13:56.057323 1 observer_polling.go:159] Starting file observer 2026-03-12T18:13:56.070107709Z I0312 18:13:56.070065 1 builder.go:304] check-endpoints version 4.18.0-202602132343.p2.ge9bc909.assembly.stream.el9-e9bc909-e9bc90906c726823f154c78d3e568c98ff77b6a5 2026-03-12T18:13:56.072445579Z I0312 18:13:56.072413 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/tmp/serving-cert-2006736986/tls.crt::/tmp/serving-cert-2006736986/tls.key" 2026-03-12T18:13:57.645096841Z I0312 18:13:57.645032 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-03-12T18:13:57.646729192Z I0312 18:13:57.646692 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-03-12T18:13:57.646729192Z I0312 18:13:57.646717 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-03-12T18:13:57.646748203Z I0312 18:13:57.646737 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-03-12T18:13:57.646748203Z I0312 18:13:57.646742 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-03-12T18:13:57.650191060Z I0312 18:13:57.650153 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-12T18:13:57.650191060Z W0312 18:13:57.650177 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-12T18:13:57.650191060Z W0312 18:13:57.650181 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-12T18:13:57.650191060Z W0312 18:13:57.650187 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-12T18:13:57.650213650Z W0312 18:13:57.650191 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-12T18:13:57.650213650Z W0312 18:13:57.650196 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-12T18:13:57.650213650Z W0312 18:13:57.650199 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-12T18:13:57.650303983Z I0312 18:13:57.650276 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-03-12T18:14:00.689872350Z I0312 18:14:00.688813 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-2006736986/tls.crt::/tmp/serving-cert-2006736986/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1773339235\" (2026-03-12 18:13:55 +0000 UTC to 2026-04-11 18:13:56 +0000 UTC (now=2026-03-12 18:14:00.688779103 +0000 UTC))" 2026-03-12T18:14:00.689872350Z I0312 18:14:00.688979 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773339236\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773339236\" (2026-03-12 17:13:56 +0000 UTC to 2027-03-12 17:13:56 +0000 UTC (now=2026-03-12 18:14:00.688943127 +0000 UTC))" 2026-03-12T18:14:00.689872350Z I0312 18:14:00.688997 1 secure_serving.go:213] Serving securely on [::]:17698 2026-03-12T18:14:00.689872350Z I0312 18:14:00.689021 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-03-12T18:14:00.689872350Z I0312 18:14:00.689045 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-12T18:14:00.689872350Z I0312 18:14:00.689072 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-12T18:14:00.689872350Z I0312 18:14:00.689113 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/tmp/serving-cert-2006736986/tls.crt::/tmp/serving-cert-2006736986/tls.key" 2026-03-12T18:14:00.689872350Z I0312 18:14:00.689219 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-12T18:14:00.689872350Z I0312 18:14:00.689323 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-12T18:14:00.689872350Z I0312 18:14:00.689331 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-12T18:14:00.689872350Z I0312 18:14:00.689345 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-12T18:14:00.689872350Z I0312 18:14:00.689350 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-12T18:14:00.689872350Z I0312 18:14:00.689414 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-12T18:14:00.689872350Z I0312 18:14:00.689423 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-12T18:14:00.702624913Z I0312 18:14:00.698997 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:14:00.707210709Z I0312 18:14:00.707161 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:14:00.707610669Z I0312 18:14:00.707580 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:14:00.793622196Z I0312 18:14:00.789813 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-12T18:14:00.793622196Z I0312 18:14:00.789882 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-12T18:14:00.793622196Z I0312 18:14:00.789977 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-12T18:14:00.793622196Z I0312 18:14:00.790150 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-12 18:02:18 +0000 UTC to 2026-03-13 18:02:18 +0000 UTC (now=2026-03-12 18:14:00.790121687 +0000 UTC))" 2026-03-12T18:14:00.793622196Z I0312 18:14:00.790312 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-2006736986/tls.crt::/tmp/serving-cert-2006736986/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1773339235\" (2026-03-12 18:13:55 +0000 UTC to 2026-04-11 18:13:56 +0000 UTC (now=2026-03-12 18:14:00.790293532 +0000 UTC))" 2026-03-12T18:14:00.793622196Z I0312 18:14:00.790439 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773339236\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773339236\" (2026-03-12 17:13:56 +0000 UTC to 2027-03-12 17:13:56 +0000 UTC (now=2026-03-12 18:14:00.790422455 +0000 UTC))" 2026-03-12T18:14:00.793622196Z I0312 18:14:00.790788 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-12 17:55:27 +0000 UTC to 2036-03-09 17:55:27 +0000 UTC (now=2026-03-12 18:14:00.790770474 +0000 UTC))" 2026-03-12T18:14:00.793622196Z I0312 18:14:00.790808 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-12 18:02:20 +0000 UTC to 2026-03-13 18:02:20 +0000 UTC (now=2026-03-12 18:14:00.790797085 +0000 UTC))" 2026-03-12T18:14:00.793622196Z I0312 18:14:00.790828 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-12 18:02:20 +0000 UTC to 2027-03-12 18:02:20 +0000 UTC (now=2026-03-12 18:14:00.790815695 +0000 UTC))" 2026-03-12T18:14:00.793622196Z I0312 18:14:00.790845 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-12 18:02:20 +0000 UTC to 2027-03-12 18:02:20 +0000 UTC (now=2026-03-12 18:14:00.790833415 +0000 UTC))" 2026-03-12T18:14:00.793622196Z I0312 18:14:00.790861 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-12 18:02:18 +0000 UTC to 2036-03-09 18:02:18 +0000 UTC (now=2026-03-12 18:14:00.790850466 +0000 UTC))" 2026-03-12T18:14:00.793622196Z I0312 18:14:00.790877 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-12 18:02:18 +0000 UTC to 2026-03-13 18:02:18 +0000 UTC (now=2026-03-12 18:14:00.790866656 +0000 UTC))" 2026-03-12T18:14:00.793622196Z I0312 18:14:00.790995 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-2006736986/tls.crt::/tmp/serving-cert-2006736986/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1773339235\" (2026-03-12 18:13:55 +0000 UTC to 2026-04-11 18:13:56 +0000 UTC (now=2026-03-12 18:14:00.790982889 +0000 UTC))" 2026-03-12T18:14:00.793622196Z I0312 18:14:00.791102 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773339236\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773339236\" (2026-03-12 17:13:56 +0000 UTC to 2027-03-12 17:13:56 +0000 UTC (now=2026-03-12 18:14:00.791089642 +0000 UTC))" 2026-03-12T18:14:01.243959254Z I0312 18:14:01.243908 1 base_controller.go:76] Waiting for caches to sync for CheckEndpointsTimeToStart 2026-03-12T18:14:01.569963324Z I0312 18:14:01.569907 1 reflector.go:368] Caches populated for *v1.CustomResourceDefinition from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:14:01.644492040Z I0312 18:14:01.644420 1 base_controller.go:82] Caches are synced for CheckEndpointsTimeToStart 2026-03-12T18:14:01.644492040Z I0312 18:14:01.644462 1 base_controller.go:119] Starting #1 worker of CheckEndpointsTimeToStart controller ... config/pod/openshift-apiserver/logs/apiserver-5786c989f8-f6jgb/openshift-apiserver_current.log0000640000000000000000000011655115154601571030766 0ustar00000000000000002026-03-12T18:17:54.131618659Z E0312 18:17:54.131556 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:54.131618659Z E0312 18:17:54.131594 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:54.131787234Z E0312 18:17:54.131488 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:54.132418050Z E0312 18:17:54.132370 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:55.245446478Z E0312 18:17:55.245332 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:55.246270479Z E0312 18:17:55.245831 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:55.246270479Z E0312 18:17:55.246073 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:55.246320470Z E0312 18:17:55.246297 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:55.246568297Z E0312 18:17:55.246545 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:03.518929172Z I0312 18:18:03.518735 1 policy_source.go:224] refreshing policies 2026-03-12T18:18:08.926859607Z E0312 18:18:08.926773 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.927341579Z E0312 18:18:08.927252 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.927424641Z E0312 18:18:08.927376 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.927641427Z E0312 18:18:08.927604 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.927845782Z E0312 18:18:08.927811 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.927891243Z E0312 18:18:08.927872 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.928053577Z E0312 18:18:08.928017 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.928097238Z E0312 18:18:08.928079 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.928104829Z E0312 18:18:08.928092 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.928112019Z E0312 18:18:08.928101 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.928189771Z E0312 18:18:08.928165 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.928189771Z E0312 18:18:08.928179 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.928278763Z E0312 18:18:08.928254 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.928324864Z E0312 18:18:08.928018 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.928324864Z E0312 18:18:08.928315 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.928366715Z E0312 18:18:08.928343 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.928375836Z E0312 18:18:08.928368 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.928412206Z E0312 18:18:08.928017 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.928452428Z E0312 18:18:08.928431 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.928489508Z E0312 18:18:08.928029 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.928533990Z E0312 18:18:08.928498 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.928544590Z E0312 18:18:08.928532 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.928551730Z E0312 18:18:08.928096 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.928604821Z E0312 18:18:08.928581 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.928694914Z E0312 18:18:08.928582 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.930637003Z E0312 18:18:08.930598 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.941556603Z E0312 18:18:08.941378 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.941556603Z E0312 18:18:08.941483 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.943542414Z E0312 18:18:08.941698 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.943542414Z E0312 18:18:08.941746 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.943542414Z E0312 18:18:08.941835 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.943542414Z E0312 18:18:08.941842 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.943542414Z E0312 18:18:08.941866 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.943542414Z E0312 18:18:08.941947 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.945190776Z E0312 18:18:08.944964 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.945190776Z E0312 18:18:08.944986 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.945190776Z E0312 18:18:08.945162 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.945339529Z E0312 18:18:08.945305 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.945460403Z E0312 18:18:08.945433 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.945569505Z E0312 18:18:08.945496 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.953252962Z E0312 18:18:08.952815 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.953252962Z E0312 18:18:08.952949 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.953252962Z E0312 18:18:08.953039 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.953252962Z E0312 18:18:08.953231 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.953331104Z E0312 18:18:08.953302 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:22.338110085Z E0312 18:18:22.338074 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:22.338484505Z E0312 18:18:22.338442 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:22.338687360Z E0312 18:18:22.338666 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:22.338947266Z E0312 18:18:22.338921 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:22.339175542Z E0312 18:18:22.339144 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:22.340024984Z E0312 18:18:22.339396 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:22.340181458Z E0312 18:18:22.339491 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:22.340336732Z E0312 18:18:22.339499 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:22.340661150Z E0312 18:18:22.339717 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:22.340661150Z E0312 18:18:22.339807 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:22.387764635Z E0312 18:18:22.387700 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:22.387764635Z E0312 18:18:22.387731 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:22.387764635Z E0312 18:18:22.387736 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:22.387866268Z E0312 18:18:22.387700 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:22.387968960Z E0312 18:18:22.387700 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:22.522523122Z E0312 18:18:22.522464 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:22.522851090Z E0312 18:18:22.522829 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:22.522966913Z E0312 18:18:22.522942 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:22.523142038Z E0312 18:18:22.523108 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:22.523193649Z E0312 18:18:22.523174 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:23.350729403Z E0312 18:18:23.349981 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:23.350729403Z E0312 18:18:23.350097 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:23.350729403Z E0312 18:18:23.350320 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:23.350729403Z E0312 18:18:23.350663 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:23.350729403Z E0312 18:18:23.350708 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:23.351016381Z E0312 18:18:23.350952 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:23.351138314Z E0312 18:18:23.351085 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:23.351472132Z E0312 18:18:23.351422 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:23.351510233Z E0312 18:18:23.351484 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:23.351719269Z E0312 18:18:23.349997 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:23.454296902Z E0312 18:18:23.454159 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:23.454552299Z E0312 18:18:23.454437 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:23.454552299Z E0312 18:18:23.454444 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:23.454552299Z E0312 18:18:23.454458 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:23.454552299Z E0312 18:18:23.454478 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:24.141501378Z E0312 18:18:24.141297 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:24.141959720Z E0312 18:18:24.141906 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:24.142309759Z E0312 18:18:24.142274 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:24.142343810Z E0312 18:18:24.142325 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:24.142475633Z E0312 18:18:24.142439 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:25.256951417Z E0312 18:18:25.256859 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:25.257390588Z E0312 18:18:25.257338 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:25.257681476Z E0312 18:18:25.257625 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:25.257898111Z E0312 18:18:25.257861 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:25.257996254Z E0312 18:18:25.257942 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" openshift-apiserver-operator_current.log0000640000000000000000000001001315154601571040412 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-799b6db4d7-6qlzz2026-03-12T18:16:42.360214779Z I0312 18:16:42.359971 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-12T18:16:42.360214779Z I0312 18:16:42.360183 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-12T18:16:42.360633649Z I0312 18:16:42.360600 1 observer_polling.go:159] Starting file observer 2026-03-12T18:17:37.394927219Z I0312 18:17:37.393900 1 builder.go:304] openshift-apiserver-operator version - 2026-03-12T18:17:38.566555816Z I0312 18:17:38.564916 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-12T18:17:38.566555816Z W0312 18:17:38.564953 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-12T18:17:38.566555816Z W0312 18:17:38.564960 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-12T18:17:38.566555816Z W0312 18:17:38.564967 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-12T18:17:38.566555816Z W0312 18:17:38.564972 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-12T18:17:38.566555816Z W0312 18:17:38.564976 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-12T18:17:38.566555816Z W0312 18:17:38.564981 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-12T18:17:38.577590684Z I0312 18:17:38.575500 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-12T18:17:38.577590684Z I0312 18:17:38.575578 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-12T18:17:38.577590684Z I0312 18:17:38.575603 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-12T18:17:38.577590684Z I0312 18:17:38.575641 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-12T18:17:38.577590684Z I0312 18:17:38.575764 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-12T18:17:38.577590684Z I0312 18:17:38.575859 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-12T18:17:38.577590684Z I0312 18:17:38.575867 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-12T18:17:38.577590684Z I0312 18:17:38.575882 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-12T18:17:38.577590684Z I0312 18:17:38.575888 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-12T18:17:38.589565076Z I0312 18:17:38.582494 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-12T18:17:38.589565076Z I0312 18:17:38.586367 1 leaderelection.go:254] attempting to acquire leader lease openshift-apiserver-operator/openshift-apiserver-operator-lock... 2026-03-12T18:17:38.682560870Z I0312 18:17:38.679639 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-12T18:17:38.682560870Z I0312 18:17:38.679690 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-12T18:17:38.682560870Z I0312 18:17:38.679633 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file openshift-apiserver-operator_previous.log0000640000000000000000000004167515154601571040626 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-799b6db4d7-6qlzz2026-03-12T18:14:18.034839842Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/authorization.openshift.io/v1: 401 2026-03-12T18:14:18.034839842Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/build.openshift.io/v1: 401 2026-03-12T18:14:18.034839842Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/image.openshift.io/v1: 401 2026-03-12T18:14:18.034839842Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/project.openshift.io/v1: 401 2026-03-12T18:14:18.034839842Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/quota.openshift.io/v1: 401 2026-03-12T18:14:18.034839842Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/route.openshift.io/v1: 401 2026-03-12T18:14:18.034839842Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/security.openshift.io/v1: 401 2026-03-12T18:14:18.034839842Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/template.openshift.io/v1: 401 2026-03-12T18:14:18.034839842Z > 2026-03-12T18:14:27.521296672Z E0312 18:14:27.521206 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-12T18:14:27.521296672Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/apps.openshift.io/v1: 401 2026-03-12T18:14:27.521296672Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/authorization.openshift.io/v1: 401 2026-03-12T18:14:27.521296672Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/build.openshift.io/v1: 401 2026-03-12T18:14:27.521296672Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/image.openshift.io/v1: 401 2026-03-12T18:14:27.521296672Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/project.openshift.io/v1: 401 2026-03-12T18:14:27.521296672Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/quota.openshift.io/v1: 401 2026-03-12T18:14:27.521296672Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/route.openshift.io/v1: 401 2026-03-12T18:14:27.521296672Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/security.openshift.io/v1: 401 2026-03-12T18:14:27.521296672Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/template.openshift.io/v1: 401 2026-03-12T18:14:27.521296672Z > 2026-03-12T18:14:43.711829505Z I0312 18:14:43.711781 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="5b20aebe19a94f48dd249beff2f7d0980dd427096efe03e19e908d07f0423448") 2026-03-12T18:14:43.711910717Z W0312 18:14:43.711896 1 builder.go:160] Restart triggered because of file /var/run/secrets/serving-cert/tls.crt was created 2026-03-12T18:14:43.712017290Z I0312 18:14:43.712001 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="fa3a7280ff381b87b56652fce256ec1f7faee7d1b9d97ee60a86df3cac3b9056") 2026-03-12T18:14:43.712249666Z I0312 18:14:43.712210 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2026-03-12T18:14:43.712292517Z I0312 18:14:43.712261 1 base_controller.go:181] Shutting down NamespaceFinalizerController_openshift-apiserver ... 2026-03-12T18:14:43.712319358Z I0312 18:14:43.712301 1 base_controller.go:181] Shutting down StatusSyncer_openshift-apiserver ... 2026-03-12T18:14:43.712319358Z I0312 18:14:43.712306 1 base_controller.go:159] All StatusSyncer_openshift-apiserver post start hooks have been terminated 2026-03-12T18:14:43.712330578Z I0312 18:14:43.712321 1 base_controller.go:181] Shutting down openshift-apiserver-UnsupportedConfigOverrides ... 2026-03-12T18:14:43.712341018Z I0312 18:14:43.712331 1 base_controller.go:181] Shutting down APIServerStaticResources-StaticResources ... 2026-03-12T18:14:43.712351399Z I0312 18:14:43.712341 1 base_controller.go:181] Shutting down openshift-apiserver-RemoveStaleConditions ... 2026-03-12T18:14:43.712361409Z I0312 18:14:43.712350 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-03-12T18:14:43.712361409Z I0312 18:14:43.712349 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionKey ... 2026-03-12T18:14:43.712371869Z I0312 18:14:43.712351 1 base_controller.go:181] Shutting down OpenShiftAPIServer-WorkloadWorkloadController ... 2026-03-12T18:14:43.712381879Z I0312 18:14:43.712369 1 base_controller.go:181] Shutting down SecretRevisionPruneController ... 2026-03-12T18:14:43.712391860Z I0312 18:14:43.712382 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-12T18:14:43.712401820Z I0312 18:14:43.712392 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionPrune ... 2026-03-12T18:14:43.712411810Z I0312 18:14:43.712402 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionState ... 2026-03-12T18:14:43.712421710Z I0312 18:14:43.712414 1 base_controller.go:181] Shutting down auditPolicyController ... 2026-03-12T18:14:43.712475922Z I0312 18:14:43.712451 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-12T18:14:43.712490452Z I0312 18:14:43.712482 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-12T18:14:43.712565644Z I0312 18:14:43.712021 1 genericapiserver.go:691] "[graceful-termination] pre-shutdown hooks completed" name="PreShutdownHooksStopped" 2026-03-12T18:14:43.712620645Z I0312 18:14:43.712552 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-12T18:14:43.712700637Z I0312 18:14:43.712673 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-03-12T18:14:43.712733528Z I0312 18:14:43.712679 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-12T18:14:43.712773279Z I0312 18:14:43.712742 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-12T18:14:43.712819290Z E0312 18:14:43.712796 1 base_controller.go:279] "Unhandled Error" err="openshift-apiserver-APIService reconciliation failed: the operator is shutting down, skipping updating conditions, err = failed to reconcile enabled APIs: [Get \"https://172.30.0.1:443/apis/apiregistration.k8s.io/v1/apiservices/v1.project.openshift.io\": context canceled, client rate limiter Wait returned an error: context canceled]" 2026-03-12T18:14:43.712819290Z I0312 18:14:43.712583 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-12T18:14:43.712854801Z I0312 18:14:43.712836 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-12T18:14:43.712854801Z I0312 18:14:43.712838 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-12T18:14:43.712854801Z I0312 18:14:43.712852 1 builder.go:335] server exited 2026-03-12T18:14:43.712867982Z I0312 18:14:43.712629 1 base_controller.go:181] Shutting down openshift-apiserver-APIService ... 2026-03-12T18:14:43.712867982Z I0312 18:14:43.712755 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-12T18:14:43.712896212Z I0312 18:14:43.712878 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionCondition ... 2026-03-12T18:14:43.712909393Z I0312 18:14:43.712901 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionMigration ... 2026-03-12T18:14:43.712919423Z I0312 18:14:43.712913 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionKey controller ... 2026-03-12T18:14:43.712929463Z I0312 18:14:43.712922 1 base_controller.go:113] All openshift-apiserver-EncryptionKey workers have been terminated 2026-03-12T18:14:43.712955414Z I0312 18:14:43.712594 1 base_controller.go:181] Shutting down openshift-apiserver ... 2026-03-12T18:14:43.713277292Z I0312 18:14:43.713010 1 base_controller.go:123] Shutting down worker of SecretRevisionPruneController controller ... 2026-03-12T18:14:43.713319943Z I0312 18:14:43.713306 1 base_controller.go:113] All SecretRevisionPruneController workers have been terminated 2026-03-12T18:14:43.713355054Z I0312 18:14:43.713051 1 base_controller.go:123] Shutting down worker of openshift-apiserver controller ... 2026-03-12T18:14:43.713400545Z I0312 18:14:43.713384 1 base_controller.go:113] All openshift-apiserver workers have been terminated 2026-03-12T18:14:43.713434866Z I0312 18:14:43.713057 1 base_controller.go:123] Shutting down worker of ConnectivityCheckController controller ... 2026-03-12T18:14:43.713462757Z I0312 18:14:43.712612 1 base_controller.go:181] Shutting down ConnectivityCheckController ... 2026-03-12T18:14:43.713494938Z I0312 18:14:43.713482 1 base_controller.go:113] All ConnectivityCheckController workers have been terminated 2026-03-12T18:14:43.713547149Z I0312 18:14:43.713072 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-12T18:14:43.713589190Z I0312 18:14:43.713576 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-12T18:14:43.713617541Z I0312 18:14:43.712767 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-12T18:14:43.713652582Z I0312 18:14:43.713082 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionState controller ... 2026-03-12T18:14:43.713693493Z I0312 18:14:43.713681 1 base_controller.go:113] All openshift-apiserver-EncryptionState workers have been terminated 2026-03-12T18:14:43.713727443Z I0312 18:14:43.713084 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionCondition controller ... 2026-03-12T18:14:43.713760644Z I0312 18:14:43.713747 1 base_controller.go:113] All openshift-apiserver-EncryptionCondition workers have been terminated 2026-03-12T18:14:43.713789385Z I0312 18:14:43.713078 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-438516229/tls.crt::/tmp/serving-cert-438516229/tls.key" 2026-03-12T18:14:43.713824506Z I0312 18:14:43.713093 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionMigration controller ... 2026-03-12T18:14:43.713858477Z I0312 18:14:43.713845 1 base_controller.go:113] All openshift-apiserver-EncryptionMigration workers have been terminated 2026-03-12T18:14:43.713983550Z I0312 18:14:43.713957 1 base_controller.go:123] Shutting down worker of openshift-apiserver-APIService controller ... 2026-03-12T18:14:43.713983550Z I0312 18:14:43.713974 1 base_controller.go:113] All openshift-apiserver-APIService workers have been terminated 2026-03-12T18:14:43.713983550Z E0312 18:14:43.713922 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-apiserver-AuditPolicy\": client rate limiter Wait returned an error: context canceled" 2026-03-12T18:14:43.713997780Z I0312 18:14:43.713101 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionPrune controller ... 2026-03-12T18:14:43.713997780Z I0312 18:14:43.713114 1 base_controller.go:123] Shutting down worker of OpenShiftAPIServer-WorkloadWorkloadController controller ... 2026-03-12T18:14:43.713997780Z I0312 18:14:43.713990 1 base_controller.go:113] All openshift-apiserver-EncryptionPrune workers have been terminated 2026-03-12T18:14:43.714009061Z I0312 18:14:43.713143 1 base_controller.go:123] Shutting down worker of openshift-apiserver-UnsupportedConfigOverrides controller ... 2026-03-12T18:14:43.714009061Z I0312 18:14:43.714002 1 base_controller.go:113] All openshift-apiserver-UnsupportedConfigOverrides workers have been terminated 2026-03-12T18:14:43.714009061Z I0312 18:14:43.713150 1 base_controller.go:123] Shutting down worker of NamespaceFinalizerController_openshift-apiserver controller ... 2026-03-12T18:14:43.714020731Z I0312 18:14:43.714005 1 base_controller.go:113] All OpenShiftAPIServer-WorkloadWorkloadController workers have been terminated 2026-03-12T18:14:43.714031231Z I0312 18:14:43.714011 1 base_controller.go:113] All NamespaceFinalizerController_openshift-apiserver workers have been terminated 2026-03-12T18:14:43.714041661Z I0312 18:14:43.713157 1 base_controller.go:123] Shutting down worker of StatusSyncer_openshift-apiserver controller ... 2026-03-12T18:14:43.714051972Z I0312 18:14:43.714038 1 base_controller.go:113] All StatusSyncer_openshift-apiserver workers have been terminated 2026-03-12T18:14:43.714051972Z I0312 18:14:43.713161 1 base_controller.go:123] Shutting down worker of APIServerStaticResources-StaticResources controller ... 2026-03-12T18:14:43.714062982Z I0312 18:14:43.714053 1 base_controller.go:113] All APIServerStaticResources-StaticResources workers have been terminated 2026-03-12T18:14:43.714062982Z I0312 18:14:43.713184 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-12T18:14:43.714073632Z I0312 18:14:43.714067 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-12T18:14:43.714089363Z I0312 18:14:43.713092 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-12T18:14:43.714089363Z I0312 18:14:43.714080 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-12T18:14:43.714089363Z I0312 18:14:43.713149 1 base_controller.go:123] Shutting down worker of openshift-apiserver-RemoveStaleConditions controller ... 2026-03-12T18:14:43.714100853Z I0312 18:14:43.714091 1 base_controller.go:113] All openshift-apiserver-RemoveStaleConditions workers have been terminated 2026-03-12T18:14:43.715407606Z I0312 18:14:43.715365 1 base_controller.go:123] Shutting down worker of auditPolicyController controller ... 2026-03-12T18:14:43.715407606Z I0312 18:14:43.715386 1 base_controller.go:113] All auditPolicyController workers have been terminated 2026-03-12T18:14:48.712067286Z I0312 18:14:48.711980 1 observer_polling.go:162] Shutting down file observer 2026-03-12T18:15:17.715691743Z E0312 18:15:17.715574 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-12T18:15:17.715691743Z W0312 18:15:17.715626 1 leaderelection.go:84] leader election lost config/pod/openshift-apiserver-operator/openshift-apiserver-operator-799b6db4d7-6qlzz.json0000640000000000000000000001443615154601571030342 0ustar0000000000000000{"metadata":{"name":"openshift-apiserver-operator-799b6db4d7-6qlzz","generateName":"openshift-apiserver-operator-799b6db4d7-","namespace":"openshift-apiserver-operator","uid":"236f2886-bb69-49a7-9471-36454fd1cbd3","resourceVersion":"8838","creationTimestamp":"2026-03-12T18:11:03Z","labels":{"app":"openshift-apiserver-operator","pod-template-hash":"799b6db4d7"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.22/23\"],\"mac_address\":\"0a:58:0a:80:00:16\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.22/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.22\"\n ],\n \"mac\": \"0a:58:0a:80:00:16\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-apiserver-operator-799b6db4d7","uid":"40f772ab-b855-4667-aaa3-bb1fb213ce8e","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access-b6ggg","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab","command":["cluster-openshift-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.34"},{"name":"KUBE_APISERVER_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-b6ggg","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-apiserver-operator","serviceAccount":"openshift-apiserver-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c15,c5"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:20Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:05Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:17:19Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:17:19Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:05Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.22","podIPs":[{"ip":"10.128.0.22"}],"startTime":"2026-03-12T18:13:05Z","containerStatuses":[{"name":"openshift-apiserver-operator","state":{"running":{"startedAt":"2026-03-12T18:16:42Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-12T18:13:23Z","finishedAt":"2026-03-12T18:15:17Z","containerID":"cri-o://6ae7a934b8aa2f254b8b82bbc367d7391db11d303ac3c55852c1da10c3f95301"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab","containerID":"cri-o://7cab1578ed2470f7e82997cc453e19ce4ec7011f918fcfd2c8f748a2ab79d803","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-b6ggg","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-scheduler-operator-container_current.log0000640000000000000000000001021515154601571043020 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-5c74bfc494-dpb6k2026-03-12T18:16:42.357870150Z I0312 18:16:42.350156 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-12T18:16:42.357870150Z I0312 18:16:42.350301 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-12T18:16:42.357870150Z I0312 18:16:42.354618 1 observer_polling.go:159] Starting file observer 2026-03-12T18:17:37.392686662Z I0312 18:17:37.392621 1 builder.go:304] openshift-cluster-kube-scheduler-operator version 4.18.0-202602132343.p2.gc7b5163.assembly.stream.el9-c7b5163-c7b51633b67e3e2860ca053930422f69e17bd40a 2026-03-12T18:17:38.600489791Z I0312 18:17:38.600439 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-12T18:17:38.600566603Z W0312 18:17:38.600555 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-12T18:17:38.600591134Z W0312 18:17:38.600582 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-12T18:17:38.600612364Z W0312 18:17:38.600604 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-12T18:17:38.600632315Z W0312 18:17:38.600624 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-12T18:17:38.600652175Z W0312 18:17:38.600644 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-12T18:17:38.600671836Z W0312 18:17:38.600664 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-12T18:17:38.613553401Z I0312 18:17:38.605617 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-12T18:17:38.613553401Z I0312 18:17:38.605898 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-scheduler-operator/openshift-cluster-kube-scheduler-operator-lock... 2026-03-12T18:17:38.613553401Z I0312 18:17:38.606686 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-12T18:17:38.613553401Z I0312 18:17:38.606732 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-12T18:17:38.613553401Z I0312 18:17:38.606745 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-12T18:17:38.613553401Z I0312 18:17:38.606772 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-12T18:17:38.613553401Z I0312 18:17:38.606868 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-12T18:17:38.613553401Z I0312 18:17:38.606949 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-12T18:17:38.613553401Z I0312 18:17:38.606954 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-12T18:17:38.613553401Z I0312 18:17:38.606964 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-12T18:17:38.613553401Z I0312 18:17:38.606969 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-12T18:17:38.708699599Z I0312 18:17:38.707102 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-12T18:17:38.708699599Z I0312 18:17:38.707154 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-12T18:17:38.708699599Z I0312 18:17:38.707150 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController kube-scheduler-operator-container_previous.log0000640000000000000000000004126615154601571043224 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-5c74bfc494-dpb6k2026-03-12T18:14:11.082190079Z I0312 18:14:11.081294 1 request.go:700] Waited for 1.15966032s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/serviceaccounts/installer-sa 2026-03-12T18:14:12.081972453Z I0312 18:14:12.081907 1 request.go:700] Waited for 1.197452226s due to client-side throttling, not priority and fairness, request: POST:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods 2026-03-12T18:14:12.921250253Z I0312 18:14:12.920860 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"054ef1ce-c0cc-494a-be50-eb63c21a9db3", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'PodCreated' Created Pod/installer-4-master-0 -n openshift-kube-scheduler because it was missing 2026-03-12T18:14:13.289677987Z I0312 18:14:13.289213 1 installer_controller.go:550] "master-0" is in transition to 4, but has not made progress because installer is not finished, but in Pending phase 2026-03-12T18:14:15.862987275Z I0312 18:14:15.860022 1 installer_controller.go:550] "master-0" is in transition to 4, but has not made progress because installer is not finished, but in Pending phase 2026-03-12T18:14:16.081488774Z I0312 18:14:16.081411 1 request.go:700] Waited for 1.086433105s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/serviceaccounts/installer-sa 2026-03-12T18:14:17.301191904Z I0312 18:14:17.300891 1 installer_controller.go:550] "master-0" is in transition to 4, but has not made progress because installer is not finished, but in Pending phase 2026-03-12T18:14:17.739457586Z I0312 18:14:17.737756 1 request.go:700] Waited for 1.030434169s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/configmaps/kube-scheduler-pod 2026-03-12T18:14:18.655979112Z I0312 18:14:18.655752 1 installer_controller.go:550] "master-0" is in transition to 4, but has not made progress because installer is not finished, but in Running phase 2026-03-12T18:14:21.763200231Z I0312 18:14:21.763139 1 installer_controller.go:550] "master-0" is in transition to 4, but has not made progress because installer is not finished, but in Running phase 2026-03-12T18:14:53.530126854Z I0312 18:14:53.530080 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="ab391d51bee90cc47b057fed4079da2058d6ed608bec9cb336c46aa13a0aa5ee") 2026-03-12T18:14:53.530197406Z W0312 18:14:53.530186 1 builder.go:160] Restart triggered because of file /var/run/secrets/serving-cert/tls.crt was created 2026-03-12T18:14:53.530305828Z I0312 18:14:53.530286 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="4786876def90278f48ecc26ba36a05b917eb4db5d7bcee5d356b79b80926db31") 2026-03-12T18:14:53.530781870Z I0312 18:14:53.530765 1 genericapiserver.go:691] "[graceful-termination] pre-shutdown hooks completed" name="PreShutdownHooksStopped" 2026-03-12T18:14:53.530827942Z I0312 18:14:53.530817 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2026-03-12T18:14:53.530911454Z I0312 18:14:53.530900 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-12T18:14:53.531745475Z I0312 18:14:53.531716 1 base_controller.go:181] Shutting down kube-scheduler ... 2026-03-12T18:14:53.531796896Z I0312 18:14:53.531785 1 base_controller.go:181] Shutting down KubeControllerManagerStaticResources-StaticResources ... 2026-03-12T18:14:53.532694429Z I0312 18:14:53.532653 1 base_controller.go:181] Shutting down TargetConfigController ... 2026-03-12T18:14:53.532738660Z I0312 18:14:53.532714 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-12T18:14:53.532760720Z I0312 18:14:53.532742 1 base_controller.go:181] Shutting down Installer ... 2026-03-12T18:14:53.532923415Z I0312 18:14:53.532884 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-03-12T18:14:53.533641783Z E0312 18:14:53.533607 1 base_controller.go:279] "Unhandled Error" err="KubeControllerManagerStaticResources-StaticResources reconciliation failed: [\"assets/kube-scheduler/sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/serviceaccounts/openshift-kube-scheduler-sa\": context canceled, \"assets/kube-scheduler/localhost-recovery-client-crb.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/localhost-recovery-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"KubeControllerManagerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-12T18:14:53.533872849Z I0312 18:14:53.533854 1 base_controller.go:123] Shutting down worker of kube-scheduler controller ... 2026-03-12T18:14:53.533911719Z I0312 18:14:53.533899 1 base_controller.go:113] All kube-scheduler workers have been terminated 2026-03-12T18:14:53.534028912Z W0312 18:14:53.533989 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerDegraded"].reason is missing; this will eventually be fatal 2026-03-12T18:14:53.534028912Z W0312 18:14:53.534009 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2026-03-12T18:14:53.534028912Z W0312 18:14:53.534015 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-03-12T18:14:53.534046673Z I0312 18:14:53.534036 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-823057702/tls.crt::/tmp/serving-cert-823057702/tls.key" 2026-03-12T18:14:53.534100024Z I0312 18:14:53.534070 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-12T18:14:53.534134355Z I0312 18:14:53.534119 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-12T18:14:53.534144615Z I0312 18:14:53.534136 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-12T18:14:53.534144615Z I0312 18:14:53.534137 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2026-03-12T18:14:53.534232868Z E0312 18:14:53.534118 1 base_controller.go:279] "Unhandled Error" err="Installer reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-scheduler-Installer\": client rate limiter Wait returned an error: context canceled" 2026-03-12T18:14:53.534232868Z I0312 18:14:53.533991 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-12T18:14:53.534232868Z I0312 18:14:53.534225 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-12T18:14:53.534265498Z I0312 18:14:53.534228 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-12T18:14:53.534306189Z I0312 18:14:53.534278 1 base_controller.go:181] Shutting down GuardController ... 2026-03-12T18:14:53.534306189Z I0312 18:14:53.534282 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-12T18:14:53.534306189Z I0312 18:14:53.534295 1 base_controller.go:181] Shutting down StatusSyncer_kube-scheduler ... 2026-03-12T18:14:53.534306189Z I0312 18:14:53.534299 1 base_controller.go:159] All StatusSyncer_kube-scheduler post start hooks have been terminated 2026-03-12T18:14:53.534325160Z I0312 18:14:53.534305 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-12T18:14:53.534325160Z I0312 18:14:53.534310 1 base_controller.go:181] Shutting down cluster-kube-scheduler-operator-UnsupportedConfigOverrides ... 2026-03-12T18:14:53.534325160Z I0312 18:14:53.534320 1 base_controller.go:181] Shutting down kube-scheduler-InstallerState ... 2026-03-12T18:14:53.534338770Z I0312 18:14:53.534232 1 builder.go:335] server exited 2026-03-12T18:14:53.534347531Z I0312 18:14:53.534332 1 base_controller.go:181] Shutting down PruneController ... 2026-03-12T18:14:53.534347531Z I0312 18:14:53.534340 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-03-12T18:14:53.534356261Z I0312 18:14:53.534348 1 base_controller.go:113] All GuardController workers have been terminated 2026-03-12T18:14:53.534364651Z I0312 18:14:53.534354 1 controller_manager.go:54] GuardController controller terminated 2026-03-12T18:14:53.534382151Z I0312 18:14:53.534354 1 base_controller.go:181] Shutting down kube-scheduler-StaticPodState ... 2026-03-12T18:14:53.534392462Z I0312 18:14:53.534373 1 base_controller.go:123] Shutting down worker of StatusSyncer_kube-scheduler controller ... 2026-03-12T18:14:53.534392462Z I0312 18:14:53.534381 1 base_controller.go:123] Shutting down worker of cluster-kube-scheduler-operator-UnsupportedConfigOverrides controller ... 2026-03-12T18:14:53.534402382Z I0312 18:14:53.534389 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-12T18:14:53.534402382Z I0312 18:14:53.534363 1 base_controller.go:123] Shutting down worker of kube-scheduler-InstallerState controller ... 2026-03-12T18:14:53.534402382Z I0312 18:14:53.534396 1 base_controller.go:113] All cluster-kube-scheduler-operator-UnsupportedConfigOverrides workers have been terminated 2026-03-12T18:14:53.534413702Z I0312 18:14:53.534400 1 base_controller.go:113] All kube-scheduler-InstallerState workers have been terminated 2026-03-12T18:14:53.534413702Z I0312 18:14:53.534402 1 base_controller.go:181] Shutting down MissingStaticPodController ... 2026-03-12T18:14:53.534497814Z I0312 18:14:53.534409 1 controller_manager.go:54] cluster-kube-scheduler-operator-UnsupportedConfigOverrides controller terminated 2026-03-12T18:14:53.534497814Z I0312 18:14:53.534409 1 controller_manager.go:54] kube-scheduler-InstallerState controller terminated 2026-03-12T18:14:53.534497814Z I0312 18:14:53.534420 1 base_controller.go:123] Shutting down worker of kube-scheduler-StaticPodState controller ... 2026-03-12T18:14:53.534497814Z I0312 18:14:53.534391 1 base_controller.go:113] All StatusSyncer_kube-scheduler workers have been terminated 2026-03-12T18:14:53.534497814Z I0312 18:14:53.534424 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-12T18:14:53.534497814Z I0312 18:14:53.534327 1 base_controller.go:181] Shutting down kube-scheduler-Node ... 2026-03-12T18:14:53.534497814Z I0312 18:14:53.534434 1 base_controller.go:123] Shutting down worker of MissingStaticPodController controller ... 2026-03-12T18:14:53.534497814Z I0312 18:14:53.534397 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-12T18:14:53.534497814Z I0312 18:14:53.534450 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-12T18:14:53.534497814Z I0312 18:14:53.534450 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-12T18:14:53.534497814Z I0312 18:14:53.534450 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-03-12T18:14:53.534497814Z I0312 18:14:53.534465 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-12T18:14:53.534497814Z I0312 18:14:53.534471 1 base_controller.go:123] Shutting down worker of kube-controller-manager-RemoveStaleConditions controller ... 2026-03-12T18:14:53.534497814Z I0312 18:14:53.534478 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-03-12T18:14:53.534497814Z I0312 18:14:53.534452 1 controller_manager.go:54] RevisionController controller terminated 2026-03-12T18:14:53.534542885Z E0312 18:14:53.534495 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-12T18:14:53.534542885Z I0312 18:14:53.534365 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-03-12T18:14:53.534587737Z I0312 18:14:53.534435 1 base_controller.go:113] All kube-scheduler-StaticPodState workers have been terminated 2026-03-12T18:14:53.534587737Z I0312 18:14:53.534560 1 base_controller.go:113] All PruneController workers have been terminated 2026-03-12T18:14:53.534587737Z I0312 18:14:53.534572 1 controller_manager.go:54] kube-scheduler-StaticPodState controller terminated 2026-03-12T18:14:53.534587737Z I0312 18:14:53.534579 1 controller_manager.go:54] PruneController controller terminated 2026-03-12T18:14:53.534600357Z I0312 18:14:53.534440 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-03-12T18:14:53.534610037Z I0312 18:14:53.534598 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-12T18:14:53.534610037Z I0312 18:14:53.534604 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-03-12T18:14:53.534620037Z I0312 18:14:53.534409 1 base_controller.go:181] Shutting down kube-controller-manager-RemoveStaleConditions ... 2026-03-12T18:14:53.534620037Z I0312 18:14:53.534614 1 base_controller.go:113] All kube-controller-manager-RemoveStaleConditions workers have been terminated 2026-03-12T18:14:53.534629408Z I0312 18:14:53.534423 1 base_controller.go:123] Shutting down worker of kube-scheduler-Node controller ... 2026-03-12T18:14:53.534638938Z I0312 18:14:53.534627 1 base_controller.go:113] All kube-scheduler-Node workers have been terminated 2026-03-12T18:14:53.534638938Z I0312 18:14:53.534634 1 controller_manager.go:54] kube-scheduler-Node controller terminated 2026-03-12T18:14:53.534786292Z I0312 18:14:53.534769 1 base_controller.go:123] Shutting down worker of KubeControllerManagerStaticResources-StaticResources controller ... 2026-03-12T18:14:53.534823033Z I0312 18:14:53.534811 1 base_controller.go:113] All KubeControllerManagerStaticResources-StaticResources workers have been terminated 2026-03-12T18:14:53.535379847Z E0312 18:14:53.535343 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: [\"manifests/installer-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/serviceaccounts/installer-sa\": context canceled, \"manifests/installer-cluster-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"BackingResourceController-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-12T18:14:53.535399797Z I0312 18:14:53.535379 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-03-12T18:14:53.535399797Z I0312 18:14:53.535391 1 base_controller.go:113] All Installer workers have been terminated 2026-03-12T18:14:53.535408917Z I0312 18:14:53.535398 1 controller_manager.go:54] Installer controller terminated 2026-03-12T18:14:53.536559376Z I0312 18:14:53.536532 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-03-12T18:14:53.536559376Z I0312 18:14:53.536549 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-03-12T18:14:53.536577097Z I0312 18:14:53.536557 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-12T18:14:53.536627728Z I0312 18:14:53.536599 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-12T18:14:53.536627728Z I0312 18:14:53.536618 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-12T18:14:58.529192905Z I0312 18:14:58.529063 1 observer_polling.go:162] Shutting down file observer 2026-03-12T18:15:27.533535448Z E0312 18:15:27.533387 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-12T18:15:27.533535448Z W0312 18:15:27.533440 1 leaderelection.go:84] leader election lost config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-5c74bfc494-dpb6k.json0000640000000000000000000001365215154601571032056 0ustar0000000000000000{"metadata":{"name":"openshift-kube-scheduler-operator-5c74bfc494-dpb6k","generateName":"openshift-kube-scheduler-operator-5c74bfc494-","namespace":"openshift-kube-scheduler-operator","uid":"d4ae1240-e04e-48e9-88df-9f1a53508da7","resourceVersion":"8855","creationTimestamp":"2026-03-12T18:11:02Z","labels":{"app":"openshift-kube-scheduler-operator","pod-template-hash":"5c74bfc494"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.6/23\"],\"mac_address\":\"0a:58:0a:80:00:06\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.6/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.6\"\n ],\n \"mac\": \"0a:58:0a:80:00:06\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-kube-scheduler-operator-5c74bfc494","uid":"4875b7f2-0787-4efd-b9d7-e30e66c665f4","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-scheduler-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-kube-scheduler-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-scheduler-operator-container","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","command":["cluster-kube-scheduler-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-kube-scheduler-operator","serviceAccount":"openshift-kube-scheduler-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:20Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:05Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:17:19Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:17:19Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:05Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.6","podIPs":[{"ip":"10.128.0.6"}],"startTime":"2026-03-12T18:13:05Z","containerStatuses":[{"name":"kube-scheduler-operator-container","state":{"running":{"startedAt":"2026-03-12T18:16:42Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-12T18:13:23Z","finishedAt":"2026-03-12T18:15:27Z","containerID":"cri-o://336f9bff957643e2b1614f5b9ab58d3286fac81af162d3e42ef2ab143bd1a53e"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","containerID":"cri-o://3bfdf8caec49323e35f87883171b05e3d1f44df1c027fc9a9977c37c9de794d7","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-scheduler/logs/installer-4-master-0/installer_current.log0000640000000000000000000001275415154601571027176 0ustar00000000000000002026-03-12T18:14:17.538481049Z I0312 18:14:17.537936 1 cmd.go:95] &{ true {false} installer true map[cert-dir:0xc0004e2f00 cert-secrets:0xc0004e2280 configmaps:0xc00033b900 namespace:0xc00033b540 optional-configmaps:0xc00033bb80 optional-secrets:0xc00033ba40 pod:0xc00033b680 pod-manifest-dir:0xc00033be00 resource-dir:0xc00033bcc0 revision:0xc00033b400 secrets:0xc00033b7c0 v:0xc0004e3900] [0xc0004e3900 0xc00033b400 0xc00033b540 0xc00033b680 0xc00033bcc0 0xc00033be00 0xc00033b900 0xc00033bb80 0xc00033ba40 0xc00033b7c0 0xc0004e2f00 0xc0004e2280] [] map[cert-configmaps:0xc0004e2c80 cert-dir:0xc0004e2f00 cert-secrets:0xc0004e2280 configmaps:0xc00033b900 help:0xc0004e3cc0 kubeconfig:0xc00033b2c0 log-flush-frequency:0xc0004e3860 namespace:0xc00033b540 optional-cert-configmaps:0xc0004e2e60 optional-cert-secrets:0xc0004e2dc0 optional-configmaps:0xc00033bb80 optional-secrets:0xc00033ba40 pod:0xc00033b680 pod-manifest-dir:0xc00033be00 pod-manifests-lock-file:0xc0004e2140 resource-dir:0xc00033bcc0 revision:0xc00033b400 secrets:0xc00033b7c0 timeout-duration:0xc0004e2000 v:0xc0004e3900 vmodule:0xc0004e39a0] [0xc00033b2c0 0xc00033b400 0xc00033b540 0xc00033b680 0xc00033b7c0 0xc00033b900 0xc00033ba40 0xc00033bb80 0xc00033bcc0 0xc00033be00 0xc0004e2000 0xc0004e2140 0xc0004e2280 0xc0004e2c80 0xc0004e2dc0 0xc0004e2e60 0xc0004e2f00 0xc0004e3860 0xc0004e3900 0xc0004e39a0 0xc0004e3cc0] [0xc0004e2c80 0xc0004e2f00 0xc0004e2280 0xc00033b900 0xc0004e3cc0 0xc00033b2c0 0xc0004e3860 0xc00033b540 0xc0004e2e60 0xc0004e2dc0 0xc00033bb80 0xc00033ba40 0xc00033b680 0xc00033be00 0xc0004e2140 0xc00033bcc0 0xc00033b400 0xc00033b7c0 0xc0004e2000 0xc0004e3900 0xc0004e39a0] map[104:0xc0004e3cc0 118:0xc0004e3900] [] -1 0 0xc000876270 true 0x223d9a0 []} 2026-03-12T18:14:17.538481049Z I0312 18:14:17.538224 1 cmd.go:96] (*installerpod.InstallOptions)(0xc00087a1a0)({ 2026-03-12T18:14:17.538481049Z KubeConfig: (string) "", 2026-03-12T18:14:17.538481049Z KubeClient: (kubernetes.Interface) , 2026-03-12T18:14:17.538481049Z Revision: (string) (len=1) "4", 2026-03-12T18:14:17.538481049Z NodeName: (string) "", 2026-03-12T18:14:17.538481049Z Namespace: (string) (len=24) "openshift-kube-scheduler", 2026-03-12T18:14:17.538481049Z Clock: (clock.RealClock) { 2026-03-12T18:14:17.538481049Z }, 2026-03-12T18:14:17.538481049Z PodConfigMapNamePrefix: (string) (len=18) "kube-scheduler-pod", 2026-03-12T18:14:17.538481049Z SecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-12T18:14:17.538481049Z (string) (len=31) "localhost-recovery-client-token" 2026-03-12T18:14:17.538481049Z }, 2026-03-12T18:14:17.538481049Z OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-12T18:14:17.538481049Z (string) (len=12) "serving-cert" 2026-03-12T18:14:17.538481049Z }, 2026-03-12T18:14:17.538481049Z ConfigMapNamePrefixes: ([]string) (len=5 cap=8) { 2026-03-12T18:14:17.538481049Z (string) (len=18) "kube-scheduler-pod", 2026-03-12T18:14:17.538481049Z (string) (len=6) "config", 2026-03-12T18:14:17.538481049Z (string) (len=17) "serviceaccount-ca", 2026-03-12T18:14:17.538481049Z (string) (len=20) "scheduler-kubeconfig", 2026-03-12T18:14:17.538481049Z (string) (len=37) "kube-scheduler-cert-syncer-kubeconfig" 2026-03-12T18:14:17.538481049Z }, 2026-03-12T18:14:17.538481049Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-12T18:14:17.538481049Z (string) (len=16) "policy-configmap" 2026-03-12T18:14:17.538481049Z }, 2026-03-12T18:14:17.538481049Z CertSecretNames: ([]string) (len=1 cap=1) { 2026-03-12T18:14:17.538481049Z (string) (len=30) "kube-scheduler-client-cert-key" 2026-03-12T18:14:17.538481049Z }, 2026-03-12T18:14:17.538481049Z OptionalCertSecretNamePrefixes: ([]string) , 2026-03-12T18:14:17.538481049Z CertConfigMapNamePrefixes: ([]string) , 2026-03-12T18:14:17.538481049Z OptionalCertConfigMapNamePrefixes: ([]string) , 2026-03-12T18:14:17.538481049Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-scheduler-certs", 2026-03-12T18:14:17.538481049Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-12T18:14:17.538481049Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-12T18:14:17.538481049Z Timeout: (time.Duration) 2m0s, 2026-03-12T18:14:17.538481049Z StaticPodManifestsLockFile: (string) "", 2026-03-12T18:14:17.538481049Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-12T18:14:17.538481049Z KubeletVersion: (string) "" 2026-03-12T18:14:17.538481049Z }) 2026-03-12T18:14:17.540301955Z I0312 18:14:17.539252 1 cmd.go:413] Getting controller reference for node master-0 2026-03-12T18:14:17.552564136Z I0312 18:14:17.550575 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-12T18:14:17.552564136Z I0312 18:14:17.550631 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-12T18:14:17.552564136Z I0312 18:14:17.550641 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-12T18:14:17.769600399Z I0312 18:14:17.767252 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-03-12T18:14:47.767702134Z I0312 18:14:47.767606 1 cmd.go:524] Getting installer pods for node master-0 2026-03-12T18:15:01.769011924Z F0312 18:15:01.768873 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-kube-scheduler/installer-4-master-0.json0000640000000000000000000001643015154601571022656 0ustar0000000000000000{"metadata":{"name":"installer-4-master-0","namespace":"openshift-kube-scheduler","uid":"7542f3f1-23fe-41df-99b9-4324c75d35b7","resourceVersion":"8840","creationTimestamp":"2026-03-12T18:14:12Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.52/23\"],\"mac_address\":\"0a:58:0a:80:00:34\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.52/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.52\"\n ],\n \"mac\": \"0a:58:0a:80:00:34\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-4","uid":"f19daad6-a1e4-459f-a217-729a431184be"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","command":["cluster-kube-scheduler-operator","installer"],"args":["-v=2","--revision=4","--namespace=openshift-kube-scheduler","--pod=kube-scheduler-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-scheduler-pod","--configmaps=config","--configmaps=serviceaccount-ca","--optional-configmaps=policy-configmap","--configmaps=scheduler-kubeconfig","--configmaps=kube-scheduler-cert-syncer-kubeconfig","--optional-secrets=serving-cert","--secrets=localhost-recovery-client-token","--cert-dir=/etc/kubernetes/static-pod-resources/kube-scheduler-certs","--cert-secrets=kube-scheduler-client-cert-key"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:16:43Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:14:12Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:16:41Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:16:41Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:14:12Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.52","podIPs":[{"ip":"10.128.0.52"}],"startTime":"2026-03-12T18:14:12Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"s: ([]string) (len=1 cap=1) {\n (string) (len=31) \"localhost-recovery-client-token\"\n },\n OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=12) \"serving-cert\"\n },\n ConfigMapNamePrefixes: ([]string) (len=5 cap=8) {\n (string) (len=18) \"kube-scheduler-pod\",\n (string) (len=6) \"config\",\n (string) (len=17) \"serviceaccount-ca\",\n (string) (len=20) \"scheduler-kubeconfig\",\n (string) (len=37) \"kube-scheduler-cert-syncer-kubeconfig\"\n },\n OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=16) \"policy-configmap\"\n },\n CertSecretNames: ([]string) (len=1 cap=1) {\n (string) (len=30) \"kube-scheduler-client-cert-key\"\n },\n OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\n CertConfigMapNamePrefixes: ([]string) \u003cnil\u003e,\n OptionalCertConfigMapNamePrefixes: ([]string) \u003cnil\u003e,\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-scheduler-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0312 18:14:17.539252 1 cmd.go:413] Getting controller reference for node master-0\nI0312 18:14:17.550575 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0312 18:14:17.550631 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0312 18:14:17.550641 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0312 18:14:17.767252 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0312 18:14:47.767606 1 cmd.go:524] Getting installer pods for node master-0\nF0312 18:15:01.768873 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","startedAt":"2026-03-12T18:14:17Z","finishedAt":"2026-03-12T18:15:01Z","containerID":"cri-o://e3aea0a79706e5d2ced89ea30c6dab8e3469fe22291b915ce855f44fa68a87b6"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","containerID":"cri-o://e3aea0a79706e5d2ced89ea30c6dab8e3469fe22291b915ce855f44fa68a87b6","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}config/pod/kube-system/logs/bootstrap-kube-scheduler-master-0/kube-scheduler_current.log0000640000000000000000000004412715154601571030232 0ustar00000000000000002026-03-12T18:15:46.290127835Z - name: NodeResourcesFit 2026-03-12T18:15:46.290127835Z weight: 1 2026-03-12T18:15:46.290127835Z - name: VolumeRestrictions 2026-03-12T18:15:46.290127835Z weight: 0 2026-03-12T18:15:46.290127835Z - name: NodeVolumeLimits 2026-03-12T18:15:46.290127835Z weight: 0 2026-03-12T18:15:46.290127835Z - name: VolumeBinding 2026-03-12T18:15:46.290127835Z weight: 0 2026-03-12T18:15:46.290127835Z - name: VolumeZone 2026-03-12T18:15:46.290127835Z weight: 0 2026-03-12T18:15:46.290127835Z - name: PodTopologySpread 2026-03-12T18:15:46.290127835Z weight: 2 2026-03-12T18:15:46.290127835Z - name: InterPodAffinity 2026-03-12T18:15:46.290127835Z weight: 2 2026-03-12T18:15:46.290127835Z - name: DefaultPreemption 2026-03-12T18:15:46.290127835Z weight: 0 2026-03-12T18:15:46.290127835Z - name: NodeResourcesBalancedAllocation 2026-03-12T18:15:46.290127835Z weight: 1 2026-03-12T18:15:46.290127835Z - name: ImageLocality 2026-03-12T18:15:46.290127835Z weight: 1 2026-03-12T18:15:46.290127835Z - name: DefaultBinder 2026-03-12T18:15:46.290127835Z weight: 0 2026-03-12T18:15:46.290127835Z permit: {} 2026-03-12T18:15:46.290127835Z postBind: {} 2026-03-12T18:15:46.290127835Z postFilter: {} 2026-03-12T18:15:46.290127835Z preBind: {} 2026-03-12T18:15:46.290127835Z preEnqueue: {} 2026-03-12T18:15:46.290127835Z preFilter: {} 2026-03-12T18:15:46.290127835Z preScore: {} 2026-03-12T18:15:46.290127835Z queueSort: {} 2026-03-12T18:15:46.290127835Z reserve: {} 2026-03-12T18:15:46.290127835Z score: {} 2026-03-12T18:15:46.290127835Z schedulerName: default-scheduler 2026-03-12T18:15:46.290127835Z > 2026-03-12T18:15:46.291471849Z I0312 18:15:46.291406 1 server.go:172] "Starting Kubernetes Scheduler" version="v1.31.14" 2026-03-12T18:15:46.291471849Z I0312 18:15:46.291423 1 server.go:174] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" 2026-03-12T18:15:46.293558662Z I0312 18:15:46.293436 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-12T18:15:46.293558662Z I0312 18:15:46.293516 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" certDetail="\"localhost@1773339286\" [serving] validServingFor=[127.0.0.1,localhost,localhost] issuer=\"localhost-ca@1773339285\" (2026-03-12 17:14:45 +0000 UTC to 2027-03-12 17:14:45 +0000 UTC (now=2026-03-12 18:15:46.293495301 +0000 UTC))" 2026-03-12T18:15:46.293607843Z I0312 18:15:46.293573 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" 2026-03-12T18:15:46.293673925Z I0312 18:15:46.293617 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-12T18:15:46.293781138Z I0312 18:15:46.293660 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773339286\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773339286\" (2026-03-12 17:14:46 +0000 UTC to 2029-03-12 17:14:46 +0000 UTC (now=2026-03-12 18:15:46.293645044 +0000 UTC))" 2026-03-12T18:15:46.293781138Z I0312 18:15:46.293773 1 secure_serving.go:213] Serving securely on [::]:10259 2026-03-12T18:15:46.293870180Z I0312 18:15:46.293820 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-12T18:15:46.302171800Z I0312 18:15:46.301709 1 reflector.go:368] Caches populated for *v1.ReplicationController from k8s.io/client-go/informers/factory.go:160 2026-03-12T18:15:46.302738754Z I0312 18:15:46.302661 1 reflector.go:368] Caches populated for *v1.Node from k8s.io/client-go/informers/factory.go:160 2026-03-12T18:15:46.302830286Z I0312 18:15:46.302777 1 reflector.go:368] Caches populated for *v1.PersistentVolume from k8s.io/client-go/informers/factory.go:160 2026-03-12T18:15:46.303049642Z I0312 18:15:46.302964 1 reflector.go:368] Caches populated for *v1.ConfigMap from runtime/asm_amd64.s:1695 2026-03-12T18:15:46.303049642Z I0312 18:15:46.303021 1 node_tree.go:65] "Added node in listed group to NodeTree" node="master-0" zone="" 2026-03-12T18:15:46.304726054Z I0312 18:15:46.304691 1 reflector.go:368] Caches populated for *v1.StorageClass from k8s.io/client-go/informers/factory.go:160 2026-03-12T18:15:46.305732920Z I0312 18:15:46.305145 1 reflector.go:368] Caches populated for *v1.PodDisruptionBudget from k8s.io/client-go/informers/factory.go:160 2026-03-12T18:15:46.305951885Z I0312 18:15:46.305895 1 reflector.go:368] Caches populated for *v1.CSINode from k8s.io/client-go/informers/factory.go:160 2026-03-12T18:15:46.306046668Z I0312 18:15:46.305980 1 reflector.go:368] Caches populated for *v1.PersistentVolumeClaim from k8s.io/client-go/informers/factory.go:160 2026-03-12T18:15:46.306046668Z I0312 18:15:46.306031 1 reflector.go:368] Caches populated for *v1.CSIDriver from k8s.io/client-go/informers/factory.go:160 2026-03-12T18:15:46.306133780Z I0312 18:15:46.306096 1 reflector.go:368] Caches populated for *v1.CSIStorageCapacity from k8s.io/client-go/informers/factory.go:160 2026-03-12T18:15:46.306216082Z I0312 18:15:46.306162 1 reflector.go:368] Caches populated for *v1.VolumeAttachment from k8s.io/client-go/informers/factory.go:160 2026-03-12T18:15:46.306702474Z I0312 18:15:46.306485 1 reflector.go:368] Caches populated for *v1.StatefulSet from k8s.io/client-go/informers/factory.go:160 2026-03-12T18:15:46.311846174Z I0312 18:15:46.311757 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go/informers/factory.go:160 2026-03-12T18:15:46.312850960Z I0312 18:15:46.312761 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go/informers/factory.go:160 2026-03-12T18:15:46.320209836Z I0312 18:15:46.320125 1 reflector.go:368] Caches populated for *v1.ReplicaSet from k8s.io/client-go/informers/factory.go:160 2026-03-12T18:15:46.325010307Z I0312 18:15:46.324933 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go/informers/factory.go:160 2026-03-12T18:15:46.394769849Z I0312 18:15:46.394680 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-12T18:15:46.394807060Z I0312 18:15:46.394760 1 leaderelection.go:254] attempting to acquire leader lease kube-system/kube-scheduler... 2026-03-12T18:15:46.395573260Z I0312 18:15:46.395363 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-12 17:55:27 +0000 UTC to 2036-03-09 17:55:27 +0000 UTC (now=2026-03-12 18:15:46.395326963 +0000 UTC))" 2026-03-12T18:15:46.395573260Z I0312 18:15:46.395489 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-12 18:02:20 +0000 UTC to 2026-03-13 18:02:20 +0000 UTC (now=2026-03-12 18:15:46.395477397 +0000 UTC))" 2026-03-12T18:15:46.395652772Z I0312 18:15:46.395557 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-12 18:02:20 +0000 UTC to 2027-03-12 18:02:20 +0000 UTC (now=2026-03-12 18:15:46.395509928 +0000 UTC))" 2026-03-12T18:15:46.395652772Z I0312 18:15:46.395595 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-12 18:02:20 +0000 UTC to 2027-03-12 18:02:20 +0000 UTC (now=2026-03-12 18:15:46.39558065 +0000 UTC))" 2026-03-12T18:15:46.395652772Z I0312 18:15:46.395629 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-12 18:02:18 +0000 UTC to 2036-03-09 18:02:18 +0000 UTC (now=2026-03-12 18:15:46.395615841 +0000 UTC))" 2026-03-12T18:15:46.396014541Z I0312 18:15:46.395955 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" certDetail="\"localhost@1773339286\" [serving] validServingFor=[127.0.0.1,localhost,localhost] issuer=\"localhost-ca@1773339285\" (2026-03-12 17:14:45 +0000 UTC to 2027-03-12 17:14:45 +0000 UTC (now=2026-03-12 18:15:46.395936439 +0000 UTC))" 2026-03-12T18:15:46.396250567Z I0312 18:15:46.396206 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773339286\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773339286\" (2026-03-12 17:14:46 +0000 UTC to 2029-03-12 17:14:46 +0000 UTC (now=2026-03-12 18:15:46.396188565 +0000 UTC))" 2026-03-12T18:15:51.395944443Z E0312 18:15:51.395846 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T18:15:58.853949450Z E0312 18:15:58.853797 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T18:16:07.444312698Z E0312 18:16:07.444229 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T18:16:16.827209927Z E0312 18:16:16.827071 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T18:16:26.177921233Z E0312 18:16:26.177747 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T18:16:34.108411763Z E0312 18:16:34.108275 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T18:16:43.272337080Z E0312 18:16:43.272223 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T18:16:52.396840643Z E0312 18:16:52.396704 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T18:17:01.679132099Z E0312 18:17:01.679002 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T18:17:10.994961280Z E0312 18:17:10.994902 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T18:17:18.441933898Z E0312 18:17:18.441827 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T18:17:25.462065853Z E0312 18:17:25.461997 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T18:17:33.190796203Z E0312 18:17:33.190713 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T18:17:57.014632960Z I0312 18:17:57.014489 1 leaderelection.go:268] successfully acquired lease kube-system/kube-scheduler 2026-03-12T18:17:57.015015970Z I0312 18:17:57.014956 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress/router-default-79f8cd6fdd-79bhf" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T18:17:57.015167433Z I0312 18:17:57.015089 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497-tzgs9" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T18:17:57.015316517Z I0312 18:17:57.015249 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-network-diagnostics/network-check-source-7c67b67d47-g4dkj" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T18:17:57.024314484Z I0312 18:17:57.024244 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-operators-d5tcw" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:17:58.958209337Z I0312 18:17:58.949890 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-credential-operator/cloud-credential-operator-55d85b7b47-vk7lr" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:17:58.958209337Z I0312 18:17:58.950125 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-machine-approver/machine-approver-955fcfb87-dt8x2" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:17:58.958209337Z I0312 18:17:58.950243 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-samples-operator/cluster-samples-operator-664cb58b85-8762n" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:17:59.067989424Z I0312 18:17:59.066455 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-insights/insights-operator-8f89dfddd-m6z6d" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:17:59.067989424Z I0312 18:17:59.066893 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/cluster-storage-operator-6fbfc8dc8f-88gzm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:17:59.067989424Z I0312 18:17:59.066964 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945-n426c" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:17:59.157306506Z I0312 18:17:59.155231 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/cluster-baremetal-operator-5cdb4c5598-2psgb" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:17:59.160570818Z I0312 18:17:59.159301 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-admission-controller-7769569c45-dq2gs" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:17:59.160570818Z I0312 18:17:59.159471 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/machine-api-operator-84bf6db4f9-gnrzd" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:17:59.160570818Z I0312 18:17:59.159605 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/cluster-autoscaler-operator-69576476f7-hkfnq" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:17:59.160570818Z I0312 18:17:59.159756 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-operator-fdb5c78b5-xbfrg" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:17:59.245181411Z I0312 18:17:59.245103 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/packageserver-694648486f-f89lc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:18:03.523327563Z I0312 18:18:03.522687 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-daemon-mfv5x" node="master-0" evaluatedNodes=1 feasibleNodes=1 config/pod/kube-system/logs/bootstrap-kube-scheduler-master-0/kube-scheduler_previous.log0000640000000000000000000006636615154601571030435 0ustar00000000000000002026-03-12T18:11:02.287176016Z I0312 18:11:02.287028 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/network-operator-7c649bf6d4-vksss" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:11:02.377589957Z I0312 18:11:02.377453 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress-operator/ingress-operator-677db989d6-4527l" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T18:11:02.478084409Z I0312 18:11:02.477956 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/package-server-manager-854648ff6d-kwv7s" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T18:11:02.574970418Z I0312 18:11:02.574768 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-marketplace/marketplace-operator-64bf9778cb-clkx5" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T18:11:02.676375322Z I0312 18:11:02.676242 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/olm-operator-d64cfc9db-npt4r" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T18:11:02.778079355Z I0312 18:11:02.777998 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-storage-version-migrator-operator/kube-storage-version-migrator-operator-7f65c457f5-2xr98" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T18:11:02.875929799Z I0312 18:11:02.875841 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-service-ca-operator/service-ca-operator-69b6fc6b88-9xlgl" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T18:11:02.972326105Z I0312 18:11:02.972262 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/catalog-operator-7d9c49f57b-pslh7" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T18:11:03.075134237Z I0312 18:11:03.075033 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-olm-operator/cluster-olm-operator-77899cf6d-6nvn4" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T18:11:03.175865315Z I0312 18:11:03.175814 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-authentication-operator/authentication-operator-7c6989d6c4-ljw8b" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T18:11:03.286177151Z I0312 18:11:03.286025 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-version/cluster-version-operator-745944c6b7-cxwmx" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:11:03.377471015Z I0312 18:11:03.377368 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-storage-operator/csi-snapshot-controller-operator-5685fbc7d-649db" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T18:11:03.475576395Z I0312 18:11:03.475418 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-dns-operator/dns-operator-589895fbb7-jqj5k" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T18:11:03.573849550Z I0312 18:11:03.573695 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-etcd-operator/etcd-operator-5884b9cd56-bfq7b" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T18:11:03.674013253Z I0312 18:11:03.673935 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-66c7586884-lqpbp" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T18:11:03.774894885Z I0312 18:11:03.774786 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-apiserver-operator/openshift-apiserver-operator-799b6db4d7-6qlzz" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T18:11:03.874982887Z I0312 18:11:03.874812 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-apiserver-operator/kube-apiserver-operator-68bd585b-ddsbn" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T18:11:03.976997238Z I0312 18:11:03.976873 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-image-registry/cluster-image-registry-operator-86d6d77c7c-l4krq" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T18:11:04.074507913Z I0312 18:11:04.074353 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-controller-manager-operator/kube-controller-manager-operator-86d7cdfdfb-w7xvp" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T18:11:04.177324625Z I0312 18:11:04.177221 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-config-operator/openshift-config-operator-64488f9d78-tjp2j" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T18:11:04.275563619Z I0312 18:11:04.275381 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager-operator/openshift-controller-manager-operator-8565d84698-m6hsp" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T18:11:04.319221649Z I0312 18:11:04.319106 1 schedule_one.go:314] "Successfully bound pod to node" pod="assisted-installer/assisted-installer-controller-g257x" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:11:41.458314704Z I0312 18:11:41.457957 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/mtu-prober-62lqd" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:11:56.636786067Z I0312 18:11:56.635677 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-656l8" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:11:57.361651517Z I0312 18:11:57.360111 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-additional-cni-plugins-lv8hk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:11:57.603832308Z I0312 18:11:57.603734 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/network-metrics-daemon-z4sc9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:11:58.636935406Z I0312 18:11:58.636867 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-multus/multus-admission-controller-8d675b596-kcpg5" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T18:12:08.038472209Z I0312 18:12:08.038385 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-control-plane-66b55d57d-w7wj9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:12:08.259610240Z I0312 18:12:08.259379 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-node-xwvdd" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:12:10.235880684Z I0312 18:12:10.235799 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-network-diagnostics/network-check-source-7c67b67d47-g4dkj" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T18:12:11.233102603Z I0312 18:12:11.233037 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-diagnostics/network-check-target-cpthp" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:12:13.833935014Z I0312 18:12:13.833850 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-node-identity/network-node-identity-hqrqt" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:12:41.595978536Z I0312 18:12:41.594909 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-node-hx8q8" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:13:05.782347898Z I0312 18:13:05.782212 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ingress-operator/ingress-operator-677db989d6-4527l" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:13:05.786170556Z I0312 18:13:05.786107 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/cluster-monitoring-operator-674cbfbd9d-fz79c" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:13:05.787406417Z I0312 18:13:05.787353 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-apiserver-operator/kube-apiserver-operator-68bd585b-ddsbn" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:13:05.787623723Z I0312 18:13:05.787583 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns-operator/dns-operator-589895fbb7-jqj5k" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:13:05.787785357Z I0312 18:13:05.787749 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/olm-operator-d64cfc9db-npt4r" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:13:05.788023553Z I0312 18:13:05.787954 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-5c74bfc494-dpb6k" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:13:05.788173757Z I0312 18:13:05.788113 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/csi-snapshot-controller-operator-5685fbc7d-649db" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:13:05.788258859Z I0312 18:13:05.788222 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-admission-controller-8d675b596-kcpg5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:13:05.788258859Z I0312 18:13:05.788220 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-olm-operator/cluster-olm-operator-77899cf6d-6nvn4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:13:05.788330721Z I0312 18:13:05.788296 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-authentication-operator/authentication-operator-7c6989d6c4-ljw8b" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:13:05.788353151Z I0312 18:13:05.788334 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-storage-version-migrator-operator/kube-storage-version-migrator-operator-7f65c457f5-2xr98" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:13:05.788449894Z I0312 18:13:05.788414 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-controller-manager-operator/kube-controller-manager-operator-86d7cdfdfb-w7xvp" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:13:05.788476924Z I0312 18:13:05.788464 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/package-server-manager-854648ff6d-kwv7s" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:13:05.788670449Z I0312 18:13:05.788609 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-66c7586884-lqpbp" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:13:05.788711490Z I0312 18:13:05.788697 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-image-registry/cluster-image-registry-operator-86d6d77c7c-l4krq" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:13:05.788806603Z I0312 18:13:05.788750 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-config-operator/openshift-config-operator-64488f9d78-tjp2j" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:13:05.788828883Z I0312 18:13:05.788802 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager-operator/openshift-controller-manager-operator-8565d84698-m6hsp" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:13:05.788882105Z I0312 18:13:05.788850 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver-operator/openshift-apiserver-operator-799b6db4d7-6qlzz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:13:05.788920206Z I0312 18:13:05.788903 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-service-ca-operator/service-ca-operator-69b6fc6b88-9xlgl" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:13:05.789009318Z I0312 18:13:05.788950 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/marketplace-operator-64bf9778cb-clkx5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:13:05.789066579Z I0312 18:13:05.789034 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-etcd-operator/etcd-operator-5884b9cd56-bfq7b" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:13:05.789106480Z I0312 18:13:05.789089 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/catalog-operator-7d9c49f57b-pslh7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:13:07.127227830Z I0312 18:13:07.125249 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/iptables-alerter-4k8wm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:13:24.316959370Z I0312 18:13:24.313450 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/csi-snapshot-controller-7577d6f48-2ltx9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:13:25.495371764Z I0312 18:13:25.495286 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-6f7fd6c796-hv2zw" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:13:25.634063376Z I0312 18:13:25.633985 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-storage-version-migrator/migrator-57ccdf9b5-w72wh" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:13:26.663167737Z I0312 18:13:26.663097 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-5b45cc45cc-kjvgg" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:13:26.674377212Z I0312 18:13:26.674324 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-5ff9688f8-27hlj" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-12T18:13:26.877879084Z I0312 18:13:26.876507 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-service-ca/service-ca-84bfdbbb7f-769nb" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:13:27.953665635Z I0312 18:13:27.916841 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-5ff9688f8-27hlj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:13:28.541555654Z I0312 18:13:28.539337 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-5cc4c76f78-8gkkj" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-12T18:13:30.241295960Z I0312 18:13:30.241053 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-5cc4c76f78-8gkkj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:13:40.069255010Z I0312 18:13:40.069203 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver/apiserver-85689756c5-8jg6d" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:13:43.386355287Z I0312 18:13:43.386300 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-apiserver/apiserver-5786c989f8-f6jgb" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-12T18:13:44.831601894Z I0312 18:13:44.831545 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-5c597958db-cclsx" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-12T18:13:44.845575890Z I0312 18:13:44.845508 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-5cd7bb8bd9-qb8ht" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-12T18:13:45.396074497Z I0312 18:13:45.396027 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver/apiserver-5786c989f8-f6jgb" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:13:46.814773259Z I0312 18:13:46.814702 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-5cd7bb8bd9-qb8ht" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:13:46.819207522Z I0312 18:13:46.819082 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-5c597958db-cclsx" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:13:47.675188055Z I0312 18:13:47.675055 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-node-tuning-operator/tuned-c6qmx" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:13:48.261227017Z I0312 18:13:48.259777 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns/dns-default-6h5tt" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:13:48.642117037Z I0312 18:13:48.640757 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns/node-resolver-7lzgx" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:13:48.700101194Z I0312 18:13:48.699987 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress/router-default-79f8cd6fdd-79bhf" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T18:13:50.316576425Z I0312 18:13:50.315665 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-catalogd/catalogd-controller-manager-7f8b8b6f4c-mb6tc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:13:50.422078546Z I0312 18:13:50.421443 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-controller/operator-controller-controller-manager-6598bfb6c4-9nzsn" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:14:04.927453629Z I0312 18:14:04.927310 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-5b55d98459-sr4hk" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-12T18:14:05.029307516Z I0312 18:14:05.029244 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-79884f6cc-tpdsd" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-12T18:14:07.294284840Z I0312 18:14:07.294227 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-oauth-apiserver/apiserver-6cb976c975-4sxlg" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:14:09.836178174Z I0312 18:14:09.834219 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-5b55d98459-sr4hk" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-12T18:14:09.836178174Z I0312 18:14:09.834481 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-79884f6cc-tpdsd" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-12T18:14:10.191278691Z I0312 18:14:10.190599 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-version/cluster-version-operator-8c9c967c7-m885k" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:14:11.409571525Z I0312 18:14:11.409497 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497-tzgs9" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T18:14:11.561215003Z I0312 18:14:11.561097 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-operators-4s28n" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:14:12.147635485Z I0312 18:14:12.147082 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/certified-operators-2vwn7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:14:12.349855362Z I0312 18:14:12.348996 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-5b55d98459-sr4hk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:14:12.349855362Z I0312 18:14:12.349229 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-79884f6cc-tpdsd" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:14:13.164572451Z I0312 18:14:13.162492 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/community-operators-67j2w" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:14:14.559764052Z I0312 18:14:14.558255 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-marketplace-ttgsx" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:14:17.748331721Z I0312 18:14:17.748113 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/certified-operators-6jhwp" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:14:21.726868742Z I0312 18:14:21.726818 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/community-operators-nmmwm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:14:27.535723457Z I0312 18:14:27.533504 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-marketplace-ggkqg" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:14:27.663266475Z I0312 18:14:27.662807 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/control-plane-machine-set-operator-6686554ddc-zd9gm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T18:14:34.580620575Z E0312 18:14:34.575700 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers), falling back to slow path 2026-03-12T18:14:39.576203137Z E0312 18:14:39.576122 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T18:14:39.576371221Z I0312 18:14:39.576333 1 leaderelection.go:297] failed to renew lease kube-system/kube-scheduler: timed out waiting for the condition 2026-03-12T18:14:44.577616207Z E0312 18:14:44.577509 1 leaderelection.go:322] Failed to release lock: Put "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T18:14:44.577647347Z E0312 18:14:44.577615 1 server.go:309] "Leaderelection lost" config/pod/kube-system/bootstrap-kube-scheduler-master-0.json0000640000000000000000000000705515154601571023011 0ustar0000000000000000{"metadata":{"name":"bootstrap-kube-scheduler-master-0","namespace":"kube-system","uid":"1bfd33d4-47b3-49d7-b323-660cf35b7d89","resourceVersion":"8810","creationTimestamp":"2026-03-12T18:12:01Z","labels":{"openshift.io/component":"scheduler","openshift.io/control-plane":"true"},"annotations":{"kubernetes.io/config.hash":"a1a56802af72ce1aac6b5077f1695ac0","kubernetes.io/config.mirror":"a1a56802af72ce1aac6b5077f1695ac0","kubernetes.io/config.seen":"2026-03-12T18:10:21.110676581Z","kubernetes.io/config.source":"file","openshift.io/run-level":"0","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"2b794e11-4c79-4c26-ab97-24c47eefd23d","controller":true}]},"spec":{"volumes":[{"name":"secrets","hostPath":{"path":"/etc/kubernetes/bootstrap-secrets","type":""}},{"name":"logs","hostPath":{"path":"/var/log/bootstrap-control-plane","type":""}}],"containers":[{"name":"kube-scheduler","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","command":["hyperkube","kube-scheduler"],"args":["--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--leader-elect=true","--cert-dir=/var/run/kubernetes","--authentication-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--v=2"],"resources":{"requests":{"cpu":"15m","memory":"50Mi"}},"volumeMounts":[{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priority":0,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:20Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:20Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:14:46Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:14:46Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:20Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-12T18:13:20Z","containerStatuses":[{"name":"kube-scheduler","state":{"running":{"startedAt":"2026-03-12T18:14:45Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","startedAt":"2026-03-12T18:10:36Z","finishedAt":"2026-03-12T18:14:44Z","containerID":"cri-o://7905195025f5bcb8de89213d12f95430c8990ba81078908548bc95e6c97e2325"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","containerID":"cri-o://ab77ac8c9287ab57ea2a467e8e1f1dee411c2f94f5642f785b9b7baa2542752b","started":true}],"qosClass":"Burstable"}}kube-controller-manager-operator_current.log0000640000000000000000000001020415154601571044620 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-86d7cdfdfb-w7xvp2026-03-12T18:16:42.471461719Z I0312 18:16:42.471164 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-12T18:16:42.471461719Z I0312 18:16:42.471282 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-12T18:16:42.471926611Z I0312 18:16:42.471807 1 observer_polling.go:159] Starting file observer 2026-03-12T18:17:37.392318173Z I0312 18:17:37.392211 1 builder.go:304] kube-controller-manager-operator version 4.18.0-202602162248.p2.g6347fc8.assembly.stream.el9-6347fc8-6347fc8179b2a04d51c99432ae612bf4df595dc0 2026-03-12T18:17:38.573675795Z I0312 18:17:38.571054 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-12T18:17:38.573675795Z W0312 18:17:38.571122 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-12T18:17:38.573675795Z W0312 18:17:38.571135 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-12T18:17:38.573675795Z W0312 18:17:38.571142 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-12T18:17:38.573675795Z W0312 18:17:38.571153 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-12T18:17:38.573675795Z W0312 18:17:38.571157 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-12T18:17:38.573675795Z W0312 18:17:38.571163 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-12T18:17:38.597924757Z I0312 18:17:38.597877 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-12T18:17:38.598041290Z I0312 18:17:38.598030 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-12T18:17:38.598077670Z I0312 18:17:38.598069 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-12T18:17:38.598157042Z I0312 18:17:38.598131 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-12T18:17:38.598283156Z I0312 18:17:38.598271 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-12T18:17:38.598397438Z I0312 18:17:38.598386 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-12T18:17:38.598422559Z I0312 18:17:38.598414 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-12T18:17:38.598453380Z I0312 18:17:38.598444 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-12T18:17:38.598475360Z I0312 18:17:38.598467 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-12T18:17:38.614089364Z I0312 18:17:38.614006 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-12T18:17:38.614645018Z I0312 18:17:38.614621 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-controller-manager-operator/kube-controller-manager-operator-lock... 2026-03-12T18:17:38.700439911Z I0312 18:17:38.700393 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-12T18:17:38.700573574Z I0312 18:17:38.700557 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-12T18:17:38.700667457Z I0312 18:17:38.700634 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file kube-controller-manager-operator_previous.log0000640000000000000000000004646615154601571045035 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-86d7cdfdfb-w7xvp2026-03-12T18:14:58.609893594Z I0312 18:14:58.609815 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2026-03-12T18:14:58.609916074Z I0312 18:14:58.609897 1 base_controller.go:181] Shutting down TargetConfigController ... 2026-03-12T18:14:58.609951235Z I0312 18:14:58.609838 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2026-03-12T18:14:58.610031017Z I0312 18:14:58.609995 1 base_controller.go:181] Shutting down MissingStaticPodController ... 2026-03-12T18:14:58.610068308Z I0312 18:14:58.610042 1 base_controller.go:181] Shutting down kube-controller-manager-operator-UnsupportedConfigOverrides ... 2026-03-12T18:14:58.610081578Z I0312 18:14:58.610065 1 base_controller.go:181] Shutting down PruneController ... 2026-03-12T18:14:58.610093919Z I0312 18:14:58.610079 1 base_controller.go:181] Shutting down kube-controller-manager-StaticPodState ... 2026-03-12T18:14:58.612062188Z I0312 18:14:58.611120 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-12T18:14:58.612062188Z I0312 18:14:58.611163 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-12T18:14:58.612062188Z I0312 18:14:58.611229 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-12T18:14:58.612062188Z I0312 18:14:58.611241 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-12T18:14:58.612062188Z I0312 18:14:58.611252 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-12T18:14:58.612062188Z I0312 18:14:58.611376 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-12T18:14:58.612062188Z I0312 18:14:58.611393 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-12T18:14:58.612062188Z I0312 18:14:58.611407 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-12T18:14:58.612062188Z I0312 18:14:58.611765 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-2308256010/tls.crt::/tmp/serving-cert-2308256010/tls.key" 2026-03-12T18:14:58.612062188Z I0312 18:14:58.611959 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-12T18:14:58.612062188Z I0312 18:14:58.611968 1 builder.go:335] server exited 2026-03-12T18:14:58.612062188Z I0312 18:14:58.611984 1 base_controller.go:181] Shutting down kube-controller-manager-Node ... 2026-03-12T18:14:58.612062188Z I0312 18:14:58.612034 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-12T18:14:58.612062188Z I0312 18:14:58.612052 1 base_controller.go:181] Shutting down SATokenSignerController ... 2026-03-12T18:14:58.612587792Z E0312 18:14:58.612143 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-12T18:14:58.612587792Z I0312 18:14:58.612258 1 base_controller.go:181] Shutting down kube-controller-manager-InstallerState ... 2026-03-12T18:14:58.612587792Z I0312 18:14:58.612259 1 base_controller.go:181] Shutting down kube-controller-manager ... 2026-03-12T18:14:58.612587792Z I0312 18:14:58.612274 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-12T18:14:58.612587792Z I0312 18:14:58.612277 1 base_controller.go:181] Shutting down KubeControllerManagerStaticResources-StaticResources ... 2026-03-12T18:14:58.612587792Z I0312 18:14:58.612289 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-03-12T18:14:58.612587792Z I0312 18:14:58.612303 1 base_controller.go:181] Shutting down Installer ... 2026-03-12T18:14:58.612587792Z I0312 18:14:58.612453 1 base_controller.go:181] Shutting down CertRotationController ... 2026-03-12T18:14:58.612587792Z I0312 18:14:58.612470 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-12T18:14:58.612587792Z I0312 18:14:58.612493 1 base_controller.go:181] Shutting down StatusSyncer_kube-controller-manager ... 2026-03-12T18:14:58.612587792Z I0312 18:14:58.612500 1 base_controller.go:159] All StatusSyncer_kube-controller-manager post start hooks have been terminated 2026-03-12T18:14:58.612587792Z I0312 18:14:58.612547 1 base_controller.go:181] Shutting down WorkerLatencyProfile ... 2026-03-12T18:14:58.613141486Z I0312 18:14:58.612586 1 base_controller.go:181] Shutting down GarbageCollectorWatcherController ... 2026-03-12T18:14:58.613557996Z I0312 18:14:58.613195 1 base_controller.go:123] Shutting down worker of GarbageCollectorWatcherController controller ... 2026-03-12T18:14:58.613557996Z I0312 18:14:58.613225 1 base_controller.go:113] All GarbageCollectorWatcherController workers have been terminated 2026-03-12T18:14:58.613557996Z I0312 18:14:58.613428 1 base_controller.go:123] Shutting down worker of StatusSyncer_kube-controller-manager controller ... 2026-03-12T18:14:58.613557996Z I0312 18:14:58.613438 1 base_controller.go:113] All StatusSyncer_kube-controller-manager workers have been terminated 2026-03-12T18:14:58.613557996Z I0312 18:14:58.613454 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-12T18:14:58.613557996Z I0312 18:14:58.613463 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-12T18:14:58.613877674Z I0312 18:14:58.613780 1 base_controller.go:123] Shutting down worker of kube-controller-manager controller ... 2026-03-12T18:14:58.613877674Z I0312 18:14:58.613808 1 base_controller.go:113] All kube-controller-manager workers have been terminated 2026-03-12T18:14:58.614589202Z I0312 18:14:58.613915 1 base_controller.go:123] Shutting down worker of WorkerLatencyProfile controller ... 2026-03-12T18:14:58.614589202Z I0312 18:14:58.614048 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-12T18:14:58.614589202Z I0312 18:14:58.614097 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-12T18:14:58.614589202Z I0312 18:14:58.614086 1 base_controller.go:123] Shutting down worker of kube-controller-manager-Node controller ... 2026-03-12T18:14:58.614589202Z I0312 18:14:58.614120 1 base_controller.go:113] All kube-controller-manager-Node workers have been terminated 2026-03-12T18:14:58.614589202Z I0312 18:14:58.614134 1 controller_manager.go:54] kube-controller-manager-Node controller terminated 2026-03-12T18:14:58.614589202Z I0312 18:14:58.614162 1 base_controller.go:181] Shutting down GuardController ... 2026-03-12T18:14:58.614589202Z I0312 18:14:58.614185 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-03-12T18:14:58.614589202Z I0312 18:14:58.614190 1 base_controller.go:113] All WorkerLatencyProfile workers have been terminated 2026-03-12T18:14:58.614589202Z I0312 18:14:58.614198 1 base_controller.go:113] All GuardController workers have been terminated 2026-03-12T18:14:58.614589202Z I0312 18:14:58.614212 1 controller_manager.go:54] GuardController controller terminated 2026-03-12T18:14:58.614589202Z I0312 18:14:58.614226 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-12T18:14:58.614589202Z I0312 18:14:58.614240 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-12T18:14:58.614589202Z I0312 18:14:58.614341 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-12T18:14:58.614589202Z I0312 18:14:58.614365 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-12T18:14:58.614589202Z I0312 18:14:58.614375 1 controller_manager.go:54] RevisionController controller terminated 2026-03-12T18:14:58.614589202Z I0312 18:14:58.614425 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-12T18:14:58.614589202Z I0312 18:14:58.614437 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-12T18:14:58.614589202Z I0312 18:14:58.614445 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-03-12T18:14:58.614699715Z E0312 18:14:58.614641 1 base_controller.go:279] "Unhandled Error" err="kube-controller-manager-InstallerState reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": context canceled" 2026-03-12T18:14:58.614823058Z I0312 18:14:58.614787 1 base_controller.go:123] Shutting down worker of MissingStaticPodController controller ... 2026-03-12T18:14:58.614823058Z I0312 18:14:58.614815 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-03-12T18:14:58.614836808Z I0312 18:14:58.614828 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-03-12T18:14:58.614968832Z I0312 18:14:58.614919 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"6e03f527-5aed-4c7c-a117-ee628a52c534", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'InstallerPodFailed' Failed to create installer pod for revision 2 count 0 on node "master-0": Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods/installer-2-master-0": context canceled 2026-03-12T18:14:58.614968832Z I0312 18:14:58.614943 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-03-12T18:14:58.614985522Z I0312 18:14:58.614972 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-03-12T18:14:58.614985522Z I0312 18:14:58.614982 1 base_controller.go:113] All PruneController workers have been terminated 2026-03-12T18:14:58.614996102Z I0312 18:14:58.614988 1 controller_manager.go:54] PruneController controller terminated 2026-03-12T18:14:58.615005963Z I0312 18:14:58.614979 1 base_controller.go:123] Shutting down worker of kube-controller-manager-operator-UnsupportedConfigOverrides controller ... 2026-03-12T18:14:58.615055044Z I0312 18:14:58.615014 1 base_controller.go:113] All kube-controller-manager-operator-UnsupportedConfigOverrides workers have been terminated 2026-03-12T18:14:58.615081775Z I0312 18:14:58.615060 1 controller_manager.go:54] kube-controller-manager-operator-UnsupportedConfigOverrides controller terminated 2026-03-12T18:14:58.616096990Z E0312 18:14:58.616044 1 base_controller.go:279] "Unhandled Error" err="kube-controller-manager-StaticPodState reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-controller-manager-StaticPodState\": client rate limiter Wait returned an error: context canceled" 2026-03-12T18:14:58.616096990Z I0312 18:14:58.616083 1 base_controller.go:123] Shutting down worker of kube-controller-manager-InstallerState controller ... 2026-03-12T18:14:58.616123621Z I0312 18:14:58.616095 1 base_controller.go:113] All kube-controller-manager-InstallerState workers have been terminated 2026-03-12T18:14:58.616123621Z I0312 18:14:58.616101 1 controller_manager.go:54] kube-controller-manager-InstallerState controller terminated 2026-03-12T18:14:58.618536682Z I0312 18:14:58.618470 1 base_controller.go:123] Shutting down worker of kube-controller-manager-StaticPodState controller ... 2026-03-12T18:14:58.618536682Z I0312 18:14:58.618503 1 base_controller.go:113] All kube-controller-manager-StaticPodState workers have been terminated 2026-03-12T18:14:58.618559413Z I0312 18:14:58.618542 1 controller_manager.go:54] kube-controller-manager-StaticPodState controller terminated 2026-03-12T18:14:58.623572279Z W0312 18:14:58.623463 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerDegraded"].reason is missing; this will eventually be fatal 2026-03-12T18:14:58.623572279Z W0312 18:14:58.623503 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2026-03-12T18:14:58.623572279Z W0312 18:14:58.623546 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-03-12T18:14:58.623682532Z E0312 18:14:58.623616 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: [\"manifests/installer-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/serviceaccounts/installer-sa\": context canceled, \"manifests/installer-cluster-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"BackingResourceController-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-12T18:14:58.623820995Z E0312 18:14:58.623776 1 base_controller.go:279] "Unhandled Error" err="Installer reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-controller-manager-Installer\": client rate limiter Wait returned an error: context canceled" 2026-03-12T18:14:58.623953789Z E0312 18:14:58.623907 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-12T18:14:58.625113268Z I0312 18:14:58.625056 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-03-12T18:14:58.625113268Z I0312 18:14:58.625085 1 base_controller.go:113] All Installer workers have been terminated 2026-03-12T18:14:58.625113268Z I0312 18:14:58.625097 1 controller_manager.go:54] Installer controller terminated 2026-03-12T18:14:58.625142649Z I0312 18:14:58.625114 1 base_controller.go:123] Shutting down worker of SATokenSignerController controller ... 2026-03-12T18:14:58.625142649Z I0312 18:14:58.625125 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-03-12T18:14:58.625142649Z I0312 18:14:58.625135 1 base_controller.go:113] All SATokenSignerController workers have been terminated 2026-03-12T18:14:58.625160279Z I0312 18:14:58.625142 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-03-12T18:14:58.625176130Z I0312 18:14:58.625156 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-12T18:14:58.627542870Z E0312 18:14:58.627450 1 base_controller.go:279] "Unhandled Error" err="KubeControllerManagerStaticResources-StaticResources reconciliation failed: [\"assets/kube-controller-manager/ns.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager\": context canceled, \"assets/kube-controller-manager/leader-election-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/leader-election-cluster-policy-controller-role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/leader-election-cluster-policy-controller-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/namespace-security-allocation-controller-clusterrole.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/namespace-security-allocation-controller-clusterrolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/podsecurity-admission-label-syncer-controller-clusterrole.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/podsecurity-admission-label-syncer-controller-clusterrolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/podsecurity-admission-label-privileged-namespaces-syncer-controller-clusterrole.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/podsecurity-admission-label-privileged-namespaces-syncer-controller-clusterrolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/namespace-openshift-infra.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/svc.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/recycler-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/localhost-recovery-client-crb.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/localhost-recovery-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/csr_approver_clusterrole.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/csr_approver_clusterrolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-binding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/gce/cloud-provider-role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/gce/cloud-provider-binding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"KubeControllerManagerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-12T18:14:58.629442848Z I0312 18:14:58.629268 1 base_controller.go:123] Shutting down worker of KubeControllerManagerStaticResources-StaticResources controller ... 2026-03-12T18:14:58.629442848Z I0312 18:14:58.629284 1 base_controller.go:113] All KubeControllerManagerStaticResources-StaticResources workers have been terminated 2026-03-12T18:15:03.608880931Z I0312 18:15:03.608813 1 observer_polling.go:162] Shutting down file observer 2026-03-12T18:15:32.615085922Z E0312 18:15:32.615020 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-12T18:15:32.615085922Z W0312 18:15:32.615073 1 leaderelection.go:84] leader election lost kube-controller-manager-operator-86d7cdfdfb-w7xvp.json0000640000000000000000000001451015154601571033736 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator{"metadata":{"name":"kube-controller-manager-operator-86d7cdfdfb-w7xvp","generateName":"kube-controller-manager-operator-86d7cdfdfb-","namespace":"openshift-kube-controller-manager-operator","uid":"e720e1d0-5a6d-4b76-8b25-5963e24950f5","resourceVersion":"8848","creationTimestamp":"2026-03-12T18:11:04Z","labels":{"app":"kube-controller-manager-operator","pod-template-hash":"86d7cdfdfb"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.19/23\"],\"mac_address\":\"0a:58:0a:80:00:13\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.19/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.19\"\n ],\n \"mac\": \"0a:58:0a:80:00:13\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-controller-manager-operator-86d7cdfdfb","uid":"ac887d88-dcc5-4277-811a-0606c55832ba","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","command":["cluster-kube-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56"},{"name":"CLUSTER_POLICY_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609"},{"name":"TOOLS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:35768a0c3eb24134dd38633e8acfc7db69ee96b2fd660e9bba3b8c996452fef7"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-controller-manager-operator","serviceAccount":"kube-controller-manager-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:20Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:06Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:17:19Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:17:19Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:05Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.19","podIPs":[{"ip":"10.128.0.19"}],"startTime":"2026-03-12T18:13:06Z","containerStatuses":[{"name":"kube-controller-manager-operator","state":{"running":{"startedAt":"2026-03-12T18:16:42Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-12T18:13:23Z","finishedAt":"2026-03-12T18:15:32Z","containerID":"cri-o://6cbf8532a0aab6166e00e40dafe24b7c97f2d79bb9206285a901edb45142b490"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","containerID":"cri-o://ba030f3020f3f1090c4c425e4d3efed561b91812de9e192e22ab2d5f0f03e899","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-controller-manager-recovery-controller_current.log0000640000000000000000000001711515154601571042050 0ustar0000000000000000config/pod/openshift-kube-controller-manager/logs/kube-controller-manager-master-02026-03-12T18:18:19.390126306Z + timeout 3m /bin/bash -exuo pipefail -c 'while [ -n "$(ss -Htanop \( sport = 9443 \))" ]; do sleep 1; done' 2026-03-12T18:18:19.392967649Z ++ ss -Htanop '(' sport = 9443 ')' 2026-03-12T18:18:19.411610505Z + '[' -n '' ']' 2026-03-12T18:18:19.412244092Z + exec cluster-kube-controller-manager-operator cert-recovery-controller --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig --namespace=openshift-kube-controller-manager --listen=0.0.0.0:9443 -v=2 2026-03-12T18:18:19.458826193Z W0312 18:18:19.458584 1 cmd.go:257] Using insecure, self-signed certificates 2026-03-12T18:18:19.459230103Z I0312 18:18:19.459203 1 crypto.go:601] Generating new CA for cert-recovery-controller-signer@1773339499 cert, and key in /tmp/serving-cert-285196980/serving-signer.crt, /tmp/serving-cert-285196980/serving-signer.key 2026-03-12T18:18:19.694366337Z I0312 18:18:19.694311 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-12T18:18:19.696477221Z I0312 18:18:19.696422 1 observer_polling.go:159] Starting file observer 2026-03-12T18:18:19.696859481Z I0312 18:18:19.696832 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-12T18:18:19.696905012Z I0312 18:18:19.696892 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-12T18:18:19.702578367Z W0312 18:18:19.702121 1 builder.go:272] unable to get owner reference (falling back to namespace): Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/pods": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-12T18:18:19.702578367Z I0312 18:18:19.702281 1 builder.go:304] cert-recovery-controller version 4.18.0-202602162248.p2.g6347fc8.assembly.stream.el9-6347fc8-6347fc8179b2a04d51c99432ae612bf4df595dc0 2026-03-12T18:18:19.705519753Z W0312 18:18:19.705464 1 builder.go:364] unable to get control plane topology, using HA cluster values for leader election: Get "https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-12T18:18:19.705693647Z I0312 18:18:19.705585 1 event.go:377] Event(v1.ObjectReference{Kind:"Namespace", Namespace:"openshift-kube-controller-manager", Name:"openshift-kube-controller-manager", UID:"", APIVersion:"v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'ControlPlaneTopology' unable to get control plane topology, using HA cluster values for leader election: Get "https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-12T18:18:19.705902062Z I0312 18:18:19.705817 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-controller-manager/cert-recovery-controller-lock... 2026-03-12T18:18:19.708834327Z E0312 18:18:19.708808 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-controller-manager.189c2ae1221ca6dd openshift-kube-controller-manager 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-controller-manager,Name:openshift-kube-controller-manager,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-12 18:18:19.705444061 +0000 UTC m=+0.289531437,LastTimestamp:2026-03-12 18:18:19.705444061 +0000 UTC m=+0.289531437,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-03-12T18:18:19.709646778Z E0312 18:18:19.709613 1 leaderelection.go:436] error retrieving resource lock openshift-kube-controller-manager/cert-recovery-controller-lock: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-controller-manager/leases/cert-recovery-controller-lock?timeout=1m47s": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-12T18:18:19.852359008Z E0312 18:18:19.852303 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-controller-manager.189c2ae1221ca6dd openshift-kube-controller-manager 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-controller-manager,Name:openshift-kube-controller-manager,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-12 18:18:19.705444061 +0000 UTC m=+0.289531437,LastTimestamp:2026-03-12 18:18:19.705444061 +0000 UTC m=+0.289531437,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" kube-controller-manager-cert-syncer_current.log0000640000000000000000000002031215154601571040260 0ustar0000000000000000config/pod/openshift-kube-controller-manager/logs/kube-controller-manager-master-02026-03-12T18:18:19.263680133Z I0312 18:18:19.263539 1 base_controller.go:76] Waiting for caches to sync for CertSyncController 2026-03-12T18:18:19.263680133Z I0312 18:18:19.263633 1 observer_polling.go:159] Starting file observer 2026-03-12T18:18:19.269358308Z W0312 18:18:19.269269 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-12T18:18:19.269428040Z E0312 18:18:19.269386 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-12T18:18:19.271444261Z W0312 18:18:19.271370 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-12T18:18:19.271497663Z E0312 18:18:19.271479 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-12T18:18:20.373602200Z W0312 18:18:20.373468 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-12T18:18:20.373602200Z E0312 18:18:20.373532 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-12T18:18:20.790908343Z W0312 18:18:20.790847 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-12T18:18:20.790949344Z E0312 18:18:20.790922 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-12T18:18:22.220319512Z W0312 18:18:22.220206 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-12T18:18:22.220917978Z E0312 18:18:22.220846 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-12T18:18:22.692270673Z W0312 18:18:22.692137 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-12T18:18:22.692332205Z E0312 18:18:22.692303 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-12T18:18:27.325273346Z W0312 18:18:27.325166 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-12T18:18:27.325273346Z E0312 18:18:27.325228 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" cluster-policy-controller_current.log0000640000000000000000000005116515154601571036456 0ustar0000000000000000config/pod/openshift-kube-controller-manager/logs/kube-controller-manager-master-02026-03-12T18:18:14.131070860Z E0312 18:18:14.131048 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-operator-lifecycle-manager" should be enqueued: namespace "openshift-operator-lifecycle-manager" not found 2026-03-12T18:18:14.131124612Z E0312 18:18:14.131093 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-operators" should be enqueued: namespace "openshift-operators" not found 2026-03-12T18:18:14.131198324Z E0312 18:18:14.131174 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-operators" should be enqueued: namespace "openshift-operators" not found 2026-03-12T18:18:14.131253175Z E0312 18:18:14.131232 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-operators" should be enqueued: namespace "openshift-operators" not found 2026-03-12T18:18:14.131309966Z E0312 18:18:14.131289 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-ovirt-infra" should be enqueued: namespace "openshift-ovirt-infra" not found 2026-03-12T18:18:14.131365548Z E0312 18:18:14.131345 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-ovirt-infra" should be enqueued: namespace "openshift-ovirt-infra" not found 2026-03-12T18:18:14.131419359Z E0312 18:18:14.131399 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-ovirt-infra" should be enqueued: namespace "openshift-ovirt-infra" not found 2026-03-12T18:18:14.131471831Z E0312 18:18:14.131451 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-ovn-kubernetes" should be enqueued: namespace "openshift-ovn-kubernetes" not found 2026-03-12T18:18:14.131566153Z E0312 18:18:14.131510 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-ovn-kubernetes" should be enqueued: namespace "openshift-ovn-kubernetes" not found 2026-03-12T18:18:14.131633635Z E0312 18:18:14.131612 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-ovn-kubernetes" should be enqueued: namespace "openshift-ovn-kubernetes" not found 2026-03-12T18:18:14.131697836Z E0312 18:18:14.131677 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-ovn-kubernetes" should be enqueued: namespace "openshift-ovn-kubernetes" not found 2026-03-12T18:18:14.131760268Z E0312 18:18:14.131740 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-ovn-kubernetes" should be enqueued: namespace "openshift-ovn-kubernetes" not found 2026-03-12T18:18:14.131817889Z E0312 18:18:14.131797 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-route-controller-manager" should be enqueued: namespace "openshift-route-controller-manager" not found 2026-03-12T18:18:14.131881981Z E0312 18:18:14.131861 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-route-controller-manager" should be enqueued: namespace "openshift-route-controller-manager" not found 2026-03-12T18:18:14.131935352Z E0312 18:18:14.131915 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-route-controller-manager" should be enqueued: namespace "openshift-route-controller-manager" not found 2026-03-12T18:18:14.131991844Z E0312 18:18:14.131971 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-route-controller-manager" should be enqueued: namespace "openshift-route-controller-manager" not found 2026-03-12T18:18:14.132062866Z E0312 18:18:14.132042 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-service-ca-operator" should be enqueued: namespace "openshift-service-ca-operator" not found 2026-03-12T18:18:14.132201479Z E0312 18:18:14.132125 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-service-ca-operator" should be enqueued: namespace "openshift-service-ca-operator" not found 2026-03-12T18:18:14.132201479Z E0312 18:18:14.132157 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-service-ca-operator" should be enqueued: namespace "openshift-service-ca-operator" not found 2026-03-12T18:18:14.132201479Z E0312 18:18:14.132170 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-service-ca-operator" should be enqueued: namespace "openshift-service-ca-operator" not found 2026-03-12T18:18:14.132201479Z E0312 18:18:14.132187 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-service-ca" should be enqueued: namespace "openshift-service-ca" not found 2026-03-12T18:18:14.132224500Z E0312 18:18:14.132199 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-service-ca" should be enqueued: namespace "openshift-service-ca" not found 2026-03-12T18:18:14.132224500Z E0312 18:18:14.132216 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-service-ca" should be enqueued: namespace "openshift-service-ca" not found 2026-03-12T18:18:14.132241850Z E0312 18:18:14.132227 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-service-ca" should be enqueued: namespace "openshift-service-ca" not found 2026-03-12T18:18:14.132258581Z E0312 18:18:14.132247 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-user-workload-monitoring" should be enqueued: namespace "openshift-user-workload-monitoring" not found 2026-03-12T18:18:14.132284951Z E0312 18:18:14.132272 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-user-workload-monitoring" should be enqueued: namespace "openshift-user-workload-monitoring" not found 2026-03-12T18:18:14.132301662Z E0312 18:18:14.132282 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-user-workload-monitoring" should be enqueued: namespace "openshift-user-workload-monitoring" not found 2026-03-12T18:18:14.132301662Z E0312 18:18:14.132293 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-vsphere-infra" should be enqueued: namespace "openshift-vsphere-infra" not found 2026-03-12T18:18:14.132319032Z E0312 18:18:14.132304 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-vsphere-infra" should be enqueued: namespace "openshift-vsphere-infra" not found 2026-03-12T18:18:14.132335733Z E0312 18:18:14.132315 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-vsphere-infra" should be enqueued: namespace "openshift-vsphere-infra" not found 2026-03-12T18:18:14.132335733Z E0312 18:18:14.132327 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift" should be enqueued: namespace "openshift" not found 2026-03-12T18:18:14.132353153Z E0312 18:18:14.132342 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift" should be enqueued: namespace "openshift" not found 2026-03-12T18:18:14.132376414Z E0312 18:18:14.132355 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift" should be enqueued: namespace "openshift" not found 2026-03-12T18:18:14.292752476Z I0312 18:18:14.292679 1 request.go:700] Waited for 1.196462991s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/api/v1/configmaps?limit=500&resourceVersion=0 2026-03-12T18:18:14.298720238Z I0312 18:18:14.298699 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:14.494488305Z I0312 18:18:14.494401 1 reflector.go:368] Caches populated for *v1.PersistentVolumeClaim from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:14.497263516Z I0312 18:18:14.497228 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:14.523741313Z I0312 18:18:14.523646 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:14.686339162Z W0312 18:18:14.686256 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-12T18:18:14.686339162Z E0312 18:18:14.686300 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-12T18:18:14.694069050Z I0312 18:18:14.694007 1 reflector.go:368] Caches populated for *v1.PodTemplate from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:14.698015191Z I0312 18:18:14.697937 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:14.900112870Z I0312 18:18:14.900012 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:14.988756447Z I0312 18:18:14.988653 1 reflector.go:368] Caches populated for *v1.Secret from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:15.097976870Z I0312 18:18:15.097903 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:15.100394412Z I0312 18:18:15.100347 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:15.102263410Z I0312 18:18:15.102218 1 base_controller.go:74] Caches are synced for namespace-security-allocation-controller 2026-03-12T18:18:15.102263410Z I0312 18:18:15.102237 1 base_controller.go:111] Starting #1 worker of namespace-security-allocation-controller controller ... 2026-03-12T18:18:15.102332012Z I0312 18:18:15.102290 1 namespace_scc_allocation_controller.go:111] Repairing SCC UID Allocations 2026-03-12T18:18:15.196020848Z I0312 18:18:15.195943 1 base_controller.go:74] Caches are synced for pod-security-admission-label-synchronization-controller 2026-03-12T18:18:15.196020848Z I0312 18:18:15.195987 1 base_controller.go:111] Starting #1 worker of pod-security-admission-label-synchronization-controller controller ... 2026-03-12T18:18:15.196068639Z I0312 18:18:15.196030 1 shared_informer.go:320] Caches are synced for privileged-namespaces-psa-label-syncer 2026-03-12T18:18:15.292881425Z I0312 18:18:15.292808 1 request.go:700] Waited for 2.195794s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/api/v1/replicationcontrollers?limit=500&resourceVersion=0 2026-03-12T18:18:15.294495487Z I0312 18:18:15.294453 1 reflector.go:368] Caches populated for *v1.ReplicationController from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:15.297537064Z I0312 18:18:15.297463 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:15.496696348Z I0312 18:18:15.496626 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:15.498975776Z I0312 18:18:15.498924 1 reflector.go:368] Caches populated for *v1.Endpoints from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:15.697656108Z I0312 18:18:15.697559 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:15.897499258Z I0312 18:18:15.897404 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:16.098459228Z I0312 18:18:16.098385 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:16.296092372Z I0312 18:18:16.295757 1 request.go:700] Waited for 3.198611148s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/apis/monitoring.coreos.com/v1/thanosrulers?limit=500&resourceVersion=0 2026-03-12T18:18:16.298131544Z I0312 18:18:16.298050 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:16.498268653Z I0312 18:18:16.498200 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:16.698694060Z I0312 18:18:16.698635 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:16.764966395Z I0312 18:18:16.764911 1 namespace_scc_allocation_controller.go:116] Repair complete 2026-03-12T18:18:16.897816812Z I0312 18:18:16.897748 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:17.097554991Z I0312 18:18:17.097475 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:17.296396437Z I0312 18:18:17.296351 1 request.go:700] Waited for 4.199018615s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/apis/monitoring.coreos.com/v1/podmonitors?limit=500&resourceVersion=0 2026-03-12T18:18:17.297557246Z I0312 18:18:17.297541 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:17.483201775Z W0312 18:18:17.483144 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-12T18:18:17.483201775Z E0312 18:18:17.483190 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-12T18:18:17.498113846Z I0312 18:18:17.498041 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:17.696979212Z I0312 18:18:17.696899 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:17.899180664Z I0312 18:18:17.898938 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:18.096932352Z I0312 18:18:18.096873 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:18.296571178Z I0312 18:18:18.296471 1 request.go:700] Waited for 5.198886388s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/apis/network.operator.openshift.io/v1/egressrouters?limit=500&resourceVersion=0 2026-03-12T18:18:18.297760418Z I0312 18:18:18.297707 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:18.497642850Z I0312 18:18:18.497582 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:18.697485622Z I0312 18:18:18.697427 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:18.896837400Z I0312 18:18:18.896778 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:19.098031676Z I0312 18:18:19.097362 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:19.297256081Z I0312 18:18:19.296526 1 request.go:700] Waited for 6.198768691s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/apis/monitoring.coreos.com/v1/prometheuses?limit=500&resourceVersion=0 2026-03-12T18:18:19.299138949Z I0312 18:18:19.298418 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:19.497607585Z I0312 18:18:19.497497 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:19.698001130Z I0312 18:18:19.697597 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:19.897026581Z I0312 18:18:19.896963 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:20.099466189Z I0312 18:18:20.099391 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:20.296979540Z I0312 18:18:20.296891 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:20.496242777Z I0312 18:18:20.496162 1 request.go:700] Waited for 7.398182127s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/apis/operators.coreos.com/v1alpha1/installplans?limit=500&resourceVersion=0 2026-03-12T18:18:20.497288523Z I0312 18:18:20.497231 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:20.698632163Z I0312 18:18:20.698552 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:20.900089216Z I0312 18:18:20.900005 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:21.097718660Z I0312 18:18:21.097656 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:21.296749061Z I0312 18:18:21.296668 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:21.496372257Z I0312 18:18:21.496303 1 request.go:700] Waited for 8.398196024s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/apis/metal3.io/v1alpha1/preprovisioningimages?limit=500&resourceVersion=0 2026-03-12T18:18:21.497403783Z I0312 18:18:21.497364 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T18:18:21.500895602Z I0312 18:18:21.500862 1 reconciliation_controller.go:224] synced cluster resource quota controller 2026-03-12T18:18:21.508102346Z I0312 18:18:21.508063 1 reconciliation_controller.go:149] Caches are synced 2026-03-12T18:18:22.584663901Z W0312 18:18:22.584565 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-12T18:18:22.584663901Z E0312 18:18:22.584611 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" kube-controller-manager_current.log0000640000000000000000000001134715154601571036034 0ustar0000000000000000config/pod/openshift-kube-controller-manager/logs/kube-controller-manager-master-02026-03-12T18:18:10.720285046Z + timeout 3m /bin/bash -exuo pipefail -c 'while [ -n "$(ss -Htanop \( sport = 10257 \))" ]; do sleep 1; done' 2026-03-12T18:18:10.727290425Z ++ ss -Htanop '(' sport = 10257 ')' 2026-03-12T18:18:10.735492605Z + '[' -n 'TIME-WAIT 0 0 [::ffff:192.168.32.10]:10257 [::ffff:192.168.32.10]:37706 timer:(timewait,32sec,0)' ']' 2026-03-12T18:18:10.735492605Z + sleep 1 2026-03-12T18:18:11.738721473Z ++ ss -Htanop '(' sport = 10257 ')' 2026-03-12T18:18:11.762734798Z + '[' -n 'TIME-WAIT 0 0 [::ffff:192.168.32.10]:10257 [::ffff:192.168.32.10]:37706 timer:(timewait,31sec,0)' ']' 2026-03-12T18:18:11.762734798Z + sleep 1 2026-03-12T18:18:12.766721415Z ++ ss -Htanop '(' sport = 10257 ')' 2026-03-12T18:18:12.776152076Z + '[' -n 'TIME-WAIT 0 0 [::ffff:192.168.32.10]:10257 [::ffff:192.168.32.10]:37706 timer:(timewait,30sec,0)' ']' 2026-03-12T18:18:12.776152076Z + sleep 1 2026-03-12T18:18:13.779123209Z ++ ss -Htanop '(' sport = 10257 ')' 2026-03-12T18:18:13.788168190Z + '[' -n 'TIME-WAIT 0 0 [::ffff:192.168.32.10]:10257 [::ffff:192.168.32.10]:37706 timer:(timewait,29sec,0)' ']' 2026-03-12T18:18:13.788189341Z + sleep 1 2026-03-12T18:18:14.791328047Z ++ ss -Htanop '(' sport = 10257 ')' 2026-03-12T18:18:14.801009605Z + '[' -n 'TIME-WAIT 0 0 [::ffff:192.168.32.10]:10257 [::ffff:192.168.32.10]:37706 timer:(timewait,28sec,0)' ']' 2026-03-12T18:18:14.801033256Z + sleep 1 2026-03-12T18:18:15.804193692Z ++ ss -Htanop '(' sport = 10257 ')' 2026-03-12T18:18:15.815575043Z + '[' -n 'TIME-WAIT 0 0 [::ffff:192.168.32.10]:10257 [::ffff:192.168.32.10]:37706 timer:(timewait,27sec,0)' ']' 2026-03-12T18:18:15.815575043Z + sleep 1 2026-03-12T18:18:16.820066544Z ++ ss -Htanop '(' sport = 10257 ')' 2026-03-12T18:18:16.829693140Z + '[' -n 'TIME-WAIT 0 0 [::ffff:192.168.32.10]:10257 [::ffff:192.168.32.10]:37706 timer:(timewait,26sec,0)' ']' 2026-03-12T18:18:16.829693140Z + sleep 1 2026-03-12T18:18:17.832637272Z ++ ss -Htanop '(' sport = 10257 ')' 2026-03-12T18:18:17.852820128Z + '[' -n 'TIME-WAIT 0 0 [::ffff:192.168.32.10]:10257 [::ffff:192.168.32.10]:37706 timer:(timewait,24sec,0)' ']' 2026-03-12T18:18:17.852820128Z + sleep 1 2026-03-12T18:18:18.856784486Z ++ ss -Htanop '(' sport = 10257 ')' 2026-03-12T18:18:18.868001383Z + '[' -n 'TIME-WAIT 0 0 [::ffff:192.168.32.10]:10257 [::ffff:192.168.32.10]:37706 timer:(timewait,23sec,0)' ']' 2026-03-12T18:18:18.868035194Z + sleep 1 2026-03-12T18:18:19.871091317Z ++ ss -Htanop '(' sport = 10257 ')' 2026-03-12T18:18:19.884716836Z + '[' -n 'TIME-WAIT 0 0 [::ffff:192.168.32.10]:10257 [::ffff:192.168.32.10]:37706 timer:(timewait,22sec,0)' ']' 2026-03-12T18:18:19.884716836Z + sleep 1 2026-03-12T18:18:20.888129680Z ++ ss -Htanop '(' sport = 10257 ')' 2026-03-12T18:18:20.899055689Z + '[' -n 'TIME-WAIT 0 0 [::ffff:192.168.32.10]:10257 [::ffff:192.168.32.10]:37706 timer:(timewait,21sec,0)' ']' 2026-03-12T18:18:20.899055689Z + sleep 1 2026-03-12T18:18:21.903349365Z ++ ss -Htanop '(' sport = 10257 ')' 2026-03-12T18:18:21.912047668Z + '[' -n 'TIME-WAIT 0 0 [::ffff:192.168.32.10]:10257 [::ffff:192.168.32.10]:37706 timer:(timewait,20sec,0)' ']' 2026-03-12T18:18:21.912047668Z + sleep 1 2026-03-12T18:18:22.915064201Z ++ ss -Htanop '(' sport = 10257 ')' 2026-03-12T18:18:22.928909495Z + '[' -n 'TIME-WAIT 0 0 [::ffff:192.168.32.10]:10257 [::ffff:192.168.32.10]:37706 timer:(timewait,19sec,0)' ']' 2026-03-12T18:18:22.928909495Z + sleep 1 2026-03-12T18:18:23.933837567Z ++ ss -Htanop '(' sport = 10257 ')' 2026-03-12T18:18:23.947488816Z + '[' -n 'TIME-WAIT 0 0 [::ffff:192.168.32.10]:10257 [::ffff:192.168.32.10]:37706 timer:(timewait,18sec,0)' ']' 2026-03-12T18:18:23.947638300Z + sleep 1 2026-03-12T18:18:24.951885645Z ++ ss -Htanop '(' sport = 10257 ')' 2026-03-12T18:18:24.960846364Z + '[' -n 'TIME-WAIT 0 0 [::ffff:192.168.32.10]:10257 [::ffff:192.168.32.10]:37706 timer:(timewait,17sec,0)' ']' 2026-03-12T18:18:24.960915846Z + sleep 1 2026-03-12T18:18:25.964601396Z ++ ss -Htanop '(' sport = 10257 ')' 2026-03-12T18:18:25.974055088Z + '[' -n 'TIME-WAIT 0 0 [::ffff:192.168.32.10]:10257 [::ffff:192.168.32.10]:37706 timer:(timewait,16sec,0)' ']' 2026-03-12T18:18:25.974055088Z + sleep 1 2026-03-12T18:18:26.977272346Z ++ ss -Htanop '(' sport = 10257 ')' 2026-03-12T18:18:26.990747140Z + '[' -n 'TIME-WAIT 0 0 [::ffff:192.168.32.10]:10257 [::ffff:192.168.32.10]:37706 timer:(timewait,15sec,0)' ']' 2026-03-12T18:18:26.990830623Z + sleep 1 2026-03-12T18:18:27.993842166Z ++ ss -Htanop '(' sport = 10257 ')' 2026-03-12T18:18:28.013854058Z + '[' -n 'TIME-WAIT 0 0 [::ffff:192.168.32.10]:10257 [::ffff:192.168.32.10]:37706 timer:(timewait,14sec,0)' ']' 2026-03-12T18:18:28.013967501Z + sleep 1 config/pod/openshift-kube-controller-manager/logs/installer-2-master-0/installer_current.log0000640000000000000000000011412515154601571031004 0ustar00000000000000002026-03-12T18:17:35.025103936Z (string) (len=10) "csr-signer" 2026-03-12T18:17:35.025103936Z }, 2026-03-12T18:17:35.025103936Z OptionalCertSecretNamePrefixes: ([]string) , 2026-03-12T18:17:35.025103936Z CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-12T18:17:35.025103936Z (string) (len=20) "aggregator-client-ca", 2026-03-12T18:17:35.025103936Z (string) (len=9) "client-ca" 2026-03-12T18:17:35.025103936Z }, 2026-03-12T18:17:35.025103936Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-12T18:17:35.025103936Z (string) (len=17) "trusted-ca-bundle" 2026-03-12T18:17:35.025103936Z }, 2026-03-12T18:17:35.025103936Z CertDir: (string) (len=66) "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs", 2026-03-12T18:17:35.025103936Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-12T18:17:35.025103936Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-12T18:17:35.025103936Z Timeout: (time.Duration) 2m0s, 2026-03-12T18:17:35.025103936Z StaticPodManifestsLockFile: (string) "", 2026-03-12T18:17:35.025103936Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-12T18:17:35.025103936Z KubeletVersion: (string) "" 2026-03-12T18:17:35.025103936Z }) 2026-03-12T18:17:35.026168093Z I0312 18:17:35.026102 1 cmd.go:413] Getting controller reference for node master-0 2026-03-12T18:17:35.123849585Z I0312 18:17:35.123713 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-12T18:17:35.123849585Z I0312 18:17:35.123803 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-12T18:17:35.123849585Z I0312 18:17:35.123829 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-12T18:17:35.127561179Z I0312 18:17:35.127483 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-03-12T18:18:05.127675048Z I0312 18:18:05.127619 1 cmd.go:524] Getting installer pods for node master-0 2026-03-12T18:18:05.305981923Z I0312 18:18:05.305942 1 cmd.go:542] Latest installer revision for node master-0 is: 2 2026-03-12T18:18:05.306024464Z I0312 18:18:05.306015 1 cmd.go:431] Querying kubelet version for node master-0 2026-03-12T18:18:05.312771164Z I0312 18:18:05.312723 1 cmd.go:444] Got kubelet version 1.31.14 on target node master-0 2026-03-12T18:18:05.312836846Z I0312 18:18:05.312822 1 cmd.go:293] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2" ... 2026-03-12T18:18:05.312971889Z I0312 18:18:05.312960 1 cmd.go:221] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2" ... 2026-03-12T18:18:05.312998410Z I0312 18:18:05.312990 1 cmd.go:229] Getting secrets ... 2026-03-12T18:18:05.321558686Z I0312 18:18:05.317247 1 copy.go:32] Got secret openshift-kube-controller-manager/localhost-recovery-client-token-2 2026-03-12T18:18:05.332832860Z I0312 18:18:05.331825 1 copy.go:32] Got secret openshift-kube-controller-manager/service-account-private-key-2 2026-03-12T18:18:05.339882368Z I0312 18:18:05.339724 1 copy.go:32] Got secret openshift-kube-controller-manager/serving-cert-2 2026-03-12T18:18:05.339882368Z I0312 18:18:05.339752 1 cmd.go:242] Getting config maps ... 2026-03-12T18:18:05.352988938Z I0312 18:18:05.346152 1 copy.go:60] Got configMap openshift-kube-controller-manager/cluster-policy-controller-config-2 2026-03-12T18:18:05.352988938Z I0312 18:18:05.349107 1 copy.go:60] Got configMap openshift-kube-controller-manager/config-2 2026-03-12T18:18:05.352988938Z I0312 18:18:05.350827 1 copy.go:60] Got configMap openshift-kube-controller-manager/controller-manager-kubeconfig-2 2026-03-12T18:18:05.357909882Z I0312 18:18:05.357878 1 copy.go:60] Got configMap openshift-kube-controller-manager/kube-controller-cert-syncer-kubeconfig-2 2026-03-12T18:18:05.365434792Z I0312 18:18:05.363960 1 copy.go:60] Got configMap openshift-kube-controller-manager/kube-controller-manager-pod-2 2026-03-12T18:18:05.365923984Z I0312 18:18:05.365850 1 copy.go:60] Got configMap openshift-kube-controller-manager/recycler-config-2 2026-03-12T18:18:05.530354959Z I0312 18:18:05.530003 1 copy.go:60] Got configMap openshift-kube-controller-manager/service-ca-2 2026-03-12T18:18:05.732359092Z I0312 18:18:05.732291 1 copy.go:60] Got configMap openshift-kube-controller-manager/serviceaccount-ca-2 2026-03-12T18:18:05.929865981Z I0312 18:18:05.929803 1 copy.go:52] Failed to get config map openshift-kube-controller-manager/cloud-config-2: configmaps "cloud-config-2" not found 2026-03-12T18:18:05.929865981Z I0312 18:18:05.929830 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/localhost-recovery-client-token" ... 2026-03-12T18:18:05.929993924Z I0312 18:18:05.929969 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/localhost-recovery-client-token/ca.crt" ... 2026-03-12T18:18:05.930119557Z I0312 18:18:05.930092 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/localhost-recovery-client-token/namespace" ... 2026-03-12T18:18:05.930202059Z I0312 18:18:05.930178 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/localhost-recovery-client-token/token" ... 2026-03-12T18:18:05.930318972Z I0312 18:18:05.930291 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/service-account-private-key" ... 2026-03-12T18:18:05.930364133Z I0312 18:18:05.930348 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/service-account-private-key/service-account.key" ... 2026-03-12T18:18:05.930450375Z I0312 18:18:05.930430 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/serving-cert" ... 2026-03-12T18:18:05.930497217Z I0312 18:18:05.930481 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/serving-cert/tls.crt" ... 2026-03-12T18:18:05.930606409Z I0312 18:18:05.930577 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/serving-cert/tls.key" ... 2026-03-12T18:18:05.930679051Z I0312 18:18:05.930659 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/cluster-policy-controller-config" ... 2026-03-12T18:18:05.930770323Z I0312 18:18:05.930751 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/cluster-policy-controller-config/config.yaml" ... 2026-03-12T18:18:05.930852646Z I0312 18:18:05.930832 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/config" ... 2026-03-12T18:18:05.930950818Z I0312 18:18:05.930929 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/config/config.yaml" ... 2026-03-12T18:18:05.931028960Z I0312 18:18:05.931012 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/controller-manager-kubeconfig" ... 2026-03-12T18:18:05.931076701Z I0312 18:18:05.931060 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/controller-manager-kubeconfig/kubeconfig" ... 2026-03-12T18:18:05.931159853Z I0312 18:18:05.931141 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-cert-syncer-kubeconfig" ... 2026-03-12T18:18:05.931210695Z I0312 18:18:05.931194 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig" ... 2026-03-12T18:18:05.931299827Z I0312 18:18:05.931283 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-manager-pod" ... 2026-03-12T18:18:05.931368429Z I0312 18:18:05.931352 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-manager-pod/version" ... 2026-03-12T18:18:05.931444230Z I0312 18:18:05.931427 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-manager-pod/forceRedeploymentReason" ... 2026-03-12T18:18:05.931532103Z I0312 18:18:05.931498 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-manager-pod/pod.yaml" ... 2026-03-12T18:18:05.931616595Z I0312 18:18:05.931596 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/recycler-config" ... 2026-03-12T18:18:05.931685927Z I0312 18:18:05.931667 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/recycler-config/recycler-pod.yaml" ... 2026-03-12T18:18:05.931788059Z I0312 18:18:05.931768 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/service-ca" ... 2026-03-12T18:18:05.931839100Z I0312 18:18:05.931823 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/service-ca/ca-bundle.crt" ... 2026-03-12T18:18:05.931920792Z I0312 18:18:05.931904 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/serviceaccount-ca" ... 2026-03-12T18:18:05.931972754Z I0312 18:18:05.931956 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/serviceaccount-ca/ca-bundle.crt" ... 2026-03-12T18:18:05.932055186Z I0312 18:18:05.932038 1 cmd.go:221] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs" ... 2026-03-12T18:18:05.932096957Z I0312 18:18:05.932081 1 cmd.go:229] Getting secrets ... 2026-03-12T18:18:06.132835428Z I0312 18:18:06.132765 1 copy.go:32] Got secret openshift-kube-controller-manager/csr-signer 2026-03-12T18:18:06.331335164Z I0312 18:18:06.331290 1 copy.go:32] Got secret openshift-kube-controller-manager/kube-controller-manager-client-cert-key 2026-03-12T18:18:06.331390305Z I0312 18:18:06.331349 1 cmd.go:242] Getting config maps ... 2026-03-12T18:18:06.531013981Z I0312 18:18:06.530966 1 copy.go:60] Got configMap openshift-kube-controller-manager/aggregator-client-ca 2026-03-12T18:18:06.731249142Z I0312 18:18:06.731206 1 copy.go:60] Got configMap openshift-kube-controller-manager/client-ca 2026-03-12T18:18:06.946659931Z I0312 18:18:06.944836 1 copy.go:60] Got configMap openshift-kube-controller-manager/trusted-ca-bundle 2026-03-12T18:18:06.946659931Z I0312 18:18:06.945203 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/csr-signer" ... 2026-03-12T18:18:06.946659931Z I0312 18:18:06.945402 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/csr-signer/tls.crt" ... 2026-03-12T18:18:07.021700760Z I0312 18:18:07.020734 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/csr-signer/tls.key" ... 2026-03-12T18:18:07.021700760Z I0312 18:18:07.020925 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/kube-controller-manager-client-cert-key" ... 2026-03-12T18:18:07.021700760Z I0312 18:18:07.020978 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/kube-controller-manager-client-cert-key/tls.crt" ... 2026-03-12T18:18:07.021700760Z I0312 18:18:07.021066 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/kube-controller-manager-client-cert-key/tls.key" ... 2026-03-12T18:18:07.021700760Z I0312 18:18:07.021140 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/aggregator-client-ca" ... 2026-03-12T18:18:07.021700760Z I0312 18:18:07.021229 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/aggregator-client-ca/ca-bundle.crt" ... 2026-03-12T18:18:07.021700760Z I0312 18:18:07.021528 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/client-ca" ... 2026-03-12T18:18:07.021700760Z I0312 18:18:07.021692 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/client-ca/ca-bundle.crt" ... 2026-03-12T18:18:07.021835834Z I0312 18:18:07.021815 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/trusted-ca-bundle" ... 2026-03-12T18:18:07.022035679Z I0312 18:18:07.021907 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/trusted-ca-bundle/ca-bundle.crt" ... 2026-03-12T18:18:07.022413849Z I0312 18:18:07.022386 1 cmd.go:335] Getting pod configmaps/kube-controller-manager-pod-2 -n openshift-kube-controller-manager 2026-03-12T18:18:07.133004357Z I0312 18:18:07.132942 1 cmd.go:351] Creating directory for static pod manifest "/etc/kubernetes/manifests" ... 2026-03-12T18:18:07.133004357Z I0312 18:18:07.132978 1 cmd.go:379] Writing a pod under "kube-controller-manager-pod.yaml" key 2026-03-12T18:18:07.133004357Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"kube-controller-manager","namespace":"openshift-kube-controller-manager","creationTimestamp":null,"labels":{"app":"kube-controller-manager","kube-controller-manager":"true","revision":"2"},"annotations":{"kubectl.kubernetes.io/default-container":"kube-controller-manager","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs"}}],"containers":[{"name":"kube-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 10257 \\))\" ]; do sleep 1; done'\n\nif [ -f /etc/kubernetes/static-pod-certs/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /etc/kubernetes/static-pod-certs/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\n\nif [ -f /etc/kubernetes/static-pod-resources/configmaps/cloud-config/ca-bundle.pem ]; then\n echo \"Setting custom CA bundle for cloud provider\"\n export AWS_CA_BUNDLE=/etc/kubernetes/static-pod-resources/configmaps/cloud-config/ca-bundle.pem\nfi\n\nexec hyperkube kube-controller-manager --openshift-config=/etc/kubernetes/static-pod-resources/configmaps/config/config.yaml \\\n --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --authentication-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --authorization-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --client-ca-file=/etc/kubernetes/static-pod-certs/configmaps/client-ca/ca-bundle.crt \\\n --requestheader-client-ca-file=/etc/kubernetes/static-pod-certs/configmaps/aggregator-client-ca/ca-bundle.crt -v=2 --tls-cert-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.crt --tls-private-key-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.key --allocate-node-cidrs=false --cert-dir=/var/run/kubernetes --cloud-provider=external --cluster-cidr=10.128.0.0/16 --cluster-name=sno-ckprl --cluster-signing-cert-file=/etc/kubernetes/static-pod-certs/secrets/csr-signer/tls.crt --cluster-signing-duration=720h --cluster-signing-key-file=/etc/kubernetes/static-pod-certs/secrets/csr-signer/tls.key --controllers=* --controllers=-bootstrapsigner --controllers=-tokencleaner --controllers=-ttl --enable-dynamic-provisioning=true --feature-gates=AWSClusterHostedDNS=false --feature-gates=AWSEFSDriverVolumeMetrics=true --feature-gates=AdditionalRoutingCapabilities=false --feature-gates=AdminNetworkPolicy=true --feature-gates=AlibabaPlatform=true --feature-gates=AutomatedEtcdBackup=false --feature-gates=AzureWorkloadIdentity=true --feature-gates=BareMetalLoadBalancer=true --feature-gates=BootcNodeManagement=false --feature-gates=BuildCSIVolumes=true --feature-gates=CSIDriverSharedResource=false --feature-gates=ChunkSizeMiB=true --feature-gates=CloudDualStackNodeIPs=true --feature-gates=ClusterAPIInstall=false --feature-gates=ClusterAPIInstallIBMCloud=false --feature-gates=ClusterMonitoringConfig=false --feature-gates=ConsolePluginContentSecurityPolicy=false --feature-gates=DNSNameResolver=false --feature-gates=DisableKubeletCloudCredentialProviders=true --feature-gates=DynamicResourceAllocation=false --feature-gates=EtcdBackendQuota=false --feature-gates=EventedPLEG=false --feature-gates=Example=false --feature-gates=ExternalOIDC=false --feature-gates=ExternalOIDCWithUIDAndExtraClaimMappings=false --feature-gates=GCPClusterHostedDNS=false --feature-gates=GCPLabelsTags=true --feature-gates=GatewayAPI=false --feature-gates=HardwareSpeed=true --feature-gates=ImageStreamImportMode=false --feature-gates=IngressControllerDynamicConfigurationManager=false --feature-gates=IngressControllerLBSubnetsAWS=true --feature-gates=InsightsConfig=false --feature-gates=InsightsConfigAPI=false --feature-gates=InsightsOnDemandDataGather=false --feature-gates=InsightsRuntimeExtractor=false --feature-gates=KMSv1=true --feature-gates=MachineAPIMigration=false --feature-gates=MachineAPIOperatorDisableMachineHealthCheckController=false --feature-gates=MachineAPIProviderOpenStack=false --feature-gates=MachineConfigNodes=false --feature-gates=ManagedBootImages=true --feature-gates=ManagedBootImagesAWS=true --feature-gates=MaxUnavailableStatefulSet=false --feature-gates=MetricsCollectionProfiles=false --feature-gates=MinimumKubeletVersion=false --feature-gates=MixedCPUsAllocation=false --feature-gates=MultiArchInstallAWS=true --feature-gates=MultiArchInstallAzure=false --feature-gates=MultiArchInstallGCP=true --feature-gates=NetworkDiagnosticsConfig=true --feature-gates=NetworkLiveMigration=true --feature-gates=NetworkSegmentation=true --feature-gates=NewOLM=true --feature-gates=NodeDisruptionPolicy=true --feature-gates=NodeSwap=false --feature-gates=NutanixMultiSubnets=false --feature-gates=OVNObservability=false --feature-gates=OnClusterBuild=true --feature-gates=OpenShiftPodSecurityAdmission=false --feature-gates=PersistentIPsForVirtualization=true --feature-gates=PinnedImages=false --feature-gates=PlatformOperators=false --feature-gates=PrivateHostedZoneAWS=true --feature-gates=ProcMountType=false --feature-gates=RouteAdvertisements=false --feature-gates=RouteExternalCertificate=false --feature-gates=ServiceAccountTokenNodeBinding=false --feature-gates=SetEIPForNLBIngressController=true --feature-gates=SignatureStores=false --feature-gates=SigstoreImageVerification=false --feature-gates=StreamingCollectionEncodingToJSON=true --feature-gates=StreamingCollectionEncodingToProtobuf=true --feature-gates=TranslateStreamCloseWebsocketRequests=false --feature-gates=UpgradeStatus=false --feature-gates=UserNamespacesPodSecurityStandards=false --feature-gates=UserNamespacesSupport=false --feature-gates=VSphereControlPlaneMachineSet=true --feature-gates=VSphereDriverConfiguration=true --feature-gates=VSphereMultiNetworks=false --feature-gates=VSphereMultiVCenters=true --feature-gates=VSphereStaticIPs=true --feature-gates=ValidatingAdmissionPolicy=true --feature-gates=VolumeAttributesClass=false --feature-gates=VolumeGroupSnapshot=false --flex-volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec --kube-api-burst=300 --kube-api-qps=150 --leader-elect-renew-deadline=12s --leader-elect-resource-lock=leases --leader-elect-retry-period=3s --leader-elect=true --pv-recycler-pod-template-filepath-hostpath=/etc/kubernetes/static-pod-resources/configmaps/recycler-config/recycler-pod.yaml --pv-recycler-pod-template-filepath-nfs=/etc/kubernetes/static-pod-resources/configmaps/recycler-config/recycler-pod.yaml --root-ca-file=/etc/kubernetes/static-pod-resources/configmaps/serviceaccount-ca/ca-bundle.crt --secure-port=10257 --service-account-private-key-file=/etc/kubernetes/static-pod-resources/secrets/service-account-private-key/service-account.key --service-cluster-ip-range=172.30.0.0/16 --use-service-account-credentials=true --tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 --tls-min-version=VersionTLS12"],"ports":[{"containerPort":10257}],"resources":{"requests":{"cpu":"60m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10},"readinessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10},"startupProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"timeoutSeconds":3},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"cluster-policy-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 10357 \\))\" ]; do sleep 1; done'\n\nexec cluster-policy-controller start --config=/etc/kubernetes/static-pod-resources/configmaps/cluster-policy-controller-config/config.yaml \\\n --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --namespace=${POD_NAMESPACE} -v=2"],"ports":[{"containerPort":10357}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10},"readinessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10},"startupProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"timeoutSeconds":3},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-controller-manager-cert-syncer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","command":["cluster-kube-controller-manager-operator","cert-syncer"],"args":["--kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig","--namespace=$(POD_NAMESPACE)","--destination-dir=/etc/kubernetes/static-pod-certs"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-controller-manager-recovery-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 9443 \\))\" ]; do sleep 1; done'\n\nexec cluster-kube-controller-manager-operator cert-recovery-controller --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig --namespace=${POD_NAMESPACE} --listen=0.0.0.0:9443 -v=2"],"env":[{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000},"status":{}} 2026-03-12T18:18:07.136450855Z I0312 18:18:07.136405 1 cmd.go:610] Writing pod manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/kube-controller-manager-pod.yaml" ... 2026-03-12T18:18:07.140253582Z I0312 18:18:07.139998 1 cmd.go:617] Removed existing static pod manifest "/etc/kubernetes/manifests/kube-controller-manager-pod.yaml" ... 2026-03-12T18:18:07.140253582Z I0312 18:18:07.140011 1 cmd.go:621] Writing static pod manifest "/etc/kubernetes/manifests/kube-controller-manager-pod.yaml" ... 2026-03-12T18:18:07.140253582Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"kube-controller-manager","namespace":"openshift-kube-controller-manager","creationTimestamp":null,"labels":{"app":"kube-controller-manager","kube-controller-manager":"true","revision":"2"},"annotations":{"kubectl.kubernetes.io/default-container":"kube-controller-manager","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs"}}],"containers":[{"name":"kube-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 10257 \\))\" ]; do sleep 1; done'\n\nif [ -f /etc/kubernetes/static-pod-certs/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /etc/kubernetes/static-pod-certs/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\n\nif [ -f /etc/kubernetes/static-pod-resources/configmaps/cloud-config/ca-bundle.pem ]; then\n echo \"Setting custom CA bundle for cloud provider\"\n export AWS_CA_BUNDLE=/etc/kubernetes/static-pod-resources/configmaps/cloud-config/ca-bundle.pem\nfi\n\nexec hyperkube kube-controller-manager --openshift-config=/etc/kubernetes/static-pod-resources/configmaps/config/config.yaml \\\n --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --authentication-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --authorization-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --client-ca-file=/etc/kubernetes/static-pod-certs/configmaps/client-ca/ca-bundle.crt \\\n --requestheader-client-ca-file=/etc/kubernetes/static-pod-certs/configmaps/aggregator-client-ca/ca-bundle.crt -v=2 --tls-cert-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.crt --tls-private-key-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.key --allocate-node-cidrs=false --cert-dir=/var/run/kubernetes --cloud-provider=external --cluster-cidr=10.128.0.0/16 --cluster-name=sno-ckprl --cluster-signing-cert-file=/etc/kubernetes/static-pod-certs/secrets/csr-signer/tls.crt --cluster-signing-duration=720h --cluster-signing-key-file=/etc/kubernetes/static-pod-certs/secrets/csr-signer/tls.key --controllers=* --controllers=-bootstrapsigner --controllers=-tokencleaner --controllers=-ttl --enable-dynamic-provisioning=true --feature-gates=AWSClusterHostedDNS=false --feature-gates=AWSEFSDriverVolumeMetrics=true --feature-gates=AdditionalRoutingCapabilities=false --feature-gates=AdminNetworkPolicy=true --feature-gates=AlibabaPlatform=true --feature-gates=AutomatedEtcdBackup=false --feature-gates=AzureWorkloadIdentity=true --feature-gates=BareMetalLoadBalancer=true --feature-gates=BootcNodeManagement=false --feature-gates=BuildCSIVolumes=true --feature-gates=CSIDriverSharedResource=false --feature-gates=ChunkSizeMiB=true --feature-gates=CloudDualStackNodeIPs=true --feature-gates=ClusterAPIInstall=false --feature-gates=ClusterAPIInstallIBMCloud=false --feature-gates=ClusterMonitoringConfig=false --feature-gates=ConsolePluginContentSecurityPolicy=false --feature-gates=DNSNameResolver=false --feature-gates=DisableKubeletCloudCredentialProviders=true --feature-gates=DynamicResourceAllocation=false --feature-gates=EtcdBackendQuota=false --feature-gates=EventedPLEG=false --feature-gates=Example=false --feature-gates=ExternalOIDC=false --feature-gates=ExternalOIDCWithUIDAndExtraClaimMappings=false --feature-gates=GCPClusterHostedDNS=false --feature-gates=GCPLabelsTags=true --feature-gates=GatewayAPI=false --feature-gates=HardwareSpeed=true --feature-gates=ImageStreamImportMode=false --feature-gates=IngressControllerDynamicConfigurationManager=false --feature-gates=IngressControllerLBSubnetsAWS=true --feature-gates=InsightsConfig=false --feature-gates=InsightsConfigAPI=false --feature-gates=InsightsOnDemandDataGather=false --feature-gates=InsightsRuntimeExtractor=false --feature-gates=KMSv1=true --feature-gates=MachineAPIMigration=false --feature-gates=MachineAPIOperatorDisableMachineHealthCheckController=false --feature-gates=MachineAPIProviderOpenStack=false --feature-gates=MachineConfigNodes=false --feature-gates=ManagedBootImages=true --feature-gates=ManagedBootImagesAWS=true --feature-gates=MaxUnavailableStatefulSet=false --feature-gates=MetricsCollectionProfiles=false --feature-gates=MinimumKubeletVersion=false --feature-gates=MixedCPUsAllocation=false --feature-gates=MultiArchInstallAWS=true --feature-gates=MultiArchInstallAzure=false --feature-gates=MultiArchInstallGCP=true --feature-gates=NetworkDiagnosticsConfig=true --feature-gates=NetworkLiveMigration=true --feature-gates=NetworkSegmentation=true --feature-gates=NewOLM=true --feature-gates=NodeDisruptionPolicy=true --feature-gates=NodeSwap=false --feature-gates=NutanixMultiSubnets=false --feature-gates=OVNObservability=false --feature-gates=OnClusterBuild=true --feature-gates=OpenShiftPodSecurityAdmission=false --feature-gates=PersistentIPsForVirtualization=true --feature-gates=PinnedImages=false --feature-gates=PlatformOperators=false --feature-gates=PrivateHostedZoneAWS=true --feature-gates=ProcMountType=false --feature-gates=RouteAdvertisements=false --feature-gates=RouteExternalCertificate=false --feature-gates=ServiceAccountTokenNodeBinding=false --feature-gates=SetEIPForNLBIngressController=true --feature-gates=SignatureStores=false --feature-gates=SigstoreImageVerification=false --feature-gates=StreamingCollectionEncodingToJSON=true --feature-gates=StreamingCollectionEncodingToProtobuf=true --feature-gates=TranslateStreamCloseWebsocketRequests=false --feature-gates=UpgradeStatus=false --feature-gates=UserNamespacesPodSecurityStandards=false --feature-gates=UserNamespacesSupport=false --feature-gates=VSphereControlPlaneMachineSet=true --feature-gates=VSphereDriverConfiguration=true --feature-gates=VSphereMultiNetworks=false --feature-gates=VSphereMultiVCenters=true --feature-gates=VSphereStaticIPs=true --feature-gates=ValidatingAdmissionPolicy=true --feature-gates=VolumeAttributesClass=false --feature-gates=VolumeGroupSnapshot=false --flex-volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec --kube-api-burst=300 --kube-api-qps=150 --leader-elect-renew-deadline=12s --leader-elect-resource-lock=leases --leader-elect-retry-period=3s --leader-elect=true --pv-recycler-pod-template-filepath-hostpath=/etc/kubernetes/static-pod-resources/configmaps/recycler-config/recycler-pod.yaml --pv-recycler-pod-template-filepath-nfs=/etc/kubernetes/static-pod-resources/configmaps/recycler-config/recycler-pod.yaml --root-ca-file=/etc/kubernetes/static-pod-resources/configmaps/serviceaccount-ca/ca-bundle.crt --secure-port=10257 --service-account-private-key-file=/etc/kubernetes/static-pod-resources/secrets/service-account-private-key/service-account.key --service-cluster-ip-range=172.30.0.0/16 --use-service-account-credentials=true --tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 --tls-min-version=VersionTLS12"],"ports":[{"containerPort":10257}],"resources":{"requests":{"cpu":"60m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10},"readinessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10},"startupProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"timeoutSeconds":3},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"cluster-policy-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 10357 \\))\" ]; do sleep 1; done'\n\nexec cluster-policy-controller start --config=/etc/kubernetes/static-pod-resources/configmaps/cluster-policy-controller-config/config.yaml \\\n --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --namespace=${POD_NAMESPACE} -v=2"],"ports":[{"containerPort":10357}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10},"readinessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10},"startupProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"timeoutSeconds":3},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-controller-manager-cert-syncer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","command":["cluster-kube-controller-manager-operator","cert-syncer"],"args":["--kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig","--namespace=$(POD_NAMESPACE)","--destination-dir=/etc/kubernetes/static-pod-certs"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-controller-manager-recovery-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 9443 \\))\" ]; do sleep 1; done'\n\nexec cluster-kube-controller-manager-operator cert-recovery-controller --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig --namespace=${POD_NAMESPACE} --listen=0.0.0.0:9443 -v=2"],"env":[{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000},"status":{}} config/pod/openshift-kube-apiserver/logs/installer-1-master-0/installer_current.log0000640000000000000000000002041715154601571027210 0ustar00000000000000002026-03-12T18:14:11.452888891Z I0312 18:14:11.452707 1 cmd.go:95] &{ true {false} installer true map[cert-configmaps:0xc00087f040 cert-dir:0xc00087f220 cert-secrets:0xc00087efa0 configmaps:0xc00087eb40 namespace:0xc00087e960 optional-cert-configmaps:0xc00087f180 optional-cert-secrets:0xc00087f0e0 optional-configmaps:0xc00087ec80 optional-secrets:0xc00087ebe0 pod:0xc00087ea00 pod-manifest-dir:0xc00087edc0 resource-dir:0xc00087ed20 revision:0xc00087e8c0 secrets:0xc00087eaa0 v:0xc0007e46e0] [0xc0007e46e0 0xc00087e8c0 0xc00087e960 0xc00087ea00 0xc00087ed20 0xc00087edc0 0xc00087eb40 0xc00087ec80 0xc00087eaa0 0xc00087ebe0 0xc00087f220 0xc00087f040 0xc00087f180 0xc00087efa0 0xc00087f0e0] [] map[cert-configmaps:0xc00087f040 cert-dir:0xc00087f220 cert-secrets:0xc00087efa0 configmaps:0xc00087eb40 help:0xc0007e4aa0 kubeconfig:0xc00087e820 log-flush-frequency:0xc0007e4640 namespace:0xc00087e960 optional-cert-configmaps:0xc00087f180 optional-cert-secrets:0xc00087f0e0 optional-configmaps:0xc00087ec80 optional-secrets:0xc00087ebe0 pod:0xc00087ea00 pod-manifest-dir:0xc00087edc0 pod-manifests-lock-file:0xc00087ef00 resource-dir:0xc00087ed20 revision:0xc00087e8c0 secrets:0xc00087eaa0 timeout-duration:0xc00087ee60 v:0xc0007e46e0 vmodule:0xc0007e4780] [0xc00087e820 0xc00087e8c0 0xc00087e960 0xc00087ea00 0xc00087eaa0 0xc00087eb40 0xc00087ebe0 0xc00087ec80 0xc00087ed20 0xc00087edc0 0xc00087ee60 0xc00087ef00 0xc00087efa0 0xc00087f040 0xc00087f0e0 0xc00087f180 0xc00087f220 0xc0007e4640 0xc0007e46e0 0xc0007e4780 0xc0007e4aa0] [0xc00087f040 0xc00087f220 0xc00087efa0 0xc00087eb40 0xc0007e4aa0 0xc00087e820 0xc0007e4640 0xc00087e960 0xc00087f180 0xc00087f0e0 0xc00087ec80 0xc00087ebe0 0xc00087ea00 0xc00087edc0 0xc00087ef00 0xc00087ed20 0xc00087e8c0 0xc00087eaa0 0xc00087ee60 0xc0007e46e0 0xc0007e4780] map[104:0xc0007e4aa0 118:0xc0007e46e0] [] -1 0 0xc00087c270 true 0xae2020 []} 2026-03-12T18:14:11.453027465Z I0312 18:14:11.452918 1 cmd.go:96] (*installerpod.InstallOptions)(0xc00059c340)({ 2026-03-12T18:14:11.453027465Z KubeConfig: (string) "", 2026-03-12T18:14:11.453027465Z KubeClient: (kubernetes.Interface) , 2026-03-12T18:14:11.453027465Z Revision: (string) (len=1) "1", 2026-03-12T18:14:11.453027465Z NodeName: (string) "", 2026-03-12T18:14:11.453027465Z Namespace: (string) (len=24) "openshift-kube-apiserver", 2026-03-12T18:14:11.453027465Z Clock: (clock.RealClock) { 2026-03-12T18:14:11.453027465Z }, 2026-03-12T18:14:11.453027465Z PodConfigMapNamePrefix: (string) (len=18) "kube-apiserver-pod", 2026-03-12T18:14:11.453027465Z SecretNamePrefixes: ([]string) (len=3 cap=4) { 2026-03-12T18:14:11.453027465Z (string) (len=11) "etcd-client", 2026-03-12T18:14:11.453027465Z (string) (len=34) "localhost-recovery-serving-certkey", 2026-03-12T18:14:11.453027465Z (string) (len=31) "localhost-recovery-client-token" 2026-03-12T18:14:11.453027465Z }, 2026-03-12T18:14:11.453027465Z OptionalSecretNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-12T18:14:11.453027465Z (string) (len=17) "encryption-config", 2026-03-12T18:14:11.453027465Z (string) (len=21) "webhook-authenticator" 2026-03-12T18:14:11.453027465Z }, 2026-03-12T18:14:11.453027465Z ConfigMapNamePrefixes: ([]string) (len=8 cap=8) { 2026-03-12T18:14:11.453027465Z (string) (len=18) "kube-apiserver-pod", 2026-03-12T18:14:11.453027465Z (string) (len=6) "config", 2026-03-12T18:14:11.453027465Z (string) (len=37) "kube-apiserver-cert-syncer-kubeconfig", 2026-03-12T18:14:11.453027465Z (string) (len=28) "bound-sa-token-signing-certs", 2026-03-12T18:14:11.453027465Z (string) (len=15) "etcd-serving-ca", 2026-03-12T18:14:11.453027465Z (string) (len=18) "kubelet-serving-ca", 2026-03-12T18:14:11.453027465Z (string) (len=22) "sa-token-signing-certs", 2026-03-12T18:14:11.453027465Z (string) (len=29) "kube-apiserver-audit-policies" 2026-03-12T18:14:11.453027465Z }, 2026-03-12T18:14:11.453027465Z OptionalConfigMapNamePrefixes: ([]string) (len=3 cap=4) { 2026-03-12T18:14:11.453027465Z (string) (len=14) "oauth-metadata", 2026-03-12T18:14:11.453027465Z (string) (len=12) "cloud-config", 2026-03-12T18:14:11.453027465Z (string) (len=24) "kube-apiserver-server-ca" 2026-03-12T18:14:11.453027465Z }, 2026-03-12T18:14:11.453027465Z CertSecretNames: ([]string) (len=10 cap=16) { 2026-03-12T18:14:11.453027465Z (string) (len=17) "aggregator-client", 2026-03-12T18:14:11.453027465Z (string) (len=30) "localhost-serving-cert-certkey", 2026-03-12T18:14:11.453027465Z (string) (len=31) "service-network-serving-certkey", 2026-03-12T18:14:11.453027465Z (string) (len=37) "external-loadbalancer-serving-certkey", 2026-03-12T18:14:11.453027465Z (string) (len=37) "internal-loadbalancer-serving-certkey", 2026-03-12T18:14:11.453027465Z (string) (len=33) "bound-service-account-signing-key", 2026-03-12T18:14:11.453027465Z (string) (len=40) "control-plane-node-admin-client-cert-key", 2026-03-12T18:14:11.453027465Z (string) (len=31) "check-endpoints-client-cert-key", 2026-03-12T18:14:11.453027465Z (string) (len=14) "kubelet-client", 2026-03-12T18:14:11.453027465Z (string) (len=16) "node-kubeconfigs" 2026-03-12T18:14:11.453027465Z }, 2026-03-12T18:14:11.453027465Z OptionalCertSecretNamePrefixes: ([]string) (len=11 cap=16) { 2026-03-12T18:14:11.453027465Z (string) (len=17) "user-serving-cert", 2026-03-12T18:14:11.453027465Z (string) (len=21) "user-serving-cert-000", 2026-03-12T18:14:11.453027465Z (string) (len=21) "user-serving-cert-001", 2026-03-12T18:14:11.453027465Z (string) (len=21) "user-serving-cert-002", 2026-03-12T18:14:11.453027465Z (string) (len=21) "user-serving-cert-003", 2026-03-12T18:14:11.453027465Z (string) (len=21) "user-serving-cert-004", 2026-03-12T18:14:11.453027465Z (string) (len=21) "user-serving-cert-005", 2026-03-12T18:14:11.453027465Z (string) (len=21) "user-serving-cert-006", 2026-03-12T18:14:11.453027465Z (string) (len=21) "user-serving-cert-007", 2026-03-12T18:14:11.453027465Z (string) (len=21) "user-serving-cert-008", 2026-03-12T18:14:11.453027465Z (string) (len=21) "user-serving-cert-009" 2026-03-12T18:14:11.453027465Z }, 2026-03-12T18:14:11.453027465Z CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) { 2026-03-12T18:14:11.453027465Z (string) (len=20) "aggregator-client-ca", 2026-03-12T18:14:11.453027465Z (string) (len=9) "client-ca", 2026-03-12T18:14:11.453027465Z (string) (len=29) "control-plane-node-kubeconfig", 2026-03-12T18:14:11.453027465Z (string) (len=26) "check-endpoints-kubeconfig" 2026-03-12T18:14:11.453027465Z }, 2026-03-12T18:14:11.453027465Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-12T18:14:11.453027465Z (string) (len=17) "trusted-ca-bundle" 2026-03-12T18:14:11.453027465Z }, 2026-03-12T18:14:11.453027465Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-apiserver-certs", 2026-03-12T18:14:11.453027465Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-12T18:14:11.453027465Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-12T18:14:11.453027465Z Timeout: (time.Duration) 2m0s, 2026-03-12T18:14:11.453027465Z StaticPodManifestsLockFile: (string) "", 2026-03-12T18:14:11.453027465Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-12T18:14:11.453027465Z KubeletVersion: (string) "" 2026-03-12T18:14:11.453027465Z }) 2026-03-12T18:14:11.524888044Z I0312 18:14:11.524744 1 cmd.go:413] Getting controller reference for node master-0 2026-03-12T18:14:11.535573454Z I0312 18:14:11.535474 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-12T18:14:11.536402925Z I0312 18:14:11.535591 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-12T18:14:11.536402925Z I0312 18:14:11.535610 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-12T18:14:11.545674450Z I0312 18:14:11.542413 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-03-12T18:14:41.542999544Z I0312 18:14:41.542941 1 cmd.go:524] Getting installer pods for node master-0 2026-03-12T18:14:55.547269670Z F0312 18:14:55.547143 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-kube-apiserver/installer-1-master-0.json0000640000000000000000000002132115154601571022670 0ustar0000000000000000{"metadata":{"name":"installer-1-master-0","namespace":"openshift-kube-apiserver","uid":"38785e6e-3052-405c-8874-4f295985def5","resourceVersion":"8836","creationTimestamp":"2026-03-12T18:14:09Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.47/23\"],\"mac_address\":\"0a:58:0a:80:00:2f\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.47/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.47\"\n ],\n \"mac\": \"0a:58:0a:80:00:2f\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-1","uid":"ae4fdc30-fdbf-43a6-9182-94734ef7ffa4"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","command":["cluster-kube-apiserver-operator","installer"],"args":["-v=2","--revision=1","--namespace=openshift-kube-apiserver","--pod=kube-apiserver-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-apiserver-pod","--configmaps=config","--configmaps=kube-apiserver-cert-syncer-kubeconfig","--optional-configmaps=oauth-metadata","--optional-configmaps=cloud-config","--configmaps=bound-sa-token-signing-certs","--configmaps=etcd-serving-ca","--optional-configmaps=kube-apiserver-server-ca","--configmaps=kubelet-serving-ca","--configmaps=sa-token-signing-certs","--configmaps=kube-apiserver-audit-policies","--secrets=etcd-client","--optional-secrets=encryption-config","--secrets=localhost-recovery-serving-certkey","--secrets=localhost-recovery-client-token","--optional-secrets=webhook-authenticator","--cert-dir=/etc/kubernetes/static-pod-resources/kube-apiserver-certs","--cert-configmaps=aggregator-client-ca","--cert-configmaps=client-ca","--optional-cert-configmaps=trusted-ca-bundle","--cert-configmaps=control-plane-node-kubeconfig","--cert-configmaps=check-endpoints-kubeconfig","--cert-secrets=aggregator-client","--cert-secrets=localhost-serving-cert-certkey","--cert-secrets=service-network-serving-certkey","--cert-secrets=external-loadbalancer-serving-certkey","--cert-secrets=internal-loadbalancer-serving-certkey","--cert-secrets=bound-service-account-signing-key","--cert-secrets=control-plane-node-admin-client-cert-key","--cert-secrets=check-endpoints-client-cert-key","--cert-secrets=kubelet-client","--cert-secrets=node-kubeconfigs","--optional-cert-secrets=user-serving-cert","--optional-cert-secrets=user-serving-cert-000","--optional-cert-secrets=user-serving-cert-001","--optional-cert-secrets=user-serving-cert-002","--optional-cert-secrets=user-serving-cert-003","--optional-cert-secrets=user-serving-cert-004","--optional-cert-secrets=user-serving-cert-005","--optional-cert-secrets=user-serving-cert-006","--optional-cert-secrets=user-serving-cert-007","--optional-cert-secrets=user-serving-cert-008","--optional-cert-secrets=user-serving-cert-009"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:14:57Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:14:09Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:14:56Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:14:56Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:14:09Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.47","podIPs":[{"ip":"10.128.0.47"}],"startTime":"2026-03-12T18:14:09Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"ving-cert\",\n (string) (len=21) \"user-serving-cert-000\",\n (string) (len=21) \"user-serving-cert-001\",\n (string) (len=21) \"user-serving-cert-002\",\n (string) (len=21) \"user-serving-cert-003\",\n (string) (len=21) \"user-serving-cert-004\",\n (string) (len=21) \"user-serving-cert-005\",\n (string) (len=21) \"user-serving-cert-006\",\n (string) (len=21) \"user-serving-cert-007\",\n (string) (len=21) \"user-serving-cert-008\",\n (string) (len=21) \"user-serving-cert-009\"\n },\n CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\",\n (string) (len=29) \"control-plane-node-kubeconfig\",\n (string) (len=26) \"check-endpoints-kubeconfig\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0312 18:14:11.524744 1 cmd.go:413] Getting controller reference for node master-0\nI0312 18:14:11.535474 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0312 18:14:11.535591 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0312 18:14:11.535610 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0312 18:14:11.542413 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0312 18:14:41.542941 1 cmd.go:524] Getting installer pods for node master-0\nF0312 18:14:55.547143 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","startedAt":"2026-03-12T18:14:10Z","finishedAt":"2026-03-12T18:14:55Z","containerID":"cri-o://ad09860af65a7f4806ecc5c16545e1e14574d76310388c1e9bda798b177013f0"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","containerID":"cri-o://ad09860af65a7f4806ecc5c16545e1e14574d76310388c1e9bda798b177013f0","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}kube-apiserver-insecure-readyz_current.log0000640000000000000000000000014615154601571035770 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-03-12T18:10:40.346973497Z I0312 18:10:40.346763 1 readyz.go:111] Listening on 0.0.0.0:6080 kube-apiserver_current.log0000640000000000000000000010664015154601571032667 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-03-12T18:18:21.537640722Z I0312 18:18:21.535809 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:21.734061435Z I0312 18:18:21.733991 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:21.735080411Z I0312 18:18:21.734969 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:21.736182970Z I0312 18:18:21.736142 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:21.933703862Z I0312 18:18:21.933649 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:21.935843816Z I0312 18:18:21.935814 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:21.935889097Z I0312 18:18:21.935866 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:22.133238105Z I0312 18:18:22.133192 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:22.135892833Z I0312 18:18:22.135832 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:22.135892833Z I0312 18:18:22.135871 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:22.336434702Z I0312 18:18:22.334027 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:22.337215442Z I0312 18:18:22.337165 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:22.338654239Z I0312 18:18:22.338333 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:22.340967998Z E0312 18:18:22.340925 1 remote_available_controller.go:470] "Unhandled Error" err="v1.image.openshift.io failed with: failing or missing response from https://10.128.0.37:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/image.openshift.io/v1: 401" logger="UnhandledError" 2026-03-12T18:18:22.341089451Z E0312 18:18:22.341057 1 remote_available_controller.go:470] "Unhandled Error" err="v1.apps.openshift.io failed with: failing or missing response from https://10.128.0.37:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/apps.openshift.io/v1: 401" logger="UnhandledError" 2026-03-12T18:18:22.388636027Z E0312 18:18:22.388565 1 remote_available_controller.go:470] "Unhandled Error" err="v1.project.openshift.io failed with: failing or missing response from https://10.128.0.37:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/project.openshift.io/v1: 401" logger="UnhandledError" 2026-03-12T18:18:22.523816505Z E0312 18:18:22.523743 1 remote_available_controller.go:470] "Unhandled Error" err="v1.quota.openshift.io failed with: failing or missing response from https://10.128.0.37:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/quota.openshift.io/v1: 401" logger="UnhandledError" 2026-03-12T18:18:22.533553084Z I0312 18:18:22.533467 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:22.535886234Z I0312 18:18:22.535830 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:22.536597282Z I0312 18:18:22.536523 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:22.734178385Z I0312 18:18:22.734095 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:22.735441307Z I0312 18:18:22.735311 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:22.736353431Z I0312 18:18:22.736301 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:22.933563344Z I0312 18:18:22.933504 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:22.935704818Z I0312 18:18:22.935684 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:22.936288313Z I0312 18:18:22.936162 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:23.134243806Z I0312 18:18:23.134166 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:23.135629272Z I0312 18:18:23.135584 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:23.135939080Z I0312 18:18:23.135897 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:23.333735409Z I0312 18:18:23.333609 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:23.336172351Z I0312 18:18:23.336079 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:23.336322265Z I0312 18:18:23.336079 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:23.352237412Z E0312 18:18:23.351474 1 remote_available_controller.go:470] "Unhandled Error" err="v1.authorization.openshift.io failed with: failing or missing response from https://10.128.0.37:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/authorization.openshift.io/v1: 401" logger="UnhandledError" 2026-03-12T18:18:23.353064593Z E0312 18:18:23.353000 1 remote_available_controller.go:470] "Unhandled Error" err="v1.build.openshift.io failed with: failing or missing response from https://10.128.0.37:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/build.openshift.io/v1: 401" logger="UnhandledError" 2026-03-12T18:18:23.455842132Z E0312 18:18:23.455768 1 remote_available_controller.go:470] "Unhandled Error" err="v1.route.openshift.io failed with: failing or missing response from https://10.128.0.37:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/route.openshift.io/v1: 401" logger="UnhandledError" 2026-03-12T18:18:23.534994096Z I0312 18:18:23.534899 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:23.535817867Z I0312 18:18:23.535739 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:23.535968151Z I0312 18:18:23.535756 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:23.734290493Z I0312 18:18:23.734176 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:23.735606967Z I0312 18:18:23.735555 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:23.735821563Z I0312 18:18:23.735771 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:23.934225987Z I0312 18:18:23.934155 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:23.935501870Z I0312 18:18:23.935440 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:23.935501870Z I0312 18:18:23.935456 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:24.133953555Z I0312 18:18:24.133879 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:24.135654079Z I0312 18:18:24.135583 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:24.138380298Z I0312 18:18:24.135775 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:24.143293764Z E0312 18:18:24.143219 1 remote_available_controller.go:470] "Unhandled Error" err="v1.template.openshift.io failed with: failing or missing response from https://10.128.0.37:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/template.openshift.io/v1: 401" logger="UnhandledError" 2026-03-12T18:18:24.334539095Z I0312 18:18:24.334371 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:24.335342726Z I0312 18:18:24.335286 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:24.335342726Z I0312 18:18:24.335333 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:24.533929215Z I0312 18:18:24.533853 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:24.535874275Z I0312 18:18:24.535812 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:24.535874275Z I0312 18:18:24.535831 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:24.734377642Z I0312 18:18:24.734236 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:24.735454039Z I0312 18:18:24.735385 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:24.735917941Z I0312 18:18:24.735836 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:24.767405846Z E0312 18:18:24.767329 1 remote_available_controller.go:470] "Unhandled Error" err="v1.oauth.openshift.io failed with: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401" logger="UnhandledError" 2026-03-12T18:18:24.934031318Z I0312 18:18:24.933958 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:24.936235015Z I0312 18:18:24.936179 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:24.936358118Z I0312 18:18:24.936180 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:25.133657924Z I0312 18:18:25.133582 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:25.136012494Z I0312 18:18:25.135957 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:25.136724142Z I0312 18:18:25.136085 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:25.258504407Z E0312 18:18:25.258446 1 remote_available_controller.go:470] "Unhandled Error" err="v1.security.openshift.io failed with: failing or missing response from https://10.128.0.37:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/security.openshift.io/v1: 401" logger="UnhandledError" 2026-03-12T18:18:25.333711240Z I0312 18:18:25.333631 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:25.336158453Z I0312 18:18:25.336123 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:25.336717827Z I0312 18:18:25.336641 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:25.533938381Z I0312 18:18:25.533892 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:25.536814885Z I0312 18:18:25.536794 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:25.537221855Z I0312 18:18:25.537155 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:25.734604474Z I0312 18:18:25.734489 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:25.735626520Z I0312 18:18:25.735574 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:25.735831425Z I0312 18:18:25.735790 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:25.920072327Z E0312 18:18:25.919991 1 remote_available_controller.go:470] "Unhandled Error" err="v1.user.openshift.io failed with: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401" logger="UnhandledError" 2026-03-12T18:18:25.934716662Z I0312 18:18:25.934641 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:25.935460901Z I0312 18:18:25.935408 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:25.935754988Z I0312 18:18:25.935717 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:26.134132562Z I0312 18:18:26.134052 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:26.135466986Z I0312 18:18:26.135415 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:26.135644241Z I0312 18:18:26.135613 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:26.333981694Z I0312 18:18:26.333869 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:26.335946084Z I0312 18:18:26.335898 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:26.336068457Z I0312 18:18:26.335996 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:26.534043599Z I0312 18:18:26.533990 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:26.535449635Z I0312 18:18:26.535394 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:26.535689482Z I0312 18:18:26.535654 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:26.733732547Z I0312 18:18:26.733667 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:26.735780249Z I0312 18:18:26.735708 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:26.737635677Z I0312 18:18:26.737614 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:26.933697981Z I0312 18:18:26.933608 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:26.936232506Z I0312 18:18:26.936156 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:26.936315668Z I0312 18:18:26.936156 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:27.134353593Z I0312 18:18:27.134288 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:27.135369319Z I0312 18:18:27.135319 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:27.135542124Z I0312 18:18:27.135477 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:27.335713203Z I0312 18:18:27.335650 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:27.335713203Z I0312 18:18:27.335690 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:27.535307548Z I0312 18:18:27.535236 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T18:18:27.535658967Z I0312 18:18:27.535608 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-0/setup_current.log0000640000000000000000000000007015154601571031150 0ustar00000000000000002026-03-12T18:10:36.861350359Z Fixing audit permissions.kube-apiserver-operator_current.log0000640000000000000000000001015115154601571036765 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-68bd585b-ddsbn2026-03-12T18:16:42.314800582Z I0312 18:16:42.313963 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-12T18:16:42.314800582Z I0312 18:16:42.314108 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-12T18:16:42.317134381Z I0312 18:16:42.315990 1 observer_polling.go:159] Starting file observer 2026-03-12T18:17:37.397562885Z I0312 18:17:37.394450 1 builder.go:304] kube-apiserver-operator version 4.18.0-202602132343.p2.ge9bc909.assembly.stream.el9-e9bc909-e9bc90906c726823f154c78d3e568c98ff77b6a5 2026-03-12T18:17:38.615872929Z I0312 18:17:38.600649 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-12T18:17:38.615872929Z W0312 18:17:38.600673 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-12T18:17:38.615872929Z W0312 18:17:38.600677 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-12T18:17:38.615872929Z W0312 18:17:38.600680 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-12T18:17:38.615872929Z W0312 18:17:38.600683 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-12T18:17:38.615872929Z W0312 18:17:38.600686 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-12T18:17:38.615872929Z W0312 18:17:38.600688 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-12T18:17:38.615872929Z I0312 18:17:38.606902 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-12T18:17:38.615872929Z I0312 18:17:38.607615 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-12T18:17:38.615872929Z I0312 18:17:38.607655 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-12T18:17:38.615872929Z I0312 18:17:38.607688 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-12T18:17:38.615872929Z I0312 18:17:38.607943 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-12T18:17:38.615872929Z I0312 18:17:38.608009 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-12T18:17:38.615872929Z I0312 18:17:38.608014 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-12T18:17:38.615872929Z I0312 18:17:38.608026 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-12T18:17:38.615872929Z I0312 18:17:38.608031 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-12T18:17:38.615872929Z I0312 18:17:38.608210 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-12T18:17:38.615872929Z I0312 18:17:38.608883 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-apiserver-operator/kube-apiserver-operator-lock... 2026-03-12T18:17:38.709688784Z I0312 18:17:38.708688 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-12T18:17:38.709688784Z I0312 18:17:38.708740 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-12T18:17:38.709688784Z I0312 18:17:38.708821 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file kube-apiserver-operator_previous.log0000640000000000000000000004511215154601571037164 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-68bd585b-ddsbn2026-03-12T18:14:48.523017521Z I0312 18:14:48.520904 1 base_controller.go:123] Shutting down worker of openshift-kube-apiserver-EncryptionKey controller ... 2026-03-12T18:14:48.523055192Z I0312 18:14:48.523029 1 base_controller.go:113] All openshift-kube-apiserver-EncryptionKey workers have been terminated 2026-03-12T18:14:48.523055192Z I0312 18:14:48.520909 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-12T18:14:48.523072712Z I0312 18:14:48.523057 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-12T18:14:48.523083222Z I0312 18:14:48.520913 1 base_controller.go:123] Shutting down worker of openshift-kube-apiserver-EncryptionMigration controller ... 2026-03-12T18:14:48.523093783Z I0312 18:14:48.523084 1 base_controller.go:113] All openshift-kube-apiserver-EncryptionMigration workers have been terminated 2026-03-12T18:14:48.523104053Z I0312 18:14:48.520930 1 base_controller.go:181] Shutting down CertRotationController ... 2026-03-12T18:14:48.523139014Z I0312 18:14:48.523114 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-12T18:14:48.523139014Z I0312 18:14:48.520938 1 base_controller.go:181] Shutting down openshift-kube-apiserver-EncryptionCondition ... 2026-03-12T18:14:48.523150214Z I0312 18:14:48.520945 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-12T18:14:48.523160264Z I0312 18:14:48.520950 1 base_controller.go:123] Shutting down worker of openshift-kube-apiserver-EncryptionCondition controller ... 2026-03-12T18:14:48.523160264Z I0312 18:14:48.523149 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-12T18:14:48.523170305Z I0312 18:14:48.520961 1 base_controller.go:123] Shutting down worker of KubeletVersionSkewController controller ... 2026-03-12T18:14:48.523180505Z I0312 18:14:48.523167 1 base_controller.go:113] All openshift-kube-apiserver-EncryptionCondition workers have been terminated 2026-03-12T18:14:48.523190405Z I0312 18:14:48.523171 1 base_controller.go:113] All KubeletVersionSkewController workers have been terminated 2026-03-12T18:14:48.523200325Z I0312 18:14:48.520973 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-03-12T18:14:48.523210296Z I0312 18:14:48.523201 1 base_controller.go:113] All GuardController workers have been terminated 2026-03-12T18:14:48.523241996Z I0312 18:14:48.523217 1 controller_manager.go:54] GuardController controller terminated 2026-03-12T18:14:48.523241996Z I0312 18:14:48.521073 1 base_controller.go:123] Shutting down worker of kube-apiserver controller ... 2026-03-12T18:14:48.523259357Z I0312 18:14:48.523246 1 base_controller.go:113] All kube-apiserver workers have been terminated 2026-03-12T18:14:48.523259357Z I0312 18:14:48.521083 1 base_controller.go:181] Shutting down TargetConfigController ... 2026-03-12T18:14:48.523278957Z I0312 18:14:48.521076 1 base_controller.go:123] Shutting down worker of kube-apiserver-Node controller ... 2026-03-12T18:14:48.523278957Z I0312 18:14:48.523269 1 base_controller.go:113] All kube-apiserver-Node workers have been terminated 2026-03-12T18:14:48.523292038Z I0312 18:14:48.523276 1 controller_manager.go:54] kube-apiserver-Node controller terminated 2026-03-12T18:14:48.523292038Z I0312 18:14:48.521117 1 base_controller.go:181] Shutting down CertRotationController ... 2026-03-12T18:14:48.523335149Z I0312 18:14:48.523305 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-12T18:14:48.523335149Z I0312 18:14:48.521139 1 base_controller.go:181] Shutting down ConnectivityCheckController ... 2026-03-12T18:14:48.523335149Z I0312 18:14:48.521157 1 base_controller.go:181] Shutting down EventWatchController ... 2026-03-12T18:14:48.523354829Z I0312 18:14:48.521178 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-12T18:14:48.523367730Z I0312 18:14:48.523360 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-12T18:14:48.523377400Z I0312 18:14:48.521186 1 base_controller.go:123] Shutting down worker of ConnectivityCheckController controller ... 2026-03-12T18:14:48.523387100Z I0312 18:14:48.523376 1 base_controller.go:113] All ConnectivityCheckController workers have been terminated 2026-03-12T18:14:48.523387100Z I0312 18:14:48.521194 1 base_controller.go:123] Shutting down worker of EventWatchController controller ... 2026-03-12T18:14:48.523399420Z I0312 18:14:48.523392 1 base_controller.go:113] All EventWatchController workers have been terminated 2026-03-12T18:14:48.523434441Z W0312 18:14:48.521209 1 base_controller.go:242] Updating status of "RevisionController" failed: unable to ApplyStatus for operator using fieldManager "RevisionController-reportDegraded": client rate limiter Wait returned an error: context canceled 2026-03-12T18:14:48.523508723Z I0312 18:14:48.521218 1 base_controller.go:123] Shutting down worker of webhookSupportabilityController controller ... 2026-03-12T18:14:48.523560484Z I0312 18:14:48.523505 1 base_controller.go:113] All webhookSupportabilityController workers have been terminated 2026-03-12T18:14:48.523560484Z I0312 18:14:48.521227 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"544b24cd-dcb5-4807-a578-f5a0d1bb75ad", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'ConfigMapCreateFailed' Failed to create ConfigMap/kube-apiserver-server-ca-3 -n openshift-kube-apiserver: Post "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/configmaps": context canceled 2026-03-12T18:14:48.523560484Z I0312 18:14:48.521239 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-12T18:14:48.523560484Z I0312 18:14:48.521248 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-12T18:14:48.523560484Z I0312 18:14:48.521264 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-12T18:14:48.523577695Z I0312 18:14:48.523564 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-12T18:14:48.523590345Z I0312 18:14:48.521275 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-12T18:14:48.523631026Z I0312 18:14:48.521283 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-12T18:14:48.523668817Z I0312 18:14:48.521353 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-12T18:14:48.523668817Z I0312 18:14:48.523646 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-12T18:14:48.523668817Z I0312 18:14:48.521973 1 base_controller.go:113] All PruneController workers have been terminated 2026-03-12T18:14:48.523683008Z I0312 18:14:48.523673 1 controller_manager.go:54] PruneController controller terminated 2026-03-12T18:14:48.523683008Z I0312 18:14:48.523673 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-12T18:14:48.523694088Z I0312 18:14:48.521980 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-03-12T18:14:48.523705658Z I0312 18:14:48.523695 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-03-12T18:14:48.523705658Z I0312 18:14:48.520893 1 base_controller.go:123] Shutting down worker of openshift-kube-apiserver-EncryptionPrune controller ... 2026-03-12T18:14:48.523723869Z I0312 18:14:48.523714 1 base_controller.go:113] All openshift-kube-apiserver-EncryptionPrune workers have been terminated 2026-03-12T18:14:48.523734259Z I0312 18:14:48.522007 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-12T18:14:48.523734259Z I0312 18:14:48.522012 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-12T18:14:48.523747139Z I0312 18:14:48.523739 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-03-12T18:14:48.523757309Z I0312 18:14:48.522019 1 base_controller.go:113] All cluster-kube-apiserver-operator-UnsupportedConfigOverrides workers have been terminated 2026-03-12T18:14:48.523767800Z I0312 18:14:48.523756 1 controller_manager.go:54] cluster-kube-apiserver-operator-UnsupportedConfigOverrides controller terminated 2026-03-12T18:14:48.523767800Z I0312 18:14:48.522026 1 base_controller.go:113] All ServiceAccountIssuerController workers have been terminated 2026-03-12T18:14:48.523778120Z I0312 18:14:48.522030 1 base_controller.go:113] All StatusSyncer_kube-apiserver workers have been terminated 2026-03-12T18:14:48.523788990Z I0312 18:14:48.522035 1 base_controller.go:113] All kube-apiserver-RemoveStaleConditions workers have been terminated 2026-03-12T18:14:48.523799781Z I0312 18:14:48.522039 1 base_controller.go:113] All CertRotationTimeUpgradeableController workers have been terminated 2026-03-12T18:14:48.523799781Z I0312 18:14:48.522042 1 base_controller.go:113] All SCCReconcileController workers have been terminated 2026-03-12T18:14:48.523812411Z I0312 18:14:48.522046 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-12T18:14:48.523822821Z I0312 18:14:48.522050 1 base_controller.go:113] All PodSecurityReadinessController workers have been terminated 2026-03-12T18:14:48.523822821Z I0312 18:14:48.522059 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-12T18:14:48.523835381Z I0312 18:14:48.523827 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-12T18:14:48.523845362Z I0312 18:14:48.522064 1 base_controller.go:113] All WorkerLatencyProfile workers have been terminated 2026-03-12T18:14:48.523855352Z I0312 18:14:48.522079 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-12T18:14:48.523892203Z I0312 18:14:48.523863 1 builder.go:335] server exited 2026-03-12T18:14:48.523892203Z I0312 18:14:48.522087 1 base_controller.go:113] All BoundSATokenSignerController workers have been terminated 2026-03-12T18:14:48.523892203Z I0312 18:14:48.522101 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-12T18:14:48.523913533Z I0312 18:14:48.523899 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-12T18:14:48.523932124Z I0312 18:14:48.522110 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-12T18:14:48.523932124Z I0312 18:14:48.523918 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-12T18:14:48.523932124Z I0312 18:14:48.520966 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-12T18:14:48.523944064Z I0312 18:14:48.523934 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-12T18:14:48.523960405Z I0312 18:14:48.523609 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-12T18:14:48.524034476Z E0312 18:14:48.524001 1 base_controller.go:279] "Unhandled Error" err="RevisionController reconciliation failed: Post \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/configmaps\": context canceled" 2026-03-12T18:14:48.524135829Z E0312 18:14:48.524115 1 base_controller.go:279] "Unhandled Error" err="Installer reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-apiserver-Installer\": client rate limiter Wait returned an error: context canceled" 2026-03-12T18:14:48.525196906Z I0312 18:14:48.525161 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-12T18:14:48.525223387Z I0312 18:14:48.525195 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-03-12T18:14:48.525223387Z I0312 18:14:48.525204 1 base_controller.go:113] All Installer workers have been terminated 2026-03-12T18:14:48.525223387Z I0312 18:14:48.525212 1 controller_manager.go:54] Installer controller terminated 2026-03-12T18:14:48.525266238Z I0312 18:14:48.525235 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-12T18:14:48.525266238Z I0312 18:14:48.525252 1 controller_manager.go:54] RevisionController controller terminated 2026-03-12T18:14:48.525890043Z E0312 18:14:48.525830 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-12T18:14:48.526340385Z E0312 18:14:48.526281 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: [\"manifests/installer-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/serviceaccounts/installer-sa\": context canceled, \"manifests/installer-cluster-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"BackingResourceController-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-12T18:14:48.527159546Z E0312 18:14:48.527099 1 base_controller.go:279] "Unhandled Error" err="KubeAPIServerStaticResources-StaticResources reconciliation failed: [\"assets/kube-apiserver/check-endpoints-rolebinding.yaml\" (string): Get \"https://172.30.0.1:443/apis/rbac.authorization.k8s.io/v1/namespaces/openshift-kube-apiserver/rolebindings/system:openshift:controller:check-endpoints\": context canceled, \"assets/kube-apiserver/delegated-incluster-authentication-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/localhost-recovery-client-crb.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/localhost-recovery-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/apiserver.openshift.io_apirequestcount.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-flowschema.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-prioritylevelconfiguration.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-flowschema-v1beta3.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-prioritylevelconfiguration-v1beta3.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/api-usage.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/audit-errors.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/kube-apiserver-requests.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/kube-apiserver-slos-basic.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/podsecurity-violations.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/kube-apiserver-slos-extended.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"KubeAPIServerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-12T18:14:48.527159546Z I0312 18:14:48.527149 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-12T18:14:48.527198647Z I0312 18:14:48.527160 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-12T18:14:48.527415862Z I0312 18:14:48.527392 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-03-12T18:14:48.527468963Z I0312 18:14:48.527453 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-03-12T18:14:48.527543235Z I0312 18:14:48.527500 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-12T18:14:48.528744066Z I0312 18:14:48.528716 1 base_controller.go:123] Shutting down worker of KubeAPIServerStaticResources-StaticResources controller ... 2026-03-12T18:14:48.528828798Z I0312 18:14:48.528813 1 base_controller.go:113] All KubeAPIServerStaticResources-StaticResources workers have been terminated 2026-03-12T18:14:53.516653693Z I0312 18:14:53.516583 1 observer_polling.go:162] Shutting down file observer 2026-03-12T18:15:01.699179689Z E0312 18:15:01.696307 1 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{kube-apiserver-operator.189c2aab174f4558 openshift-kube-apiserver-operator 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Deployment,Namespace:openshift-kube-apiserver-operator,Name:kube-apiserver-operator,UID:544b24cd-dcb5-4807-a578-f5a0d1bb75ad,APIVersion:apps/v1,ResourceVersion:,FieldPath:,},Reason:ConfigMapCreated,Message:Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig-3 -n openshift-kube-apiserver because it was missing,Source:EventSource{Component:kube-apiserver-operator-revisioncontroller,Host:,},FirstTimestamp:2026-03-12 18:14:27.595978072 +0000 UTC m=+79.412034549,LastTimestamp:2026-03-12 18:14:27.595978072 +0000 UTC m=+79.412034549,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kube-apiserver-operator-revisioncontroller,ReportingInstance:,}" 2026-03-12T18:15:22.522006144Z E0312 18:15:22.521940 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-12T18:15:22.522006144Z W0312 18:15:22.521972 1 leaderelection.go:84] leader election lost config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-68bd585b-ddsbn.json0000640000000000000000000001362015154601571027755 0ustar0000000000000000{"metadata":{"name":"kube-apiserver-operator-68bd585b-ddsbn","generateName":"kube-apiserver-operator-68bd585b-","namespace":"openshift-kube-apiserver-operator","uid":"ab926874-9722-4e65-9084-27b2f9915450","resourceVersion":"8853","creationTimestamp":"2026-03-12T18:11:03Z","labels":{"app":"kube-apiserver-operator","pod-template-hash":"68bd585b"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.12/23\"],\"mac_address\":\"0a:58:0a:80:00:0c\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.12/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.12\"\n ],\n \"mac\": \"0a:58:0a:80:00:0c\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-apiserver-operator-68bd585b","uid":"e7988152-ac89-4906-b97a-22dca5d142a2","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","command":["cluster-kube-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-apiserver-operator","serviceAccount":"kube-apiserver-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:08Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:05Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:17:19Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:17:19Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:05Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.12","podIPs":[{"ip":"10.128.0.12"}],"startTime":"2026-03-12T18:13:05Z","containerStatuses":[{"name":"kube-apiserver-operator","state":{"running":{"startedAt":"2026-03-12T18:16:42Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-12T18:13:08Z","finishedAt":"2026-03-12T18:15:22Z","containerID":"cri-o://f47fabdc4bdd8a3562bf6c4bb328b7b2603314ba7c3e007528769af4852f929f"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","containerID":"cri-o://9213ca251d514ef6a4502ec562d995d2bad7cf3823696ef39a8b4b2403b0a326","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-etcd/logs/installer-1-master-0/installer_current.log0000640000000000000000000007242515154601571025211 0ustar00000000000000002026-03-12T18:14:27.645835304Z 2026-03-12T18:14:27.645835304Z cluster-etcd-operator rev \ 2026-03-12T18:14:27.645835304Z --endpoints=$(ALL_ETCD_ENDPOINTS) \ 2026-03-12T18:14:27.645835304Z --client-cert-file=$(ETCDCTL_CERT) \ 2026-03-12T18:14:27.645835304Z --client-key-file=$(ETCDCTL_KEY) \ 2026-03-12T18:14:27.645835304Z --client-cacert-file=$(ETCDCTL_CACERT) 2026-03-12T18:14:27.645835304Z securityContext: 2026-03-12T18:14:27.645835304Z privileged: true 2026-03-12T18:14:27.645835304Z resources: 2026-03-12T18:14:27.645835304Z requests: 2026-03-12T18:14:27.645835304Z memory: 50Mi 2026-03-12T18:14:27.645835304Z cpu: 10m 2026-03-12T18:14:27.645835304Z env: 2026-03-12T18:14:27.645835304Z - name: "ALL_ETCD_ENDPOINTS" 2026-03-12T18:14:27.645835304Z value: "https://192.168.32.10:2379" 2026-03-12T18:14:27.645835304Z - name: "ETCDCTL_API" 2026-03-12T18:14:27.645835304Z value: "3" 2026-03-12T18:14:27.645835304Z - name: "ETCDCTL_CACERT" 2026-03-12T18:14:27.645835304Z value: "/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt" 2026-03-12T18:14:27.645835304Z - name: "ETCDCTL_CERT" 2026-03-12T18:14:27.645835304Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt" 2026-03-12T18:14:27.645835304Z - name: "ETCDCTL_ENDPOINTS" 2026-03-12T18:14:27.645835304Z value: "https://192.168.32.10:2379" 2026-03-12T18:14:27.645835304Z - name: "ETCDCTL_KEY" 2026-03-12T18:14:27.645835304Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key" 2026-03-12T18:14:27.645835304Z - name: "ETCD_CIPHER_SUITES" 2026-03-12T18:14:27.645835304Z value: "TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256" 2026-03-12T18:14:27.645835304Z - name: "ETCD_DATA_DIR" 2026-03-12T18:14:27.645835304Z value: "/var/lib/etcd" 2026-03-12T18:14:27.645835304Z - name: "ETCD_ELECTION_TIMEOUT" 2026-03-12T18:14:27.645835304Z value: "2500" 2026-03-12T18:14:27.645835304Z - name: "ETCD_ENABLE_PPROF" 2026-03-12T18:14:27.645932837Z value: "true" 2026-03-12T18:14:27.645932837Z - name: "ETCD_EXPERIMENTAL_MAX_LEARNERS" 2026-03-12T18:14:27.645932837Z value: "1" 2026-03-12T18:14:27.645932837Z - name: "ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION" 2026-03-12T18:14:27.645932837Z value: "200ms" 2026-03-12T18:14:27.645932837Z - name: "ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL" 2026-03-12T18:14:27.645932837Z value: "5s" 2026-03-12T18:14:27.645932837Z - name: "ETCD_HEARTBEAT_INTERVAL" 2026-03-12T18:14:27.645932837Z value: "500" 2026-03-12T18:14:27.645932837Z - name: "ETCD_IMAGE" 2026-03-12T18:14:27.645932837Z value: "quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b" 2026-03-12T18:14:27.645932837Z - name: "ETCD_INITIAL_CLUSTER_STATE" 2026-03-12T18:14:27.645932837Z value: "existing" 2026-03-12T18:14:27.645932837Z - name: "ETCD_QUOTA_BACKEND_BYTES" 2026-03-12T18:14:27.645932837Z value: "8589934592" 2026-03-12T18:14:27.645932837Z - name: "ETCD_SOCKET_REUSE_ADDRESS" 2026-03-12T18:14:27.645932837Z value: "true" 2026-03-12T18:14:27.645932837Z - name: "ETCD_TLS_MIN_VERSION" 2026-03-12T18:14:27.645932837Z value: "TLS1.2" 2026-03-12T18:14:27.645932837Z - name: "NODE_master_0_ETCD_NAME" 2026-03-12T18:14:27.645932837Z value: "master-0" 2026-03-12T18:14:27.645932837Z - name: "NODE_master_0_ETCD_URL_HOST" 2026-03-12T18:14:27.645932837Z value: "192.168.32.10" 2026-03-12T18:14:27.645932837Z - name: "NODE_master_0_IP" 2026-03-12T18:14:27.645932837Z value: "192.168.32.10" 2026-03-12T18:14:27.645932837Z volumeMounts: 2026-03-12T18:14:27.645932837Z - mountPath: /var/lib/etcd 2026-03-12T18:14:27.645932837Z name: data-dir 2026-03-12T18:14:27.645932837Z - mountPath: /etc/kubernetes/static-pod-certs 2026-03-12T18:14:27.645932837Z name: cert-dir 2026-03-12T18:14:27.645932837Z hostNetwork: true 2026-03-12T18:14:27.645932837Z priority: 2000001000 2026-03-12T18:14:27.645932837Z priorityClassName: system-node-critical 2026-03-12T18:14:27.645932837Z tolerations: 2026-03-12T18:14:27.645932837Z - operator: "Exists" 2026-03-12T18:14:27.645932837Z volumes: 2026-03-12T18:14:27.645932837Z - hostPath: 2026-03-12T18:14:27.645932837Z path: /etc/kubernetes/manifests 2026-03-12T18:14:27.645932837Z name: static-pod-dir 2026-03-12T18:14:27.645932837Z - hostPath: 2026-03-12T18:14:27.645932837Z path: /etc/kubernetes/static-pod-resources/etcd-pod-1 2026-03-12T18:14:27.645932837Z name: resource-dir 2026-03-12T18:14:27.645932837Z - hostPath: 2026-03-12T18:14:27.645932837Z path: /etc/kubernetes/static-pod-resources/etcd-certs 2026-03-12T18:14:27.645932837Z name: cert-dir 2026-03-12T18:14:27.645932837Z - hostPath: 2026-03-12T18:14:27.645932837Z path: /var/lib/etcd 2026-03-12T18:14:27.645932837Z type: "" 2026-03-12T18:14:27.645932837Z name: data-dir 2026-03-12T18:14:27.645932837Z - hostPath: 2026-03-12T18:14:27.645932837Z path: /usr/local/bin 2026-03-12T18:14:27.645932837Z name: usr-local-bin 2026-03-12T18:14:27.645932837Z - hostPath: 2026-03-12T18:14:27.645932837Z path: /var/log/etcd 2026-03-12T18:14:27.645932837Z name: log-dir 2026-03-12T18:14:27.645932837Z - hostPath: 2026-03-12T18:14:27.645932837Z path: /etc/kubernetes 2026-03-12T18:14:27.645932837Z name: config-dir 2026-03-12T18:14:27.645932837Z - hostPath: 2026-03-12T18:14:27.645932837Z path: /var/lib/etcd-auto-backup 2026-03-12T18:14:27.645932837Z name: etcd-auto-backup-dir 2026-03-12T18:14:27.661237184Z I0312 18:14:27.661170 1 cmd.go:610] Writing pod manifest "/etc/kubernetes/static-pod-resources/etcd-pod-1/etcd-pod.yaml" ... 2026-03-12T18:14:27.668560349Z I0312 18:14:27.665133 1 cmd.go:617] Removed existing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2026-03-12T18:14:27.668560349Z I0312 18:14:27.665161 1 cmd.go:621] Writing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2026-03-12T18:14:27.668560349Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"etcd","namespace":"openshift-etcd","creationTimestamp":null,"labels":{"app":"etcd","etcd":"true","k8s-app":"etcd","revision":"1"},"annotations":{"kubectl.kubernetes.io/default-container":"etcd","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"static-pod-dir","hostPath":{"path":"/etc/kubernetes/manifests"}},{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-pod-1"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-certs"}},{"name":"data-dir","hostPath":{"path":"/var/lib/etcd","type":""}},{"name":"usr-local-bin","hostPath":{"path":"/usr/local/bin"}},{"name":"log-dir","hostPath":{"path":"/var/log/etcd"}},{"name":"config-dir","hostPath":{"path":"/etc/kubernetes"}},{"name":"etcd-auto-backup-dir","hostPath":{"path":"/var/lib/etcd-auto-backup"}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","command":["/bin/sh","-c","#!/bin/sh\necho -n \"Fixing etcd log permissions.\"\nmkdir -p /var/log/etcd \u0026\u0026 chmod 0600 /var/log/etcd\necho -n \"Fixing etcd auto backup permissions.\"\nmkdir -p /var/lib/etcd-auto-backup \u0026\u0026 chmod 0600 /var/lib/etcd-auto-backup\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-ensure-env-vars","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\n: \"${NODE_master_0_ETCD_URL_HOST?not set}\"\n: \"${NODE_master_0_ETCD_NAME?not set}\"\n: \"${NODE_master_0_IP?not set}\"\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_IP}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_IP}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected node IP to be ${NODE_IP} got ${NODE_master_0_IP}\" \u003e\u00262\n exit 1\nfi\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_ETCD_URL_HOST}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_ETCD_URL_HOST}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected etcd url host to be ${NODE_IP} got ${NODE_master_0_ETCD_URL_HOST}\" \u003e\u00262\n exit 1\nfi\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"NODE_IP","valueFrom":{"fieldRef":{"fieldPath":"status.podIP"}}}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-resources-copy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nrm -f $(grep -l '^### Created by cluster-etcd-operator' /usr/local/bin/*)\ncp -p /etc/kubernetes/static-pod-certs/configmaps/etcd-scripts/*.sh /usr/local/bin\n"],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"usr-local-bin","mountPath":"/usr/local/bin"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"etcdctl","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","command":["/bin/bash","-c","trap TERM INT; sleep infinity \u0026 wait"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"etcd","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\netcdctl member list || true\n\n# this has a non-zero return code if the command is non-zero. If you use an export first, it doesn't and you\n# will succeed when you should fail.\nETCD_INITIAL_CLUSTER=$(discover-etcd-initial-cluster \\\n --cacert=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --cert=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --key=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --endpoints=${ALL_ETCD_ENDPOINTS} \\\n --data-dir=/var/lib/etcd \\\n --target-peer-url-host=${NODE_master_0_ETCD_URL_HOST} \\\n --target-name=master-0)\nexport ETCD_INITIAL_CLUSTER\n\n# we cannot use the \"normal\" port conflict initcontainer because when we upgrade, the existing static pod will never yield,\n# so we do the detection in etcd container itself.\necho -n \"Waiting for ports 2379, 2380 and 9978 to be released.\"\ntime while [ -n \"$(ss -Htan '( sport = 2379 or sport = 2380 or sport = 9978 )')\" ]; do\n echo -n \".\"\n sleep 1\ndone\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\nenv | grep ETCD | grep -v NODE\n\nset -x\n# See https://etcd.io/docs/v3.4.0/tuning/ for why we use ionice\nexec nice -n -19 ionice -c2 -n0 etcd \\\n --logger=zap \\\n --log-level=info \\\n --experimental-initial-corrupt-check=true \\\n --snapshot-count=10000 \\\n --initial-advertise-peer-urls=https://${NODE_master_0_IP}:2380 \\\n --cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --client-cert-auth=true \\\n --peer-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --peer-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --peer-trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --peer-client-cert-auth=true \\\n --advertise-client-urls=https://${NODE_master_0_IP}:2379 \\\n --listen-client-urls=https://0.0.0.0:2379,unixs://${NODE_master_0_IP}:0 \\\n --listen-peer-urls=https://0.0.0.0:2380 \\\n --metrics=extensive \\\n --listen-metrics-urls=https://0.0.0.0:9978 || mv /etc/kubernetes/etcd-backup-dir/etcd-member.yaml /etc/kubernetes/manifests\n"],"ports":[{"name":"etcd","containerPort":2379,"protocol":"TCP"},{"name":"etcd-peer","containerPort":2380,"protocol":"TCP"},{"name":"etcd-metrics","containerPort":9978,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"300m","memory":"600Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"livenessProbe":{"httpGet":{"path":"healthz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"readinessProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"startupProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":18},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-metrics","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\n\nexec nice -n -18 etcd grpc-proxy start \\\n --endpoints https://${NODE_master_0_ETCD_URL_HOST}:9978 \\\n --metrics-addr https://0.0.0.0:9979 \\\n --listen-addr 127.0.0.1:9977 \\\n --advertise-client-url \"\" \\\n --key /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --key-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.key \\\n --cert /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --cert-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.crt \\\n --cacert /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --trusted-ca-file /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/metrics-ca-bundle.crt \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --tls-min-version $(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"proxy-metrics","containerPort":9979,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"40m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-readyz","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexec nice -n -18 cluster-etcd-operator readyz \\\n --target=https://localhost:2379 \\\n --listen-port=9980 \\\n --serving-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --serving-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT) \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --listen-tls-min-version=$(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"readyz","containerPort":9980,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd/"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-rev","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\ncluster-etcd-operator rev \\\n --endpoints=$(ALL_ETCD_ENDPOINTS) \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT)\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"data-dir","mountPath":"/var/lib/etcd"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000},"status":{}} machine-api-operator_current.log0000640000000000000000000003446115154601571033420 0ustar0000000000000000config/pod/openshift-machine-api/logs/machine-api-operator-84bf6db4f9-gnrzd2026-03-12T18:18:19.190164073Z I0312 18:18:19.189953 1 start.go:72] Version: 4.18.0-202602132343.p2.g609dbab.assembly.stream.el9 2026-03-12T18:18:19.190277446Z I0312 18:18:19.190242 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-12T18:18:19.198913486Z I0312 18:18:19.198870 1 leaderelection.go:254] attempting to acquire leader lease openshift-machine-api/machine-api-operator... 2026-03-12T18:18:19.210290647Z I0312 18:18:19.209662 1 leaderelection.go:268] successfully acquired lease openshift-machine-api/machine-api-operator 2026-03-12T18:18:19.220219481Z I0312 18:18:19.220164 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-12T18:18:19.220219481Z I0312 18:18:19.220191 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-12T18:18:19.220257572Z I0312 18:18:19.220226 1 reflector.go:305] Starting reflector *v1.MutatingWebhookConfiguration (15m44.137279331s) from k8s.io/client-go/informers/factory.go:160 2026-03-12T18:18:19.220257572Z I0312 18:18:19.220237 1 reflector.go:341] Listing and watching *v1.MutatingWebhookConfiguration from k8s.io/client-go/informers/factory.go:160 2026-03-12T18:18:19.220257572Z I0312 18:18:19.220239 1 reflector.go:305] Starting reflector *v1.Proxy (17m9.616191175s) from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-12T18:18:19.220257572Z I0312 18:18:19.220254 1 reflector.go:341] Listing and watching *v1.Proxy from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-12T18:18:19.220290093Z I0312 18:18:19.220240 1 reflector.go:305] Starting reflector *v1beta1.Machine (17m54.823843058s) from github.com/openshift/client-go/machine/informers/externalversions/factory.go:125 2026-03-12T18:18:19.220290093Z I0312 18:18:19.220281 1 reflector.go:341] Listing and watching *v1beta1.Machine from github.com/openshift/client-go/machine/informers/externalversions/factory.go:125 2026-03-12T18:18:19.220299983Z I0312 18:18:19.220273 1 reflector.go:305] Starting reflector *v1beta1.MachineSet (17m54.823843058s) from github.com/openshift/client-go/machine/informers/externalversions/factory.go:125 2026-03-12T18:18:19.220322924Z I0312 18:18:19.220262 1 reflector.go:305] Starting reflector *v1.DaemonSet (15m44.137279331s) from k8s.io/client-go/informers/factory.go:160 2026-03-12T18:18:19.220679863Z I0312 18:18:19.220307 1 reflector.go:341] Listing and watching *v1.DaemonSet from k8s.io/client-go/informers/factory.go:160 2026-03-12T18:18:19.221589626Z I0312 18:18:19.221555 1 reflector.go:305] Starting reflector *v1.ValidatingWebhookConfiguration (15m44.137279331s) from k8s.io/client-go/informers/factory.go:160 2026-03-12T18:18:19.221589626Z I0312 18:18:19.220172 1 operator.go:217] Starting Machine API Operator 2026-03-12T18:18:19.221609337Z I0312 18:18:19.221590 1 reflector.go:305] Starting reflector *v1.ClusterOperator (17m9.616191175s) from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-12T18:18:19.221609337Z I0312 18:18:19.221597 1 reflector.go:341] Listing and watching *v1.ClusterOperator from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-12T18:18:19.221609337Z I0312 18:18:19.221576 1 reflector.go:341] Listing and watching *v1.ValidatingWebhookConfiguration from k8s.io/client-go/informers/factory.go:160 2026-03-12T18:18:19.221670068Z I0312 18:18:19.221633 1 reflector.go:305] Starting reflector *v1.Deployment (15m44.137279331s) from k8s.io/client-go/informers/factory.go:160 2026-03-12T18:18:19.221670068Z I0312 18:18:19.221661 1 reflector.go:341] Listing and watching *v1.Deployment from k8s.io/client-go/informers/factory.go:160 2026-03-12T18:18:19.222267134Z I0312 18:18:19.222225 1 reflector.go:305] Starting reflector *v1.ClusterVersion (17m9.616191175s) from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-12T18:18:19.222267134Z I0312 18:18:19.222240 1 reflector.go:341] Listing and watching *v1.ClusterVersion from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-12T18:18:19.222474419Z I0312 18:18:19.222449 1 reflector.go:305] Starting reflector *v1.FeatureGate (17m9.616191175s) from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-12T18:18:19.222474419Z I0312 18:18:19.222464 1 reflector.go:341] Listing and watching *v1.FeatureGate from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-12T18:18:19.222602142Z I0312 18:18:19.220298 1 reflector.go:341] Listing and watching *v1beta1.MachineSet from github.com/openshift/client-go/machine/informers/externalversions/factory.go:125 2026-03-12T18:18:19.230434143Z I0312 18:18:19.230161 1 reflector.go:368] Caches populated for *v1.DaemonSet from k8s.io/client-go/informers/factory.go:160 2026-03-12T18:18:19.230434143Z I0312 18:18:19.230249 1 reflector.go:368] Caches populated for *v1.FeatureGate from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-12T18:18:19.230982907Z I0312 18:18:19.230952 1 reflector.go:368] Caches populated for *v1.ValidatingWebhookConfiguration from k8s.io/client-go/informers/factory.go:160 2026-03-12T18:18:19.236297423Z I0312 18:18:19.236246 1 reflector.go:368] Caches populated for *v1.MutatingWebhookConfiguration from k8s.io/client-go/informers/factory.go:160 2026-03-12T18:18:19.236297423Z I0312 18:18:19.236246 1 reflector.go:368] Caches populated for *v1beta1.MachineSet from github.com/openshift/client-go/machine/informers/externalversions/factory.go:125 2026-03-12T18:18:19.236930639Z I0312 18:18:19.236879 1 reflector.go:368] Caches populated for *v1.Proxy from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-12T18:18:19.236930639Z I0312 18:18:19.236888 1 reflector.go:368] Caches populated for *v1beta1.Machine from github.com/openshift/client-go/machine/informers/externalversions/factory.go:125 2026-03-12T18:18:19.237397271Z I0312 18:18:19.237362 1 reflector.go:368] Caches populated for *v1.ClusterVersion from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-12T18:18:19.238859438Z I0312 18:18:19.238318 1 reflector.go:368] Caches populated for *v1.Deployment from k8s.io/client-go/informers/factory.go:160 2026-03-12T18:18:19.240383077Z I0312 18:18:19.240334 1 reflector.go:368] Caches populated for *v1.ClusterOperator from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2026-03-12T18:18:19.320765502Z I0312 18:18:19.320691 1 start.go:121] Synced up machine api informer caches 2026-03-12T18:18:19.321775038Z I0312 18:18:19.321741 1 operator.go:229] Synced up caches 2026-03-12T18:18:19.321775038Z I0312 18:18:19.321766 1 operator.go:234] Started feature gate accessor 2026-03-12T18:18:19.321801638Z I0312 18:18:19.321793 1 simple_featuregate_reader.go:171] Starting feature-gate-detector 2026-03-12T18:18:19.322029784Z I0312 18:18:19.321973 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-machine-api", Name:"machine-api-operator", UID:"3b64bb57-4464-4757-87e8-5ad13ecb5d95", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'FeatureGatesInitialized' FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{"AWSEFSDriverVolumeMetrics", "AdminNetworkPolicy", "AlibabaPlatform", "AzureWorkloadIdentity", "BareMetalLoadBalancer", "BuildCSIVolumes", "ChunkSizeMiB", "CloudDualStackNodeIPs", "DisableKubeletCloudCredentialProviders", "GCPLabelsTags", "HardwareSpeed", "IngressControllerLBSubnetsAWS", "KMSv1", "ManagedBootImages", "ManagedBootImagesAWS", "MultiArchInstallAWS", "MultiArchInstallGCP", "NetworkDiagnosticsConfig", "NetworkLiveMigration", "NetworkSegmentation", "NewOLM", "NodeDisruptionPolicy", "OnClusterBuild", "PersistentIPsForVirtualization", "PrivateHostedZoneAWS", "SetEIPForNLBIngressController", "StreamingCollectionEncodingToJSON", "StreamingCollectionEncodingToProtobuf", "VSphereControlPlaneMachineSet", "VSphereDriverConfiguration", "VSphereMultiVCenters", "VSphereStaticIPs", "ValidatingAdmissionPolicy"}, Disabled:[]v1.FeatureGateName{"AWSClusterHostedDNS", "AdditionalRoutingCapabilities", "AutomatedEtcdBackup", "BootcNodeManagement", "CSIDriverSharedResource", "ClusterAPIInstall", "ClusterAPIInstallIBMCloud", "ClusterMonitoringConfig", "ConsolePluginContentSecurityPolicy", "DNSNameResolver", "DynamicResourceAllocation", "EtcdBackendQuota", "EventedPLEG", "Example", "ExternalOIDC", "ExternalOIDCWithUIDAndExtraClaimMappings", "GCPClusterHostedDNS", "GatewayAPI", "ImageStreamImportMode", "IngressControllerDynamicConfigurationManager", "InsightsConfig", "InsightsConfigAPI", "InsightsOnDemandDataGather", "InsightsRuntimeExtractor", "MachineAPIMigration", "MachineAPIOperatorDisableMachineHealthCheckController", "MachineAPIProviderOpenStack", "MachineConfigNodes", "MaxUnavailableStatefulSet", "MetricsCollectionProfiles", "MinimumKubeletVersion", "MixedCPUsAllocation", "MultiArchInstallAzure", "NodeSwap", "NutanixMultiSubnets", "OVNObservability", "OpenShiftPodSecurityAdmission", "PinnedImages", "PlatformOperators", "ProcMountType", "RouteAdvertisements", "RouteExternalCertificate", "ServiceAccountTokenNodeBinding", "SignatureStores", "SigstoreImageVerification", "TranslateStreamCloseWebsocketRequests", "UpgradeStatus", "UserNamespacesPodSecurityStandards", "UserNamespacesSupport", "VSphereMultiNetworks", "VolumeAttributesClass", "VolumeGroupSnapshot"}} 2026-03-12T18:18:19.357882861Z I0312 18:18:19.357808 1 status.go:63] Syncing status: progressing 2026-03-12T18:18:19.358130988Z I0312 18:18:19.358041 1 event.go:377] Event(v1.ObjectReference{Kind:"ClusterOperator", Namespace:"", Name:"machine-api", UID:"48a718d9-c1d9-406d-bbe3-ac3849807c8d", APIVersion:"config.openshift.io/v1", ResourceVersion:"10139", FieldPath:""}): type: 'Normal' reason: 'Status upgrade' Progressing towards operator: 4.18.34 2026-03-12T18:18:19.367486837Z I0312 18:18:19.367447 1 sync.go:77] Provider is NoOp, skipping synchronisation 2026-03-12T18:18:19.370076883Z I0312 18:18:19.370034 1 status.go:99] Syncing status: available 2026-03-12T18:18:19.523666181Z I0312 18:18:19.522289 1 request.go:632] Waited for 141.482599ms due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/apis/config.openshift.io/v1/proxies/cluster 2026-03-12T18:18:19.723233466Z I0312 18:18:19.723168 1 request.go:632] Waited for 198.355823ms due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/apis/config.openshift.io/v1/clusteroperators/machine-api 2026-03-12T18:18:19.923108088Z I0312 18:18:19.923026 1 request.go:632] Waited for 195.735906ms due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/apis/config.openshift.io/v1/clusteroperators/machine-api 2026-03-12T18:18:19.926236668Z I0312 18:18:19.926167 1 status.go:69] Syncing status: re-syncing 2026-03-12T18:18:20.123035291Z I0312 18:18:20.122955 1 request.go:632] Waited for 196.65637ms due to client-side throttling, not priority and fairness, request: PUT:https://172.30.0.1:443/apis/config.openshift.io/v1/clusteroperators/machine-api/status 2026-03-12T18:18:20.131417436Z I0312 18:18:20.131352 1 sync.go:77] Provider is NoOp, skipping synchronisation 2026-03-12T18:18:20.322468192Z I0312 18:18:20.322412 1 request.go:632] Waited for 190.979125ms due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/apis/config.openshift.io/v1/clusteroperators/machine-api 2026-03-12T18:18:20.324814252Z I0312 18:18:20.324787 1 status.go:99] Syncing status: available 2026-03-12T18:18:20.522858147Z I0312 18:18:20.522794 1 request.go:632] Waited for 197.547223ms due to client-side throttling, not priority and fairness, request: PUT:https://172.30.0.1:443/apis/config.openshift.io/v1/clusteroperators/machine-api/status 2026-03-12T18:18:20.723040627Z I0312 18:18:20.722987 1 request.go:632] Waited for 193.375526ms due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/apis/config.openshift.io/v1/infrastructures/cluster 2026-03-12T18:18:20.922658913Z I0312 18:18:20.922580 1 request.go:632] Waited for 196.237739ms due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/apis/config.openshift.io/v1/proxies/cluster 2026-03-12T18:18:21.123189072Z I0312 18:18:21.123141 1 request.go:632] Waited for 197.390339ms due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/apis/config.openshift.io/v1/clusteroperators/machine-api 2026-03-12T18:18:21.323026373Z I0312 18:18:21.322956 1 request.go:632] Waited for 196.67247ms due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/apis/config.openshift.io/v1/clusteroperators/machine-api 2026-03-12T18:18:21.327083597Z I0312 18:18:21.327038 1 status.go:69] Syncing status: re-syncing 2026-03-12T18:18:21.522334201Z I0312 18:18:21.522288 1 request.go:632] Waited for 195.09098ms due to client-side throttling, not priority and fairness, request: PUT:https://172.30.0.1:443/apis/config.openshift.io/v1/clusteroperators/machine-api/status 2026-03-12T18:18:21.527300928Z I0312 18:18:21.527250 1 sync.go:77] Provider is NoOp, skipping synchronisation 2026-03-12T18:18:21.722715455Z I0312 18:18:21.722668 1 request.go:632] Waited for 195.338556ms due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/apis/config.openshift.io/v1/clusteroperators/machine-api 2026-03-12T18:18:21.729494398Z I0312 18:18:21.728758 1 status.go:99] Syncing status: available 2026-03-12T18:18:21.922238078Z I0312 18:18:21.922191 1 request.go:632] Waited for 193.287194ms due to client-side throttling, not priority and fairness, request: PUT:https://172.30.0.1:443/apis/config.openshift.io/v1/clusteroperators/machine-api/status kube-rbac-proxy_current.log0000640000000000000000000001524715154601571032427 0ustar0000000000000000config/pod/openshift-machine-api/logs/machine-api-operator-84bf6db4f9-gnrzd2026-03-12T18:18:00.646552160Z I0312 18:18:00.645958 1 flags.go:64] FLAG: --add-dir-header="false" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646102 1 flags.go:64] FLAG: --allow-paths="[]" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646109 1 flags.go:64] FLAG: --alsologtostderr="false" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646113 1 flags.go:64] FLAG: --auth-header-fields-enabled="false" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646117 1 flags.go:64] FLAG: --auth-header-groups-field-name="x-remote-groups" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646122 1 flags.go:64] FLAG: --auth-header-groups-field-separator="|" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646125 1 flags.go:64] FLAG: --auth-header-user-field-name="x-remote-user" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646128 1 flags.go:64] FLAG: --auth-token-audiences="[]" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646132 1 flags.go:64] FLAG: --client-ca-file="" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646136 1 flags.go:64] FLAG: --config-file="/etc/kube-rbac-proxy/config-file.yaml" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646139 1 flags.go:64] FLAG: --help="false" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646142 1 flags.go:64] FLAG: --http2-disable="false" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646145 1 flags.go:64] FLAG: --http2-max-concurrent-streams="100" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646149 1 flags.go:64] FLAG: --http2-max-size="262144" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646152 1 flags.go:64] FLAG: --ignore-paths="[]" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646156 1 flags.go:64] FLAG: --insecure-listen-address="" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646158 1 flags.go:64] FLAG: --kube-api-burst="0" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646162 1 flags.go:64] FLAG: --kube-api-qps="0" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646166 1 flags.go:64] FLAG: --kubeconfig="" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646169 1 flags.go:64] FLAG: --log-backtrace-at="" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646172 1 flags.go:64] FLAG: --log-dir="" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646175 1 flags.go:64] FLAG: --log-file="" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646178 1 flags.go:64] FLAG: --log-file-max-size="0" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646182 1 flags.go:64] FLAG: --log-flush-frequency="5s" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646186 1 flags.go:64] FLAG: --logtostderr="true" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646189 1 flags.go:64] FLAG: --oidc-ca-file="" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646192 1 flags.go:64] FLAG: --oidc-clientID="" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646194 1 flags.go:64] FLAG: --oidc-groups-claim="groups" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646197 1 flags.go:64] FLAG: --oidc-groups-prefix="" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646200 1 flags.go:64] FLAG: --oidc-issuer="" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646202 1 flags.go:64] FLAG: --oidc-sign-alg="[RS256]" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646212 1 flags.go:64] FLAG: --oidc-username-claim="email" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646215 1 flags.go:64] FLAG: --oidc-username-prefix="" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646217 1 flags.go:64] FLAG: --one-output="false" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646220 1 flags.go:64] FLAG: --proxy-endpoints-port="0" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646223 1 flags.go:64] FLAG: --secure-listen-address="0.0.0.0:8443" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646226 1 flags.go:64] FLAG: --skip-headers="false" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646229 1 flags.go:64] FLAG: --skip-log-headers="false" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646232 1 flags.go:64] FLAG: --stderrthreshold="" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646234 1 flags.go:64] FLAG: --tls-cert-file="/etc/tls/private/tls.crt" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646237 1 flags.go:64] FLAG: --tls-cipher-suites="[TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305]" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646244 1 flags.go:64] FLAG: --tls-min-version="VersionTLS12" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646248 1 flags.go:64] FLAG: --tls-private-key-file="/etc/tls/private/tls.key" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646251 1 flags.go:64] FLAG: --tls-reload-interval="1m0s" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646255 1 flags.go:64] FLAG: --upstream="http://localhost:8080/" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646258 1 flags.go:64] FLAG: --upstream-ca-file="" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646260 1 flags.go:64] FLAG: --upstream-client-cert-file="" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646263 1 flags.go:64] FLAG: --upstream-client-key-file="" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646266 1 flags.go:64] FLAG: --upstream-force-h2c="false" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646269 1 flags.go:64] FLAG: --v="3" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646272 1 flags.go:64] FLAG: --version="false" 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646278 1 flags.go:64] FLAG: --vmodule="" 2026-03-12T18:18:00.646552160Z W0312 18:18:00.646288 1 deprecated.go:66] 2026-03-12T18:18:00.646552160Z ==== Removed Flag Warning ====================== 2026-03-12T18:18:00.646552160Z 2026-03-12T18:18:00.646552160Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-03-12T18:18:00.646552160Z 2026-03-12T18:18:00.646552160Z =============================================== 2026-03-12T18:18:00.646552160Z 2026-03-12T18:18:00.646552160Z I0312 18:18:00.646297 1 kube-rbac-proxy.go:530] Reading config file: /etc/kube-rbac-proxy/config-file.yaml 2026-03-12T18:18:00.649030533Z I0312 18:18:00.646893 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-03-12T18:18:00.649030533Z I0312 18:18:00.647956 1 kube-rbac-proxy.go:347] Reading certificate files 2026-03-12T18:18:00.649030533Z I0312 18:18:00.648269 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:8443 2026-03-12T18:18:00.649030533Z I0312 18:18:00.648700 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:8443 control-plane-machine-set-operator_current.log0000640000000000000000000002642515154601571040561 0ustar0000000000000000config/pod/openshift-machine-api/logs/control-plane-machine-set-operator-6686554ddc-zd9gm2026-03-12T18:17:36.509833395Z I0312 18:17:36.509536 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-12T18:17:36.510961713Z I0312 18:17:36.510913 1 simple_featuregate_reader.go:171] Starting feature-gate-detector 2026-03-12T18:17:36.521909479Z I0312 18:17:36.521867 1 recorder_logging.go:44] &Event{ObjectMeta:{dummy.189c2ad714291e10 dummy 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:dummy,Name:dummy,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:FeatureGatesInitialized,Message:FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{"AWSEFSDriverVolumeMetrics", "AdminNetworkPolicy", "AlibabaPlatform", "AzureWorkloadIdentity", "BareMetalLoadBalancer", "BuildCSIVolumes", "ChunkSizeMiB", "CloudDualStackNodeIPs", "DisableKubeletCloudCredentialProviders", "GCPLabelsTags", "HardwareSpeed", "IngressControllerLBSubnetsAWS", "KMSv1", "ManagedBootImages", "ManagedBootImagesAWS", "MultiArchInstallAWS", "MultiArchInstallGCP", "NetworkDiagnosticsConfig", "NetworkLiveMigration", "NetworkSegmentation", "NewOLM", "NodeDisruptionPolicy", "OnClusterBuild", "PersistentIPsForVirtualization", "PrivateHostedZoneAWS", "SetEIPForNLBIngressController", "StreamingCollectionEncodingToJSON", "StreamingCollectionEncodingToProtobuf", "VSphereControlPlaneMachineSet", "VSphereDriverConfiguration", "VSphereMultiVCenters", "VSphereStaticIPs", "ValidatingAdmissionPolicy"}, Disabled:[]v1.FeatureGateName{"AWSClusterHostedDNS", "AdditionalRoutingCapabilities", "AutomatedEtcdBackup", "BootcNodeManagement", "CSIDriverSharedResource", "ClusterAPIInstall", "ClusterAPIInstallIBMCloud", "ClusterMonitoringConfig", "ConsolePluginContentSecurityPolicy", "DNSNameResolver", "DynamicResourceAllocation", "EtcdBackendQuota", "EventedPLEG", "Example", "ExternalOIDC", "ExternalOIDCWithUIDAndExtraClaimMappings", "GCPClusterHostedDNS", "GatewayAPI", "ImageStreamImportMode", "IngressControllerDynamicConfigurationManager", "InsightsConfig", "InsightsConfigAPI", "InsightsOnDemandDataGather", "InsightsRuntimeExtractor", "MachineAPIMigration", "MachineAPIOperatorDisableMachineHealthCheckController", "MachineAPIProviderOpenStack", "MachineConfigNodes", "MaxUnavailableStatefulSet", "MetricsCollectionProfiles", "MinimumKubeletVersion", "MixedCPUsAllocation", "MultiArchInstallAzure", "NodeSwap", "NutanixMultiSubnets", "OVNObservability", "OpenShiftPodSecurityAdmission", "PinnedImages", "PlatformOperators", "ProcMountType", "RouteAdvertisements", "RouteExternalCertificate", "ServiceAccountTokenNodeBinding", "SignatureStores", "SigstoreImageVerification", "TranslateStreamCloseWebsocketRequests", "UpgradeStatus", "UserNamespacesPodSecurityStandards", "UserNamespacesSupport", "VSphereMultiNetworks", "VolumeAttributesClass", "VolumeGroupSnapshot"}},Source:EventSource{Component:,Host:,},FirstTimestamp:2026-03-12 18:17:36.521707024 +0000 UTC m=+0.050459893,LastTimestamp:2026-03-12 18:17:36.521707024 +0000 UTC m=+0.050459893,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:,ReportingInstance:,} 2026-03-12T18:17:36.522055193Z I0312 18:17:36.521990 1 main.go:175] FeatureGates initialized: [AWSEFSDriverVolumeMetrics AdminNetworkPolicy AlibabaPlatform AzureWorkloadIdentity BareMetalLoadBalancer BuildCSIVolumes ChunkSizeMiB CloudDualStackNodeIPs DisableKubeletCloudCredentialProviders GCPLabelsTags HardwareSpeed IngressControllerLBSubnetsAWS KMSv1 ManagedBootImages ManagedBootImagesAWS MultiArchInstallAWS MultiArchInstallGCP NetworkDiagnosticsConfig NetworkLiveMigration NetworkSegmentation NewOLM NodeDisruptionPolicy OnClusterBuild PersistentIPsForVirtualization PrivateHostedZoneAWS SetEIPForNLBIngressController StreamingCollectionEncodingToJSON StreamingCollectionEncodingToProtobuf VSphereControlPlaneMachineSet VSphereDriverConfiguration VSphereMultiVCenters VSphereStaticIPs ValidatingAdmissionPolicy AWSClusterHostedDNS AdditionalRoutingCapabilities AutomatedEtcdBackup BootcNodeManagement CSIDriverSharedResource ClusterAPIInstall ClusterAPIInstallIBMCloud ClusterMonitoringConfig ConsolePluginContentSecurityPolicy DNSNameResolver DynamicResourceAllocation EtcdBackendQuota EventedPLEG Example ExternalOIDC ExternalOIDCWithUIDAndExtraClaimMappings GCPClusterHostedDNS GatewayAPI ImageStreamImportMode IngressControllerDynamicConfigurationManager InsightsConfig InsightsConfigAPI InsightsOnDemandDataGather InsightsRuntimeExtractor MachineAPIMigration MachineAPIOperatorDisableMachineHealthCheckController MachineAPIProviderOpenStack MachineConfigNodes MaxUnavailableStatefulSet MetricsCollectionProfiles MinimumKubeletVersion MixedCPUsAllocation MultiArchInstallAzure NodeSwap NutanixMultiSubnets OVNObservability OpenShiftPodSecurityAdmission PinnedImages PlatformOperators ProcMountType RouteAdvertisements RouteExternalCertificate ServiceAccountTokenNodeBinding SignatureStores SigstoreImageVerification TranslateStreamCloseWebsocketRequests UpgradeStatus UserNamespacesPodSecurityStandards UserNamespacesSupport VSphereMultiNetworks VolumeAttributesClass VolumeGroupSnapshot] 2026-03-12T18:17:36.522460733Z I0312 18:17:36.522411 1 webhook.go:186] "skip registering a mutating webhook, object does not implement admission.Defaulter or WithDefaulter wasn't called" logger="controller-runtime.builder" GVK="machine.openshift.io/v1, Kind=ControlPlaneMachineSet" 2026-03-12T18:17:36.523877829Z I0312 18:17:36.523774 1 webhook.go:202] "Registering a validating webhook" logger="controller-runtime.builder" GVK="machine.openshift.io/v1, Kind=ControlPlaneMachineSet" path="/validate-machine-openshift-io-v1-controlplanemachineset" 2026-03-12T18:17:36.524254359Z I0312 18:17:36.524209 1 server.go:183] "Registering webhook" logger="controller-runtime.webhook" path="/validate-machine-openshift-io-v1-controlplanemachineset" 2026-03-12T18:17:36.524474614Z I0312 18:17:36.524444 1 main.go:230] "starting manager" logger="setup" 2026-03-12T18:17:36.525010638Z I0312 18:17:36.524972 1 server.go:208] "Starting metrics server" logger="controller-runtime.metrics" 2026-03-12T18:17:36.525119900Z I0312 18:17:36.525037 1 server.go:83] "starting server" name="health probe" addr="[::]:8081" 2026-03-12T18:17:36.525119900Z I0312 18:17:36.525075 1 server.go:191] "Starting webhook server" logger="controller-runtime.webhook" 2026-03-12T18:17:36.525209073Z I0312 18:17:36.525175 1 leaderelection.go:254] attempting to acquire leader lease openshift-machine-api/control-plane-machine-set-leader... 2026-03-12T18:17:36.525576832Z I0312 18:17:36.525495 1 server.go:247] "Serving metrics server" logger="controller-runtime.metrics" bindAddress=":8080" secure=false 2026-03-12T18:17:36.525700165Z I0312 18:17:36.525605 1 certwatcher.go:161] "Updated current TLS certificate" logger="controller-runtime.certwatcher" 2026-03-12T18:17:36.525945591Z I0312 18:17:36.525880 1 server.go:242] "Serving webhook server" logger="controller-runtime.webhook" host="" port=9443 2026-03-12T18:17:36.526014073Z I0312 18:17:36.525990 1 certwatcher.go:115] "Starting certificate watcher" logger="controller-runtime.certwatcher" 2026-03-12T18:17:38.556747669Z I0312 18:17:38.556678 1 leaderelection.go:268] successfully acquired lease openshift-machine-api/control-plane-machine-set-leader 2026-03-12T18:17:38.557106448Z I0312 18:17:38.556952 1 recorder.go:104] "control-plane-machine-set-operator-6686554ddc-zd9gm_4b045888-67a7-462b-8814-6ae3040a1504 became leader" logger="events" type="Normal" object={"kind":"Lease","namespace":"openshift-machine-api","name":"control-plane-machine-set-leader","uid":"84338834-a424-4ae2-a040-5b80b2e22e47","apiVersion":"coordination.k8s.io/v1","resourceVersion":"9138"} reason="LeaderElection" 2026-03-12T18:17:38.557106448Z I0312 18:17:38.557078 1 controller.go:175] "Starting EventSource" controller="controlplanemachineset" source="kind source: *v1.ControlPlaneMachineSet" 2026-03-12T18:17:38.557106448Z I0312 18:17:38.557090 1 controller.go:175] "Starting EventSource" controller="controlplanemachineset" source="kind source: *v1beta1.Machine" 2026-03-12T18:17:38.557106448Z I0312 18:17:38.557096 1 controller.go:175] "Starting EventSource" controller="controlplanemachineset" source="kind source: *v1.Node" 2026-03-12T18:17:38.557106448Z I0312 18:17:38.557102 1 controller.go:175] "Starting EventSource" controller="controlplanemachineset" source="kind source: *v1.ClusterOperator" 2026-03-12T18:17:38.557149699Z I0312 18:17:38.557109 1 controller.go:175] "Starting EventSource" controller="controlplanemachineset" source="kind source: *v1.Infrastructure" 2026-03-12T18:17:38.557149699Z I0312 18:17:38.557114 1 controller.go:183] "Starting Controller" controller="controlplanemachineset" 2026-03-12T18:17:38.557670572Z I0312 18:17:38.557581 1 controller.go:175] "Starting EventSource" controller="controlplanemachinesetgenerator" source="kind source: *v1.ControlPlaneMachineSet" 2026-03-12T18:17:38.557670572Z I0312 18:17:38.557596 1 controller.go:175] "Starting EventSource" controller="controlplanemachinesetgenerator" source="kind source: *v1beta1.Machine" 2026-03-12T18:17:38.557670572Z I0312 18:17:38.557602 1 controller.go:183] "Starting Controller" controller="controlplanemachinesetgenerator" 2026-03-12T18:17:38.720013084Z I0312 18:17:38.718133 1 controller.go:217] "Starting workers" controller="controlplanemachineset" worker count=1 2026-03-12T18:17:38.720013084Z I0312 18:17:38.718206 1 controller.go:170] "Reconciling control plane machine set" controller="controlplanemachineset" reconcileID="70f0d08d-d43f-4718-b73c-e153df7a4c3d" namespace="openshift-machine-api" name="cluster" 2026-03-12T18:17:38.720013084Z I0312 18:17:38.718279 1 controller.go:178] "No control plane machine set found, setting operator status available" controller="controlplanemachineset" reconcileID="70f0d08d-d43f-4718-b73c-e153df7a4c3d" namespace="openshift-machine-api" name="cluster" 2026-03-12T18:17:38.727897213Z I0312 18:17:38.727023 1 controller.go:217] "Starting workers" controller="controlplanemachinesetgenerator" worker count=1 2026-03-12T18:17:38.738356847Z I0312 18:17:38.738285 1 controller.go:184] "Finished reconciling control plane machine set" controller="controlplanemachineset" reconcileID="70f0d08d-d43f-4718-b73c-e153df7a4c3d" namespace="openshift-machine-api" name="cluster" 2026-03-12T18:17:38.738440759Z I0312 18:17:38.738428 1 controller.go:170] "Reconciling control plane machine set" controller="controlplanemachineset" reconcileID="cf8908aa-a079-40bd-b3b9-701f4bb2ebb0" namespace="openshift-machine-api" name="cluster" 2026-03-12T18:17:38.738493970Z I0312 18:17:38.738482 1 controller.go:178] "No control plane machine set found, setting operator status available" controller="controlplanemachineset" reconcileID="cf8908aa-a079-40bd-b3b9-701f4bb2ebb0" namespace="openshift-machine-api" name="cluster" 2026-03-12T18:17:38.738583743Z I0312 18:17:38.738570 1 controller.go:184] "Finished reconciling control plane machine set" controller="controlplanemachineset" reconcileID="cf8908aa-a079-40bd-b3b9-701f4bb2ebb0" namespace="openshift-machine-api" name="cluster" baremetal-kube-rbac-proxy_current.log0000640000000000000000000001552515154601571035426 0ustar0000000000000000config/pod/openshift-machine-api/logs/cluster-baremetal-operator-5cdb4c5598-2psgb2026-03-12T18:18:11.314751280Z I0312 18:18:11.314549 1 flags.go:64] FLAG: --add-dir-header="false" 2026-03-12T18:18:11.314751280Z I0312 18:18:11.314707 1 flags.go:64] FLAG: --allow-paths="[]" 2026-03-12T18:18:11.314751280Z I0312 18:18:11.314719 1 flags.go:64] FLAG: --alsologtostderr="false" 2026-03-12T18:18:11.314751280Z I0312 18:18:11.314722 1 flags.go:64] FLAG: --auth-header-fields-enabled="false" 2026-03-12T18:18:11.314751280Z I0312 18:18:11.314725 1 flags.go:64] FLAG: --auth-header-groups-field-name="x-remote-groups" 2026-03-12T18:18:11.314751280Z I0312 18:18:11.314729 1 flags.go:64] FLAG: --auth-header-groups-field-separator="|" 2026-03-12T18:18:11.314751280Z I0312 18:18:11.314732 1 flags.go:64] FLAG: --auth-header-user-field-name="x-remote-user" 2026-03-12T18:18:11.314751280Z I0312 18:18:11.314735 1 flags.go:64] FLAG: --auth-token-audiences="[]" 2026-03-12T18:18:11.314751280Z I0312 18:18:11.314741 1 flags.go:64] FLAG: --client-ca-file="" 2026-03-12T18:18:11.314751280Z I0312 18:18:11.314744 1 flags.go:64] FLAG: --config-file="/etc/baremetal-kube-rbac-proxy/config-file.yaml" 2026-03-12T18:18:11.314751280Z I0312 18:18:11.314747 1 flags.go:64] FLAG: --help="false" 2026-03-12T18:18:11.314874464Z I0312 18:18:11.314749 1 flags.go:64] FLAG: --http2-disable="false" 2026-03-12T18:18:11.314874464Z I0312 18:18:11.314754 1 flags.go:64] FLAG: --http2-max-concurrent-streams="100" 2026-03-12T18:18:11.314874464Z I0312 18:18:11.314758 1 flags.go:64] FLAG: --http2-max-size="262144" 2026-03-12T18:18:11.314874464Z I0312 18:18:11.314761 1 flags.go:64] FLAG: --ignore-paths="[]" 2026-03-12T18:18:11.314874464Z I0312 18:18:11.314768 1 flags.go:64] FLAG: --insecure-listen-address="" 2026-03-12T18:18:11.314874464Z I0312 18:18:11.314771 1 flags.go:64] FLAG: --kube-api-burst="0" 2026-03-12T18:18:11.314874464Z I0312 18:18:11.314775 1 flags.go:64] FLAG: --kube-api-qps="0" 2026-03-12T18:18:11.314874464Z I0312 18:18:11.314779 1 flags.go:64] FLAG: --kubeconfig="" 2026-03-12T18:18:11.314874464Z I0312 18:18:11.314782 1 flags.go:64] FLAG: --log-backtrace-at="" 2026-03-12T18:18:11.314874464Z I0312 18:18:11.314784 1 flags.go:64] FLAG: --log-dir="" 2026-03-12T18:18:11.314874464Z I0312 18:18:11.314787 1 flags.go:64] FLAG: --log-file="" 2026-03-12T18:18:11.314874464Z I0312 18:18:11.314789 1 flags.go:64] FLAG: --log-file-max-size="0" 2026-03-12T18:18:11.314874464Z I0312 18:18:11.314793 1 flags.go:64] FLAG: --log-flush-frequency="5s" 2026-03-12T18:18:11.314874464Z I0312 18:18:11.314796 1 flags.go:64] FLAG: --logtostderr="true" 2026-03-12T18:18:11.314874464Z I0312 18:18:11.314799 1 flags.go:64] FLAG: --oidc-ca-file="" 2026-03-12T18:18:11.314874464Z I0312 18:18:11.314802 1 flags.go:64] FLAG: --oidc-clientID="" 2026-03-12T18:18:11.314874464Z I0312 18:18:11.314804 1 flags.go:64] FLAG: --oidc-groups-claim="groups" 2026-03-12T18:18:11.314874464Z I0312 18:18:11.314807 1 flags.go:64] FLAG: --oidc-groups-prefix="" 2026-03-12T18:18:11.314874464Z I0312 18:18:11.314809 1 flags.go:64] FLAG: --oidc-issuer="" 2026-03-12T18:18:11.314874464Z I0312 18:18:11.314812 1 flags.go:64] FLAG: --oidc-sign-alg="[RS256]" 2026-03-12T18:18:11.314874464Z I0312 18:18:11.314819 1 flags.go:64] FLAG: --oidc-username-claim="email" 2026-03-12T18:18:11.314874464Z I0312 18:18:11.314822 1 flags.go:64] FLAG: --oidc-username-prefix="" 2026-03-12T18:18:11.314874464Z I0312 18:18:11.314824 1 flags.go:64] FLAG: --one-output="false" 2026-03-12T18:18:11.314874464Z I0312 18:18:11.314827 1 flags.go:64] FLAG: --proxy-endpoints-port="0" 2026-03-12T18:18:11.314874464Z I0312 18:18:11.314830 1 flags.go:64] FLAG: --secure-listen-address="0.0.0.0:8443" 2026-03-12T18:18:11.314874464Z I0312 18:18:11.314832 1 flags.go:64] FLAG: --skip-headers="false" 2026-03-12T18:18:11.314874464Z I0312 18:18:11.314835 1 flags.go:64] FLAG: --skip-log-headers="false" 2026-03-12T18:18:11.314874464Z I0312 18:18:11.314837 1 flags.go:64] FLAG: --stderrthreshold="" 2026-03-12T18:18:11.314874464Z I0312 18:18:11.314840 1 flags.go:64] FLAG: --tls-cert-file="/etc/tls/private/tls.crt" 2026-03-12T18:18:11.314874464Z I0312 18:18:11.314843 1 flags.go:64] FLAG: --tls-cipher-suites="[TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305]" 2026-03-12T18:18:11.314874464Z I0312 18:18:11.314852 1 flags.go:64] FLAG: --tls-min-version="VersionTLS12" 2026-03-12T18:18:11.314874464Z I0312 18:18:11.314857 1 flags.go:64] FLAG: --tls-private-key-file="/etc/tls/private/tls.key" 2026-03-12T18:18:11.314874464Z I0312 18:18:11.314860 1 flags.go:64] FLAG: --tls-reload-interval="1m0s" 2026-03-12T18:18:11.314874464Z I0312 18:18:11.314864 1 flags.go:64] FLAG: --upstream="http://localhost:8080/" 2026-03-12T18:18:11.314874464Z I0312 18:18:11.314867 1 flags.go:64] FLAG: --upstream-ca-file="" 2026-03-12T18:18:11.314874464Z I0312 18:18:11.314871 1 flags.go:64] FLAG: --upstream-client-cert-file="" 2026-03-12T18:18:11.314900194Z I0312 18:18:11.314873 1 flags.go:64] FLAG: --upstream-client-key-file="" 2026-03-12T18:18:11.314900194Z I0312 18:18:11.314876 1 flags.go:64] FLAG: --upstream-force-h2c="false" 2026-03-12T18:18:11.314900194Z I0312 18:18:11.314879 1 flags.go:64] FLAG: --v="10" 2026-03-12T18:18:11.314900194Z I0312 18:18:11.314882 1 flags.go:64] FLAG: --version="false" 2026-03-12T18:18:11.314900194Z I0312 18:18:11.314886 1 flags.go:64] FLAG: --vmodule="" 2026-03-12T18:18:11.314900194Z W0312 18:18:11.314896 1 deprecated.go:66] 2026-03-12T18:18:11.314900194Z ==== Removed Flag Warning ====================== 2026-03-12T18:18:11.314900194Z 2026-03-12T18:18:11.314900194Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-03-12T18:18:11.314900194Z 2026-03-12T18:18:11.314900194Z =============================================== 2026-03-12T18:18:11.314900194Z 2026-03-12T18:18:11.314910304Z I0312 18:18:11.314905 1 kube-rbac-proxy.go:530] Reading config file: /etc/baremetal-kube-rbac-proxy/config-file.yaml 2026-03-12T18:18:11.315582242Z I0312 18:18:11.315560 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-03-12T18:18:11.317110701Z I0312 18:18:11.316730 1 kube-rbac-proxy.go:347] Reading certificate files 2026-03-12T18:18:11.317110701Z I0312 18:18:11.316789 1 reloader.go:99] reloading key /etc/tls/private/tls.key certificate /etc/tls/private/tls.crt 2026-03-12T18:18:11.317213563Z I0312 18:18:11.317178 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:8443 2026-03-12T18:18:11.317486100Z I0312 18:18:11.317467 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:8443 cluster-baremetal-operator_current.log0000640000000000000000000001323215154601571035717 0ustar0000000000000000config/pod/openshift-machine-api/logs/cluster-baremetal-operator-5cdb4c5598-2psgb2026-03-12T18:18:10.699291469Z I0312 18:18:10.698733 1 webhook.go:104] WebhookDependenciesReady: everything ready for webhooks 2026-03-12T18:18:12.415689157Z I0312 18:18:12.415624 1 clusteroperator.go:235] "new CO status" reason="WaitingForProvisioningCR" processMessage="" message="Waiting for Provisioning CR on BareMetal Platform" 2026-03-12T18:18:12.657505902Z I0312 18:18:12.656576 1 provisioning_controller.go:651] "Network stack calculation" NetworkStack=1 2026-03-12T18:18:12.675222665Z I0312 18:18:12.673525 1 recorder_logging.go:44] &Event{ObjectMeta:{dummy.189c2adf7ee73226 dummy 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:dummy,Name:dummy,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ValidatingWebhookConfigurationCreated,Message:Created ValidatingWebhookConfiguration.admissionregistration.k8s.io/cluster-baremetal-validating-webhook-configuration because it was missing,Source:EventSource{Component:,Host:,},FirstTimestamp:2026-03-12 18:18:12.67228727 +0000 UTC m=+2.050338520,LastTimestamp:2026-03-12 18:18:12.67228727 +0000 UTC m=+2.050338520,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:,ReportingInstance:,} 2026-03-12T18:18:12.675222665Z I0312 18:18:12.673656 1 webhook.go:177] "msg"="skip registering a mutating webhook, object does not implement admission.Defaulter or WithDefaulter wasn't called" "GVK"={"Group":"metal3.io","Version":"v1alpha1","Kind":"Provisioning"} "logger"="controller-runtime.builder" 2026-03-12T18:18:12.675222665Z I0312 18:18:12.673696 1 webhook.go:193] "msg"="Registering a validating webhook" "GVK"={"Group":"metal3.io","Version":"v1alpha1","Kind":"Provisioning"} "logger"="controller-runtime.builder" "path"="/validate-metal3-io-v1alpha1-provisioning" 2026-03-12T18:18:12.675222665Z I0312 18:18:12.673770 1 server.go:183] "msg"="Registering webhook" "logger"="controller-runtime.webhook" "path"="/validate-metal3-io-v1alpha1-provisioning" 2026-03-12T18:18:12.675222665Z I0312 18:18:12.673800 1 main.go:180] starting manager 2026-03-12T18:18:12.675598534Z I0312 18:18:12.675578 1 server.go:208] "msg"="Starting metrics server" "logger"="controller-runtime.metrics" 2026-03-12T18:18:12.675922533Z I0312 18:18:12.675908 1 server.go:247] "msg"="Serving metrics server" "bindAddress"=":8080" "logger"="controller-runtime.metrics" "secure"=false 2026-03-12T18:18:12.676002305Z I0312 18:18:12.675991 1 server.go:191] "msg"="Starting webhook server" "logger"="controller-runtime.webhook" 2026-03-12T18:18:12.676242291Z I0312 18:18:12.676229 1 certwatcher.go:161] "msg"="Updated current TLS certificate" "logger"="controller-runtime.certwatcher" 2026-03-12T18:18:12.676336003Z I0312 18:18:12.676325 1 server.go:242] "msg"="Serving webhook server" "host"="" "logger"="controller-runtime.webhook" "port"=9443 2026-03-12T18:18:12.676447296Z I0312 18:18:12.676435 1 certwatcher.go:115] "msg"="Starting certificate watcher" "logger"="controller-runtime.certwatcher" 2026-03-12T18:18:12.780759434Z I0312 18:18:12.780702 1 leaderelection.go:250] attempting to acquire leader lease openshift-machine-api/cluster-baremetal-operator... 2026-03-12T18:18:12.793037908Z I0312 18:18:12.792569 1 leaderelection.go:260] successfully acquired lease openshift-machine-api/cluster-baremetal-operator 2026-03-12T18:18:12.793037908Z I0312 18:18:12.792880 1 controller.go:173] "msg"="Starting EventSource" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "source"="kind source: *v1alpha1.Provisioning" 2026-03-12T18:18:12.793037908Z I0312 18:18:12.792910 1 controller.go:173] "msg"="Starting EventSource" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "source"="kind source: *v1.Secret" 2026-03-12T18:18:12.793037908Z I0312 18:18:12.792929 1 controller.go:173] "msg"="Starting EventSource" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "source"="kind source: *v1.Deployment" 2026-03-12T18:18:12.793037908Z I0312 18:18:12.792942 1 controller.go:173] "msg"="Starting EventSource" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "source"="kind source: *v1.Service" 2026-03-12T18:18:12.793037908Z I0312 18:18:12.792957 1 controller.go:173] "msg"="Starting EventSource" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "source"="kind source: *v1.DaemonSet" 2026-03-12T18:18:12.793037908Z I0312 18:18:12.792973 1 controller.go:173] "msg"="Starting EventSource" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "source"="kind source: *v1.ClusterOperator" 2026-03-12T18:18:12.793037908Z I0312 18:18:12.792985 1 controller.go:173] "msg"="Starting EventSource" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "source"="kind source: *v1.Proxy" 2026-03-12T18:18:12.793037908Z I0312 18:18:12.792997 1 controller.go:173] "msg"="Starting EventSource" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "source"="kind source: *v1beta1.Machine" 2026-03-12T18:18:12.793037908Z I0312 18:18:12.793008 1 controller.go:181] "msg"="Starting Controller" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" 2026-03-12T18:18:13.011839154Z I0312 18:18:13.011753 1 controller.go:215] "msg"="Starting workers" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "worker count"=1 cluster-autoscaler-operator_current.log0000640000000000000000000002037015154601571036225 0ustar0000000000000000config/pod/openshift-machine-api/logs/cluster-autoscaler-operator-69576476f7-hkfnq2026-03-12T18:18:10.782656481Z I0312 18:18:10.782464 1 main.go:15] Go Version: go1.22.12 (Red Hat 1.22.12-7.el9) X:strictfipsruntime 2026-03-12T18:18:10.782792275Z I0312 18:18:10.782781 1 main.go:16] Go OS/Arch: linux/amd64 2026-03-12T18:18:10.782817585Z I0312 18:18:10.782806 1 main.go:17] Version: cluster-autoscaler-operator v4.18.0-202602132343.p2.g474ad65.assembly.stream.el9+ose-cluster-autoscaler-operator 2026-03-12T18:18:10.783039471Z I0312 18:18:10.783017 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-12T18:18:11.268322893Z I0312 18:18:11.267143 1 server.go:183] "msg"="Registering webhook" "logger"="controller-runtime.webhook" "path"="/validate-clusterautoscalers" 2026-03-12T18:18:11.268322893Z I0312 18:18:11.267199 1 server.go:183] "msg"="Registering webhook" "logger"="controller-runtime.webhook" "path"="/validate-machineautoscalers" 2026-03-12T18:18:11.268322893Z I0312 18:18:11.267426 1 main.go:41] Starting cluster-autoscaler-operator 2026-03-12T18:18:11.271728190Z I0312 18:18:11.271684 1 server.go:208] "msg"="Starting metrics server" "logger"="controller-runtime.metrics" 2026-03-12T18:18:11.272037798Z I0312 18:18:11.272006 1 server.go:247] "msg"="Serving metrics server" "bindAddress"="127.0.0.1:9191" "logger"="controller-runtime.metrics" "secure"=false 2026-03-12T18:18:11.272110570Z I0312 18:18:11.272086 1 server.go:191] "msg"="Starting webhook server" "logger"="controller-runtime.webhook" 2026-03-12T18:18:11.272429918Z I0312 18:18:11.272399 1 certwatcher.go:161] "msg"="Updated current TLS certificate" "logger"="controller-runtime.certwatcher" 2026-03-12T18:18:11.272616743Z I0312 18:18:11.272586 1 server.go:242] "msg"="Serving webhook server" "host"="" "logger"="controller-runtime.webhook" "port"=8443 2026-03-12T18:18:11.272789007Z I0312 18:18:11.272761 1 certwatcher.go:115] "msg"="Starting certificate watcher" "logger"="controller-runtime.certwatcher" 2026-03-12T18:18:11.272842809Z I0312 18:18:11.272818 1 leaderelection.go:254] attempting to acquire leader lease openshift-machine-api/cluster-autoscaler-operator-leader... 2026-03-12T18:18:12.631503307Z I0312 18:18:12.630119 1 leaderelection.go:268] successfully acquired lease openshift-machine-api/cluster-autoscaler-operator-leader 2026-03-12T18:18:12.631503307Z I0312 18:18:12.630690 1 controller.go:175] "msg"="Starting EventSource" "controller"="cluster_autoscaler_controller" "source"="kind source: *v1.ClusterAutoscaler" 2026-03-12T18:18:12.631503307Z I0312 18:18:12.630724 1 controller.go:175] "msg"="Starting EventSource" "controller"="cluster_autoscaler_controller" "source"="kind source: *v1.Deployment" 2026-03-12T18:18:12.631503307Z I0312 18:18:12.630757 1 controller.go:175] "msg"="Starting EventSource" "controller"="cluster_autoscaler_controller" "source"="kind source: *v1.Service" 2026-03-12T18:18:12.631503307Z I0312 18:18:12.630777 1 controller.go:175] "msg"="Starting EventSource" "controller"="cluster_autoscaler_controller" "source"="kind source: *v1.ServiceMonitor" 2026-03-12T18:18:12.631503307Z I0312 18:18:12.630796 1 controller.go:175] "msg"="Starting EventSource" "controller"="cluster_autoscaler_controller" "source"="kind source: *v1.PrometheusRule" 2026-03-12T18:18:12.631503307Z I0312 18:18:12.630811 1 controller.go:183] "msg"="Starting Controller" "controller"="cluster_autoscaler_controller" 2026-03-12T18:18:12.633280352Z I0312 18:18:12.631928 1 controller.go:175] "msg"="Starting EventSource" "controller"="machine_autoscaler_controller" "source"="kind source: *v1beta1.MachineAutoscaler" 2026-03-12T18:18:12.633280352Z I0312 18:18:12.631969 1 controller.go:175] "msg"="Starting EventSource" "controller"="machine_autoscaler_controller" "source"="kind source: *unstructured.Unstructured" 2026-03-12T18:18:12.633280352Z I0312 18:18:12.631989 1 controller.go:183] "msg"="Starting Controller" "controller"="machine_autoscaler_controller" 2026-03-12T18:18:12.633280352Z I0312 18:18:12.632122 1 status.go:341] Starting status reporter: cluster operator informers 2026-03-12T18:18:12.737172629Z I0312 18:18:12.733291 1 status.go:352] Starting status reporter: worker 2026-03-12T18:18:12.749049223Z I0312 18:18:12.748985 1 status.go:437] machine-api-operator not ready yet 2026-03-12T18:18:12.749049223Z W0312 18:18:12.749013 1 status.go:271] Operator status degraded: machine-api not ready 2026-03-12T18:18:12.751565717Z I0312 18:18:12.751465 1 webhookconfig.go:72] Webhook configuration status: created 2026-03-12T18:18:12.764713774Z I0312 18:18:12.764673 1 controller.go:217] "msg"="Starting workers" "controller"="machine_autoscaler_controller" "worker count"=1 2026-03-12T18:18:12.765107154Z I0312 18:18:12.765029 1 controller.go:217] "msg"="Starting workers" "controller"="cluster_autoscaler_controller" "worker count"=1 2026-03-12T18:18:12.766141300Z I0312 18:18:12.766119 1 status.go:437] machine-api-operator not ready yet 2026-03-12T18:18:12.766141300Z W0312 18:18:12.766133 1 status.go:271] Operator status degraded: machine-api not ready 2026-03-12T18:18:12.770681356Z I0312 18:18:12.770653 1 status.go:437] machine-api-operator not ready yet 2026-03-12T18:18:12.770681356Z W0312 18:18:12.770668 1 status.go:271] Operator status degraded: machine-api not ready 2026-03-12T18:18:12.979750614Z I0312 18:18:12.979561 1 status.go:437] machine-api-operator not ready yet 2026-03-12T18:18:12.979750614Z W0312 18:18:12.979594 1 status.go:271] Operator status degraded: machine-api not ready 2026-03-12T18:18:13.050777430Z I0312 18:18:13.050735 1 status.go:437] machine-api-operator not ready yet 2026-03-12T18:18:13.050829522Z W0312 18:18:13.050816 1 status.go:271] Operator status degraded: machine-api not ready 2026-03-12T18:18:13.059399031Z I0312 18:18:13.059035 1 status.go:437] machine-api-operator not ready yet 2026-03-12T18:18:13.059399031Z W0312 18:18:13.059052 1 status.go:271] Operator status degraded: machine-api not ready 2026-03-12T18:18:14.924141974Z I0312 18:18:14.924097 1 status.go:437] machine-api-operator not ready yet 2026-03-12T18:18:14.924209076Z W0312 18:18:14.924196 1 status.go:271] Operator status degraded: machine-api not ready 2026-03-12T18:18:16.531711209Z I0312 18:18:16.530433 1 status.go:437] machine-api-operator not ready yet 2026-03-12T18:18:16.531711209Z W0312 18:18:16.530458 1 status.go:271] Operator status degraded: machine-api not ready 2026-03-12T18:18:16.767132790Z I0312 18:18:16.767092 1 status.go:437] machine-api-operator not ready yet 2026-03-12T18:18:16.767186261Z W0312 18:18:16.767172 1 status.go:271] Operator status degraded: machine-api not ready 2026-03-12T18:18:19.343339109Z I0312 18:18:19.343287 1 status.go:437] machine-api-operator not ready yet 2026-03-12T18:18:19.343339109Z W0312 18:18:19.343303 1 status.go:271] Operator status degraded: machine-api not ready 2026-03-12T18:18:19.355592803Z I0312 18:18:19.355267 1 status.go:437] machine-api-operator not ready yet 2026-03-12T18:18:19.355592803Z W0312 18:18:19.355288 1 status.go:271] Operator status degraded: machine-api not ready 2026-03-12T18:18:19.372296710Z I0312 18:18:19.371557 1 status.go:437] machine-api-operator not ready yet 2026-03-12T18:18:19.372296710Z W0312 18:18:19.371576 1 status.go:271] Operator status degraded: machine-api not ready 2026-03-12T18:18:19.386688738Z I0312 18:18:19.386645 1 status.go:450] No ClusterAutoscaler. Reporting available. 2026-03-12T18:18:19.386753630Z I0312 18:18:19.386743 1 status.go:244] Operator status available: at version 4.18.34 2026-03-12T18:18:19.410961579Z I0312 18:18:19.410896 1 status.go:450] No ClusterAutoscaler. Reporting available. 2026-03-12T18:18:19.410961579Z I0312 18:18:19.410920 1 status.go:244] Operator status available: at version 4.18.34 2026-03-12T18:18:19.613618742Z I0312 18:18:19.611705 1 status.go:450] No ClusterAutoscaler. Reporting available. 2026-03-12T18:18:19.613618742Z I0312 18:18:19.611722 1 status.go:244] Operator status available: at version 4.18.34 kube-rbac-proxy_current.log0000640000000000000000000001524715154601571033574 0ustar0000000000000000config/pod/openshift-machine-api/logs/cluster-autoscaler-operator-69576476f7-hkfnq2026-03-12T18:18:00.612620895Z I0312 18:18:00.611641 1 flags.go:64] FLAG: --add-dir-header="false" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611770 1 flags.go:64] FLAG: --allow-paths="[]" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611777 1 flags.go:64] FLAG: --alsologtostderr="false" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611780 1 flags.go:64] FLAG: --auth-header-fields-enabled="false" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611783 1 flags.go:64] FLAG: --auth-header-groups-field-name="x-remote-groups" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611787 1 flags.go:64] FLAG: --auth-header-groups-field-separator="|" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611790 1 flags.go:64] FLAG: --auth-header-user-field-name="x-remote-user" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611793 1 flags.go:64] FLAG: --auth-token-audiences="[]" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611796 1 flags.go:64] FLAG: --client-ca-file="" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611800 1 flags.go:64] FLAG: --config-file="/etc/kube-rbac-proxy/config-file.yaml" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611803 1 flags.go:64] FLAG: --help="false" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611806 1 flags.go:64] FLAG: --http2-disable="false" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611809 1 flags.go:64] FLAG: --http2-max-concurrent-streams="100" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611813 1 flags.go:64] FLAG: --http2-max-size="262144" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611817 1 flags.go:64] FLAG: --ignore-paths="[]" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611821 1 flags.go:64] FLAG: --insecure-listen-address="" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611824 1 flags.go:64] FLAG: --kube-api-burst="0" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611828 1 flags.go:64] FLAG: --kube-api-qps="0" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611832 1 flags.go:64] FLAG: --kubeconfig="" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611834 1 flags.go:64] FLAG: --log-backtrace-at="" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611837 1 flags.go:64] FLAG: --log-dir="" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611840 1 flags.go:64] FLAG: --log-file="" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611843 1 flags.go:64] FLAG: --log-file-max-size="0" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611847 1 flags.go:64] FLAG: --log-flush-frequency="5s" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611850 1 flags.go:64] FLAG: --logtostderr="true" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611853 1 flags.go:64] FLAG: --oidc-ca-file="" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611856 1 flags.go:64] FLAG: --oidc-clientID="" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611859 1 flags.go:64] FLAG: --oidc-groups-claim="groups" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611861 1 flags.go:64] FLAG: --oidc-groups-prefix="" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611864 1 flags.go:64] FLAG: --oidc-issuer="" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611868 1 flags.go:64] FLAG: --oidc-sign-alg="[RS256]" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611877 1 flags.go:64] FLAG: --oidc-username-claim="email" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611880 1 flags.go:64] FLAG: --oidc-username-prefix="" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611883 1 flags.go:64] FLAG: --one-output="false" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611886 1 flags.go:64] FLAG: --proxy-endpoints-port="0" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611889 1 flags.go:64] FLAG: --secure-listen-address="0.0.0.0:9192" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611892 1 flags.go:64] FLAG: --skip-headers="false" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611894 1 flags.go:64] FLAG: --skip-log-headers="false" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611897 1 flags.go:64] FLAG: --stderrthreshold="" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611900 1 flags.go:64] FLAG: --tls-cert-file="/etc/tls/private/tls.crt" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611902 1 flags.go:64] FLAG: --tls-cipher-suites="[TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305]" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611910 1 flags.go:64] FLAG: --tls-min-version="VersionTLS12" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611914 1 flags.go:64] FLAG: --tls-private-key-file="/etc/tls/private/tls.key" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611917 1 flags.go:64] FLAG: --tls-reload-interval="1m0s" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611921 1 flags.go:64] FLAG: --upstream="http://127.0.0.1:9191/" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611924 1 flags.go:64] FLAG: --upstream-ca-file="" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611927 1 flags.go:64] FLAG: --upstream-client-cert-file="" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611930 1 flags.go:64] FLAG: --upstream-client-key-file="" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611933 1 flags.go:64] FLAG: --upstream-force-h2c="false" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611936 1 flags.go:64] FLAG: --v="3" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611939 1 flags.go:64] FLAG: --version="false" 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611943 1 flags.go:64] FLAG: --vmodule="" 2026-03-12T18:18:00.612620895Z W0312 18:18:00.611953 1 deprecated.go:66] 2026-03-12T18:18:00.612620895Z ==== Removed Flag Warning ====================== 2026-03-12T18:18:00.612620895Z 2026-03-12T18:18:00.612620895Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-03-12T18:18:00.612620895Z 2026-03-12T18:18:00.612620895Z =============================================== 2026-03-12T18:18:00.612620895Z 2026-03-12T18:18:00.612620895Z I0312 18:18:00.611962 1 kube-rbac-proxy.go:530] Reading config file: /etc/kube-rbac-proxy/config-file.yaml 2026-03-12T18:18:00.612791569Z I0312 18:18:00.612653 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-03-12T18:18:00.613802965Z I0312 18:18:00.613700 1 kube-rbac-proxy.go:347] Reading certificate files 2026-03-12T18:18:00.614453551Z I0312 18:18:00.614342 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:9192 2026-03-12T18:18:00.616313348Z I0312 18:18:00.614704 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:9192 config/pod/openshift-oauth-apiserver/logs/apiserver-6cb976c975-4sxlg/oauth-apiserver_current.log0000640000000000000000000011655115154601571031334 0ustar00000000000000002026-03-12T18:17:43.876823907Z E0312 18:17:43.876797 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:43.876879438Z E0312 18:17:43.876861 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:43.876975120Z E0312 18:17:43.876946 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:43.876987931Z E0312 18:17:43.876974 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:43.877080763Z E0312 18:17:43.877043 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:43.877197496Z E0312 18:17:43.877160 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:43.884869740Z E0312 18:17:43.884843 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:43.896210925Z E0312 18:17:43.896181 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:43.896283317Z E0312 18:17:43.896247 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:43.896283317Z E0312 18:17:43.896270 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:43.896471172Z E0312 18:17:43.896438 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:43.896637736Z E0312 18:17:43.896608 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:43.896654887Z E0312 18:17:43.896626 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:43.904100884Z E0312 18:17:43.904052 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:43.907134471Z E0312 18:17:43.907086 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:43.907134471Z E0312 18:17:43.907120 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:43.907170702Z E0312 18:17:43.907122 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:43.907227243Z E0312 18:17:43.907197 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:43.907364757Z E0312 18:17:43.907130 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:43.929477364Z E0312 18:17:43.929428 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:43.929830673Z E0312 18:17:43.929802 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:43.929988077Z E0312 18:17:43.929950 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:43.930071849Z E0312 18:17:43.930043 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:43.930117450Z E0312 18:17:43.930081 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:44.017663897Z E0312 18:17:44.017619 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:44.017780040Z E0312 18:17:44.017766 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:44.017942714Z E0312 18:17:44.017910 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:44.017942714Z E0312 18:17:44.017926 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:44.017984865Z E0312 18:17:44.017958 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:44.018031267Z E0312 18:17:44.018012 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:44.018138079Z E0312 18:17:44.018117 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:44.018191801Z E0312 18:17:44.018034 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:44.018338794Z E0312 18:17:44.017619 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:44.018758405Z E0312 18:17:44.018188 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:44.187460208Z E0312 18:17:44.186186 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:44.187460208Z E0312 18:17:44.186194 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:44.187460208Z E0312 18:17:44.186275 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:44.187460208Z E0312 18:17:44.186477 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:44.187658003Z E0312 18:17:44.187596 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:44.513647171Z E0312 18:17:44.512382 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:44.513647171Z E0312 18:17:44.512460 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:44.513647171Z E0312 18:17:44.512544 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:44.513647171Z E0312 18:17:44.512558 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:44.513647171Z E0312 18:17:44.512575 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:45.163799282Z E0312 18:17:45.163754 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:45.163994967Z E0312 18:17:45.163947 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:45.164009127Z E0312 18:17:45.163974 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:45.164105780Z E0312 18:17:45.164071 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:45.164233143Z E0312 18:17:45.164205 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:45.312431149Z E0312 18:17:45.312361 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:45.312714066Z E0312 18:17:45.312668 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:45.312826469Z E0312 18:17:45.312742 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:45.313186328Z E0312 18:17:45.313144 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:45.313319861Z E0312 18:17:45.313279 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:46.449353701Z E0312 18:17:46.449281 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:46.450198032Z E0312 18:17:46.450159 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:46.450791097Z E0312 18:17:46.450746 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:46.451358091Z E0312 18:17:46.451323 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:46.451953896Z E0312 18:17:46.451923 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:47.884684674Z E0312 18:17:47.883846 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:47.884684674Z E0312 18:17:47.884374 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:47.885173987Z E0312 18:17:47.885134 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:48.895810435Z E0312 18:17:48.895123 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:48.895810435Z E0312 18:17:48.895181 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:49.027579737Z E0312 18:17:49.026723 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:49.027579737Z E0312 18:17:49.026814 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:49.027579737Z E0312 18:17:49.026891 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:49.027579737Z E0312 18:17:49.026896 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:49.027579737Z E0312 18:17:49.026723 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:54.021895833Z E0312 18:17:54.021815 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:54.022190061Z E0312 18:17:54.022156 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:54.022361325Z E0312 18:17:54.022325 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:54.022527799Z E0312 18:17:54.022483 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:54.022721374Z E0312 18:17:54.022690 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:54.165595266Z E0312 18:17:54.163836 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:54.165595266Z E0312 18:17:54.163936 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:54.165595266Z E0312 18:17:54.164230 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:54.165595266Z E0312 18:17:54.164303 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:17:54.165595266Z E0312 18:17:54.164239 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:03.848641764Z I0312 18:18:03.848583 1 policy_source.go:224] refreshing policies 2026-03-12T18:18:04.269685259Z E0312 18:18:04.269502 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:04.269879324Z E0312 18:18:04.269857 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:04.270049978Z E0312 18:18:04.270030 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:04.270195282Z E0312 18:18:04.270152 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:04.270479789Z E0312 18:18:04.270047 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:04.414549041Z E0312 18:18:04.414484 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:04.414744616Z E0312 18:18:04.414716 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:04.414904600Z E0312 18:18:04.414492 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:04.415095355Z E0312 18:18:04.414564 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:04.415204797Z E0312 18:18:04.414596 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.942008164Z E0312 18:18:08.941314 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.942008164Z E0312 18:18:08.941865 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.942008164Z E0312 18:18:08.941945 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.942263491Z E0312 18:18:08.942196 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.942325662Z E0312 18:18:08.942300 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.942474046Z E0312 18:18:08.942454 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.942758133Z E0312 18:18:08.942723 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.942825995Z E0312 18:18:08.942459 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.943001730Z E0312 18:18:08.942970 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" 2026-03-12T18:18:08.943027990Z E0312 18:18:08.942199 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=7722836328612826307, SKID=B2:EE:54:0C:64:F2:3D:EC:B6:7B:4C:F3:C8:FB:AA:8D:66:67:13:F4, AKID=F7:7C:47:05:BC:27:A6:70:AA:D9:3E:97:9B:5C:42:91:CE:41:F7:8C failed: x509: certificate signed by unknown authority]" config/pod/openshift-ingress/router-default-79f8cd6fdd-79bhf.json0000640000000000000000000001533715154601571023274 0ustar0000000000000000{"metadata":{"name":"router-default-79f8cd6fdd-79bhf","generateName":"router-default-79f8cd6fdd-","namespace":"openshift-ingress","uid":"518ffff8-8119-41be-8b76-ce49d5751254","resourceVersion":"6214","creationTimestamp":"2026-03-12T18:13:48Z","labels":{"ingresscontroller.operator.openshift.io/deployment-ingresscontroller":"default","ingresscontroller.operator.openshift.io/hash":"9cb46c8fc","pod-template-hash":"79f8cd6fdd"},"annotations":{"openshift.io/required-scc":"hostnetwork","openshift.io/scc":"hostnetwork"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"router-default-79f8cd6fdd","uid":"7b4853a8-0121-49ac-aaf7-8ce7857c8504","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"default-certificate","secret":{"secretName":"router-certs-default","defaultMode":420}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"defaultMode":420,"optional":false}},{"name":"stats-auth","secret":{"secretName":"router-stats-default","defaultMode":420}},{"name":"metrics-certs","secret":{"secretName":"router-metrics-certs-default","defaultMode":420}},{"name":"kube-api-access-4glbr","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"router","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9b2e765b795c30c910c331c85226e5db0d56463b6c81d79ded739cba76e2b032","ports":[{"name":"http","hostPort":80,"containerPort":80,"protocol":"TCP"},{"name":"https","hostPort":443,"containerPort":443,"protocol":"TCP"},{"name":"metrics","hostPort":1936,"containerPort":1936,"protocol":"TCP"}],"env":[{"name":"DEFAULT_CERTIFICATE_DIR","value":"/etc/pki/tls/private"},{"name":"DEFAULT_DESTINATION_CA_PATH","value":"/var/run/configmaps/service-ca/service-ca.crt"},{"name":"RELOAD_INTERVAL","value":"5s"},{"name":"ROUTER_ALLOW_WILDCARD_ROUTES","value":"false"},{"name":"ROUTER_CANONICAL_HOSTNAME","value":"router-default.apps.sno.openstack.lab"},{"name":"ROUTER_CIPHERS","value":"ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384"},{"name":"ROUTER_CIPHERSUITES","value":"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256"},{"name":"ROUTER_DISABLE_HTTP2","value":"true"},{"name":"ROUTER_DISABLE_NAMESPACE_OWNERSHIP_CHECK","value":"false"},{"name":"ROUTER_DOMAIN","value":"apps.sno.openstack.lab"},{"name":"ROUTER_IDLE_CLOSE_ON_RESPONSE","value":"true"},{"name":"ROUTER_LOAD_BALANCE_ALGORITHM","value":"random"},{"name":"ROUTER_METRICS_TLS_CERT_FILE","value":"/etc/pki/tls/metrics-certs/tls.crt"},{"name":"ROUTER_METRICS_TLS_KEY_FILE","value":"/etc/pki/tls/metrics-certs/tls.key"},{"name":"ROUTER_METRICS_TYPE","value":"haproxy"},{"name":"ROUTER_SERVICE_HTTPS_PORT","value":"443"},{"name":"ROUTER_SERVICE_HTTP_PORT","value":"80"},{"name":"ROUTER_SERVICE_NAME","value":"default"},{"name":"ROUTER_SERVICE_NAMESPACE","value":"openshift-ingress"},{"name":"ROUTER_SET_FORWARDED_HEADERS","value":"append"},{"name":"ROUTER_TCP_BALANCE_SCHEME","value":"source"},{"name":"ROUTER_THREADS","value":"4"},{"name":"SSL_MIN_VERSION","value":"TLSv1.2"},{"name":"STATS_PASSWORD_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsPassword"},{"name":"STATS_PORT","value":"1936"},{"name":"STATS_USERNAME_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsUsername"}],"resources":{"requests":{"cpu":"100m","memory":"256Mi"}},"volumeMounts":[{"name":"default-certificate","readOnly":true,"mountPath":"/etc/pki/tls/private"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca"},{"name":"stats-auth","readOnly":true,"mountPath":"/var/lib/haproxy/conf/metrics-auth"},{"name":"metrics-certs","readOnly":true,"mountPath":"/etc/pki/tls/metrics-certs"},{"name":"kube-api-access-4glbr","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3,"terminationGracePeriodSeconds":10},"readinessProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":1,"successThreshold":1,"failureThreshold":120},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000650000,"runAsNonRoot":true,"readOnlyRootFilesystem":false,"allowPrivilegeEscalation":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":3600,"dnsPolicy":"ClusterFirstWithHostNet","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"router","serviceAccount":"router","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c26,c0"},"supplementalGroups":[1000650000],"fsGroup":1000650000},"schedulerName":"default-scheduler","tolerations":[{"key":"kubernetes.io/e2e-evict-taint-key","operator":"Equal","value":"evictTaintVal","effect":"NoExecute"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority","topologySpreadConstraints":[{"maxSkew":1,"topologyKey":"topology.kubernetes.io/zone","whenUnsatisfiable":"ScheduleAnyway","labelSelector":{"matchExpressions":[{"key":"ingresscontroller.operator.openshift.io/hash","operator":"In","values":["9cb46c8fc"]}]}}]},"status":{"phase":"Pending","conditions":[{"type":"PodScheduled","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:48Z","reason":"Unschedulable","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling."}],"qosClass":"Burstable"}}authentication-operator_current.log0000640000000000000000000007300615154601571037375 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-7c6989d6c4-ljw8b2026-03-12T18:17:38.516020442Z E0312 18:17:38.510392 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.45.215:443/healthz\": dial tcp 172.30.45.215:443: connect: connection refused" 2026-03-12T18:17:38.516020442Z I0312 18:17:38.513101 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Degraded message changed from "APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\nAPIServerWorkloadDegraded: \"deployments\": invalid dependency reference: \"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\"\nAPIServerWorkloadDegraded: \nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.45.215:443/healthz\": dial tcp 172.30.45.215:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready" to "IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.45.215:443/healthz\": dial tcp 172.30.45.215:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready",Progressing changed from True to False ("AuthenticatorCertKeyProgressing: All is well"),Available message changed from "APIServerDeploymentAvailable: deployment/openshift-oauth-apiserver: could not be retrieved\nAPIServicesAvailable: PreconditionNotReady\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.45.215:443/healthz\": dial tcp 172.30.45.215:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods)." to "APIServicesAvailable: PreconditionNotReady\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.45.215:443/healthz\": dial tcp 172.30.45.215:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods)." 2026-03-12T18:17:39.015117044Z W0312 18:17:39.015061 1 reflector.go:561] github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io) 2026-03-12T18:17:39.015167045Z E0312 18:17:39.015117 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: Failed to watch *v1.OAuthClient: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io)" 2026-03-12T18:17:39.634848227Z I0312 18:17:39.634781 1 request.go:700] Waited for 1.124475968s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-oauth-apiserver/secrets/etcd-client 2026-03-12T18:17:40.834287295Z I0312 18:17:40.834184 1 request.go:700] Waited for 1.19680244s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-oauth-apiserver/configmaps/etcd-serving-ca 2026-03-12T18:17:43.849588120Z I0312 18:17:43.847967 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'Created' Created /v1.user.openshift.io because it was missing 2026-03-12T18:17:43.851315594Z W0312 18:17:43.851086 1 dynamic_operator_client.go:352] .status.conditions["APIServicesDegraded"].reason is missing; this will eventually be fatal 2026-03-12T18:17:43.851315594Z W0312 18:17:43.851126 1 dynamic_operator_client.go:355] .status.conditions["APIServicesDegraded"].message is missing; this will eventually be fatal 2026-03-12T18:17:43.881609057Z E0312 18:17:43.881495 1 base_controller.go:279] "Unhandled Error" err="openshift-apiserver-APIService reconciliation failed: the server was unable to return a response in the time allotted, but may still be processing the request (get apiservices.apiregistration.k8s.io v1.oauth.openshift.io)" 2026-03-12T18:17:43.895554049Z W0312 18:17:43.892534 1 dynamic_operator_client.go:352] .status.conditions["APIServicesDegraded"].reason is missing; this will eventually be fatal 2026-03-12T18:17:43.895554049Z W0312 18:17:43.892565 1 dynamic_operator_client.go:355] .status.conditions["APIServicesDegraded"].message is missing; this will eventually be fatal 2026-03-12T18:17:43.896125513Z I0312 18:17:43.896068 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-12T18:17:14Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.45.215:443/healthz\": dial tcp 172.30.45.215:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready","reason":"IngressStateEndpoints_MissingSubsets::OAuthServerServiceEndpointAccessibleController_SyncError::OAuthServerServiceEndpointsEndpointAccessibleController_SyncError","status":"True","type":"Degraded"},{"lastTransitionTime":"2026-03-12T18:17:38Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2026-03-12T18:13:41Z","message":"APIServicesAvailable: the server was unable to return a response in the time allotted, but may still be processing the request (get apiservices.apiregistration.k8s.io v1.oauth.openshift.io)\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.45.215:443/healthz\": dial tcp 172.30.45.215:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-12T18:13:41Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-12T18:13:40Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-12T18:17:43.904399792Z E0312 18:17:43.898272 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-03-12T18:17:43.904399792Z E0312 18:17:43.898857 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.45.215:443/healthz\": dial tcp 172.30.45.215:443: connect: connection refused" 2026-03-12T18:17:43.910887105Z I0312 18:17:43.910812 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Available message changed from "APIServicesAvailable: PreconditionNotReady\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.45.215:443/healthz\": dial tcp 172.30.45.215:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods)." to "APIServicesAvailable: the server was unable to return a response in the time allotted, but may still be processing the request (get apiservices.apiregistration.k8s.io v1.oauth.openshift.io)\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.45.215:443/healthz\": dial tcp 172.30.45.215:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods)." 2026-03-12T18:17:43.919852341Z E0312 18:17:43.919783 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-12T18:17:43.919852341Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401 2026-03-12T18:17:43.919852341Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401 2026-03-12T18:17:43.919852341Z > 2026-03-12T18:17:43.921870042Z E0312 18:17:43.921823 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready" 2026-03-12T18:17:43.923155215Z I0312 18:17:43.923092 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-12T18:17:14Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.45.215:443/healthz\": dial tcp 172.30.45.215:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready","reason":"IngressStateEndpoints_MissingSubsets::OAuthServerServiceEndpointAccessibleController_SyncError::OAuthServerServiceEndpointsEndpointAccessibleController_SyncError","status":"True","type":"Degraded"},{"lastTransitionTime":"2026-03-12T18:17:38Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2026-03-12T18:13:41Z","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.45.215:443/healthz\": dial tcp 172.30.45.215:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-12T18:13:41Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-12T18:13:40Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-12T18:17:43.924470448Z E0312 18:17:43.924406 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.45.215:443/healthz\": dial tcp 172.30.45.215:443: connect: connection refused" 2026-03-12T18:17:43.931753601Z E0312 18:17:43.931679 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-12T18:17:43.931753601Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401 2026-03-12T18:17:43.931753601Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401 2026-03-12T18:17:43.931753601Z > 2026-03-12T18:17:43.935289101Z I0312 18:17:43.935217 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Available message changed from "APIServicesAvailable: the server was unable to return a response in the time allotted, but may still be processing the request (get apiservices.apiregistration.k8s.io v1.oauth.openshift.io)\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.45.215:443/healthz\": dial tcp 172.30.45.215:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods)." to "APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.45.215:443/healthz\": dial tcp 172.30.45.215:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods)." 2026-03-12T18:17:43.952852123Z E0312 18:17:43.952777 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-12T18:17:43.952852123Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401 2026-03-12T18:17:43.952852123Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401 2026-03-12T18:17:43.952852123Z > 2026-03-12T18:17:44.040751949Z E0312 18:17:44.040692 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-12T18:17:44.040751949Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401 2026-03-12T18:17:44.040751949Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401 2026-03-12T18:17:44.040751949Z > 2026-03-12T18:17:44.214333145Z E0312 18:17:44.214253 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-12T18:17:44.214333145Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401 2026-03-12T18:17:44.214333145Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401 2026-03-12T18:17:44.214333145Z > 2026-03-12T18:17:44.546577701Z E0312 18:17:44.546464 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-12T18:17:44.546577701Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401 2026-03-12T18:17:44.546577701Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401 2026-03-12T18:17:44.546577701Z > 2026-03-12T18:17:45.033577969Z I0312 18:17:45.033456 1 request.go:700] Waited for 1.138330597s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-config-managed/secrets/router-certs 2026-03-12T18:17:45.197604104Z E0312 18:17:45.197486 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-12T18:17:45.197604104Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401 2026-03-12T18:17:45.197604104Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401 2026-03-12T18:17:45.197604104Z > 2026-03-12T18:17:46.196202709Z E0312 18:17:46.196130 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-12T18:17:46.196202709Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401 2026-03-12T18:17:46.196202709Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401 2026-03-12T18:17:46.196202709Z > 2026-03-12T18:17:46.234032063Z I0312 18:17:46.233947 1 request.go:700] Waited for 1.196834742s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-authentication/secrets/v4-0-config-system-router-certs 2026-03-12T18:17:46.487468532Z E0312 18:17:46.487397 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-12T18:17:46.487468532Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401 2026-03-12T18:17:46.487468532Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401 2026-03-12T18:17:46.487468532Z > 2026-03-12T18:17:47.439564663Z I0312 18:17:47.436715 1 request.go:700] Waited for 1.192346108s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-config-managed/secrets/router-certs 2026-03-12T18:17:51.620019152Z E0312 18:17:51.619890 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-12T18:17:51.620019152Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401 2026-03-12T18:17:51.620019152Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401 2026-03-12T18:17:51.620019152Z > 2026-03-12T18:17:52.191966351Z E0312 18:17:52.191894 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-12T18:17:52.191966351Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401 2026-03-12T18:17:52.191966351Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401 2026-03-12T18:17:52.191966351Z > 2026-03-12T18:17:52.201011979Z E0312 18:17:52.200969 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-12T18:17:52.201011979Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401 2026-03-12T18:17:52.201011979Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401 2026-03-12T18:17:52.201011979Z > 2026-03-12T18:17:56.198913165Z E0312 18:17:56.198834 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-12T18:17:56.198913165Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401 2026-03-12T18:17:56.198913165Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401 2026-03-12T18:17:56.198913165Z > 2026-03-12T18:17:58.473745853Z W0312 18:17:58.473609 1 reflector.go:561] github.com/openshift/client-go/route/informers/externalversions/factory.go:125: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-12T18:17:58.473745853Z E0312 18:17:58.473668 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/route/informers/externalversions/factory.go:125: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io)" 2026-03-12T18:17:59.053564161Z E0312 18:17:59.052281 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-12T18:17:59.053564161Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401 2026-03-12T18:17:59.053564161Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401 2026-03-12T18:17:59.053564161Z > 2026-03-12T18:18:01.613569718Z E0312 18:18:01.610777 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-12T18:18:01.613569718Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401 2026-03-12T18:18:01.613569718Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401 2026-03-12T18:18:01.613569718Z > 2026-03-12T18:18:01.936912849Z E0312 18:18:01.936640 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-12T18:18:01.936912849Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401 2026-03-12T18:18:01.936912849Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401 2026-03-12T18:18:01.936912849Z > 2026-03-12T18:18:06.198986808Z E0312 18:18:06.198909 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-12T18:18:06.198986808Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401 2026-03-12T18:18:06.198986808Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401 2026-03-12T18:18:06.198986808Z > 2026-03-12T18:18:14.710506520Z E0312 18:18:14.710433 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://172.30.45.215:443/healthz\": dial tcp 172.30.45.215:443: connect: connection refused" 2026-03-12T18:18:15.602755060Z W0312 18:18:15.602682 1 reflector.go:561] github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io) 2026-03-12T18:18:15.602755060Z E0312 18:18:15.602736 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: Failed to watch *v1.OAuthClient: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io)" 2026-03-12T18:18:16.531622156Z E0312 18:18:16.530118 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-12T18:18:16.531622156Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401 2026-03-12T18:18:16.531622156Z apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401 2026-03-12T18:18:16.531622156Z > events/openshift-operator-lifecycle-manager.json0000640000000000000000000003176315154601571020653 0ustar0000000000000000{"items":[{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:07:17Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:07:27Z","reason":"ScalingReplicaSet","message":"Scaled up replica set package-server-manager-854648ff6d to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:07:29Z","reason":"ScalingReplicaSet","message":"Scaled up replica set olm-operator-d64cfc9db to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:07:30Z","reason":"ScalingReplicaSet","message":"Scaled up replica set catalog-operator-7d9c49f57b to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:07:30Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-d64cfc9db-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:07:30Z","reason":"FailedCreate","message":"Error creating: pods \"catalog-operator-7d9c49f57b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:07:30Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-854648ff6d-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:10:57Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:11:00Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-854648ff6d-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:11:00Z","reason":"FailedCreate","message":"Error creating: pods \"catalog-operator-7d9c49f57b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:11:00Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-d64cfc9db-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:11:02Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:11:02Z","reason":"SuccessfulCreate","message":"Created pod: package-server-manager-854648ff6d-kwv7s","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:11:02Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:11:02Z","reason":"SuccessfulCreate","message":"Created pod: catalog-operator-7d9c49f57b-pslh7","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:11:02Z","reason":"SuccessfulCreate","message":"Created pod: olm-operator-d64cfc9db-npt4r","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:11:02Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:13:05Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/olm-operator-d64cfc9db-npt4r to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:13:05Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/catalog-operator-7d9c49f57b-pslh7 to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:13:05Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/package-server-manager-854648ff6d-kwv7s to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:13:13Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:13:13Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"catalog-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:13:13Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:13:36Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:13:36Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"catalog-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:13:36Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:13:54Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.7/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:13:54Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.25/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:13:54Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:13:54Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.11/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:13:54Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:13:55Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:13:55Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:13:55Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:13:55Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:14:10Z","reason":"Started","message":"Started container catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:14:10Z","reason":"Started","message":"Started container package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:14:10Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\" in 15.057s (15.057s including waiting). Image size: 862633255 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:14:10Z","reason":"Started","message":"Started container olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:14:10Z","reason":"Created","message":"Created container: catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:14:10Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\" in 15.044s (15.044s including waiting). Image size: 862633255 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:14:10Z","reason":"Created","message":"Created container: package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:14:10Z","reason":"Created","message":"Created container: olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:14:10Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\" in 15.202s (15.202s including waiting). Image size: 862633255 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:14:11Z","reason":"LeaderElection","message":"package-server-manager-854648ff6d-kwv7s_381e587a-2f47-4b9a-adad-4b48f257e82c became leader","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:14:14Z","reason":"NoOperatorGroup","message":"csv in namespace with no operatorgroups","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:17:51Z","reason":"RequirementsUnknown","message":"InstallModes now support target namespaces","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:17:51Z","reason":"AllRequirementsMet","message":"all requirements found, attempting install","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:17:52Z","reason":"InstallSucceeded","message":"waiting for install components to report healthy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:17:52Z","reason":"InstallWaiting","message":"apiServices not installed","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:17:58Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:17:58Z","reason":"ScalingReplicaSet","message":"Scaled up replica set packageserver-694648486f to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:17:59Z","reason":"SuccessfulCreate","message":"Created pod: packageserver-694648486f-f89lc","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:18:00Z","reason":"Started","message":"Started container packageserver","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:18:00Z","reason":"Created","message":"Created container: packageserver","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:18:00Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T18:18:00Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.70/23] from ovn-kubernetes","type":"Normal"}]}events/openshift-apiserver.json0000640000000000000000000001310215154601571015436 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T18:13:40Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-85689756c5 to 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T18:13:40Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver/apiserver-85689756c5-8jg6d to master-0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T18:13:40Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-85689756c5-8jg6d","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T18:13:41Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T18:13:43Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T18:13:43Z","reason":"ScalingReplicaSet","message":"Scaled down replica set apiserver-85689756c5 to 0 from 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T18:13:43Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-5786c989f8-f6jgb","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T18:13:43Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-5786c989f8 to 1 from 0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T18:13:43Z","reason":"SuccessfulDelete","message":"Deleted pod: apiserver-85689756c5-8jg6d","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T18:13:43Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"audit\" : configmap \"audit-0\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T18:13:45Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver/apiserver-5786c989f8-f6jgb to master-0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T18:13:47Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b\"","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T18:13:47Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.37/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T18:13:54Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T18:13:54Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T18:13:54Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T18:13:54Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b\" in 6.699s (6.699s including waiting). Image size: 589379637 bytes.","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T18:13:55Z","reason":"Started","message":"Started container openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T18:13:55Z","reason":"Created","message":"Created container: openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T18:13:55Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T18:13:55Z","reason":"Started","message":"Started container openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T18:13:55Z","reason":"Created","message":"Created container: openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T18:14:06Z","reason":"Unhealthy","message":"Startup probe failed: HTTP probe failed with statuscode: 500","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T18:14:06Z","reason":"ProbeError","message":"Startup probe error: HTTP probe failed with statuscode: 500\nbody: [+]ping ok\n[+]log ok\n[+]etcd ok\n[+]poststarthook/start-apiserver-admission-initializer ok\n[+]poststarthook/generic-apiserver-start-informers ok\n[+]poststarthook/max-in-flight-filter ok\n[+]poststarthook/storage-object-count-tracker-hook ok\n[+]poststarthook/image.openshift.io-apiserver-caches ok\n[-]poststarthook/authorization.openshift.io-bootstrapclusterroles failed: reason withheld\n[+]poststarthook/authorization.openshift.io-ensurenodebootstrap-sa ok\n[+]poststarthook/project.openshift.io-projectcache ok\n[+]poststarthook/project.openshift.io-projectauthorizationcache ok\n[+]poststarthook/openshift.io-startinformers ok\n[+]poststarthook/openshift.io-restmapperupdater ok\n[+]poststarthook/quota.openshift.io-clusterquotamapping ok\nlivez check failed\n\n","type":"Warning"}]}events/openshift-apiserver-operator.json0000640000000000000000000010350115154601571017272 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:07:14Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-apiserver-operator-799b6db4d7 to 1","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:07:25Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-799b6db4d7-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:11:01Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-799b6db4d7-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:11:03Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:11:03Z","reason":"SuccessfulCreate","message":"Created pod: openshift-apiserver-operator-799b6db4d7-6qlzz","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:05Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver-operator/openshift-apiserver-operator-799b6db4d7-6qlzz to master-0","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:07Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.22/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:07Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:21Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:23Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab\" in 1.457s (1.457s including waiting). Image size: 512273539 bytes.","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:24Z","reason":"LeaderElection","message":"openshift-apiserver-operator-799b6db4d7-6qlzz_47b85e5c-e1c5-4ca7-9b7c-72a4128755c3 became leader","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:24Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:24Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"operator\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to True (\"All is well\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [] to [{\"operator.openshift.io\" \"openshiftapiservers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver\"} {\"\" \"namespaces\" \"\" \"openshift-etcd-operator\"} {\"\" \"endpoints\" \"openshift-etcd\" \"host-etcd-2\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-apiserver\" \"\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.apps.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.authorization.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.build.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.image.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.project.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.quota.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.route.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.security.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.template.openshift.io\"}],status.versions changed from [] to [{\"operator\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:25Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:25Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:25Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"All is well\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:25Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:25Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \",Available changed from Unknown to False (\"\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:25Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:25Z","reason":"RoutingConfigSubdomainChanged","message":"Domain changed from \"\" to \"apps.sno.openstack.lab\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:25Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:25Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:25Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:25Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t},\n+ \t\"projectConfig\": map[string]any{\"projectRequestMessage\": string(\"\")},\n+ \t\"routingConfig\": map[string]any{\"subdomain\": string(\"apps.sno.openstack.lab\")},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n+ \t\"storageConfig\": map[string]any{\"urls\": []any{string(\"https://192.168.32.10:2379\")}},\n  }\n","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:26Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:26Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:28Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:28Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:28Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:28Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:28Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:29Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:30Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:32Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-apiserver-sa -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:32Z","reason":"ConfigMapCreated","message":"Created ConfigMap/image-import-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:32Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:32Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \" to \"APIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:32Z","reason":"ConfigMapCreated","message":"Created ConfigMap/trusted-ca-bundle -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:33Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:39Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from False to True (\"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"APIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \" to \"All is well\",Progressing message changed from \"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\",Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:43Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-apiserver because it changed","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:13:47Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:14:11Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.apps.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:14:11Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.authorization.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:14:11Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.build.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:14:11Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.image.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:14:11Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"openshift-apiserver\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:14:11Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.project.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:14:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: status.versions changed from [{\"operator\" \"4.18.34\"}] to [{\"operator\" \"4.18.34\"} {\"openshift-apiserver\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:14:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from True to False (\"All is well\"),Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:14:11Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.quota.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:14:11Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.route.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:14:12Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.security.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:14:12Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.template.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:14:12Z","reason":"OpenShiftAPICheckFailed","message":"\"apps.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:14:12Z","reason":"OpenShiftAPICheckFailed","message":"\"authorization.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:14:12Z","reason":"OpenShiftAPICheckFailed","message":"\"build.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:14:13Z","reason":"OpenShiftAPICheckFailed","message":"\"image.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:14:13Z","reason":"OpenShiftAPICheckFailed","message":"\"project.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:14:13Z","reason":"OpenShiftAPICheckFailed","message":"\"quota.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:14:13Z","reason":"OpenShiftAPICheckFailed","message":"\"route.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:14:13Z","reason":"OpenShiftAPICheckFailed","message":"\"security.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:14:13Z","reason":"OpenShiftAPICheckFailed","message":"\"template.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:14:13Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:14:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/apps.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/authorization.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/build.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/image.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/project.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/quota.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/route.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/security.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/template.openshift.io/v1: 401\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:16:41Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:16:42Z","reason":"Created","message":"Created container: openshift-apiserver-operator","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T18:16:42Z","reason":"Started","message":"Started container openshift-apiserver-operator","type":"Normal"}]}events/openshift-kube-scheduler-operator.json0000640000000000000000000007705115154601571020206 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:07:13Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-kube-scheduler-operator-5c74bfc494 to 1","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:07:23Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-5c74bfc494-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:10:59Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-5c74bfc494-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:11:02Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:11:02Z","reason":"SuccessfulCreate","message":"Created pod: openshift-kube-scheduler-operator-5c74bfc494-dpb6k","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:05Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-5c74bfc494-dpb6k to master-0","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:07Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.6/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:07Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:20Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:22Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" in 1.717s (1.717s including waiting). Image size: 506394574 bytes.","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:23Z","reason":"LeaderElection","message":"openshift-kube-scheduler-operator-5c74bfc494-dpb6k_9c3ecb88-8886-4c96-9820-1fc98e81b80e became leader","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:23Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"All is well\" to \"NodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:24Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:24Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:24Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:24Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-scheduler version \"raw-internal\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-scheduler\" \"\"}] to [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\",Progressing changed from Unknown to False (\"NodeInstallerProgressing: 1 node is at revision 0\"),Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:24Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:24Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:26Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-scheduler because it changed","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:26Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:26Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:26Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-scheduler-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:27Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-scheduler -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:27Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler:public-2 because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:27Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:27Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:28Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:29Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-kube-scheduler-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:29Z","reason":"ServiceCreated","message":"Created Service/scheduler -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:29Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:30Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:32Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:32Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:32Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:32Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:32Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:32Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:33Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:37Z","reason":"SecretCreated","message":"Created Secret/serving-cert-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:38Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:39Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:39Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:40Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:40Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:40Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler:\ncause by changes in data.pod.yaml","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:40Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:47Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:47Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:48Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:49Z","reason":"StartingNewRevision","message":"new revision 3 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:51Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:53Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:53Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:13:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:14:00Z","reason":"SecretCreated","message":"Created Secret/serving-cert-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:14:01Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-scheduler:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:14:01Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:14:01Z","reason":"RevisionTriggered","message":"new revision 3 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:14:01Z","reason":"StartingNewRevision","message":"new revision 4 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:14:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:14:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:14:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:14:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:14:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:14:04Z","reason":"SecretCreated","message":"Created Secret/serving-cert-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:14:04Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:14:06Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:14:06Z","reason":"PodCreated","message":"Created Pod/installer-3-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:14:06Z","reason":"RevisionTriggered","message":"new revision 4 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:14:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 4\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 4\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:14:12Z","reason":"PodCreated","message":"Created Pod/installer-4-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:16:41Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:16:42Z","reason":"Created","message":"Created container: kube-scheduler-operator-container","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T18:16:42Z","reason":"Started","message":"Started container kube-scheduler-operator-container","type":"Normal"}]}events/openshift-kube-scheduler.json0000640000000000000000000000703315154601571016346 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-12T18:13:40Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.35/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-12T18:13:40Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-12T18:13:41Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-12T18:13:41Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-12T18:13:51Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-12T18:13:55Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.43/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-12T18:13:55Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-12T18:13:55Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-12T18:13:55Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-12T18:14:04Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-12T18:14:10Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.44/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-12T18:14:10Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-12T18:14:10Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-12T18:14:10Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-12T18:14:11Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-12T18:14:13Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.52/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-12T18:14:16Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-12T18:14:17Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-12T18:14:17Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-controller-manager-operator.json0000640000000000000000000013613015154601571022015 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:07:13Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-controller-manager-operator-86d7cdfdfb to 1","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:07:24Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-86d7cdfdfb-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:11:01Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-86d7cdfdfb-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:11:04Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:11:04Z","reason":"SuccessfulCreate","message":"Created pod: kube-controller-manager-operator-86d7cdfdfb-w7xvp","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:05Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-controller-manager-operator/kube-controller-manager-operator-86d7cdfdfb-w7xvp to master-0","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:07Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.19/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:07Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:21Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:22Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\" in 1.138s (1.138s including waiting). Image size: 508888174 bytes.","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:24Z","reason":"LeaderElection","message":"kube-controller-manager-operator-86d7cdfdfb-w7xvp_4f5e5f65-037b-4f55-b986-fe832854f48d became leader","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:24Z","reason":"CABundleUpdateRequired","message":"\"csr-controller-signer-ca\" in \"openshift-kube-controller-manager-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"InstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\",Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded changed from Unknown to False (\"InstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\"),Progressing changed from Unknown to False (\"All is well\"),Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; \")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:24Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"\" \"nodes\" \"\" \"\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"} {\"\" \"nodes\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:24Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-controller-manager version \"raw-internal\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:25Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:25Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"extendedArguments\": map[string]any{\n+ \t\t\"cluster-cidr\": []any{string(\"10.128.0.0/16\")},\n+ \t\t\"cluster-name\": []any{string(\"sno-ckprl\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")},\n+ \t},\n+ \t\"featureGates\": []any{\n+ \t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"),\n+ \t\tstring(\"DisableKubeletCloudCredentialProviders=true\"),\n+ \t\tstring(\"GCPLabelsTags=true\"), string(\"HardwareSpeed=true\"),\n+ \t\tstring(\"IngressControllerLBSubnetsAWS=true\"), string(\"KMSv1=true\"),\n+ \t\tstring(\"ManagedBootImages=true\"), string(\"ManagedBootImagesAWS=true\"),\n+ \t\tstring(\"MultiArchInstallAWS=true\"), ...,\n+ \t},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:25Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\" to \"InstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:26Z","reason":"TargetUpdateRequired","message":"\"csr-signer\" in \"openshift-kube-controller-manager-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:26Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:26Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; \" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:27Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/csr-controller-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:28Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:28Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-controller-manager-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:28Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:28Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-controller-manager because it changed","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:29Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:29Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:29Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-controller-manager -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:29Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:29Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:29Z","reason":"ObservedConfigWriteError","message":"Failed to write observed config: Operation cannot be fulfilled on kubecontrollermanagers.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:29Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:29Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\" to \"InstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubecontrollermanagers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:30Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated featureGates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:30Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:32Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:32Z","reason":"ObserveServiceCAConfigMap","message":"observed change in config","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:32Z","reason":"ServiceCreated","message":"Created Service/kube-controller-manager -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:32Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"extendedArguments\": map[string]any{\n+ \t\t\"cluster-cidr\": []any{string(\"10.128.0.0/16\")},\n+ \t\t\"cluster-name\": []any{string(\"sno-ckprl\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")},\n+ \t},\n+ \t\"featureGates\": []any{\n+ \t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"),\n+ \t\tstring(\"DisableKubeletCloudCredentialProviders=true\"),\n+ \t\tstring(\"GCPLabelsTags=true\"), string(\"HardwareSpeed=true\"),\n+ \t\tstring(\"IngressControllerLBSubnetsAWS=true\"), string(\"KMSv1=true\"),\n+ \t\tstring(\"ManagedBootImages=true\"), string(\"ManagedBootImagesAWS=true\"),\n+ \t\tstring(\"MultiArchInstallAWS=true\"), ...,\n+ \t},\n+ \t\"serviceServingCert\": map[string]any{\n+ \t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resources/configmaps/service-ca/ca-bundle.crt\"),\n+ \t},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:32Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated extendedArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:32Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:33Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/kube-controller-manager-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:33Z","reason":"ConfigMissing","message":"no observedConfig","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubecontrollermanagers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\" to \"InstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:36Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/pv-recycler-controller -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:38Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-controller-manager-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:39Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:40Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:40Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:40Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:40Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:44Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:51Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:51Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:53Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:53Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:57Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/client-ca -n openshift-kube-controller-manager:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:13:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:14:00Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:14:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:14:01Z","reason":"SecretCreated","message":"Created Secret/serving-cert-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:14:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:14:01Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:14:02Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:14:02Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:14:02Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:14:03Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/cluster-policy-controller-config has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:14:04Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:14:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:14:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:14:04Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\" to \"InstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:14:04Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:14:05Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:14:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:14:06Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:14:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:14:08Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:14:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nGarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: no such host\" to \"NodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:14:10Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:14:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nGarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: no such host\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:14:10Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:14:12Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:14:14Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:14:15Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:14:16Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:14:17Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"required configmap/cluster-policy-controller-config has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:14:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:14:27Z","reason":"SATokenSignerControllerStuck","message":"unexpected addresses: 192.168.32.10","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:14:27Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:16:41Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:16:42Z","reason":"Created","message":"Created container: kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T18:16:42Z","reason":"Started","message":"Started container kube-controller-manager-operator","type":"Normal"}]}events/openshift-kube-controller-manager.json0000640000000000000000000001302115154601571020155 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T18:14:10Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.45/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T18:14:10Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T18:14:10Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T18:14:10Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T18:14:22Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T18:17:25Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access\" : failed to fetch token: Timeout: request did not complete within requested timeout - context deadline exceeded","type":"Warning"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T18:17:34Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.58/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T18:17:34Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T18:17:34Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T18:17:34Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T18:18:07Z","reason":"StaticPodInstallerCompleted","message":"Successfully installed revision 2","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T18:18:10Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T18:18:10Z","reason":"Created","message":"Created container: kube-controller-manager","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T18:18:11Z","reason":"Created","message":"Created container: cluster-policy-controller","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T18:18:11Z","reason":"Started","message":"Started container kube-controller-manager","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T18:18:11Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T18:18:12Z","reason":"ControlPlaneTopology","message":"unable to get control plane topology, using HA cluster values for leader election: infrastructures.config.openshift.io \"cluster\" is forbidden: User \"system:kube-controller-manager\" cannot get resource \"infrastructures\" in API group \"config.openshift.io\" at the cluster scope","type":"Warning"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T18:18:12Z","reason":"Started","message":"Started container cluster-policy-controller","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T18:18:12Z","reason":"LeaderElection","message":"master-0_d38182e2-0c9c-44d7-8b87-8758087afff7 became leader","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T18:18:15Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T18:18:19Z","reason":"Created","message":"Created container: kube-controller-manager-cert-syncer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T18:18:19Z","reason":"Started","message":"Started container kube-controller-manager-cert-syncer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T18:18:19Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T18:18:19Z","reason":"Created","message":"Created container: kube-controller-manager-recovery-controller","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T18:18:19Z","reason":"Started","message":"Started container kube-controller-manager-recovery-controller","type":"Normal"}]}events/openshift-kube-apiserver.json0000640000000000000000000000143215154601571016365 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-12T18:14:10Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.47/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-12T18:14:10Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-12T18:14:10Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-12T18:14:11Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-apiserver-operator.json0000640000000000000000000021752415154601571020231 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:07:29Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-apiserver-operator-68bd585b to 1","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:07:30Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-68bd585b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:11:01Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-68bd585b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:11:03Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:11:03Z","reason":"SuccessfulCreate","message":"Created pod: kube-apiserver-operator-68bd585b-ddsbn","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:05Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-apiserver-operator/kube-apiserver-operator-68bd585b-ddsbn to master-0","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:07Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.12/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:07Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:08Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:08Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:09Z","reason":"LeaderElection","message":"kube-apiserver-operator-68bd585b-ddsbn_c21a9b39-5ab1-444e-93c9-dcf2ca12eec1 became leader","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:09Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:09Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-apiserver version \"raw-internal\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:09Z","reason":"ServiceAccountIssuer","message":"Issuer set to default value \"https://kubernetes.default.svc\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Upgradeable changed from Unknown to True (\"All is well\"),EvaluationConditionsDetected changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:10Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:10Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/cpu-utilization -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:10Z","reason":"SignerUpdateRequired","message":"\"node-system-admin-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded changed from Unknown to False (\"All is well\"),Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:11Z","reason":"SignerUpdateRequired","message":"\"localhost-recovery-serving-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:11Z","reason":"CABundleUpdateRequired","message":"\"loadbalancer-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:11Z","reason":"CABundleUpdateRequired","message":"\"service-network-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:11Z","reason":"CABundleUpdateRequired","message":"\"localhost-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"All is well\" to \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\" to \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\",Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; \")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:12Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:12Z","reason":"CABundleUpdateRequired","message":"\"node-system-admin-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:13Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:13Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:13Z","reason":"SecretUpdated","message":"Updated Secret/kube-control-plane-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:13Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\" to \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:13Z","reason":"ConfigMapCreated","message":"Created ConfigMap/loadbalancer-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:13Z","reason":"TargetUpdateRequired","message":"\"external-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; \" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:14Z","reason":"SecretUpdated","message":"Updated Secret/kube-apiserver-to-kubelet-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:14Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-to-kubelet-client-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:14Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/: configmaps \"loadbalancer-serving-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-network-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:15Z","reason":"TargetUpdateRequired","message":"\"service-network-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:15Z","reason":"CABundleUpdateRequired","message":"\"kube-control-plane-signer-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:15Z","reason":"TargetUpdateRequired","message":"\"localhost-serving-cert-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:15Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:15Z","reason":"SecretUpdated","message":"Updated Secret/aggregator-client-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:15Z","reason":"CABundleUpdateRequired","message":"\"localhost-recovery-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:15Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-aggregator-client-ca\" in \"openshift-config-managed\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:15Z","reason":"RotationError","message":"configmaps \"loadbalancer-serving-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:15Z","reason":"TargetUpdateRequired","message":"\"internal-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\" to \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/node-system-admin-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:16Z","reason":"TargetUpdateRequired","message":"\"node-system-admin-client\" in \"openshift-kube-apiserver-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:16Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Upgradeable message changed from \"All is well\" to \"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced.\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-control-plane-signer-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:16Z","reason":"TargetUpdateRequired","message":"\"kube-controller-manager-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:17Z","reason":"TargetUpdateRequired","message":"\"kube-scheduler-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-to-kubelet-client-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:17Z","reason":"TargetUpdateRequired","message":"\"kubelet-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:17Z","reason":"SecretCreated","message":"Created Secret/external-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:17Z","reason":"SecretCreated","message":"Created Secret/bound-service-account-signing-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:17Z","reason":"TargetUpdateRequired","message":"\"control-plane-node-admin-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-recovery-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:17Z","reason":"TargetUpdateRequired","message":"\"localhost-recovery-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:18Z","reason":"SecretCreated","message":"Created Secret/localhost-serving-cert-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:18Z","reason":"SecretCreated","message":"Created Secret/service-network-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:18Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:18Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-apiserver-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:18Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/: configmaps \"kube-control-plane-signer-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-aggregator-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:18Z","reason":"TargetUpdateRequired","message":"\"aggregator-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:19Z","reason":"SecretCreated","message":"Created Secret/internal-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:19Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-client -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:19Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:20Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:20Z","reason":"SecretCreated","message":"Created Secret/kubelet-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:20Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:20Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\" to \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:20Z","reason":"SecretCreated","message":"Created Secret/control-plane-node-admin-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:21Z","reason":"ServiceCreated","message":"Created Service/apiserver -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:21Z","reason":"SecretCreated","message":"Created Secret/aggregator-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:22Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:22Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:22Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-auth-delegator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:22Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:22Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:22Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/check-endpoints-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:24Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:24Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:24Z","reason":"TargetUpdateRequired","message":"\"check-endpoints-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/control-plane-node-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:25Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/authentication-reader-for-authenticated-users -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:25Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-apiserver-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:26Z","reason":"SecretCreated","message":"Created Secret/check-endpoints-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:27Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:28Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\" to \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:28Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-slos-basic -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:28Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-requests -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:28Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/audit-errors -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:28Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/api-usage -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:28Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:28Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:28Z","reason":"CustomResourceDefinitionUpdated","message":"Updated CustomResourceDefinition.apiextensions.k8s.io/apirequestcounts.apiserver.openshift.io because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:28Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:28Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:28Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:29Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-kube-apiserver/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:29Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:29Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/podsecurity -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:30Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:32Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:39Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"admission\": map[string]any{\n+ \t\t\"pluginConfig\": map[string]any{\n+ \t\t\t\"PodSecurity\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/ExternalIPRanger\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/RestrictedEndpointsAdmission\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t},\n+ \t},\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"api-audiences\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"etcd-servers\": []any{string(\"https://192.168.32.10:2379\"), string(\"https://localhost:2379\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"goaway-chance\": []any{string(\"0\")},\n+ \t\t\"runtime-config\": []any{string(\"admissionregistration.k8s.io/v1beta1=true\")},\n+ \t\t\"send-retry-after-while-not-ready-once\": []any{string(\"true\")},\n+ \t\t\"service-account-issuer\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"service-account-jwks-uri\": []any{string(\"https://api.sno.openstack.lab:6443/openid/v1/jwks\")},\n+ \t\t\"shutdown-delay-duration\": []any{string(\"0s\")},\n+ \t},\n+ \t\"corsAllowedOrigins\": []any{string(`//127\\.0\\.0\\.1(:|$)`), string(\"//localhost(:|$)\")},\n+ \t\"gracefulTerminationDuration\": string(\"15\"),\n+ \t\"servicesSubnet\": string(\"172.30.0.0/16\"),\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"bindAddress\": string(\"0.0.0.0:6443\"),\n+ \t\t\"bindNetwork\": string(\"tcp4\"),\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t\t\"namedCertificates\": []any{\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t},\n+ \t\t},\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:39Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\" to \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:39Z","reason":"ConfigMissing","message":"no observedConfig","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:39Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:39Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:39Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379,https://localhost:2379","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:39Z","reason":"ObservedConfigWriteError","message":"Failed to write observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:40Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\" to \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:41Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:47Z","reason":"SecretCreated","message":"Created Secret/node-kubeconfigs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:47Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\" to \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:50Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:51Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:53Z","reason":"SecretCreated","message":"Created Secret/etcd-client-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:54Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/client-ca -n openshift-kube-apiserver:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:55Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-apiserver-client-ca -n openshift-config-managed:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:13:56Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:14:00Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:14:01Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:14:01Z","reason":"ObserveWebhookTokenAuthenticator","message":"authentication-token webhook configuration status changed from false to true","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:14:01Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n  \t\"admission\": map[string]any{\"pluginConfig\": map[string]any{\"PodSecurity\": map[string]any{\"configuration\": map[string]any{\"defaults\": map[string]any{\"audit\": string(\"restricted\"), \"audit-version\": string(\"latest\"), \"enforce\": string(\"privileged\"), \"enforce-version\": string(\"latest\"), ...}}}, \"network.openshift.io/ExternalIPRanger\": map[string]any{\"configuration\": map[string]any{\"allowIngressIP\": bool(false), \"apiVersion\": string(\"network.openshift.io/v1\"), \"kind\": string(\"ExternalIPRangerAdmissionConfig\")}}, \"network.openshift.io/RestrictedEndpointsAdmission\": map[string]any{\"configuration\": map[string]any{\"apiVersion\": string(\"network.openshift.io/v1\"), \"kind\": string(\"RestrictedEndpointsAdmissionConfig\"), \"restrictedCIDRs\": []any{string(\"10.128.0.0/16\"), string(\"172.30.0.0/16\")}}}}},\n  \t\"apiServerArguments\": map[string]any{\n  \t\t\"api-audiences\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"authentication-token-webhook-config-file\": []any{\n+ \t\t\tstring(\"/etc/kubernetes/static-pod-resources/secrets/webhook-authenticator/kubeConfig\"),\n+ \t\t},\n+ \t\t\"authentication-token-webhook-version\": []any{string(\"v1\")},\n  \t\t\"etcd-servers\": []any{string(\"https://192.168.32.10:2379\"), string(\"https://localhost:2379\")},\n  \t\t\"feature-gates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...},\n  \t\t... // 6 identical entries\n  \t},\n  \t\"corsAllowedOrigins\": []any{string(`//127\\.0\\.0\\.1(:|$)`), string(\"//localhost(:|$)\")},\n  \t\"gracefulTerminationDuration\": string(\"15\"),\n  \t... // 2 identical entries\n  }\n","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:14:01Z","reason":"SecretCreated","message":"Created Secret/webhook-authenticator -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:14:01Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:14:02Z","reason":"SecretCreateFailed","message":"Failed to create Secret/webhook-authenticator -n openshift-kube-apiserver: secrets \"webhook-authenticator\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:14:03Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\" to \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:14:03Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"optional secret/webhook-authenticator has been created\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:14:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:14:04Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\\nResourceSyncControllerDegraded: secrets \\\"webhook-authenticator\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:14:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:14:04Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\\nResourceSyncControllerDegraded: secrets \\\"webhook-authenticator\\\" already exists\" to \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:14:04Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:14:04Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:14:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:14:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:14:08Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:14:09Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:14:09Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:14:10Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-kube-apiserver:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:14:11Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:14:13Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:14:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:14:17Z","reason":"SecretCreated","message":"Created Secret/etcd-client-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:14:20Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:14:21Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:14:22Z","reason":"SecretCreated","message":"Created Secret/webhook-authenticator-2 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:14:22Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"optional secret/webhook-authenticator has been created\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:14:25Z","reason":"StartingNewRevision","message":"new revision 3 triggered by \"required configmap/config has changed\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:14:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod-3 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:14:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-3 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:16:41Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:16:42Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T18:16:42Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"}]}events/openshift-etcd.json0000640000000000000000000001306115154601571014361 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T18:13:47Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.36/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T18:13:47Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T18:13:47Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T18:13:47Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T18:14:27Z","reason":"StaticPodInstallerCompleted","message":"Successfully installed revision 1","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T18:14:27Z","reason":"Killing","message":"Stopping container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T18:14:43Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T18:14:43Z","reason":"Created","message":"Created container: setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T18:14:43Z","reason":"Started","message":"Started container setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T18:14:56Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T18:14:57Z","reason":"Started","message":"Started container etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T18:14:57Z","reason":"Created","message":"Created container: etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T18:15:11Z","reason":"Created","message":"Created container: etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T18:15:11Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T18:15:12Z","reason":"Started","message":"Started container etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T18:16:54Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T18:16:55Z","reason":"Created","message":"Created container: etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T18:16:55Z","reason":"Started","message":"Started container etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T18:16:55Z","reason":"Started","message":"Started container etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T18:16:55Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T18:16:55Z","reason":"Created","message":"Created container: etcd-readyz","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T18:16:55Z","reason":"Started","message":"Started container etcd-readyz","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T18:16:55Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T18:16:55Z","reason":"Created","message":"Created container: etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T18:16:55Z","reason":"Started","message":"Started container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T18:16:55Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T18:16:55Z","reason":"Created","message":"Created container: etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T18:16:55Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T18:16:56Z","reason":"Started","message":"Started container etcd-rev","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T18:16:56Z","reason":"Created","message":"Created container: etcd-rev","type":"Normal"}]}events/openshift-etcd-operator.json0000640000000000000000000003645615154601571016227 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:07:14Z","reason":"ScalingReplicaSet","message":"Scaled up replica set etcd-operator-5884b9cd56 to 1","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:07:25Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-5884b9cd56-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:11:01Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-5884b9cd56-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:11:03Z","reason":"SuccessfulCreate","message":"Created pod: etcd-operator-5884b9cd56-bfq7b","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:11:03Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:05Z","reason":"Scheduled","message":"Successfully assigned openshift-etcd-operator/etcd-operator-5884b9cd56-bfq7b to master-0","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:07Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.17/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:07Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:21Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:22Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\" in 1.449s (1.449s including waiting). Image size: 518384455 bytes.","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded changed from Unknown to False (\"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\")","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\" to \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nClusterMemberControllerDegraded: could not get list of unhealthy members: getting cache client could not retrieve endpoints: node lister not synced\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:24Z","reason":"LeaderElection","message":"etcd-operator-5884b9cd56-bfq7b_2166985f-e550-4879-87b2-8e0c50e28078 became leader","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"raw-internal\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:24Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:24Z","reason":"OperatorVersionChanged","message":"clusteroperator/etcd version \"raw-internal\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:25Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"controlPlane\": map[string]any{\"replicas\": float64(1)},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:25Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:25Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-ca-bundle -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:27Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:27Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-etcd-installer because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:27Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:27Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/etcd-ca-bundle -n openshift-etcd-operator:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:27Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:28Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:28Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:29Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-metric-serving-ca -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:29Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-config-v1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:29Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/etcd-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:29Z","reason":"EtcdEndpointsErrorUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:30Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd-minimal -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:30Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:30Z","reason":"ServiceUpdated","message":"Updated Service/etcd -n openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:32Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: etcd-all-bundles-0,etcd-endpoints-0,etcd-pod-0, secrets: etcd-all-certs-0","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:32Z","reason":"EnvVarControllerUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:36Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"etcd-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-scripts -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/restore-etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-endpoints-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:39Z","reason":"SecretCreated","message":"Created Secret/etcd-all-certs-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:39Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-all-bundles-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:13:39Z","reason":"ScriptControllerErrorUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:16:14Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.17:8443/healthz\": dial tcp 10.128.0.17:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:16:14Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.17:8443/healthz\": dial tcp 10.128.0.17:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:16:41Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:16:42Z","reason":"Started","message":"Started container etcd-operator","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T18:16:42Z","reason":"Created","message":"Created container: etcd-operator","type":"Normal"}]}events/openshift-machine-api.json0000640000000000000000000002036715154601571015624 0ustar0000000000000000{"items":[{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-12T18:14:27Z","reason":"ScalingReplicaSet","message":"Scaled up replica set control-plane-machine-set-operator-6686554ddc to 1","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-12T18:14:27Z","reason":"SuccessfulCreate","message":"Created pod: control-plane-machine-set-operator-6686554ddc-zd9gm","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-12T18:14:27Z","reason":"Scheduled","message":"Successfully assigned openshift-machine-api/control-plane-machine-set-operator-6686554ddc-zd9gm to master-0","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-12T18:17:25Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access-gmsnk\" : failed to fetch token: Timeout: request did not complete within requested timeout - context deadline exceeded","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-12T18:17:34Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e9ee63a30a9b95b5801afa36e09fc583ec2cda3c5cb3c8676e478fea016abfa1\"","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-12T18:17:34Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.59/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-12T18:17:36Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e9ee63a30a9b95b5801afa36e09fc583ec2cda3c5cb3c8676e478fea016abfa1\" in 1.878s (1.878s including waiting). Image size: 470680779 bytes.","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-12T18:17:36Z","reason":"Created","message":"Created container: control-plane-machine-set-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-12T18:17:36Z","reason":"Started","message":"Started container control-plane-machine-set-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-12T18:17:38Z","reason":"LeaderElection","message":"control-plane-machine-set-operator-6686554ddc-zd9gm_4b045888-67a7-462b-8814-6ae3040a1504 became leader","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-12T18:17:58Z","reason":"ScalingReplicaSet","message":"Scaled up replica set cluster-baremetal-operator-5cdb4c5598 to 1","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-12T18:17:58Z","reason":"ScalingReplicaSet","message":"Scaled up replica set machine-api-operator-84bf6db4f9 to 1","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-12T18:17:58Z","reason":"ScalingReplicaSet","message":"Scaled up replica set cluster-autoscaler-operator-69576476f7 to 1","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-12T18:17:59Z","reason":"SuccessfulCreate","message":"Created pod: cluster-autoscaler-operator-69576476f7-hkfnq","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-12T18:17:59Z","reason":"SuccessfulCreate","message":"Created pod: machine-api-operator-84bf6db4f9-gnrzd","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-12T18:17:59Z","reason":"SuccessfulCreate","message":"Created pod: cluster-baremetal-operator-5cdb4c5598-2psgb","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-12T18:18:00Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:00b591b3820682dc99f16f07a3a0a4ec06dfedba63cd0f79b998ac4509fabea3\"","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-12T18:18:00Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2508a5f66e509e813cb09825b5456be91b4cdd4d02f470f22a33de42c753f2b7\"","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-12T18:18:00Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.67/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-12T18:18:00Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-12T18:18:00Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.66/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-12T18:18:00Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-12T18:18:00Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d74fe7cb12c554c120262683d9c4066f33ae4f60a5fad83cba419d851b98c12d\"","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-12T18:18:00Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.68/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-12T18:18:00Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-12T18:18:00Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-12T18:18:00Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-12T18:18:00Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-12T18:18:10Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d74fe7cb12c554c120262683d9c4066f33ae4f60a5fad83cba419d851b98c12d\" in 9.713s (9.713s including waiting). Image size: 470822665 bytes.","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-12T18:18:10Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:00b591b3820682dc99f16f07a3a0a4ec06dfedba63cd0f79b998ac4509fabea3\" in 9.579s (9.579s including waiting). Image size: 456374430 bytes.","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-12T18:18:10Z","reason":"Created","message":"Created container: cluster-autoscaler-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-12T18:18:10Z","reason":"Created","message":"Created container: cluster-baremetal-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-12T18:18:10Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-12T18:18:10Z","reason":"Started","message":"Started container cluster-baremetal-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-12T18:18:11Z","reason":"Started","message":"Started container baremetal-kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-12T18:18:11Z","reason":"Created","message":"Created container: baremetal-kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-12T18:18:11Z","reason":"Started","message":"Started container cluster-autoscaler-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-12T18:18:12Z","reason":"LeaderElection","message":"cluster-baremetal-operator-5cdb4c5598-2psgb_80dc876f-e92d-4c73-9801-87800602b484 became leader","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-12T18:18:12Z","reason":"LeaderElection","message":"cluster-autoscaler-operator-69576476f7-hkfnq_9f92ad46-0b7f-44aa-a0bf-49a6c950ae27 became leader","type":"Normal"}]}events/openshift-oauth-apiserver.json0000640000000000000000000000443715154601571016567 0ustar0000000000000000{"items":[{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-12T18:14:07Z","reason":"Scheduled","message":"Successfully assigned openshift-oauth-apiserver/apiserver-6cb976c975-4sxlg to master-0","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-12T18:14:07Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-6cb976c975-4sxlg","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-12T18:14:07Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-6cb976c975 to 1","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-12T18:14:10Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.46/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-12T18:14:10Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9\"","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-12T18:14:16Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9\" in 5.784s (5.784s including waiting). Image size: 505344964 bytes.","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-12T18:14:16Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-12T18:14:17Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-12T18:14:17Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9\" already present on machine","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-12T18:14:18Z","reason":"Created","message":"Created container: oauth-apiserver","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-12T18:14:18Z","reason":"Started","message":"Started container oauth-apiserver","type":"Normal"}]}events/openshift-ingress.json0000640000000000000000000000124015154601571015110 0ustar0000000000000000{"items":[{"namespace":"openshift-ingress","lastTimestamp":"2026-03-12T18:13:48Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-12T18:13:48Z","reason":"SuccessfulCreate","message":"Created pod: router-default-79f8cd6fdd-79bhf","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-12T18:13:48Z","reason":"ScalingReplicaSet","message":"Scaled up replica set router-default-79f8cd6fdd to 1","type":"Normal"}]}events/openshift-authentication-operator.json0000640000000000000000000021643315154601571020322 0ustar0000000000000000{"items":[{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:07:15Z","reason":"ScalingReplicaSet","message":"Scaled up replica set authentication-operator-7c6989d6c4 to 1","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:07:26Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-7c6989d6c4-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:11:00Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-7c6989d6c4-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:11:03Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:11:03Z","reason":"SuccessfulCreate","message":"Created pod: authentication-operator-7c6989d6c4-ljw8b","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:05Z","reason":"Scheduled","message":"Successfully assigned openshift-authentication-operator/authentication-operator-7c6989d6c4-ljw8b to master-0","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:07Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.21/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:07Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:22Z","reason":"Failed","message":"Failed to pull image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953\": rpc error: code = Canceled desc = copying config: context canceled","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:22Z","reason":"Failed","message":"Error: ErrImagePull","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:36Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:40Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953\" in 3.437s (3.437s including waiting). Image size: 513220825 bytes.","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:40Z","reason":"Created","message":"Created container: authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:40Z","reason":"Started","message":"Started container authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:40Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"operator\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:40Z","reason":"LeaderElection","message":"authentication-operator-7c6989d6c4-ljw8b_6b4549e8-e92a-4a35-b767-489f868840dd became leader","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"operator\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded changed from Unknown to False (\"All is well\"),Available changed from Unknown to False (\"ReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"ReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:42Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:43Z","reason":"ObserveTokenConfig","message":"accessTokenMaxAgeSeconds changed from %!d(float64=0) to %!d(float64=86400)","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:43Z","reason":"ObserveAuditProfile","message":"AuditProfile changed from '%!s(\u003cnil\u003e)' to 'map[audit-log-format:[json] audit-log-maxbackup:[10] audit-log-maxsize:[100] audit-log-path:[/var/log/oauth-server/audit.log] audit-policy-file:[/var/run/configmaps/audit/audit.yaml]]'","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:43Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:43Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:43Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \"\\u00a0\\u00a0map[string]any(\\n-\\u00a0\\tnil,\\n+\\u00a0\\t{\\n+\\u00a0\\t\\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+\\u00a0\\t\\t\\\"oauthConfig\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"assetPublicURL\\\": string(\\\"\\\"),\\n+\\u00a0\\t\\t\\t\\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"),\\n+\\u00a0\\t\\t\\t\\\"templates\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\t\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t\\t\\\"tokenConfig\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\t\\\"accessTokenMaxAgeSeconds\\\": float64(86400),\\n+\\u00a0\\t\\t\\t\\t\\\"authorizeTokenMaxAgeSeconds\\\": float64(300),\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t\\t\\\"serverArguments\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"audit-log-format\\\": []any{string(\\\"json\\\")},\\n+\\u00a0\\t\\t\\t\\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")},\\n+\\u00a0\\t\\t\\t\\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")},\\n+\\u00a0\\t\\t\\t\\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")},\\n+\\u00a0\\t\\t\\t\\\"audit-policy-file\\\": []any{string(\\\"/var/run/configmaps/audit/audit.\\\"...)},\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t\\t\\\"servingInfo\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"cipherSuites\\\": []any{\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t\\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n+\\u00a0\\t},\\n\\u00a0\\u00a0)\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"All is well\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:43Z","reason":"ObserveAPIAudiences","message":"service account issuer changed from to https://kubernetes.default.svc","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:43Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:43Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:43Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:43Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthAPIServer\") of observed config: \"\\u00a0\\u00a0map[string]any(\\n-\\u00a0\\tnil,\\n+\\u00a0\\t{\\n+\\u00a0\\t\\t\\\"apiServerArguments\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"api-audiences\\\": []any{string(\\\"https://kubernetes.default.svc\\\")},\\n+\\u00a0\\t\\t\\t\\\"cors-allowed-origins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+\\u00a0\\t\\t\\t\\\"etcd-servers\\\": []any{string(\\\"https://192.168.32.10:2379\\\")},\\n+\\u00a0\\t\\t\\t\\\"tls-cipher-suites\\\": []any{\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t\\t\\\"tls-min-version\\\": string(\\\"VersionTLS12\\\"),\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t},\\n\\u00a0\\u00a0)\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:43Z","reason":"ObserveAPIServerURL","message":"loginURL changed from to https://api.sno.openstack.lab:6443","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:43Z","reason":"ObserveTemplates","message":"templates changed to map[\"error\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/errors.html\" \"login\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/login.html\" \"providerSelection\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/providers.html\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:45Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:47Z","reason":"NoValidCertificateFound","message":"No valid client certificate for OpenShiftAuthenticatorCertRequester is found: unable to parse certificate: data does not contain any valid RSA or ECDSA certificates","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:47Z","reason":"CSRCreated","message":"A csr \"system:openshift:openshift-authenticator-mwx8m\" is created for OpenShiftAuthenticatorCertRequester","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:47Z","reason":"CSRApproval","message":"The CSR \"system:openshift:openshift-authenticator-mwx8m\" has been approved","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:47Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/etcd-serving-ca -n openshift-oauth-apiserver: namespaces \"openshift-oauth-apiserver\" not found","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:47Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/audit -n openshift-authentication: namespaces \"openshift-authentication\" not found","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:48Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:48Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:48Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:50Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nResourceSyncControllerDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:52Z","reason":"ClientCertificateCreated","message":"A new client certificate for OpenShiftAuthenticatorCertRequester is available","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:53Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nResourceSyncControllerDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:53Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:53Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:54Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"All is well\" to \"AuthenticatorCertKeyProgressing: All is well\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:54Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:54Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:13:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/v4-0-config-system-trusted-ca-bundle -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:14:00Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-apiserver-sa -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:14:00Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \"\\u00a0\\u00a0map[string]any{\\n\\u00a0\\u00a0\\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n\\u00a0\\u00a0\\t\\\"oauthConfig\\\": map[string]any{\\\"assetPublicURL\\\": string(\\\"\\\"), \\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"), \\\"templates\\\": map[string]any{\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...)}, \\\"tokenConfig\\\": map[string]any{\\\"accessTokenMaxAgeSeconds\\\": float64(86400), \\\"authorizeTokenMaxAgeSeconds\\\": float64(300)}},\\n\\u00a0\\u00a0\\t\\\"serverArguments\\\": map[string]any{\\\"audit-log-format\\\": []any{string(\\\"json\\\")}, \\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")}, \\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")}, \\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")}, ...},\\n\\u00a0\\u00a0\\t\\\"servingInfo\\\": map[string]any{\\n\\u00a0\\u00a0\\t\\t\\\"cipherSuites\\\": []any{string(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"), string(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"), string(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\\\"), ...},\\n\\u00a0\\u00a0\\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+\\u00a0\\t\\t\\\"namedCertificates\\\": []any{\\n+\\u00a0\\t\\t\\tmap[string]any{\\n+\\u00a0\\t\\t\\t\\t\\\"certFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"keyFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"names\\\": []any{string(\\\"*.apps.sno.openstack.lab\\\")},\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t},\\n\\u00a0\\u00a0\\t},\\n\\u00a0\\u00a0\\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n\\u00a0\\u00a0}\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:14:00Z","reason":"ObserveRouterSecret","message":"namedCertificates changed to []interface {}{map[string]interface {}{\"certFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"keyFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"names\":[]interface {}{\"*.apps.sno.openstack.lab\"}}}","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:14:00Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:14:00Z","reason":"SecretCreated","message":"Created Secret/webhook-authentication-integrated-oauth -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:14:00Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-ocp-branding-template -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:14:00Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-router-certs -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:14:01Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:14:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:14:02Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:14:02Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:14:02Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:14:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/oauth-serving-cert -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:14:04Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:14:04Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:14:07Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:14:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\" to \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\",Progressing changed from False to True (\"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\"),Available message changed from \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:14:08Z","reason":"ServiceCreated","message":"Created Service/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:14:08Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:14:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:14:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:14:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:14:08Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:14:10Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:14:13Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:14:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.45.215:443/healthz\\\": dial tcp 172.30.45.215:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.45.215:443/healthz\\\": dial tcp 172.30.45.215:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:14:16Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.45.215:443/healthz\\\": dial tcp 172.30.45.215:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.45.215:443/healthz\\\": dial tcp 172.30.45.215:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:17:35Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded changed from False to True (\"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.45.215:443/healthz\\\": dial tcp 172.30.45.215:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:17:35Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.45.215:443/healthz\\\": dial tcp 172.30.45.215:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\" to \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerStaticResourcesDegraded: \\\"oauth-apiserver/sa.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts oauth-apiserver-sa)\\nAPIServerStaticResourcesDegraded: \\\"oauth-apiserver/RBAC/useroauthaccesstokens_binding.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:useroauthaccesstoken-manager)\\nAPIServerStaticResourcesDegraded: \\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.45.215:443/healthz\\\": dial tcp 172.30.45.215:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/ns.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-authentication)\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/authentication-clusterrolebinding.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:openshift-authentication)\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/serviceaccount.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts oauth-openshift)\\nOpenshiftAuthenticationStaticResourcesDegraded: \",Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\" to \"APIServerDeploymentProgressing: deployment/openshift-oauth-apiserver: could not be retrieved\",Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.45.215:443/healthz\\\": dial tcp 172.30.45.215:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.45.215:443/healthz\\\": dial tcp 172.30.45.215:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:17:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerStaticResourcesDegraded: \\\"oauth-apiserver/sa.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts oauth-apiserver-sa)\\nAPIServerStaticResourcesDegraded: \\\"oauth-apiserver/RBAC/useroauthaccesstokens_binding.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:useroauthaccesstoken-manager)\\nAPIServerStaticResourcesDegraded: \\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.45.215:443/healthz\\\": dial tcp 172.30.45.215:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/ns.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-authentication)\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/authentication-clusterrolebinding.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:openshift-authentication)\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/serviceaccount.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts oauth-openshift)\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.45.215:443/healthz\\\": dial tcp 172.30.45.215:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/ns.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-authentication)\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/authentication-clusterrolebinding.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:openshift-authentication)\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/serviceaccount.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts oauth-openshift)\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:17:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.45.215:443/healthz\\\": dial tcp 172.30.45.215:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/ns.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-authentication)\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/authentication-clusterrolebinding.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get clusterrolebindings.rbac.authorization.k8s.io system:openshift:openshift-authentication)\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/serviceaccount.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts oauth-openshift)\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.45.215:443/healthz\\\": dial tcp 172.30.45.215:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:17:38Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"oauth-apiserver\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:17:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServerWorkloadDegraded: \\\"deployments\\\": invalid dependency reference: \\\"the server was unable to return a response in the time allotted, but may still be processing the request (get secrets etcd-client)\\\"\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.45.215:443/healthz\\\": dial tcp 172.30.45.215:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\" to \"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.45.215:443/healthz\\\": dial tcp 172.30.45.215:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\",Progressing changed from True to False (\"AuthenticatorCertKeyProgressing: All is well\"),Available message changed from \"APIServerDeploymentAvailable: deployment/openshift-oauth-apiserver: could not be retrieved\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.45.215:443/healthz\\\": dial tcp 172.30.45.215:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.45.215:443/healthz\\\": dial tcp 172.30.45.215:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:17:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: status.versions changed from [{\"operator\" \"4.18.34\"}] to [{\"operator\" \"4.18.34\"} {\"oauth-apiserver\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:17:43Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.user.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:17:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.45.215:443/healthz\\\": dial tcp 172.30.45.215:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: the server was unable to return a response in the time allotted, but may still be processing the request (get apiservices.apiregistration.k8s.io v1.oauth.openshift.io)\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.45.215:443/healthz\\\": dial tcp 172.30.45.215:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T18:17:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: the server was unable to return a response in the time allotted, but may still be processing the request (get apiservices.apiregistration.k8s.io v1.oauth.openshift.io)\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.45.215:443/healthz\\\": dial tcp 172.30.45.215:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.45.215:443/healthz\\\": dial tcp 172.30.45.215:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"}]}events/openshift-config-managed.json0000640000000000000000000000061015154601571016275 0ustar0000000000000000{"items":[{"namespace":"openshift-config-managed","lastTimestamp":"2026-03-12T18:13:49Z","reason":"PublishedRouterCA","message":"Published \"default-ingress-cert\" in \"openshift-config-managed\"","type":"Normal"},{"namespace":"openshift-config-managed","lastTimestamp":"2026-03-12T18:13:49Z","reason":"PublishedRouterCertificates","message":"Published router certificates","type":"Normal"}]}config/serviceaccounts.json0000640000000000000000000003457115154601564014621 0ustar0000000000000000{"serviceAccounts":{"TOTAL_COUNT":335,"namespaces":{"default":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-public":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-system":[{"name":"attachdetach-controller","secrets":1},{"name":"builder","secrets":1},{"name":"certificate-controller","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"clusterrole-aggregation-controller","secrets":1},{"name":"cronjob-controller","secrets":1},{"name":"daemon-set-controller","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"deployment-controller","secrets":1},{"name":"disruption-controller","secrets":1},{"name":"endpoint-controller","secrets":1},{"name":"endpointslice-controller","secrets":1},{"name":"endpointslicemirroring-controller","secrets":1},{"name":"ephemeral-volume-controller","secrets":1},{"name":"expand-controller","secrets":1},{"name":"generic-garbage-collector","secrets":1},{"name":"horizontal-pod-autoscaler","secrets":1},{"name":"job-controller","secrets":1},{"name":"legacy-service-account-token-cleaner","secrets":1},{"name":"namespace-controller","secrets":1},{"name":"node-controller","secrets":1},{"name":"persistent-volume-binder","secrets":1},{"name":"pod-garbage-collector","secrets":1},{"name":"pv-protection-controller","secrets":1},{"name":"pvc-protection-controller","secrets":1},{"name":"replicaset-controller","secrets":1},{"name":"replication-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"root-ca-cert-publisher","secrets":1},{"name":"service-account-controller","secrets":1},{"name":"service-ca-cert-publisher","secrets":1},{"name":"statefulset-controller","secrets":1},{"name":"ttl-after-finished-controller","secrets":1},{"name":"validatingadmissionpolicy-status-controller","secrets":1}],"openshift":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-sa","secrets":1}],"openshift-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-operator","secrets":1}],"openshift-authentication":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-openshift","secrets":1}],"openshift-authentication-operator":[{"name":"authentication-operator","secrets":1},{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-catalogd":[{"name":"builder","secrets":1},{"name":"catalogd-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager":[{"name":"builder","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"cloud-node-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"cluster-cloud-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-credential-operator":[{"name":"builder","secrets":1},{"name":"cloud-credential-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-network-config-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-platform-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-csi-drivers":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-machine-approver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-approver-sa","secrets":1}],"openshift-cluster-node-tuning-operator":[{"name":"builder","secrets":1},{"name":"cluster-node-tuning-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"tuned","secrets":1}],"openshift-cluster-olm-operator":[{"name":"builder","secrets":1},{"name":"cluster-olm-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-samples-operator":[{"name":"builder","secrets":1},{"name":"cluster-samples-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-storage-operator":[{"name":"builder","secrets":1},{"name":"cluster-storage-operator","secrets":1},{"name":"csi-snapshot-controller","secrets":1},{"name":"csi-snapshot-controller-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-version":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-managed":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-config-operator","secrets":1}],"openshift-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-sa","secrets":1}],"openshift-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-operator","secrets":1}],"openshift-dns":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns","secrets":1},{"name":"node-resolver","secrets":1}],"openshift-dns-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns-operator","secrets":1}],"openshift-etcd":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-backup-sa","secrets":1},{"name":"etcd-sa","secrets":1},{"name":"installer-sa","secrets":1}],"openshift-etcd-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-operator","secrets":1}],"openshift-host-network":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-image-registry":[{"name":"builder","secrets":1},{"name":"cluster-image-registry-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"node-ca","secrets":1},{"name":"pruner","secrets":1}],"openshift-infra":[{"name":"build-config-change-controller","secrets":1},{"name":"build-controller","secrets":1},{"name":"builder","secrets":1},{"name":"cluster-csr-approver-controller","secrets":1},{"name":"cluster-quota-reconciliation-controller","secrets":1},{"name":"default","secrets":1},{"name":"default-rolebindings-controller","secrets":1},{"name":"deployer","secrets":1},{"name":"deployer-controller","secrets":1},{"name":"deploymentconfig-controller","secrets":1},{"name":"image-import-controller","secrets":1},{"name":"image-trigger-controller","secrets":1},{"name":"ingress-to-route-controller","secrets":1},{"name":"namespace-security-allocation-controller","secrets":1},{"name":"node-bootstrapper","secrets":1},{"name":"origin-namespace-controller","secrets":1},{"name":"podsecurity-admission-label-syncer-controller","secrets":1},{"name":"privileged-namespaces-psa-label-syncer","secrets":1},{"name":"pv-recycler-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"serviceaccount-controller","secrets":1},{"name":"serviceaccount-pull-secrets-controller","secrets":1},{"name":"template-instance-controller","secrets":1},{"name":"template-instance-finalizer-controller","secrets":1},{"name":"unidling-controller","secrets":1}],"openshift-ingress":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"router","secrets":1}],"openshift-ingress-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ingress-operator","secrets":1}],"openshift-insights":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"gather","secrets":1},{"name":"operator","secrets":1}],"openshift-kni-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-kube-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-apiserver-operator","secrets":1}],"openshift-kube-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"kube-controller-manager-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-controller-manager-operator","secrets":1}],"openshift-kube-scheduler":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1},{"name":"openshift-kube-scheduler-sa","secrets":1}],"openshift-kube-scheduler-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-kube-scheduler-operator","secrets":1}],"openshift-kube-storage-version-migrator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-sa","secrets":1}],"openshift-kube-storage-version-migrator-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-operator","secrets":1}],"openshift-machine-api":[{"name":"builder","secrets":1},{"name":"cluster-autoscaler","secrets":1},{"name":"cluster-autoscaler-operator","secrets":1},{"name":"cluster-baremetal-operator","secrets":1},{"name":"control-plane-machine-set-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-api-controllers","secrets":1},{"name":"machine-api-operator","secrets":1},{"name":"machine-api-termination-handler","secrets":1}],"openshift-machine-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-config-daemon","secrets":1},{"name":"machine-config-operator","secrets":1}],"openshift-marketplace":[{"name":"builder","secrets":1},{"name":"certified-operators","secrets":1},{"name":"community-operators","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"marketplace-operator","secrets":1},{"name":"redhat-marketplace","secrets":1},{"name":"redhat-operators","secrets":1}],"openshift-monitoring":[{"name":"builder","secrets":1},{"name":"cluster-monitoring-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"prometheus-operator","secrets":1},{"name":"prometheus-operator-admission-webhook","secrets":1}],"openshift-multus":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"metrics-daemon-sa","secrets":1},{"name":"multus","secrets":1},{"name":"multus-ac","secrets":1},{"name":"multus-ancillary-tools","secrets":1}],"openshift-network-diagnostics":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-diagnostics","secrets":1}],"openshift-network-node-identity":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-node-identity","secrets":1}],"openshift-network-operator":[{"name":"builder","secrets":1},{"name":"cluster-network-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"iptables-alerter","secrets":1}],"openshift-node":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-nutanix-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-oauth-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-apiserver-sa","secrets":1}],"openshift-openstack-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-operator-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"operator-controller-controller-manager","secrets":1}],"openshift-operator-lifecycle-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"olm-operator-serviceaccount","secrets":1}],"openshift-operators":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovirt-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovn-kubernetes":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ovn-kubernetes-control-plane","secrets":1},{"name":"ovn-kubernetes-node","secrets":1}],"openshift-route-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"route-controller-manager-sa","secrets":1}],"openshift-service-ca":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca","secrets":1}],"openshift-service-ca-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca-operator","secrets":1}],"openshift-user-workload-monitoring":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-vsphere-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}]}}}config/installplans.json0000640000000000000000000000010015154601563014101 0ustar0000000000000000{"items":null,"stats":{"TOTAL_COUNT":0,"TOTAL_NONUNIQ_COUNT":0}}config/configmaps/kube-system/cluster-config-v1/install-config0000640000000000000000000000155515154601551023220 0ustar0000000000000000apiVersion: v1 baseDomain: xxxxxxxxxxxxx compute: - hyperthreading: Enabled name: worker platform: {} replicas: 0 controlPlane: hyperthreading: Enabled name: master platform: {} replicas: 1 metadata: creationTimestamp: null name: sno networking: clusterNetwork: - cidr: 10.128.0.0/16 hostPrefix: 23 machineNetwork: - cidr: 192.168.32.0/24 networkType: OVNKubernetes serviceNetwork: - 172.30.0.0/16 platform: none: {} publish: External pullSecret: "" sshKey: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt0000640000000000000000000000010115154601551025430 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/openshift-install-manifests/version0000640000000000000000000000000715154601551025137 0ustar0000000000000000v4.18.0config/configmaps/openshift-config/openshift-install-manifests/invoker0000640000000000000000000000001715154601551025130 0ustar0000000000000000agent-installerconfig/configmaps/openshift-config/kube-root-ca.crt/ca.crt0000640000000000000000000000030315154601551022250 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/initial-kube-apiserver-server-ca/ca-bundle.crt0000640000000000000000000000050515154601551026704 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt0000640000000000000000000000010115154601551023407 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt0000640000000000000000000000010115154601551023203 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt0000640000000000000000000000010115154601551025473 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- aggregated/ingress_controllers_certs.json0000640000000000000000000000045715154601551017536 0ustar0000000000000000[{"name":"router-ca","namespace":"openshift-ingress-operator","not_before":"2026-03-12T18:13:47Z","not_after":"2028-03-11T18:13:48Z","controllers":[]},{"name":"router-certs-default","namespace":"openshift-ingress","not_before":"2026-03-12T18:13:48Z","not_after":"2028-03-11T18:13:49Z","controllers":[]}]aggregated/unused_machine_configs_count.json0000640000000000000000000000004115154601551020132 0ustar0000000000000000{"unused_machineconfigs_count":9}config/node/logs/master-0.log0000640000000000000000000006620715154601551014547 0ustar0000000000000000Mar 12 18:17:03.027684 master-0 kubenswrapper[7337]: I0312 18:17:03.027463 7337 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-controller-manager/controller-manager-5b55d98459-sr4hk" podUID="30c5dc4b-f1c8-4773-b961-985740fcc503" containerName="controller-manager" probeResult="failure" output="Get \"https://10.128.0.50:8443/healthz\": dial tcp 10.128.0.50:8443: connect: connection refused" Mar 12 18:17:12.834711 master-0 kubenswrapper[7337]: E0312 18:17:12.834633 7337 kubelet_node_status.go:585] "Error updating node status, will retry" err="error getting node \"master-0\": Get \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Mar 12 18:17:13.026783 master-0 kubenswrapper[7337]: I0312 18:17:13.026721 7337 patch_prober.go:28] interesting pod/controller-manager-5b55d98459-sr4hk container/controller-manager namespace/openshift-controller-manager: Readiness probe status=failure output="Get \"https://10.128.0.50:8443/healthz\": dial tcp 10.128.0.50:8443: connect: connection refused" start-of-body= Mar 12 18:17:13.026974 master-0 kubenswrapper[7337]: I0312 18:17:13.026781 7337 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-controller-manager/controller-manager-5b55d98459-sr4hk" podUID="30c5dc4b-f1c8-4773-b961-985740fcc503" containerName="controller-manager" probeResult="failure" output="Get \"https://10.128.0.50:8443/healthz\": dial tcp 10.128.0.50:8443: connect: connection refused" Mar 12 18:17:13.026974 master-0 kubenswrapper[7337]: I0312 18:17:13.026954 7337 patch_prober.go:28] interesting pod/controller-manager-5b55d98459-sr4hk container/controller-manager namespace/openshift-controller-manager: Liveness probe status=failure output="Get \"https://10.128.0.50:8443/healthz\": dial tcp 10.128.0.50:8443: connect: connection refused" start-of-body= Mar 12 18:17:13.027156 master-0 kubenswrapper[7337]: I0312 18:17:13.027015 7337 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-controller-manager/controller-manager-5b55d98459-sr4hk" podUID="30c5dc4b-f1c8-4773-b961-985740fcc503" containerName="controller-manager" probeResult="failure" output="Get \"https://10.128.0.50:8443/healthz\": dial tcp 10.128.0.50:8443: connect: connection refused" Mar 12 18:17:15.800507 master-0 kubenswrapper[7337]: E0312 18:17:15.800459 7337 mirror_client.go:138] "Failed deleting a mirror pod" err="Timeout: request did not complete within requested timeout - context deadline exceeded" pod="openshift-etcd/etcd-master-0-master-0" Mar 12 18:17:15.801098 master-0 kubenswrapper[7337]: E0312 18:17:15.801071 7337 kubelet.go:2526] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="34.038s" Mar 12 18:17:17.739744 master-0 kubenswrapper[7337]: E0312 18:17:17.739563 7337 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{bootstrap-kube-controller-manager-master-0.189c2aaea3d7a5b5 kube-system 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:kube-system,Name:bootstrap-kube-controller-manager-master-0,UID:f78c05e1499b533b83f091333d61f045,APIVersion:v1,ResourceVersion:,FieldPath:spec.containers{kube-controller-manager},},Reason:Unhealthy,Message:Readiness probe failed: Get \"https://192.168.32.10:10257/healthz\": dial tcp 192.168.32.10:10257: connect: connection refused,Source:EventSource{Component:kubelet,Host:master-0,},FirstTimestamp:2026-03-12 18:14:42.838627765 +0000 UTC m=+83.307228712,LastTimestamp:2026-03-12 18:14:42.838627765 +0000 UTC m=+83.307228712,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:master-0,}" Mar 12 18:17:18.523987 master-0 kubenswrapper[7337]: E0312 18:17:18.523883 7337 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" interval="7s" Mar 12 18:17:19.114449 master-0 kubenswrapper[7337]: E0312 18:17:19.114348 7337 kubelet.go:2526] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="3.313s" Mar 12 18:17:19.138910 master-0 kubenswrapper[7337]: E0312 18:17:19.134649 7337 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"snapshot-controller\" with CrashLoopBackOff: \"back-off 10s restarting failed container=snapshot-controller pod=csi-snapshot-controller-7577d6f48-2ltx9_openshift-cluster-storage-operator(bce831df-c604-4608-a24e-b14d62c5287a)\"" pod="openshift-cluster-storage-operator/csi-snapshot-controller-7577d6f48-2ltx9" podUID="bce831df-c604-4608-a24e-b14d62c5287a" Mar 12 18:17:19.255164 master-0 kubenswrapper[7337]: E0312 18:17:19.255117 7337 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"e722a80d2945b3420fc5caeacc6065896e4511dd6a2605aa37b3ca081a3ef049\": container with ID starting with e722a80d2945b3420fc5caeacc6065896e4511dd6a2605aa37b3ca081a3ef049 not found: ID does not exist" containerID="e722a80d2945b3420fc5caeacc6065896e4511dd6a2605aa37b3ca081a3ef049" Mar 12 18:17:21.584682 master-0 kubenswrapper[7337]: E0312 18:17:21.584558 7337 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = DeadlineExceeded desc = context deadline exceeded" Mar 12 18:17:21.585034 master-0 kubenswrapper[7337]: E0312 18:17:21.584703 7337 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = DeadlineExceeded desc = context deadline exceeded" pod="openshift-network-diagnostics/network-check-target-cpthp" Mar 12 18:17:21.585034 master-0 kubenswrapper[7337]: E0312 18:17:21.584728 7337 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = DeadlineExceeded desc = context deadline exceeded" pod="openshift-network-diagnostics/network-check-target-cpthp" Mar 12 18:17:21.585034 master-0 kubenswrapper[7337]: E0312 18:17:21.584780 7337 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"network-check-target-cpthp_openshift-network-diagnostics(33feec78-4592-4343-965b-aa1b7044fcf3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"network-check-target-cpthp_openshift-network-diagnostics(33feec78-4592-4343-965b-aa1b7044fcf3)\\\": rpc error: code = DeadlineExceeded desc = context deadline exceeded\"" pod="openshift-network-diagnostics/network-check-target-cpthp" podUID="33feec78-4592-4343-965b-aa1b7044fcf3" Mar 12 18:17:22.835619 master-0 kubenswrapper[7337]: E0312 18:17:22.835479 7337 kubelet_node_status.go:585] "Error updating node status, will retry" err="error getting node \"master-0\": Get \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Mar 12 18:17:22.835619 master-0 kubenswrapper[7337]: E0312 18:17:22.835601 7337 kubelet_node_status.go:572] "Unable to update node status" err="update node status exceeds retry count" Mar 12 18:17:22.983530 master-0 kubenswrapper[7337]: E0312 18:17:22.983447 7337 fsHandler.go:119] failed to collect filesystem stats - rootDiskErr: could not stat "/var/lib/containers/storage/overlay/53c3e9b4b8cca5096418831f916cb1cb0c57b6fb8aae97e2652c5c5a1bbcab4a/diff" to get inode usage: stat /var/lib/containers/storage/overlay/53c3e9b4b8cca5096418831f916cb1cb0c57b6fb8aae97e2652c5c5a1bbcab4a/diff: no such file or directory, extraDiskErr: Mar 12 18:17:25.454945 master-0 kubenswrapper[7337]: E0312 18:17:25.454861 7337 projected.go:194] Error preparing data for projected volume kube-api-access for pod openshift-kube-controller-manager/installer-2-master-0: failed to fetch token: Timeout: request did not complete within requested timeout - context deadline exceeded Mar 12 18:17:25.455539 master-0 kubenswrapper[7337]: E0312 18:17:25.454997 7337 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/ec8121ea-f6e9-4232-9837-78b278a8cf54-kube-api-access podName:ec8121ea-f6e9-4232-9837-78b278a8cf54 nodeName:}" failed. No retries permitted until 2026-03-12 18:17:33.454956014 +0000 UTC m=+253.923556961 (durationBeforeRetry 8s). Error: MountVolume.SetUp failed for volume "kube-api-access" (UniqueName: "kubernetes.io/projected/ec8121ea-f6e9-4232-9837-78b278a8cf54-kube-api-access") pod "installer-2-master-0" (UID: "ec8121ea-f6e9-4232-9837-78b278a8cf54") : failed to fetch token: Timeout: request did not complete within requested timeout - context deadline exceeded Mar 12 18:17:25.455539 master-0 kubenswrapper[7337]: E0312 18:17:25.455156 7337 projected.go:194] Error preparing data for projected volume kube-api-access-bdc26 for pod openshift-marketplace/redhat-marketplace-ggkqg: failed to fetch token: Timeout: request did not complete within requested timeout - context deadline exceeded Mar 12 18:17:25.455539 master-0 kubenswrapper[7337]: E0312 18:17:25.455266 7337 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/0cc54e47-af53-448a-b1c9-043710890a32-kube-api-access-bdc26 podName:0cc54e47-af53-448a-b1c9-043710890a32 nodeName:}" failed. No retries permitted until 2026-03-12 18:17:33.455237351 +0000 UTC m=+253.923838328 (durationBeforeRetry 8s). Error: MountVolume.SetUp failed for volume "kube-api-access-bdc26" (UniqueName: "kubernetes.io/projected/0cc54e47-af53-448a-b1c9-043710890a32-kube-api-access-bdc26") pod "redhat-marketplace-ggkqg" (UID: "0cc54e47-af53-448a-b1c9-043710890a32") : failed to fetch token: Timeout: request did not complete within requested timeout - context deadline exceeded Mar 12 18:17:25.658085 master-0 kubenswrapper[7337]: E0312 18:17:25.657984 7337 projected.go:194] Error preparing data for projected volume kube-api-access-gmsnk for pod openshift-machine-api/control-plane-machine-set-operator-6686554ddc-zd9gm: failed to fetch token: Timeout: request did not complete within requested timeout - context deadline exceeded Mar 12 18:17:25.658355 master-0 kubenswrapper[7337]: E0312 18:17:25.658231 7337 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/34cbf061-4c76-476e-bed9-0a133c744862-kube-api-access-gmsnk podName:34cbf061-4c76-476e-bed9-0a133c744862 nodeName:}" failed. No retries permitted until 2026-03-12 18:17:33.658133885 +0000 UTC m=+254.126734872 (durationBeforeRetry 8s). Error: MountVolume.SetUp failed for volume "kube-api-access-gmsnk" (UniqueName: "kubernetes.io/projected/34cbf061-4c76-476e-bed9-0a133c744862-kube-api-access-gmsnk") pod "control-plane-machine-set-operator-6686554ddc-zd9gm" (UID: "34cbf061-4c76-476e-bed9-0a133c744862") : failed to fetch token: Timeout: request did not complete within requested timeout - context deadline exceeded Mar 12 18:17:32.146763 master-0 kubenswrapper[7337]: E0312 18:17:32.146666 7337 kubelet.go:1929] "Failed creating a mirror pod for" err="Internal error occurred: admission plugin \"LimitRanger\" failed to complete mutation in 13s" pod="openshift-etcd/etcd-master-0" Mar 12 18:17:35.525170 master-0 kubenswrapper[7337]: E0312 18:17:35.524754 7337 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" interval="7s" Mar 12 18:17:41.792426 master-0 kubenswrapper[7337]: E0312 18:17:41.792354 7337 kubelet.go:1929] "Failed creating a mirror pod for" err="pods \"etcd-master-0\" is forbidden: the server was unable to return a response in the time allotted, but may still be processing the request (get limitranges)" pod="openshift-etcd/etcd-master-0" Mar 12 18:17:43.223982 master-0 kubenswrapper[7337]: E0312 18:17:43.223818 7337 kubelet_node_status.go:585] "Error updating node status, will retry" err="failed to patch status \"{\\\"status\\\":{\\\"$setElementOrder/conditions\\\":[{\\\"type\\\":\\\"MemoryPressure\\\"},{\\\"type\\\":\\\"DiskPressure\\\"},{\\\"type\\\":\\\"PIDPressure\\\"},{\\\"type\\\":\\\"Ready\\\"}],\\\"conditions\\\":[{\\\"lastHeartbeatTime\\\":\\\"2026-03-12T18:17:33Z\\\",\\\"type\\\":\\\"MemoryPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2026-03-12T18:17:33Z\\\",\\\"type\\\":\\\"DiskPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2026-03-12T18:17:33Z\\\",\\\"type\\\":\\\"PIDPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2026-03-12T18:17:33Z\\\",\\\"type\\\":\\\"Ready\\\"}],\\\"images\\\":[{\\\"names\\\":[\\\"registry.redhat.io/redhat/redhat-operator-index@sha256:24fdf6755aec2ff108ceee2e24eee87c6953140e4325a59c8d1ddbf1dca41828\\\",\\\"registry.redhat.io/redhat/redhat-operator-index@sha256:ea25f58b1e485b176739a042e02cb509306918451cb4ee862117f0d0892ea2c1\\\",\\\"registry.redhat.io/redhat/redhat-operator-index:v4.18\\\"],\\\"sizeBytes\\\":1739033560},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0\\\"],\\\"sizeBytes\\\":1637445817},{\\\"names\\\":[\\\"registry.redhat.io/redhat/certified-operator-index@sha256:1fce8b5c6b0206ecb4ddc7de47062bed853b88d4e34415e9e5a2a6bc99cf6aad\\\",\\\"registry.redhat.io/redhat/certified-operator-index@sha256:8bd0ffcb6caac4a5d03346b5f7cdfaf2f6f9f9d0a30deff8f216e6cb63b0ee75\\\",\\\"registry.redhat.io/redhat/certified-operator-index:v4.18\\\"],\\\"sizeBytes\\\":1282704097},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:381e96959e3c3b08a3e2715e6024697ae14af31bd0378b49f583e984b3b9a192\\\"],\\\"sizeBytes\\\":1238047254},{\\\"names\\\":[\\\"registry.redhat.io/redhat/redhat-marketplace-index@sha256:898c67bf7fc973e99114f3148976a6c21ae0dbe413051415588fa9b995f5b331\\\",\\\"registry.redhat.io/redhat/redhat-marketplace-index@sha256:a641939d2096609a4cf6eec872a1476b7c671bfd81cffc2edeb6e9f13c9deeba\\\",\\\"registry.redhat.io/redhat/redhat-marketplace-index:v4.18\\\"],\\\"sizeBytes\\\":1231028434},{\\\"names\\\":[\\\"registry.redhat.io/redhat/community-operator-index@sha256:896dc34712ba5eb2d9daa6e77a55cb67501435f8f108cc4e5eda3ece5212c2b0\\\",\\\"registry.redhat.io/redhat/community-operator-index@sha256:ef4e5c2f6262e5a68f785f148c9da79aefa72e2e20a365276bc996658ce6689c\\\",\\\"registry.redhat.io/redhat/community-operator-index:v4.18\\\"],\\\"sizeBytes\\\":1221806801},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c\\\"],\\\"sizeBytes\\\":992610645},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4\\\"],\\\"sizeBytes\\\":943837171},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ff40e33e63d6c1f4e4393d5506e38def25ba20582d980fec8b81f81c867ceeec\\\"],\\\"sizeBytes\\\":918278686},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e207c762b7802ee0e54507d21ed1f25b19eddc511a4b824934c16c163193be6a\\\"],\\\"sizeBytes\\\":876146500},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\\\"],\\\"sizeBytes\\\":862633255},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bfcd8017eede3fb66fa3f5b47c27508b787d38455689154461f0e6a5dc303ff\\\"],\\\"sizeBytes\\\":772939850},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9c946fdc5a4cd16ff998c17844780e7efc38f7f38b97a8a40d75cd77b318ddef\\\"],\\\"sizeBytes\\\":687947017},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c03cb25dc6f6a865529ebc979e8d7d08492b28fd3fb93beddf30e1cb06f1245\\\"],\\\"sizeBytes\\\":683169303},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3f34dc492c80a3dee4643cc2291044750ac51e6e919b973de8723fa8b70bde70\\\"],\\\"sizeBytes\\\":677929075},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3\\\"],\\\"sizeBytes\\\":621647686},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b\\\"],\\\"sizeBytes\\\":589379637},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460\\\"],\\\"sizeBytes\\\":582153879},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:eb82e437a701ce83b70e56be8477d987da67578714dda3d9fa6628804b1b56f5\\\"],\\\"sizeBytes\\\":558210153},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:28f33d62fd0b94c5ea0ebcd7a4216848c8dd671a38d901ce98f4c399b700e1c7\\\"],\\\"sizeBytes\\\":548751793},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b\\\"],\\\"sizeBytes\\\":529324693},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ac6f0695d3386e6d601f4ae507940981352fa3ad884b0fed6fb25698c5e6f916\\\"],\\\"sizeBytes\\\":528946249},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\\\"],\\\"sizeBytes\\\":518384455},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b\\\"],\\\"sizeBytes\\\":517997625},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898\\\"],\\\"sizeBytes\\\":514980169},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953\\\"],\\\"sizeBytes\\\":513220825},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab\\\"],\\\"sizeBytes\\\":512273539},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0\\\"],\\\"sizeBytes\\\":511226810},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:834063dd26fb3d2489e193489198a0d5fbe9c775a0e30173e5fcef6994fbf0f6\\\"],\\\"sizeBytes\\\":511164376},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\\\"],\\\"sizeBytes\\\":508888174},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7220d16ea511c0f0410cf45db45aaafcc64847c9cb5732ad1eff39ceb482cdba\\\"],\\\"sizeBytes\\\":508544235},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:526c5c02a8fa86a2fa83a7087d4a5c4b1c4072c0f3906163494cc3b3c1295e9b\\\"],\\\"sizeBytes\\\":507967997},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4010a8f9d932615336227e2fd43325d4fa9025dca4bebe032106efea733fcfc3\\\"],\\\"sizeBytes\\\":506479655},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\\\"],\\\"sizeBytes\\\":506394574},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9\\\"],\\\"sizeBytes\\\":505344964},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609\\\"],\\\"sizeBytes\\\":505242594},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d11f13e867f4df046ca6789bb7273da5d0c08895b3dea00949c8a5458f9e22f9\\\"],\\\"sizeBytes\\\":504623546},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76bdc35338c4d0f5e5b9448fb73e3578656f908a962286692e12a0372ec721d5\\\"],\\\"sizeBytes\\\":495994161},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc\\\"],\\\"sizeBytes\\\":495064829},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2fe5144b1f72bdcf5d5a52130f02ed86fbec3875cc4ac108ead00eaac1659e06\\\"],\\\"sizeBytes\\\":487090672},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4a4c3e6ca0cd26f7eb5270cfafbcf423cf2986d152bf5b9fc6469d40599e104e\\\"],\\\"sizeBytes\\\":484450382},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c54c3f7cffe057ae0bdf26163d5e46744685083ae16fc97112e32beacd2d8955\\\"],\\\"sizeBytes\\\":484175664},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b9b8bc43bac294be3c7669cde049e388ad9d8751242051ba40f83e1c401eceda\\\"],\\\"sizeBytes\\\":468263999},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501\\\"],\\\"sizeBytes\\\":465086330},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a85dab5856916220df6f05ce9d6aa10cd4fa0234093b55355246690bba05ad1\\\"],\\\"sizeBytes\\\":463700811},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b714a7ada1e295b599b432f32e1fd5b74c8cdbe6fe51e95306322b25cb873914\\\"],\\\"sizeBytes\\\":458126424},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5230462066ab36e3025524e948dd33fa6f51ee29a4f91fa469bfc268568b5fd9\\\"],\\\"sizeBytes\\\":456575686},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:89cb093f319eaa04acfe9431b8697bffbc71ab670546f7ed257daa332165c626\\\"],\\\"sizeBytes\\\":448828105},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783\\\"],\\\"sizeBytes\\\":448041621},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf9670d0f269f8d49fd9ef4981999be195f6624a4146aa93d9201eb8acc81053\\\"],\\\"sizeBytes\\\":443271011}]}}\" for node \"master-0\": Patch \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0/status?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Mar 12 18:17:57.032939 master-0 kubenswrapper[7337]: E0312 18:17:57.032895 7337 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="9813ec3a-943f-4f29-b2dc-9a92ac3c0d4a" containerName="extract-content" Mar 12 18:17:57.033466 master-0 kubenswrapper[7337]: E0312 18:17:57.033432 7337 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="2331fc4b-e67b-4496-8cae-15cd11cf3030" containerName="extract-utilities" Mar 12 18:17:57.033916 master-0 kubenswrapper[7337]: E0312 18:17:57.033887 7337 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="c4d20441-ec1f-4571-b590-989f2bdd4082" containerName="extract-content" Mar 12 18:17:57.034291 master-0 kubenswrapper[7337]: E0312 18:17:57.034262 7337 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="9813ec3a-943f-4f29-b2dc-9a92ac3c0d4a" containerName="extract-utilities" Mar 12 18:17:57.034742 master-0 kubenswrapper[7337]: E0312 18:17:57.034710 7337 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="38785e6e-3052-405c-8874-4f295985def5" containerName="installer" Mar 12 18:17:57.035115 master-0 kubenswrapper[7337]: E0312 18:17:57.035082 7337 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="f516dab9-06d1-4bea-96b9-8f3e14543bbd" containerName="extract-utilities" Mar 12 18:17:57.035503 master-0 kubenswrapper[7337]: E0312 18:17:57.035471 7337 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="c4d20441-ec1f-4571-b590-989f2bdd4082" containerName="extract-utilities" Mar 12 18:17:57.035967 master-0 kubenswrapper[7337]: E0312 18:17:57.035938 7337 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="f516dab9-06d1-4bea-96b9-8f3e14543bbd" containerName="extract-content" Mar 12 18:17:57.036332 master-0 kubenswrapper[7337]: E0312 18:17:57.036303 7337 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="7542f3f1-23fe-41df-99b9-4324c75d35b7" containerName="installer" Mar 12 18:17:57.036744 master-0 kubenswrapper[7337]: E0312 18:17:57.036715 7337 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="e418d797-2c31-404b-9dc3-251399e42542" containerName="installer" Mar 12 18:17:57.037117 master-0 kubenswrapper[7337]: E0312 18:17:57.037090 7337 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="8cd18201-afdc-4229-972e-ab01adb2a7f3" containerName="installer" Mar 12 18:17:57.037437 master-0 kubenswrapper[7337]: E0312 18:17:57.037411 7337 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="2331fc4b-e67b-4496-8cae-15cd11cf3030" containerName="extract-content" Mar 12 18:18:07.141892 master-0 kubenswrapper[7337]: E0312 18:18:07.141859 7337 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="f78c05e1499b533b83f091333d61f045" containerName="kube-controller-manager" Mar 12 18:18:07.141892 master-0 kubenswrapper[7337]: E0312 18:18:07.141889 7337 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="f78c05e1499b533b83f091333d61f045" containerName="cluster-policy-controller" Mar 12 18:18:07.142096 master-0 kubenswrapper[7337]: E0312 18:18:07.141920 7337 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="f78c05e1499b533b83f091333d61f045" containerName="kube-controller-manager" Mar 12 18:18:07.142096 master-0 kubenswrapper[7337]: E0312 18:18:07.141935 7337 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="f78c05e1499b533b83f091333d61f045" containerName="kube-controller-manager" Mar 12 18:18:07.142446 master-0 kubenswrapper[7337]: E0312 18:18:07.142222 7337 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="f78c05e1499b533b83f091333d61f045" containerName="kube-controller-manager" Mar 12 18:18:10.814605 master-0 kubenswrapper[7337]: E0312 18:18:10.814323 7337 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"0b463f9b24d0ab49df3e727d4db7dfa04150b13289e95c0e9bcdb7b146ec69e5\": container with ID starting with 0b463f9b24d0ab49df3e727d4db7dfa04150b13289e95c0e9bcdb7b146ec69e5 not found: ID does not exist" containerID="0b463f9b24d0ab49df3e727d4db7dfa04150b13289e95c0e9bcdb7b146ec69e5" Mar 12 18:18:10.814767 master-0 kubenswrapper[7337]: E0312 18:18:10.814739 7337 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"e36200a118a6b9e121bed30c8ddbc2aa00c9c281d2b93d4ca81dd8623b5aea84\": container with ID starting with e36200a118a6b9e121bed30c8ddbc2aa00c9c281d2b93d4ca81dd8623b5aea84 not found: ID does not exist" containerID="e36200a118a6b9e121bed30c8ddbc2aa00c9c281d2b93d4ca81dd8623b5aea84" Mar 12 18:18:10.815200 master-0 kubenswrapper[7337]: E0312 18:18:10.815178 7337 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"46264a9af82e695b6d4dff6d1f55cd807b8535bd3965ef4182b223f7b1e2e6f6\": container with ID starting with 46264a9af82e695b6d4dff6d1f55cd807b8535bd3965ef4182b223f7b1e2e6f6 not found: ID does not exist" containerID="46264a9af82e695b6d4dff6d1f55cd807b8535bd3965ef4182b223f7b1e2e6f6"config/crd/volumesnapshotcontents.snapshot.storage.k8s.io.json0000640000000000000000000005444315154601551023445 0ustar0000000000000000{"metadata":{"name":"volumesnapshotcontents.snapshot.storage.k8s.io","uid":"740a9607-ccfb-4eeb-9ee5-65f756923c3d","resourceVersion":"4187","generation":1,"creationTimestamp":"2026-03-12T18:13:24Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/955","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"scope":"Cluster","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the\nunderlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system.\nRequired.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on\nthe underlying storage system should be deleted when its bound VolumeSnapshot is deleted.\nSupported values are \"Retain\" and \"Delete\".\n\"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept.\n\"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted.\nFor dynamically provisioned snapshots, this field will automatically be filled in by the\nCSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding\nVolumeSnapshotClass.\nFor pre-existing snapshots, users MUST specify this field when creating the\n VolumeSnapshotContent object.\nRequired.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on\nthe underlying storage system.\nThis MUST be the same as the name returned by the CSI GetPluginName() call for\nthat driver.\nRequired.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned\nor already exists, and just requires a Kubernetes object representation.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on\nthe underlying storage system for which a Kubernetes object representation\nwas (or should be) created.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"snapshotHandle is immutable"}]},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot\nshould be dynamically taken from.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeHandle is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.volumeHandle) || has(self.volumeHandle)","message":"volumeHandle is required once set"},{"rule":"!has(oldSelf.snapshotHandle) || has(self.snapshotHandle)","message":"snapshotHandle is required once set"},{"rule":"(has(self.volumeHandle) \u0026\u0026 !has(self.snapshotHandle)) || (!has(self.volumeHandle) \u0026\u0026 has(self.snapshotHandle))","message":"exactly one of volumeHandle and snapshotHandle must be set"}]},"sourceVolumeMode":{"description":"SourceVolumeMode is the mode of the volume whose snapshot is taken.\nCan be either “Filesystem” or “Block”.\nIf not specified, it indicates the source volume's mode is unknown.\nThis field is immutable.\nThis field is an alpha field.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"sourceVolumeMode is immutable"}]},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be)\ncreated.\nNote that after provisioning, the VolumeSnapshotClass may be deleted or\nrecreated with different set of values, and as such, should not be referenced\npost-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this\nVolumeSnapshotContent object is bound.\nVolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to\nthis VolumeSnapshotContent's name for the bidirectional binding to be valid.\nFor a pre-existing VolumeSnapshotContent object, name and namespace of the\nVolumeSnapshot object MUST be provided for binding to happen.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string\nshould contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2].\nFor example, if the object reference is to a container within a pod, this would take on a value like:\n\"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered\nthe event) or if no container name is specified \"spec.containers[2]\" (container with\nindex 2 in this pod). This syntax is chosen only to have some well-defined way of\nreferencing a part of an object.\nTODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}},"x-kubernetes-map-type":"atomic","x-kubernetes-validations":[{"rule":"has(self.name) \u0026\u0026 has(self.__namespace__)","message":"both spec.volumeSnapshotRef.name and spec.volumeSnapshotRef.namespace must be set"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.sourceVolumeMode) || has(self.sourceVolumeMode)","message":"sourceVolumeMode is required once set"}]},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it indicates the creation time is unknown.\nThe format of this field is a Unix nanoseconds time encoded as an int64.\nOn Unix, the command `date +%s%N` returns the current time in nanoseconds\nsince 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nUpon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system.\nIf not specified, it indicates that dynamic snapshot creation has either failed\nor it is still in progress.","type":"string"},"volumeGroupSnapshotHandle":{"description":"VolumeGroupSnapshotHandle is the CSI \"group_snapshot_id\" of a group snapshot\non the underlying storage system.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshotContent is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshotContent","schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the underlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system. Required.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted. Supported values are \"Retain\" and \"Delete\". \"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept. \"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted. For dynamically provisioned snapshots, this field will automatically be filled in by the CSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding VolumeSnapshotClass. For pre-existing snapshots, users MUST specify this field when creating the VolumeSnapshotContent object. Required.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on the underlying storage system. This MUST be the same as the name returned by the CSI GetPluginName() call for that driver. Required.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned or already exists, and just requires a Kubernetes object representation. This field is immutable after creation. Required.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on the underlying storage system for which a Kubernetes object representation was (or should be) created. This field is immutable.","type":"string"},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot should be dynamically taken from. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be) created. Note that after provisioning, the VolumeSnapshotClass may be deleted or recreated with different set of values, and as such, should not be referenced post-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this VolumeSnapshotContent object is bound. VolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to this VolumeSnapshotContent's name for the bidirectional binding to be valid. For a pre-existing VolumeSnapshotContent object, name and namespace of the VolumeSnapshot object MUST be provided for binding to happen. This field is immutable after creation. Required.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string should contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2]. For example, if the object reference is to a container within a pod, this would take on a value like: \"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered the event) or if no container name is specified \"spec.containers[2]\" (container with index 2 in this pod). This syntax is chosen only to have some well-defined way of referencing a part of an object. TODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}}}}},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it indicates the creation time is unknown. The format of this field is a Unix nanoseconds time encoded as an int64. On Unix, the command `date +%s%N` returns the current time in nanoseconds since 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any. Upon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system. If not specified, it indicates that dynamic snapshot creation has either failed or it is still in progress.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-03-12T18:13:24Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-03-12T18:13:24Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"},{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-03-12T18:13:24Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/955"}],"acceptedNames":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"storedVersions":["v1"]}}config/crd/volumesnapshots.snapshot.storage.k8s.io.json0000640000000000000000000004563015154601551022050 0ustar0000000000000000{"metadata":{"name":"volumesnapshots.snapshot.storage.k8s.io","uid":"919f05e0-1653-4693-a1c1-33e054d3f487","resourceVersion":"4158","generation":1,"creationTimestamp":"2026-03-12T18:13:24Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/814","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"scope":"Namespaced","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time\nsnapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user.\nMore info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots\nRequired.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim\nobject representing the volume from which a snapshot should be created.\nThis PVC is assumed to be in the same namespace as the VolumeSnapshot\nobject.\nThis field should be set if the snapshot does not exists, and needs to be\ncreated.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"persistentVolumeClaimName is immutable"}]},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent\nobject representing an existing volume snapshot.\nThis field should be set if the snapshot already exists and only needs a representation in Kubernetes.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeSnapshotContentName is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.persistentVolumeClaimName) || has(self.persistentVolumeClaimName)","message":"persistentVolumeClaimName is required once set"},{"rule":"!has(oldSelf.volumeSnapshotContentName) || has(self.volumeSnapshotContentName)","message":"volumeSnapshotContentName is required once set"},{"rule":"(has(self.volumeSnapshotContentName) \u0026\u0026 !has(self.persistentVolumeClaimName)) || (!has(self.volumeSnapshotContentName) \u0026\u0026 has(self.persistentVolumeClaimName))","message":"exactly one of volumeSnapshotContentName and persistentVolumeClaimName must be set"}]},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass\nrequested by the VolumeSnapshot.\nVolumeSnapshotClassName may be left nil to indicate that the default\nSnapshotClass should be used.\nA given cluster may have multiple default Volume SnapshotClasses: one\ndefault per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass,\nVolumeSnapshotSource will be checked to figure out what the associated\nCSI Driver is, and the default VolumeSnapshotClass associated with that\nCSI Driver will be used. If more than one VolumeSnapshotClass exist for\na given CSI Driver and more than one have been marked as default,\nCreateSnapshot will fail and generate an event.\nEmpty string is not allowed for this field.","type":"string","x-kubernetes-validations":[{"rule":"size(self) \u003e 0","message":"volumeSnapshotClassName must not be the empty string when set"}]}}},"status":{"description":"status represents the current information of a snapshot.\nConsumers must verify binding between VolumeSnapshot and\nVolumeSnapshotContent objects is successful (by validating that both\nVolumeSnapshot and VolumeSnapshotContent point at each other) before\nusing this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent\nobject to which this VolumeSnapshot object intends to bind to.\nIf not specified, it indicates that the VolumeSnapshot object has not been\nsuccessfully bound to a VolumeSnapshotContent object yet.\nNOTE: To avoid possible security issues, consumers must verify binding between\nVolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that\nboth VolumeSnapshot and VolumeSnapshotContent point at each other) before using\nthis object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nThis field could be helpful to upper level controllers(i.e., application controller)\nto decide whether they should continue on waiting for the snapshot to be created\nbased on the type of error reported.\nThe snapshot controller will keep retrying when an error occurs during the\nsnapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume\nfrom this snapshot.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"volumeGroupSnapshotName":{"description":"VolumeGroupSnapshotName is the name of the VolumeGroupSnapshot of which this\nVolumeSnapshot is a part of.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshot is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshot","schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time snapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user. More info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots Required.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from. This field is immutable after creation. Required.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim object representing the volume from which a snapshot should be created. This PVC is assumed to be in the same namespace as the VolumeSnapshot object. This field should be set if the snapshot does not exists, and needs to be created. This field is immutable.","type":"string"},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent object representing an existing volume snapshot. This field should be set if the snapshot already exists and only needs a representation in Kubernetes. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass requested by the VolumeSnapshot. VolumeSnapshotClassName may be left nil to indicate that the default SnapshotClass should be used. A given cluster may have multiple default Volume SnapshotClasses: one default per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass, VolumeSnapshotSource will be checked to figure out what the associated CSI Driver is, and the default VolumeSnapshotClass associated with that CSI Driver will be used. If more than one VolumeSnapshotClass exist for a given CSI Driver and more than one have been marked as default, CreateSnapshot will fail and generate an event. Empty string is not allowed for this field.","type":"string"}}},"status":{"description":"status represents the current information of a snapshot. Consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent object to which this VolumeSnapshot object intends to bind to. If not specified, it indicates that the VolumeSnapshot object has not been successfully bound to a VolumeSnapshotContent object yet. NOTE: To avoid possible security issues, consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any. This field could be helpful to upper level controllers(i.e., application controller) to decide whether they should continue on waiting for the snapshot to be created based on the type of error reported. The snapshot controller will keep retrying when an error occurs during the snapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume from this snapshot. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-03-12T18:13:24Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-03-12T18:13:24Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"},{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-03-12T18:13:24Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/814"}],"acceptedNames":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"storedVersions":["v1"]}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/edit.json0000640000000000000000000002215615154601551025503 0ustar0000000000000000{"metadata":{"name":"edit","uid":"ae88b9d3-de61-4f76-a867-a2a00a141898","resourceVersion":"7025","creationTimestamp":"2026-03-12T18:05:23Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults","rbac.authorization.k8s.io/aggregate-to-admin":"true"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-edit":"true"}}]}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/admin.json0000640000000000000000000002504315154601551025644 0ustar0000000000000000{"metadata":{"name":"admin","uid":"c8169543-4877-46cc-a5d9-697a5e89919e","resourceVersion":"7028","creationTimestamp":"2026-03-12T18:05:23Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["watch","list","get"],"apiGroups":["k8s.cni.cncf.io"],"resources":["network-attachment-definitions"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindings","roles"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["rbac.authorization.k8s.io"],"resources":["rolebindings","roles"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["localresourceaccessreviews","localsubjectaccessreviews","subjectrulesreviews"]},{"verbs":["create"],"apiGroups":["authorization.k8s.io"],"resources":["localsubjectaccessreviews"]},{"verbs":["delete","get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["resourceaccessreviews","subjectaccessreviews"]},{"verbs":["create"],"apiGroups":["","security.openshift.io"],"resources":["podsecuritypolicyreviews","podsecuritypolicyselfsubjectreviews","podsecuritypolicysubjectreviews"]},{"verbs":["get","list","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindingrestrictions"]},{"verbs":["admin","edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["delete","get","patch","update"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["update"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-admin":"true"}}]}}config/pod/openshift-cluster-version/cluster-version-operator-8c9c967c7-m885k.json0000640000000000000000000001341415154601551026444 0ustar0000000000000000{"metadata":{"name":"cluster-version-operator-8c9c967c7-m885k","generateName":"cluster-version-operator-8c9c967c7-","namespace":"openshift-cluster-version","uid":"4048e453-a983-4708-89b6-a81af0067e29","resourceVersion":"7459","creationTimestamp":"2026-03-12T18:14:10Z","labels":{"k8s-app":"cluster-version-operator","pod-template-hash":"8c9c967c7"},"annotations":{"openshift.io/required-scc":"hostaccess","openshift.io/scc":"hostaccess"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-version-operator-8c9c967c7","uid":"fe4f071a-3c40-422e-9e22-c006a047c1c2","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"etc-ssl-certs","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"etc-cvo-updatepayloads","hostPath":{"path":"/etc/cvo/updatepayloads","type":""}},{"name":"serving-cert","secret":{"secretName":"cluster-version-operator-serving-cert","defaultMode":420}},{"name":"service-ca","configMap":{"name":"openshift-service-ca.crt","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-version-operator","image":"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","args":["start","--release-image=quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","--enable-auto-update=false","--listen=0.0.0.0:9099","--serving-cert-file=/etc/tls/serving-cert/tls.crt","--serving-key-file=/etc/tls/serving-cert/tls.key","--v=2","--always-enable-capabilities=Ingress"],"env":[{"name":"OPERATOR_IMAGE_VERSION","value":"0.0.1-snapshot"},{"name":"KUBERNETES_SERVICE_PORT","value":"6443"},{"name":"KUBERNETES_SERVICE_HOST","value":"api-int.sno.openstack.lab"},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}},{"name":"CLUSTER_PROFILE","value":"self-managed-high-availability"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-ssl-certs","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"etc-cvo-updatepayloads","readOnly":true,"mountPath":"/etc/cvo/updatepayloads"},{"name":"serving-cert","readOnly":true,"mountPath":"/etc/tls/serving-cert"},{"name":"service-ca","readOnly":true,"mountPath":"/etc/tls/service-ca"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000040000,"runAsNonRoot":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":130,"dnsPolicy":"Default","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"default","serviceAccount":"default","automountServiceAccountToken":false,"nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c6,c5"},"fsGroup":1000040000},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:14:11Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:14:10Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:14:11Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:14:11Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:14:10Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-12T18:14:10Z","containerStatuses":[{"name":"cluster-version-operator","state":{"running":{"startedAt":"2026-03-12T18:14:10Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","imageID":"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","containerID":"cri-o://570936a0a36edb0fda6b55c99e7f566dfd145b7b28da0dcae1b91148af7c1a36","started":true,"volumeMounts":[{"name":"etc-ssl-certs","mountPath":"/etc/ssl/certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-cvo-updatepayloads","mountPath":"/etc/cvo/updatepayloads","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"serving-cert","mountPath":"/etc/tls/serving-cert","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca","mountPath":"/etc/tls/service-ca","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/id0000640000000000000000000000004415154601551011025 0ustar0000000000000000bcd4b9b5-e5c8-488a-9ff1-aedc4cb18961config/version.json0000640000000000000000000000717415154601551013101 0ustar0000000000000000{"metadata":{"name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e","resourceVersion":"10102","generation":2,"creationTimestamp":"2026-03-12T18:06:37Z"},"spec":{"clusterID":"bcd4b9b5-e5c8-488a-9ff1-aedc4cb18961","channel":"stable-4.18","signatureStores":null},"status":{"desired":{"version":"4.18.34","image":"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","url":"https://access.redhat.com/errata/RHSA-2026:2977","channels":["candidate-4.18","candidate-4.19","candidate-4.20","eus-4.18","fast-4.18","fast-4.19","stable-4.18"]},"history":[{"state":"Partial","startedTime":"2026-03-12T18:06:58Z","completionTime":null,"version":"4.18.34","image":"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","verified":false}],"observedGeneration":2,"versionHash":"p13mOMOOYQo=","capabilities":{"enabledCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"],"knownCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"]},"conditions":[{"type":"RetrievedUpdates","status":"True","lastTransitionTime":"2026-03-12T18:06:58Z"},{"type":"Upgradeable","status":"False","lastTransitionTime":"2026-03-12T18:06:58Z","reason":"AdminAckRequired","message":"Kubernetes 1.32 and therefore OpenShift 4.19 remove several APIs which require admin consideration. Please see the knowledge article https://access.redhat.com/articles/7112216 for details and instructions."},{"type":"ImplicitlyEnabledCapabilities","status":"False","lastTransitionTime":"2026-03-12T18:06:58Z","reason":"AsExpected","message":"Capabilities match configured spec"},{"type":"ReleaseAccepted","status":"True","lastTransitionTime":"2026-03-12T18:06:58Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.34\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b\" architecture=\"amd64\""},{"type":"Available","status":"False","lastTransitionTime":"2026-03-12T18:06:58Z"},{"type":"Failing","status":"True","lastTransitionTime":"2026-03-12T18:18:00Z","reason":"MultipleErrors","message":"Multiple errors are preventing progress:\n* Cluster operators authentication, baremetal, cloud-controller-manager, cloud-credential, cluster-autoscaler, etcd, image-registry, insights, kube-apiserver, kube-controller-manager, kube-scheduler, machine-api, machine-approver, machine-config, monitoring, openshift-apiserver, openshift-samples, operator-lifecycle-manager-packageserver, storage are not available\n* Could not update imagestream \"openshift/driver-toolkit\" (617 of 908): the server is down or not responding\n* Could not update oauthclient \"console\" (550 of 908): the server does not recognize this resource, check extension API servers\n* Could not update role \"openshift-console-operator/prometheus-k8s\" (825 of 908): resource may have been deleted\n* Could not update role \"openshift-console/prometheus-k8s\" (829 of 908): resource may have been deleted"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-12T18:06:58Z","reason":"MultipleErrors","message":"Unable to apply 4.18.34: an unknown error has occurred: MultipleErrors"}],"availableUpdates":null}}config/clusteroperator/storage.json0000640000000000000000000000346715154601550016315 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"storage","uid":"2defe797-a3c3-4a44-b5c8-65a311eb7b6c","resourceVersion":"10101","generation":1,"creationTimestamp":"2026-03-12T18:06:58Z","annotations":{"capability.openshift.io/name":"Storage","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T18:18:14Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-12T18:18:14Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-12T18:18:14Z","reason":"AsExpected","message":"DefaultStorageClassControllerAvailable: No default StorageClass for this platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T18:18:14Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-12T18:18:13Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"","resource":"namespaces","name":"openshift-cluster-csi-drivers"},{"group":"operator.openshift.io","resource":"storages","name":"cluster"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"cluster-storage-operator-role"}],"extension":null}}config/clusteroperator/service-ca.json0000640000000000000000000000340315154601550016660 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"service-ca","uid":"9f3b547f-00ee-4ab2-815a-16b1d440d7ab","resourceVersion":"4839","generation":1,"creationTimestamp":"2026-03-12T18:06:58Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T18:13:24Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-12T18:13:28Z","reason":"AsExpected","message":"Progressing: All service-ca-operator deployments updated"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-12T18:13:26Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T18:13:26Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-12T18:13:24Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"servicecas","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-service-ca-operator"},{"group":"","resource":"namespaces","name":"openshift-service-ca"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-packageserver.json0000640000000000000000000000307615154601550024665 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-packageserver","uid":"9d48192c-24c7-457b-8877-85a27eda308b","resourceVersion":"9523","generation":1,"creationTimestamp":"2026-03-12T18:06:59Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T18:14:10Z"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-12T18:14:10Z","reason":"ClusterServiceVersionNotSucceeded","message":"ClusterServiceVersion openshift-operator-lifecycle-manager/packageserver observed in phase Failed with reason: NoOperatorGroup, message: csv in namespace with no operatorgroups"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-12T18:17:51Z","message":"Working toward 0.0.1-snapshot"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T18:14:12Z","message":"Safe to upgrade"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"},{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-catalog.json0000640000000000000000000000255515154601550023456 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-catalog","uid":"00c48d9f-19c3-4a58-a41c-13fd1c425f68","resourceVersion":"9171","generation":1,"creationTimestamp":"2026-03-12T18:06:59Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T18:14:10Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-12T18:17:35Z","message":"Deployed 4.18.0-202602140513.p2.gc2df9e7.assembly.stream.el9-c2df9e7"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-12T18:14:10Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T18:14:10Z"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"operator-lifecycle-manager","version":"4.18.0-202602140513.p2.gc2df9e7.assembly.stream.el9-c2df9e7"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager.json0000640000000000000000000000264115154601550022042 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager","uid":"25b43981-2ab7-4252-b37e-97733e83609f","resourceVersion":"7416","generation":1,"creationTimestamp":"2026-03-12T18:06:58Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-12T18:14:10Z","message":"Deployed 4.18.0-202602140513.p2.gc2df9e7.assembly.stream.el9-c2df9e7"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-12T18:14:10Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T18:14:10Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T18:14:10Z"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"operator-lifecycle-manager","version":"4.18.0-202602140513.p2.gc2df9e7.assembly.stream.el9-c2df9e7"}],"relatedObjects":[{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/openshift-samples.json0000640000000000000000000000173315154601550020304 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-samples","uid":"9fbee658-40f9-406d-bffc-29240c6a2d7a","resourceVersion":"710","generation":1,"creationTimestamp":"2026-03-12T18:06:58Z","annotations":{"capability.openshift.io/name":"openshift-samples","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"samples.operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-samples-operator"},{"group":"template.openshift.io","resource":"templates","namespace":"openshift","name":""},{"group":"image.openshift.io","resource":"imagestreams","namespace":"openshift","name":""}],"extension":null}}config/clusteroperator/openshift-controller-manager.json0000640000000000000000000000377215154601550022440 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-controller-manager","uid":"02c9422c-2f3f-4c9a-9590-619ef3816a47","resourceVersion":"6946","generation":1,"creationTimestamp":"2026-03-12T18:06:58Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T18:13:24Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-12T18:13:31Z","reason":"_DesiredStateNotYetAchieved","message":"Progressing: deployment/controller-manager: observed generation is 4, desired generation is 5.\nProgressing: deployment/route-controller-manager: observed generation is 2, desired generation is 3."},{"type":"Available","status":"True","lastTransitionTime":"2026-03-12T18:14:04Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T18:13:31Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-12T18:13:24Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftcontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-controller-manager-operator"},{"group":"","resource":"namespaces","name":"openshift-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-route-controller-manager"}],"extension":null}}config/clusteroperator/openshift-apiserver.json0000640000000000000000000001216215154601550020636 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-apiserver","uid":"55e5046e-80c2-4343-a1e4-9ac809c5043b","resourceVersion":"7857","generation":1,"creationTimestamp":"2026-03-12T18:06:58Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T18:13:25Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-12T18:14:11Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-12T18:13:25Z","reason":"APIServices_Error","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/apps.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/authorization.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/build.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/image.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/project.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/quota.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/route.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/security.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/template.openshift.io/v1: 401"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T18:13:24Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-12T18:13:24Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"openshift-apiserver","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftapiservers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-apiserver"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"endpoints","namespace":"openshift-etcd","name":"host-etcd-2"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-apiserver","name":""},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.apps.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.authorization.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.build.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.image.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.project.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.quota.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.route.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.security.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.template.openshift.io"}],"extension":null}}config/clusteroperator/olm.json0000640000000000000000000001420415154601550015427 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"olm","uid":"ad6e062c-d817-4a38-abf9-784a82576f84","resourceVersion":"9440","generation":1,"creationTimestamp":"2026-03-12T18:06:58Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManagerV1","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T18:13:40Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-12T18:14:09Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-12T18:14:09Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T18:13:40Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-12T18:13:40Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-catalogd"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clustercatalogs.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-catalogd","name":"catalogd-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-catalogd","name":"catalogd-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-catalogd","name":"catalogd-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-catalogd","name":"catalogd-service"},{"group":"apps","resource":"deployments","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-certified-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-community-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-marketplace"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-operators"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":"catalogd-mutating-webhook-configuration"},{"group":"","resource":"namespaces","name":"openshift-operator-controller"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusterextensions.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-operator-controller","name":"operator-controller-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager-metrics-service"},{"group":"apps","resource":"deployments","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"operator.openshift.io","resource":"olms","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-olm-operator"}],"extension":null}}config/clusteroperator/node-tuning.json0000640000000000000000000000342115154601550017066 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"node-tuning","uid":"ab79a913-3cc7-4eb2-b22b-a2a11a3cfa5e","resourceVersion":"6285","generation":1,"creationTimestamp":"2026-03-12T18:06:58Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-12T18:13:48Z","reason":"AsExpected","message":"Cluster has deployed 1/1 \"4.18.34\" operands"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-12T18:13:49Z","reason":"AsExpected","message":"Cluster version is \"4.18.34\""},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T18:13:47Z","reason":"AsExpected","message":"DaemonSet \"tuned\" available"}],"versions":[{"name":"ocp-tuned","version":"4.18.34"},{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-node-tuning-operator"},{"group":"tuned.openshift.io","resource":"profiles","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"tuned.openshift.io","resource":"tuneds","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"apps","resource":"daemonsets","namespace":"openshift-cluster-node-tuning-operator","name":"tuned"},{"group":"performance.openshift.io","resource":"performanceprofiles","name":""}],"extension":null}}config/clusteroperator/network.json0000640000000000000000000003614315154601550016337 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"network","uid":"b1b48482-7112-4ef6-9848-e882b13da535","resourceVersion":"9939","generation":1,"creationTimestamp":"2026-03-12T18:06:58Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","network.operator.openshift.io/last-seen-state":"{\"DaemonsetStates\":[],\"DeploymentStates\":[],\"StatefulsetStates\":[]}","network.operator.openshift.io/relatedClusterObjects":""},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"ManagementStateDegraded","status":"False","lastTransitionTime":"2026-03-12T18:11:57Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T18:11:39Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T18:11:39Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-12T18:18:02Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-12T18:13:12Z"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"applied-cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"network-attachment-definitions.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ippools.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"overlappingrangeipreservations.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"nodeslicepools.whereabouts.cni.cncf.io"},{"group":"","resource":"namespaces","name":"openshift-multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-ancillary-tools"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-transient"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-group"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-cluster-readers"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"net-attach-def-project"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"default-cni-sysctl-allowlist"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"cni-copy-resources"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"whereabouts-config"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"multus-daemon-config"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus-additional-cni-plugins"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"metrics-daemon-sa"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"metrics-daemon-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"metrics-daemon-sa-rolebinding"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"network-metrics-daemon"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-network"},{"group":"","resource":"services","namespace":"openshift-multus","name":"network-metrics-service"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"","resource":"services","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ac"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-admission-controller-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-admission-controller-webhook"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"multus.openshift.io"},{"group":"apps","resource":"deployments","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-multus-admission-controller"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-multus","name":"prometheus-k8s-rules"},{"group":"","resource":"namespaces","name":"openshift-ovn-kubernetes"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressfirewalls.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressips.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressqoses.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminpolicybasedexternalroutes.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressservices.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"baselineadminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ipamclaims.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"userdefinednetworks.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusteruserdefinednetworks.k8s.ovn.org"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-nodes-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-kube-rbac-proxy"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-kube-rbac-proxy"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-config"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"ovn"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"signer"},{"group":"flowcontrol.apiserver.k8s.io","resource":"flowschemas","name":"openshift-ovn-kubernetes"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-cluster-reader"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-script-lib"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-editor"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-viewer"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"master-rules"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"networking-rules"},{"group":"","resource":"configmaps","namespace":"openshift-config-managed","name":"openshift-network-features"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-control-plane-metrics"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-node"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"","resource":"namespaces","name":"openshift-host-network"},{"group":"","resource":"resourcequotas","namespace":"openshift-host-network","name":"host-network-namespace-quotas"},{"group":"apps","resource":"deployments","namespace":"openshift-ovn-kubernetes","name":"ovnkube-control-plane"},{"group":"apps","resource":"daemonsets","namespace":"openshift-ovn-kubernetes","name":"ovnkube-node"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicies","name":"user-defined-networks-namespace-label"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicybindings","name":"user-defined-networks-namespace-label-binding"},{"group":"","resource":"namespaces","name":"openshift-network-diagnostics"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"kube-system","name":"network-diagnostics"},{"group":"apps","resource":"deployments","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config-managed","name":"openshift-network-public-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config-managed","name":"openshift-network-public-role-binding"},{"group":"","resource":"namespaces","name":"openshift-network-node-identity"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"system:openshift:scc:hostnetwork-v2"},{"group":"","resource":"configmaps","namespace":"openshift-network-node-identity","name":"ovnkube-identity-cm"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"network-node-identity.openshift.io"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-network-operator","name":"openshift-network-operator-ipsec-rules"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-iptables-alerter"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-iptables-alerter"},{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"iptables-alerter-script"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"","resource":"namespaces","name":"openshift-network-operator"},{"group":"operator.openshift.io","resource":"networks","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cloud-network-config-controller"}],"extension":null}}config/clusteroperator/monitoring.json0000640000000000000000000000333715154601550017032 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"monitoring","uid":"bcf49a5c-40f8-4a77-bbac-cdcfc1053f6b","resourceVersion":"7361","generation":1,"creationTimestamp":"2026-03-12T18:06:58Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"Unknown","lastTransitionTime":"2026-03-12T18:14:10Z"},{"type":"Degraded","status":"Unknown","lastTransitionTime":"2026-03-12T18:14:10Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-12T18:14:10Z","reason":"RollOutInProgress","message":"Rolling out the stack."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T18:14:10Z"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-monitoring"},{"group":"","resource":"namespaces","name":"openshift-user-workload-monitoring"},{"group":"monitoring.coreos.com","resource":"servicemonitors","name":""},{"group":"monitoring.coreos.com","resource":"podmonitors","name":""},{"group":"monitoring.coreos.com","resource":"prometheusrules","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagers","name":""},{"group":"monitoring.coreos.com","resource":"prometheuses","name":""},{"group":"monitoring.coreos.com","resource":"thanosrulers","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagerconfigs","name":""}],"extension":null}}config/clusteroperator/marketplace.json0000640000000000000000000000313315154601550017127 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"marketplace","uid":"a602d518-ce4b-4d11-80f4-26cdbb732da9","resourceVersion":"7418","generation":1,"creationTimestamp":"2026-03-12T18:06:58Z","annotations":{"capability.openshift.io/name":"marketplace","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-12T18:14:10Z","reason":"OperatorAvailable","message":"Successfully progressed to release version: 4.18.34"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-12T18:14:10Z","reason":"OperatorAvailable","message":"Available release version: 4.18.34"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T18:14:10Z","reason":"OperatorAvailable","message":"Marketplace is upgradeable"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T18:14:10Z","reason":"OperatorAvailable","message":"Available release version: 4.18.34"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-marketplace"},{"group":"operators.coreos.com","resource":"catalogsources","namespace":"openshift-marketplace","name":""}],"extension":null}}config/clusteroperator/machine-config.json0000640000000000000000000000230015154601550017501 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-config","uid":"f2438584-d74f-4bc0-9ecf-bbcdb5eecbe4","resourceVersion":"781","generation":1,"creationTimestamp":"2026-03-12T18:06:58Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-config-operator"},{"group":"machineconfiguration.openshift.io","resource":"machineconfigpools","name":""},{"group":"machineconfiguration.openshift.io","resource":"controllerconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"machineconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"kubeletconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"containerruntimeconfigs","name":""},{"group":"","resource":"nodes","name":""}],"extension":null}}config/clusteroperator/machine-approver.json0000640000000000000000000000146715154601550020107 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-approver","uid":"a994470e-7193-436a-913d-bce0d7927826","resourceVersion":"813","generation":1,"creationTimestamp":"2026-03-12T18:06:58Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-machine-approver"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""}],"extension":null}}config/clusteroperator/machine-api.json0000640000000000000000000000263415154601550017017 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-api","uid":"48a718d9-c1d9-406d-bbe3-ac3849807c8d","resourceVersion":"712","generation":1,"creationTimestamp":"2026-03-12T18:06:58Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"machines","name":""},{"group":"machine.openshift.io","resource":"machinesets","name":""},{"group":"machine.openshift.io","resource":"machinehealthchecks","name":""},{"group":"rbac.authorization.k8s.io","resource":"roles","name":""},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-operator"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-controllers"},{"group":"metal3.io","resource":"baremetalhosts","name":""},{"group":"ipam.cluster.x-k8s.io","resource":"ipaddresses","name":""},{"group":"ipam.cluster.x-k8s.io","resource":"ipaddressclaims","name":""}],"extension":null}}config/clusteroperator/kube-storage-version-migrator.json0000640000000000000000000000325315154601550022537 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-storage-version-migrator","uid":"f6069b3b-0898-42ba-87d7-9d9fd23b161f","resourceVersion":"5179","generation":1,"creationTimestamp":"2026-03-12T18:06:58Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T18:13:24Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-12T18:13:33Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-12T18:13:33Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T18:13:24Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-12T18:13:24Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubestorageversionmigrators","name":"cluster"},{"group":"migration.k8s.io","resource":"storageversionmigrations","name":""},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator"},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator-operator"}],"extension":null}}config/clusteroperator/kube-scheduler.json0000640000000000000000000000415615154601550017547 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-scheduler","uid":"a108ab20-40f4-4ed7-b230-8084d2f671e8","resourceVersion":"7273","generation":1,"creationTimestamp":"2026-03-12T18:06:58Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T18:13:24Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-12T18:13:40Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 4"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-12T18:13:24Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 4"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T18:13:24Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-12T18:13:24Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeschedulers","name":"cluster"},{"group":"config.openshift.io","resource":"schedulers","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler-operator"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""}],"extension":null}}config/clusteroperator/kube-controller-manager.json0000640000000000000000000000427715154601550021370 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-controller-manager","uid":"1944d2e8-addf-403f-b722-af1e0d412896","resourceVersion":"8678","generation":1,"creationTimestamp":"2026-03-12T18:06:58Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T18:13:24Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-12T18:14:04Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-12T18:13:24Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T18:13:24Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-12T18:13:24Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubecontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager-operator"},{"group":"","resource":"namespaces","name":"kube-system"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""},{"group":"","resource":"nodes","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/kube-apiserver.json0000640000000000000000000000517715154601550017575 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-apiserver","uid":"1083901a-d1ff-4b66-a729-0ffa00c90979","resourceVersion":"6894","generation":1,"creationTimestamp":"2026-03-12T18:06:58Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T18:13:10Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-12T18:14:04Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-12T18:13:11Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T18:13:10Z","reason":"AsExpected","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced."},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-03-12T18:13:10Z","reason":"AsExpected","message":"All is well"}],"versions":[{"name":"raw-internal","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeapiservers","name":"cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":""},{"group":"security.openshift.io","resource":"securitycontextconstraints","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":""},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":""},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""},{"group":"apiserver.openshift.io","resource":"apirequestcounts","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/insights.json0000640000000000000000000000141415154601550016467 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"insights","uid":"779e25a1-a2d4-4d87-8149-a57db5ecce49","resourceVersion":"698","generation":1,"creationTimestamp":"2026-03-12T18:06:58Z","annotations":{"capability.openshift.io/name":"Insights","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/ingress.json0000640000000000000000000000456715154601550016325 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"ingress","uid":"e86cc211-02db-4f29-ba51-100110b67254","resourceVersion":"6257","generation":1,"creationTimestamp":"2026-03-12T18:06:58Z","annotations":{"capability.openshift.io/name":"Ingress","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-12T18:13:49Z","reason":"IngressAvailable","message":"The \"default\" ingress controller reports Available=True."},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-12T18:13:48Z","reason":"Reconciling","message":"ingresscontroller \"default\" is progressing: IngressControllerProgressing: One or more status conditions indicate progressing: DeploymentRollingOut=True (DeploymentRollingOut: Waiting for router deployment rollout to finish: 0 of 1 updated replica(s) are available...\n)."},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T18:13:49Z","reason":"IngressNotDegraded","message":"The \"default\" ingress controller reports Degraded=False."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T18:13:48Z","reason":"Upgradeable"},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-03-12T18:13:48Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"ingress-controller","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9b2e765b795c30c910c331c85226e5db0d56463b6c81d79ded739cba76e2b032"},{"name":"canary-server","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-ingress-operator"},{"group":"operator.openshift.io","resource":"ingresscontrollers","namespace":"openshift-ingress-operator","name":""},{"group":"ingress.operator.openshift.io","resource":"dnsrecords","namespace":"openshift-ingress-operator","name":""},{"group":"","resource":"namespaces","name":"openshift-ingress"}],"extension":null}}config/clusteroperator/image-registry.json0000640000000000000000000000132715154601550017572 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"image-registry","uid":"c6aacfc6-05dc-4381-899e-ca74778e914c","resourceVersion":"815","generation":1,"creationTimestamp":"2026-03-12T18:06:58Z","annotations":{"capability.openshift.io/name":"ImageRegistry","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/etcd.json0000640000000000000000000000457015154601550015564 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"etcd","uid":"04fde70f-2aa6-447d-a375-e0f01c48b58a","resourceVersion":"5657","generation":1,"creationTimestamp":"2026-03-12T18:06:58Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T18:13:24Z","reason":"AsExpected","message":"EtcdMembersControllerDegraded: giving up getting a cached client after 3 tries\nClusterMemberRemovalControllerDegraded: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries\nClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\nNodeControllerDegraded: All master nodes are ready\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-12T18:13:40Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-12T18:13:25Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T18:13:24Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-12T18:13:24Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"etcds","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"namespaces","name":"openshift-etcd"}],"extension":null}}config/clusteroperator/dns.json0000640000000000000000000000365515154601550015434 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"dns","uid":"1c7fc5f6-ec7d-4617-9377-3dbd5eab2a62","resourceVersion":"8344","generation":1,"creationTimestamp":"2026-03-12T18:06:58Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-12T18:14:16Z","reason":"AsExpected","message":"DNS \"default\" is available."},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-12T18:13:48Z","reason":"AsExpected","message":"Desired and current number of DNSes are equal"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T18:14:16Z","reason":"DNSNotDegraded"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T18:13:48Z","reason":"DNSUpgradeable","message":"DNS default is upgradeable: DNS Operator can be upgraded"}],"versions":[{"name":"openshift-cli","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460"},{"name":"kube-rbac-proxy","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501"},{"name":"operator","version":"4.18.34"},{"name":"coredns","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c54c3f7cffe057ae0bdf26163d5e46744685083ae16fc97112e32beacd2d8955"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-dns-operator"},{"group":"operator.openshift.io","resource":"dnses","name":"default"},{"group":"","resource":"namespaces","name":"openshift-dns"}],"extension":null}}config/clusteroperator/csi-snapshot-controller.json0000640000000000000000000000321715154601550021436 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"csi-snapshot-controller","uid":"38a5040f-f7e9-4c57-a9d8-db60209d5d80","resourceVersion":"9202","generation":1,"creationTimestamp":"2026-03-12T18:06:58Z","annotations":{"capability.openshift.io/name":"CSISnapshot","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T18:13:24Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-12T18:13:27Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-12T18:13:27Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T18:13:24Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-12T18:13:24Z","reason":"NoData"}],"versions":[{"name":"csi-snapshot-controller","version":"4.18.34"},{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"operator.openshift.io","resource":"csisnapshotcontrollers","name":"cluster"}],"extension":null}}config/clusteroperator/control-plane-machine-set.json0000640000000000000000000000263515154601550021615 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"control-plane-machine-set","uid":"d02eaa0d-9a1e-459d-a35e-6d8918a6153d","resourceVersion":"9155","generation":1,"creationTimestamp":"2026-03-12T18:06:58Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-12T18:17:38Z","reason":"AsExpected","message":"cluster operator is available"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-12T18:17:38Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T18:17:38Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T18:17:38Z","reason":"AsExpected","message":"cluster operator is upgradable"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"controlplanemachinesets","name":""},{"group":"machine.openshift.io","resource":"machines","name":""}],"extension":null}}config/clusteroperator/console.json0000640000000000000000000000131215154601550016276 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"console","uid":"b09dd7d5-adf0-414c-aafc-876be3558ac1","resourceVersion":"709","generation":1,"creationTimestamp":"2026-03-12T18:06:58Z","annotations":{"capability.openshift.io/name":"Console","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/config-operator.json0000640000000000000000000000311615154601550017736 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"config-operator","uid":"071d3721-e312-4807-ab2e-e37e6964df7c","resourceVersion":"9079","generation":1,"creationTimestamp":"2026-03-12T18:06:58Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T18:13:28Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-12T18:13:28Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-12T18:13:28Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T18:13:28Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-12T18:13:28Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"feature-gates","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-operator"}],"extension":null}}config/clusteroperator/cluster-autoscaler.json0000640000000000000000000000260415154601550020462 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster-autoscaler","uid":"25b379a8-76a0-4672-be6c-fb948579c3c4","resourceVersion":"10061","generation":1,"creationTimestamp":"2026-03-12T18:06:58Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-12T18:18:12Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-12T18:18:12Z"},{"type":"Degraded","status":"True","lastTransitionTime":"2026-03-12T18:18:12Z","reason":"MissingDependency","message":"machine-api not ready"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T18:18:12Z"}],"relatedObjects":[{"group":"autoscaling.openshift.io","resource":"machineautoscalers","namespace":"openshift-machine-api","name":""},{"group":"autoscaling.openshift.io","resource":"clusterautoscalers","namespace":"openshift-machine-api","name":""},{"group":"","resource":"namespaces","name":"openshift-machine-api"}],"extension":null}}config/clusteroperator/cloud-credential.json0000640000000000000000000000346515154601550020065 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-credential","uid":"3bd7db3c-5a03-48b3-8f01-dd23d6b32689","resourceVersion":"808","generation":1,"creationTimestamp":"2026-03-12T18:06:58Z","annotations":{"capability.openshift.io/name":"CloudCredential","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":"pod-identity-webhook"},{"group":"apps","resource":"deployments","namespace":"openshift-cloud-credential-operator","name":"pod-identity-webhook"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","name":""},{"group":"","resource":"namespaces","name":"openshift-cloud-credential-operator"},{"group":"","resource":"serviceaccounts","namespace":"openshift-cloud-credential-operator","name":"pod-identity-webhook"},{"group":"","resource":"services","namespace":"openshift-cloud-credential-operator","name":"pod-identity-webhook"},{"group":"operator.openshift.io","resource":"cloudcredentials","name":"cluster"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-cloud-credential-operator","name":"pod-identity-webhook"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-cloud-credential-operator","name":"pod-identity-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"pod-identity-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"pod-identity-webhook"}],"extension":null}}config/clusteroperator/cloud-controller-manager.json0000640000000000000000000000440215154601550021536 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-controller-manager","uid":"e322f2a0-bfbd-45e7-bf78-80eeab7790a5","resourceVersion":"10085","generation":1,"creationTimestamp":"2026-03-12T18:06:58Z","annotations":{"capability.openshift.io/name":"CloudControllerManager","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"TrustedCABundleControllerControllerAvailable","status":"True","lastTransitionTime":"2026-03-12T18:18:12Z","reason":"AsExpected","message":"Trusted CA Bundle Controller works as expected"},{"type":"TrustedCABundleControllerControllerDegraded","status":"False","lastTransitionTime":"2026-03-12T18:18:12Z","reason":"AsExpected","message":"Trusted CA Bundle Controller works as expected"},{"type":"CloudConfigControllerAvailable","status":"True","lastTransitionTime":"2026-03-12T18:18:13Z","reason":"AsExpected","message":"Cloud Config Controller works as expected"},{"type":"CloudConfigControllerDegraded","status":"False","lastTransitionTime":"2026-03-12T18:18:13Z","reason":"AsExpected","message":"Cloud Config Controller works as expected"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-12T18:18:13Z","reason":"AsExpected","message":"Cluster Cloud Controller Manager Operator is available at 4.18.34"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-12T18:18:13Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T18:18:13Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T18:18:13Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager-operator"},{"group":"config.openshift.io","resource":"clusteroperators","name":"cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager"}],"extension":null}}config/clusteroperator/baremetal.json0000640000000000000000000000427115154601550016577 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"baremetal","uid":"c22f213f-7a48-428e-a186-1167426673f9","resourceVersion":"10023","generation":1,"creationTimestamp":"2026-03-12T18:06:58Z","annotations":{"capability.openshift.io/name":"baremetal","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-12T18:18:11Z","reason":"WaitingForProvisioningCR"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T18:18:11Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-12T18:18:12Z","reason":"WaitingForProvisioningCR","message":"Waiting for Provisioning CR on BareMetal Platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T18:18:11Z"},{"type":"Disabled","status":"False","lastTransitionTime":"2026-03-12T18:18:11Z"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"provisioning","name":""},{"group":"metal3.io","resource":"hostfirmwaresettings","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"firmwareschemas","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"preprovisioningimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"bmceventsubscriptions","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostfirmwarecomponents","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"dataimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostupdatepolicies","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/authentication.json0000640000000000000000000000771415154601550017667 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"authentication","uid":"e7083763-7bc7-4ed0-a5c7-d008a1075626","resourceVersion":"9428","generation":1,"creationTimestamp":"2026-03-12T18:06:58Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"True","lastTransitionTime":"2026-03-12T18:17:14Z","reason":"IngressStateEndpoints_MissingSubsets::OAuthServerServiceEndpointAccessibleController_SyncError::OAuthServerServiceEndpointsEndpointAccessibleController_SyncError","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.45.215:443/healthz\": dial tcp 172.30.45.215:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-12T18:17:38Z","reason":"AsExpected","message":"AuthenticatorCertKeyProgressing: All is well"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-12T18:13:41Z","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.46:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.46:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.45.215:443/healthz\": dial tcp 172.30.45.215:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods)."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T18:13:41Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-12T18:13:40Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"oauth-apiserver","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"infrastructures","name":"cluster"},{"group":"config.openshift.io","resource":"oauths","name":"cluster"},{"group":"route.openshift.io","resource":"routes","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"services","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-authentication"},{"group":"","resource":"namespaces","name":"openshift-authentication-operator"},{"group":"","resource":"namespaces","name":"openshift-ingress"},{"group":"","resource":"namespaces","name":"openshift-oauth-apiserver"}],"extension":null}}config/running_containers.json0000640000000000000000000001024115154601550015305 0ustar0000000000000000{"images":{"0":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","1":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","10":"sha256:cf9670d0f269f8d49fd9ef4981999be195f6624a4146aa93d9201eb8acc81053","11":"sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c","12":"sha256:7220d16ea511c0f0410cf45db45aaafcc64847c9cb5732ad1eff39ceb482cdba","13":"sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b","14":"sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","15":"sha256:3f34dc492c80a3dee4643cc2291044750ac51e6e919b973de8723fa8b70bde70","16":"sha256:5230462066ab36e3025524e948dd33fa6f51ee29a4f91fa469bfc268568b5fd9","17":"sha256:e207c762b7802ee0e54507d21ed1f25b19eddc511a4b824934c16c163193be6a","18":"sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953","19":"sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","2":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","20":"sha256:ebee49810f493f9b566740bd61256fd40b897cc51423f1efa01a02bb57ce177d","21":"sha256:4a4c3e6ca0cd26f7eb5270cfafbcf423cf2986d152bf5b9fc6469d40599e104e","22":"sha256:9bd0b71d620cf0acbfcd1b58797dc30050bd167cb6b7a7f62c8333dd370c76d5","23":"sha256:4010a8f9d932615336227e2fd43325d4fa9025dca4bebe032106efea733fcfc3","24":"sha256:d74fe7cb12c554c120262683d9c4066f33ae4f60a5fad83cba419d851b98c12d","25":"sha256:00b591b3820682dc99f16f07a3a0a4ec06dfedba63cd0f79b998ac4509fabea3","26":"sha256:e9ee63a30a9b95b5801afa36e09fc583ec2cda3c5cb3c8676e478fea016abfa1","27":"sha256:b714a7ada1e295b599b432f32e1fd5b74c8cdbe6fe51e95306322b25cb873914","28":"sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","29":"sha256:76bdc35338c4d0f5e5b9448fb73e3578656f908a962286692e12a0372ec721d5","3":"sha256:ff40e33e63d6c1f4e4393d5506e38def25ba20582d980fec8b81f81c867ceeec","30":"sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","31":"sha256:b8cb5e0caeca0fb02f3e8c72b7ddf1c49e3c602e42e119ba30c60525f1db1821","32":"sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","33":"sha256:d11f13e867f4df046ca6789bb7273da5d0c08895b3dea00949c8a5458f9e22f9","34":"sha256:28f33d62fd0b94c5ea0ebcd7a4216848c8dd671a38d901ce98f4c399b700e1c7","35":"sha256:ace4dcd008420277d915fe983b07bbb50fb3ab0673f28d0166424a75bc2137e7","36":"sha256:ac6f0695d3386e6d601f4ae507940981352fa3ad884b0fed6fb25698c5e6f916","37":"sha256:0c03cb25dc6f6a865529ebc979e8d7d08492b28fd3fb93beddf30e1cb06f1245","38":"sha256:8ceca1efee55b9fd5089428476bbc401fe73db7c0b0f5e16d4ad28ed0f0f9d43","39":"sha256:eb82e437a701ce83b70e56be8477d987da67578714dda3d9fa6628804b1b56f5","4":"sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","40":"sha256:c54c3f7cffe057ae0bdf26163d5e46744685083ae16fc97112e32beacd2d8955","41":"sha256:2fe5144b1f72bdcf5d5a52130f02ed86fbec3875cc4ac108ead00eaac1659e06","42":"registry.redhat.io/redhat/certified-operator-index:v4.18","43":"registry.redhat.io/redhat/community-operator-index:v4.18","44":"registry.redhat.io/redhat/redhat-operator-index:v4.18","45":"registry.redhat.io/redhat/redhat-marketplace-index:v4.18","46":"sha256:89cb093f319eaa04acfe9431b8697bffbc71ab670546f7ed257daa332165c626","47":"sha256:b9b8bc43bac294be3c7669cde049e388ad9d8751242051ba40f83e1c401eceda","48":"sha256:c8f0fda36e9a2040dbe0537361dcd73658df4e669d846f8101a8f9f29f0be9a7","49":"sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab","5":"sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","6":"sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9","7":"sha256:263827a457b3cc707bdd050873234f5d0892a553af5cfab13f8db75de762d4cf","8":"sha256:381e96959e3c3b08a3e2715e6024697ae14af31bd0378b49f583e984b3b9a192","9":"sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460"},"containers":{"2026-03":{"0":14,"1":8,"10":2,"11":2,"12":2,"13":2,"14":2,"15":2,"16":2,"17":2,"18":1,"19":1,"2":8,"20":1,"21":1,"22":1,"23":1,"24":1,"25":1,"26":1,"27":1,"28":1,"29":1,"3":4,"30":1,"31":1,"32":1,"33":1,"34":1,"35":1,"36":1,"37":1,"38":1,"39":1,"4":3,"40":1,"41":1,"42":1,"43":1,"44":1,"45":1,"46":1,"47":1,"48":1,"49":1,"5":3,"6":2,"7":2,"8":2,"9":2}}}operator-controller-controller-manager-6598bfb6c4-9nzsn.json0000640000000000000000000002474415154601550032415 0ustar0000000000000000config/pod/openshift-operator-controller{"metadata":{"name":"operator-controller-controller-manager-6598bfb6c4-9nzsn","generateName":"operator-controller-controller-manager-6598bfb6c4-","namespace":"openshift-operator-controller","uid":"b1cf6cb1-8b20-4bc2-a474-52d6d7cc3652","resourceVersion":"8851","creationTimestamp":"2026-03-12T18:13:50Z","labels":{"control-plane":"operator-controller-controller-manager","pod-template-hash":"6598bfb6c4"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.42/23\"],\"mac_address\":\"0a:58:0a:80:00:2a\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.42/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.42\"\n ],\n \"mac\": \"0a:58:0a:80:00:2a\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"manager","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"operator-controller-controller-manager-6598bfb6c4","uid":"37634092-f3e6-4d1e-a5ea-5a2c60fcb8a8","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cache","emptyDir":{}},{"name":"ca-certs","projected":{"sources":[{"configMap":{"name":"operator-controller-trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"ca-bundle.crt"}],"optional":false}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"optional":false}}],"defaultMode":420}},{"name":"etc-containers","hostPath":{"path":"/etc/containers","type":"Directory"}},{"name":"etc-docker","hostPath":{"path":"/etc/docker","type":"Directory"}},{"name":"kube-api-access-k59mb","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","command":["/manager"],"args":["--health-probe-bind-address=:8081","--metrics-bind-address=127.0.0.1:8080","--leader-elect","--catalogd-cas-dir=/var/ca-certs","--v=2","--global-pull-secret=openshift-config/pull-secret"],"env":[{"name":"SSL_CERT_DIR","value":"/var/ca-certs"}],"resources":{"requests":{"cpu":"10m","memory":"64Mi"}},"volumeMounts":[{"name":"cache","mountPath":"/var/cache"},{"name":"ca-certs","readOnly":true,"mountPath":"/var/ca-certs"},{"name":"etc-containers","readOnly":true,"mountPath":"/etc/containers"},{"name":"etc-docker","readOnly":true,"mountPath":"/etc/docker"},{"name":"kube-api-access-k59mb","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":15,"timeoutSeconds":1,"periodSeconds":20,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":5,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","args":["--secure-listen-address=0.0.0.0:8443","--http2-disable","--upstream=http://127.0.0.1:8080/","--logtostderr=true","--v=2"],"ports":[{"name":"https","containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"5m","memory":"64Mi"}},"volumeMounts":[{"name":"kube-api-access-k59mb","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":10,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"operator-controller-controller-manager","serviceAccount":"operator-controller-controller-manager","nodeName":"master-0","securityContext":{"seLinuxOptions":{"type":"spc_t"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchExpressions":[{"key":"kubernetes.io/arch","operator":"In","values":["amd64","arm64","ppc64le","s390x"]},{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:55Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:50Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:17:19Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:17:19Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:50Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.42","podIPs":[{"ip":"10.128.0.42"}],"startTime":"2026-03-12T18:13:50Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-12T18:13:55Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","containerID":"cri-o://c433c1f714e33e033c20efa5d98a4308ecf9ca34573376730b9a889d9f08a15c","started":true,"volumeMounts":[{"name":"kube-api-access-k59mb","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"manager","state":{"running":{"startedAt":"2026-03-12T18:16:42Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"ork.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"edd5a454-6acc-4f6a-85b6-e29abccaa86c\"\nI0312 18:14:06.830236 1 clustercatalog_controller.go:75] \"reconcile ending\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"edd5a454-6acc-4f6a-85b6-e29abccaa86c\"\nI0312 18:14:21.738102 1 clustercatalog_controller.go:54] \"reconcile starting\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"d873ff72-0b24-420e-9c9b-d826f149aa9a\"\nI0312 18:14:22.508029 1 clustercatalog_controller.go:90] \"reconcile ending\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"d873ff72-0b24-420e-9c9b-d826f149aa9a\"\nE0312 18:15:21.736628 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0312 18:16:21.739340 1 leaderelection.go:436] error retrieving resource lock openshift-operator-controller/9c4404e7.operatorframework.io: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io 9c4404e7.operatorframework.io)\nI0312 18:16:34.732070 1 leaderelection.go:297] failed to renew lease openshift-operator-controller/9c4404e7.operatorframework.io: timed out waiting for the condition\nE0312 18:16:34.732239 1 main.go:362] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\n","startedAt":"2026-03-12T18:13:55Z","finishedAt":"2026-03-12T18:16:34Z","containerID":"cri-o://a15650ff0279cc1eb053cd0564e886ecaf1299636ec1285faa1562a29a442c43"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","containerID":"cri-o://68e99d6ea6e8d10062ce5f4ba00f8d6b01cd9c70d46c0f8c6da206028e5ae034","started":true,"volumeMounts":[{"name":"cache","mountPath":"/var/cache"},{"name":"ca-certs","mountPath":"/var/ca-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-containers","mountPath":"/etc/containers","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-docker","mountPath":"/etc/docker","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-k59mb","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-network-operator/network-operator-7c649bf6d4-vksss.json0000640000000000000000000002265715154601550025610 0ustar0000000000000000{"metadata":{"name":"network-operator-7c649bf6d4-vksss","generateName":"network-operator-7c649bf6d4-","namespace":"openshift-network-operator","uid":"b6d288e3-8e73-44d2-874d-64c6c98dd991","resourceVersion":"8847","creationTimestamp":"2026-03-12T18:11:02Z","labels":{"name":"network-operator","pod-template-hash":"7c649bf6d4"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"network-operator-7c649bf6d4","uid":"f108ac60-9603-4caa-b29d-6a2b3adfbed5","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"host-etc-kube","hostPath":{"path":"/etc/kubernetes","type":"Directory"}},{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420,"optional":true}},{"name":"kube-api-access-vdb9w","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"network-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","command":["/bin/bash","-c","#!/bin/bash\nset -o allexport\nif [[ -f /etc/kubernetes/apiserver-url.env ]]; then\n source /etc/kubernetes/apiserver-url.env\nelse\n echo \"Error: /etc/kubernetes/apiserver-url.env is missing\"\n exit 1\nfi\nexec /usr/bin/cluster-network-operator start --listen=0.0.0.0:9104\n"],"ports":[{"name":"cno","hostPort":9104,"containerPort":9104,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.34"},{"name":"KUBE_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9242604e78efada5aeb232d73a7963f806b754213f5d92b1dffc9b493d7b5a65"},{"name":"KUBE_RBAC_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501"},{"name":"MULTUS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:381e96959e3c3b08a3e2715e6024697ae14af31bd0378b49f583e984b3b9a192"},{"name":"MULTUS_ADMISSION_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5230462066ab36e3025524e948dd33fa6f51ee29a4f91fa469bfc268568b5fd9"},{"name":"CNI_PLUGINS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c03cb25dc6f6a865529ebc979e8d7d08492b28fd3fb93beddf30e1cb06f1245"},{"name":"BOND_CNI_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ace4dcd008420277d915fe983b07bbb50fb3ab0673f28d0166424a75bc2137e7"},{"name":"WHEREABOUTS_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e207c762b7802ee0e54507d21ed1f25b19eddc511a4b824934c16c163193be6a"},{"name":"ROUTE_OVERRRIDE_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8f0fda36e9a2040dbe0537361dcd73658df4e669d846f8101a8f9f29f0be9a7"},{"name":"MULTUS_NETWORKPOLICY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b19b9d0e5437b0bb19cafc3fb516f654c911cdf11184c0de9a27b43c6b80c9ce"},{"name":"OVN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0"},{"name":"OVN_NB_RAFT_ELECTION_TIMER","value":"10"},{"name":"OVN_SB_RAFT_ELECTION_TIMER","value":"16"},{"name":"OVN_NORTHD_PROBE_INTERVAL","value":"10000"},{"name":"OVN_CONTROLLER_INACTIVITY_PROBE","value":"180000"},{"name":"OVN_NB_INACTIVITY_PROBE","value":"60000"},{"name":"EGRESS_ROUTER_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ac6f0695d3386e6d601f4ae507940981352fa3ad884b0fed6fb25698c5e6f916"},{"name":"NETWORK_METRICS_DAEMON_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:89cb093f319eaa04acfe9431b8697bffbc71ab670546f7ed257daa332165c626"},{"name":"NETWORK_CHECK_SOURCE_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3"},{"name":"NETWORK_CHECK_TARGET_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3"},{"name":"NETWORK_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3"},{"name":"CLOUD_NETWORK_CONFIG_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3aa7c84e73a2a19cc9baca38b7e86dfcde579aa88221647c332c83f047d5ae6d"},{"name":"CLI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460"},{"name":"FRR_K8S_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5bfe4d3125d98cc501d5a529d3ae2497106a2bbb5a6dd06df7c0e0930d168212"},{"name":"NETWORKING_CONSOLE_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b62afe74fdcb011a4a8c8fa5572dbab2514dda673ae4be4c6beaef92d28216ba"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"host-etc-kube","readOnly":true,"mountPath":"/etc/kubernetes"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-vdb9w","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-network-operator","serviceAccount":"cluster-network-operator","nodeName":"master-0","hostNetwork":true,"securityContext":{"runAsUser":65534,"runAsNonRoot":true},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"name":"network-operator"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:11:39Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:11:35Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:17:19Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:17:19Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:11:02Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-12T18:11:35Z","containerStatuses":[{"name":"network-operator","state":{"running":{"startedAt":"2026-03-12T18:16:42Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0312 18:14:27.153753 1 cmd.go:250] Using service-serving-cert provided certificates\nI0312 18:14:27.154107 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0312 18:14:27.155495 1 observer_polling.go:159] Starting file observer\nI0312 18:14:27.521348 1 builder.go:298] network-operator version 4.18.0-202602132343.p2.gf63a7ff.assembly.stream.el9-f63a7ff-f63a7ffb316c9ca4359210ff5ea2c003dbe2d6a9\nF0312 18:14:58.139255 1 cmd.go:179] failed checking apiserver connectivity: Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-operator/leases/network-operator-lock\": context deadline exceeded\n","startedAt":"2026-03-12T18:14:27Z","finishedAt":"2026-03-12T18:14:58Z","containerID":"cri-o://6c849a8a5d45f345d2ba87802bb0e5ab5b7b8e621fde5662c4d921f30c496726"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","containerID":"cri-o://61391e64ce8e20710a16e47ab514517643e782dc9c713a84a5cefd62cff8c6ad","started":true,"volumeMounts":[{"name":"host-etc-kube","mountPath":"/etc/kubernetes","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-vdb9w","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-network-node-identity/network-node-identity-hqrqt.json0000640000000000000000000002464515154601550026037 0ustar0000000000000000{"metadata":{"name":"network-node-identity-hqrqt","generateName":"network-node-identity-","namespace":"openshift-network-node-identity","uid":"8e2a83a2-7063-4e17-bf6c-ca6fc6f8cfbe","resourceVersion":"8849","creationTimestamp":"2026-03-12T18:12:13Z","labels":{"app":"network-node-identity","component":"network","controller-revision-hash":"68cb6fd5b","kubernetes.io/os":"linux","openshift.io/component":"network","pod-template-generation":"1","type":"infra"},"annotations":{"openshift.io/required-scc":"hostnetwork-v2","openshift.io/scc":"hostnetwork-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"DaemonSet","name":"network-node-identity","uid":"b49109d8-9cc0-4ea0-b588-076e00a43d6c","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"webhook-cert","secret":{"secretName":"network-node-identity-cert","defaultMode":420}},{"name":"env-overrides","configMap":{"name":"env-overrides","defaultMode":420,"optional":true}},{"name":"ovnkube-identity-cm","configMap":{"name":"ovnkube-identity-cm","items":[{"key":"additional-cert-acceptance-cond.json","path":"additional-cert-acceptance-cond.json"},{"key":"additional-pod-admission-cond.json","path":"additional-pod-admission-cond.json"}],"defaultMode":420}},{"name":"kube-api-access-tdlcw","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"webhook","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n# OVN-K will try to remove hybrid overlay node annotations even when the hybrid overlay is not enabled.\n# https://github.com/ovn-org/ovn-kubernetes/blob/ac6820df0b338a246f10f412cd5ec903bd234694/go-controller/pkg/ovn/master.go#L791\nho_enable=\"--enable-hybrid-overlay\"\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start webhook\"\n# extra-allowed-user: service account `ovn-kubernetes-control-plane`\n# sets pod annotations in multi-homing layer3 network controller (cluster-manager)\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --webhook-cert-dir=\"/etc/webhook-cert\" \\\n --webhook-host=127.0.0.1 \\\n --webhook-port=9743 \\\n ${ho_enable} \\\n --enable-interconnect \\\n --disable-approver \\\n --extra-allowed-user=\"system:serviceaccount:openshift-ovn-kubernetes:ovn-kubernetes-control-plane\" \\\n --wait-for-kubernetes-api=200s \\\n --pod-admission-conditions=\"/var/run/ovnkube-identity-config/additional-pod-admission-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"2"},{"name":"KUBERNETES_NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-tdlcw","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}},{"name":"approver","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start approver\"\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --disable-webhook \\\n --csr-acceptance-conditions=\"/var/run/ovnkube-identity-config/additional-cert-acceptance-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"4"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-tdlcw","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":200,"dnsPolicy":"Default","nodeSelector":{"beta.kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"network-node-identity","serviceAccount":"network-node-identity","nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c23,c22"},"supplementalGroups":[1000550000],"fsGroup":1000550000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchFields":[{"key":"metadata.name","operator":"In","values":["master-0"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:12:40Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:12:13Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:17:19Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:17:19Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:12:13Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-12T18:12:13Z","containerStatuses":[{"name":"approver","state":{"running":{"startedAt":"2026-03-12T18:16:42Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"7440 1 approver.go:230] Finished syncing CSR csr-qb5hw for master-0 node in 8.574698ms\nI0312 18:12:54.797667 1 approver.go:230] Finished syncing CSR csr-qb5hw for unknown node in 56.661µs\nI0312 18:12:54.809033 1 approver.go:230] Finished syncing CSR csr-qb5hw for unknown node in 67.321µs\nE0312 18:14:56.734847 1 leaderelection.go:429] Failed to update lock optimistically: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers), falling back to slow path\nE0312 18:15:11.735031 1 leaderelection.go:436] error retrieving resource lock openshift-network-node-identity/ovnkube-identity: Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded\nI0312 18:15:11.735083 1 leaderelection.go:297] failed to renew lease openshift-network-node-identity/ovnkube-identity: context deadline exceeded\nE0312 18:15:26.736063 1 leaderelection.go:322] Failed to release lock: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded\nF0312 18:15:26.736298 1 ovnkubeidentity.go:309] error running approver: leader election lost\nI0312 18:15:26.736340 1 recorder.go:104] \"master-0_8bf27a45-dbda-4dd5-bf44-1b70408fffd6 stopped leading\" logger=\"events\" type=\"Normal\" object={\"kind\":\"Lease\",\"namespace\":\"openshift-network-node-identity\",\"name\":\"ovnkube-identity\",\"uid\":\"d8c65b5d-c4e2-41e3-b636-d82d7857d2e2\",\"apiVersion\":\"coordination.k8s.io/v1\",\"resourceVersion\":\"8639\"} reason=\"LeaderElection\"\nI0312 18:15:26.736418 1 internal.go:538] \"Stopping and waiting for non leader election runnables\"\nI0312 18:15:26.736449 1 internal.go:542] \"Stopping and waiting for leader election runnables\"\n","startedAt":"2026-03-12T18:12:39Z","finishedAt":"2026-03-12T18:15:27Z","containerID":"cri-o://0e62c9f4417a5a9e30eb23f06a18c4ab2b7d089c3e060926866187529335e3de"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","containerID":"cri-o://f3f978addd81177f408450b5c8b37d7927d5e40c6e8538e905d2bc327fb8a086","started":true,"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-tdlcw","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"webhook","state":{"running":{"startedAt":"2026-03-12T18:12:39Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","containerID":"cri-o://9f542199e120aca0f259c8f37b187c51f9d83a60acac8d5c2aa71e651dac3686","started":true,"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-tdlcw","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-machine-config-operator/kube-rbac-proxy-crio-master-0.json0000640000000000000000000001542215154601550026257 0ustar0000000000000000{"metadata":{"name":"kube-rbac-proxy-crio-master-0","namespace":"openshift-machine-config-operator","uid":"93212bba-ff24-49db-9ba0-8e3b8047726a","resourceVersion":"3997","creationTimestamp":"2026-03-12T18:11:44Z","labels":{"k8s-app":"kube-rbac-proxy-crio"},"annotations":{"kubernetes.io/config.hash":"e9add8df47182fc2eaf8cd78016ebe72","kubernetes.io/config.mirror":"e9add8df47182fc2eaf8cd78016ebe72","kubernetes.io/config.seen":"2026-03-12T18:10:21.110684721Z","kubernetes.io/config.source":"file","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"2b794e11-4c79-4c26-ab97-24c47eefd23d","controller":true}]},"spec":{"volumes":[{"name":"etc-kube","hostPath":{"path":"/etc/kubernetes","type":""}},{"name":"var-lib-kubelet","hostPath":{"path":"/var/lib/kubelet","type":""}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","command":["/bin/bash","-ec"],"args":["echo -n \"Waiting for kubelet key and certificate to be available\"\nwhile [ -n \"$(test -e /var/lib/kubelet/pki/kubelet-server-current.pem)\" ] ; do\n echo -n \".\"\n sleep 1\n (( tries += 1 ))\n if [[ \"${tries}\" -gt 10 ]]; then\n echo \"Timed out waiting for kubelet key and cert.\"\n exit 1\n fi\ndone\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"var-lib-kubelet","mountPath":"/var","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"kube-rbac-proxy-crio","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","args":["--secure-listen-address=:9637","--config-file=/etc/kubernetes/crio-metrics-proxy.cfg","--client-ca-file=/etc/kubernetes/kubelet-ca.crt","--logtostderr=true","--kubeconfig=/var/lib/kubelet/kubeconfig","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12","--upstream=http://127.0.0.1:9537","--tls-cert-file=/var/lib/kubelet/pki/kubelet-server-current.pem","--tls-private-key-file=/var/lib/kubelet/pki/kubelet-server-current.pem"],"ports":[{"hostPort":9637,"containerPort":9637,"protocol":"TCP"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-kube","readOnly":true,"mountPath":"/etc/kubernetes","mountPropagation":"HostToContainer"},{"name":"var-lib-kubelet","readOnly":true,"mountPath":"/var/lib/kubelet","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:20Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:20Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:20Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:20Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:20Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-12T18:13:20Z","initContainerStatuses":[{"name":"setup","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-12T18:10:25Z","finishedAt":"2026-03-12T18:10:25Z","containerID":"cri-o://cfb72c7fed7776f25cec78c2b1f068a79f1aca1d681c7f12e196e29d22a04486"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","containerID":"cri-o://cfb72c7fed7776f25cec78c2b1f068a79f1aca1d681c7f12e196e29d22a04486","started":false}],"containerStatuses":[{"name":"kube-rbac-proxy-crio","state":{"running":{"startedAt":"2026-03-12T18:11:55Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"W0312 18:11:07.774928 1 deprecated.go:66] \n==== Removed Flag Warning ======================\n\nlogtostderr is removed in the k8s upstream and has no effect any more.\n\n===============================================\n\t\t\nI0312 18:11:07.775049 1 kube-rbac-proxy.go:530] Reading config file: /etc/kubernetes/crio-metrics-proxy.cfg\nI0312 18:11:07.777151 1 kube-rbac-proxy.go:233] Valid token audiences: \nI0312 18:11:07.777377 1 dynamic_cafile_content.go:160] \"Starting controller\" name=\"client-ca::/etc/kubernetes/kubelet-ca.crt\"\nI0312 18:11:07.779166 1 kube-rbac-proxy.go:347] Reading certificate files\nE0312 18:11:07.779302 1 run.go:72] \"command failed\" err=\"failed to initialize certificate reloader: error loading certificates: error loading certificate: open /var/lib/kubelet/pki/kubelet-server-current.pem: no such file or directory\"\nI0312 18:11:07.779341 1 dynamic_cafile_content.go:174] \"Shutting down controller\" name=\"client-ca::/etc/kubernetes/kubelet-ca.crt\"\n","startedAt":"2026-03-12T18:11:07Z","finishedAt":"2026-03-12T18:11:08Z","containerID":"cri-o://f4576abbe7a90b1b20fca15403fa958348685c536308da122d58a74078454e59"}},"ready":true,"restartCount":4,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","containerID":"cri-o://93aef700d51857dffd379b4fa5c63e9358523baf23deed5a0f436de9a4c7c7b1","started":true}],"qosClass":"Burstable"}}config/pod/openshift-ingress-operator/ingress-operator-677db989d6-4527l.json0000640000000000000000000002432015154601550025076 0ustar0000000000000000{"metadata":{"name":"ingress-operator-677db989d6-4527l","generateName":"ingress-operator-677db989d6-","namespace":"openshift-ingress-operator","uid":"d94dc349-c5cb-4f12-8e48-867030af4981","resourceVersion":"8854","creationTimestamp":"2026-03-12T18:11:02Z","labels":{"name":"ingress-operator","pod-template-hash":"677db989d6"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.23/23\"],\"mac_address\":\"0a:58:0a:80:00:17\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.23/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.23\"\n ],\n \"mac\": \"0a:58:0a:80:00:17\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"ingress-operator-677db989d6","uid":"0ff263fb-8415-4d07-a3e2-5be060d37447","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420}},{"name":"trusted-ca","configMap":{"name":"trusted-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420}},{"name":"bound-sa-token","projected":{"sources":[{"serviceAccountToken":{"audience":"openshift","expirationSeconds":3600,"path":"token"}}],"defaultMode":420}},{"name":"kube-api-access-zjmcv","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"ingress-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0","command":["ingress-operator","start","--namespace","$(WATCH_NAMESPACE)","--image","$(IMAGE)","--canary-image","$(CANARY_IMAGE)","--release-version","$(RELEASE_VERSION)"],"env":[{"name":"RELEASE_VERSION","value":"4.18.34"},{"name":"WATCH_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9b2e765b795c30c910c331c85226e5db0d56463b6c81d79ded739cba76e2b032"},{"name":"CANARY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0"}],"resources":{"requests":{"cpu":"10m","memory":"56Mi"}},"volumeMounts":[{"name":"trusted-ca","readOnly":true,"mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"bound-sa-token","readOnly":true,"mountPath":"/var/run/secrets/openshift/serviceaccount"},{"name":"kube-api-access-zjmcv","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","args":["--logtostderr","--secure-listen-address=:9393","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256","--upstream=http://127.0.0.1:60000/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key"],"ports":[{"name":"metrics","containerPort":9393,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"40Mi"}},"volumeMounts":[{"name":"metrics-tls","readOnly":true,"mountPath":"/etc/tls/private"},{"name":"kube-api-access-zjmcv","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"ingress-operator","serviceAccount":"ingress-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c12,c4"},"runAsNonRoot":true,"fsGroup":1000140000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:48Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:05Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:17:19Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:17:19Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:05Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.23","podIPs":[{"ip":"10.128.0.23"}],"startTime":"2026-03-12T18:13:05Z","containerStatuses":[{"name":"ingress-operator","state":{"running":{"startedAt":"2026-03-12T18:16:41Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"from the watch stream: context canceled\") has prevented the request from succeeding\nW0312 18:16:18.157694 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.CustomResourceDefinition ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0312 18:16:18.158016 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.Pod ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\n2026-03-12T18:16:18.158Z\tINFO\toperator.init.controller-runtime.metrics\truntime/asm_amd64.s:1695\tShutting down metrics server with timeout of 1 minute\nW0312 18:16:18.158152 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.Deployment ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0312 18:16:18.158229 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.RoleBinding ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\n2026-03-12T18:16:18.160Z\tINFO\toperator.main\truntime/asm_amd64.s:1695\tfile watch events channel closed\n2026-03-12T18:16:18.160Z\tERROR\toperator.main\tcobra/command.go:989\terror starting\t{\"error\": \"[failed to wait for canary_controller caches to sync: timed out waiting for cache to be synced for Kind *v1.Route, failed waiting for all runnables to end within grace period of 30s: context deadline exceeded]\", \"errorCauses\": [{\"error\": \"failed to wait for canary_controller caches to sync: timed out waiting for cache to be synced for Kind *v1.Route\"}, {\"error\": \"failed waiting for all runnables to end within grace period of 30s: context deadline exceeded\"}]}\n","startedAt":"2026-03-12T18:13:47Z","finishedAt":"2026-03-12T18:16:18Z","containerID":"cri-o://fd2b6be186aaa869f9c5743426ef2bc5d49bada1c5fa7a307e7f55efa78a7bbf"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0","containerID":"cri-o://95c9f43b56f422e41bfe1eff7ae31e7f220fb9fe9c3b7c82ac5ec70e4a6cd3be","started":true,"volumeMounts":[{"name":"trusted-ca","mountPath":"/etc/pki/ca-trust/extracted/pem","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"bound-sa-token","mountPath":"/var/run/secrets/openshift/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-zjmcv","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-12T18:13:47Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","containerID":"cri-o://0ad3015222a8f16d127aab6f080af73c1d0665020a57f9fc4f03e7582fcac536","started":true,"volumeMounts":[{"name":"metrics-tls","mountPath":"/etc/tls/private","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-zjmcv","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-controller-manager-operator-8565d84698-m6hsp.json0000640000000000000000000001661315154601550033405 0ustar0000000000000000config/pod/openshift-controller-manager-operator{"metadata":{"name":"openshift-controller-manager-operator-8565d84698-m6hsp","generateName":"openshift-controller-manager-operator-8565d84698-","namespace":"openshift-controller-manager-operator","uid":"223a548b-a3ad-40dd-82de-e3dbb7f3e4fa","resourceVersion":"8844","creationTimestamp":"2026-03-12T18:11:04Z","labels":{"app":"openshift-controller-manager-operator","pod-template-hash":"8565d84698"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.14/23\"],\"mac_address\":\"0a:58:0a:80:00:0e\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.14/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.14\"\n ],\n \"mac\": \"0a:58:0a:80:00:0e\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-controller-manager-operator-8565d84698","uid":"3d6c7b5b-e691-400d-a272-357dc2057ef5","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access-s55hv","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:526c5c02a8fa86a2fa83a7087d4a5c4b1c4072c0f3906163494cc3b3c1295e9b","command":["cluster-openshift-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.34"},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:eb82e437a701ce83b70e56be8477d987da67578714dda3d9fa6628804b1b56f5"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"ROUTE_CONTROLLER_MANAGER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2fe5144b1f72bdcf5d5a52130f02ed86fbec3875cc4ac108ead00eaac1659e06"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-s55hv","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-controller-manager-operator","serviceAccount":"openshift-controller-manager-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c17,c9"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:20Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:05Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:17:19Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:17:19Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:05Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.14","podIPs":[{"ip":"10.128.0.14"}],"startTime":"2026-03-12T18:13:05Z","containerStatuses":[{"name":"openshift-controller-manager-operator","state":{"running":{"startedAt":"2026-03-12T18:16:42Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0312 18:14:45.496587 1 cmd.go:253] Using service-serving-cert provided certificates\nI0312 18:14:45.496933 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0312 18:14:45.497392 1 observer_polling.go:159] Starting file observer\nW0312 18:15:45.506124 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods openshift-controller-manager-operator-8565d84698-m6hsp)\nI0312 18:15:45.506401 1 builder.go:304] openshift-controller-manager-operator version 4.18.0-202602132343.p2.gf1711cf.assembly.stream.el9-f1711cf-f1711cf30f683ec0eaa187cd5168caae9e8c1254\nF0312 18:16:15.765678 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-controller-manager-operator/leases/openshift-controller-manager-operator-lock\": context deadline exceeded\n","startedAt":"2026-03-12T18:14:45Z","finishedAt":"2026-03-12T18:16:16Z","containerID":"cri-o://3e81068034bf9c9fbfc0dcacd5d8ed6f99d4b966db54edfeaa5ae37af6e0a1a5"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:526c5c02a8fa86a2fa83a7087d4a5c4b1c4072c0f3906163494cc3b3c1295e9b","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:526c5c02a8fa86a2fa83a7087d4a5c4b1c4072c0f3906163494cc3b3c1295e9b","containerID":"cri-o://5d0241cc7009d3306ab2a5141a1e724e5d10e6d5ba8b992abdc867f5e3227b5c","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-s55hv","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-storage-operator/csi-snapshot-controller-7577d6f48-2ltx9.json0000640000000000000000000001401415154601550030074 0ustar0000000000000000{"metadata":{"name":"csi-snapshot-controller-7577d6f48-2ltx9","generateName":"csi-snapshot-controller-7577d6f48-","namespace":"openshift-cluster-storage-operator","uid":"bce831df-c604-4608-a24e-b14d62c5287a","resourceVersion":"8869","creationTimestamp":"2026-03-12T18:13:24Z","labels":{"app":"csi-snapshot-controller","pod-template-hash":"7577d6f48"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.27/23\"],\"mac_address\":\"0a:58:0a:80:00:1b\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.27/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.27\"\n ],\n \"mac\": \"0a:58:0a:80:00:1b\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"csi-snapshot-controller-7577d6f48","uid":"8c5e87f2-efe4-49fb-b2b2-e786004e8a1f","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"kube-api-access-wfjj6","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"snapshot-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a85dab5856916220df6f05ce9d6aa10cd4fa0234093b55355246690bba05ad1","args":["--v=2","--leader-election=true","--leader-election-lease-duration=137s","--leader-election-renew-deadline=107s","--leader-election-retry-period=26s","--leader-election-namespace=openshift-cluster-storage-operator"],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"kube-api-access-wfjj6","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000160000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"csi-snapshot-controller","serviceAccount":"csi-snapshot-controller","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c13,c2"},"runAsNonRoot":true,"fsGroup":1000160000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"app":"csi-snapshot-controller"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:27Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:24Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:17:30Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:17:30Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:24Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.27","podIPs":[{"ip":"10.128.0.27"}],"startTime":"2026-03-12T18:13:24Z","containerStatuses":[{"name":"snapshot-controller","state":{"running":{"startedAt":"2026-03-12T18:17:29Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"I0312 18:16:42.327429 1 feature_gate.go:387] feature gates: {map[]}\nI0312 18:16:42.327635 1 main.go:169] Version: a3681c9bbf7c01e13d6bf97ae0384460950c97ec\nI0312 18:16:42.328744 1 main.go:220] Start NewCSISnapshotController with kubeconfig [] resyncPeriod [15m0s]\nE0312 18:17:12.335482 1 main.go:98] Failed to list v1 volumesnapshots with error=Get \"https://172.30.0.1:443/apis/snapshot.storage.k8s.io/v1/volumesnapshots?limit=1\": context deadline exceeded\nE0312 18:17:12.335659 1 main.go:246] Exiting due to failure to ensure CRDs exist during startup: context deadline exceeded\n","startedAt":"2026-03-12T18:16:42Z","finishedAt":"2026-03-12T18:17:12Z","containerID":"cri-o://d836c15d1f62aaf6703c6affbd63fc3695d34670b745bd3f6f244a838540e38e"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a85dab5856916220df6f05ce9d6aa10cd4fa0234093b55355246690bba05ad1","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a85dab5856916220df6f05ce9d6aa10cd4fa0234093b55355246690bba05ad1","containerID":"cri-o://b960a5afb85862022f06f7d612fd0f8b4c4023ddaec1e0fe6a309ca8f51ad930","started":true,"volumeMounts":[{"name":"kube-api-access-wfjj6","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-olm-operator/cluster-olm-operator-77899cf6d-6nvn4.json0000640000000000000000000002540515154601550026606 0ustar0000000000000000{"metadata":{"name":"cluster-olm-operator-77899cf6d-6nvn4","generateName":"cluster-olm-operator-77899cf6d-","namespace":"openshift-cluster-olm-operator","uid":"f3a2cda2-b70f-4128-a1be-48503f5aad6d","resourceVersion":"5532","creationTimestamp":"2026-03-12T18:11:03Z","labels":{"name":"cluster-olm-operator","pod-template-hash":"77899cf6d"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.9/23\"],\"mac_address\":\"0a:58:0a:80:00:09\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.9/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.9\"\n ],\n \"mac\": \"0a:58:0a:80:00:09\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-olm-operator-77899cf6d","uid":"34979d62-db39-4e1a-89b2-15e4a5711b19","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cluster-olm-operator-serving-cert","secret":{"secretName":"cluster-olm-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"operand-assets","emptyDir":{}},{"name":"kube-api-access-tcvfv","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"initContainers":[{"name":"copy-catalogd-manifests","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","command":["/bin/sh"],"args":["-c","cp -a /openshift/manifests /operand-assets/catalogd"],"resources":{},"volumeMounts":[{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-tcvfv","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000350000,"allowPrivilegeEscalation":false}},{"name":"copy-operator-controller-manifests","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","command":["/bin/sh"],"args":["-c","cp -a /openshift/manifests /operand-assets/operator-controller"],"resources":{},"volumeMounts":[{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-tcvfv","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000350000,"allowPrivilegeEscalation":false}}],"containers":[{"name":"cluster-olm-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:834063dd26fb3d2489e193489198a0d5fbe9c775a0e30173e5fcef6994fbf0f6","command":["/cluster-olm-operator"],"args":["start"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"OPERATOR_NAME","value":"cluster-olm-operator"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"KUBE_RBAC_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501"},{"name":"CATALOGD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783"},{"name":"OPERATOR_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"cluster-olm-operator-serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-tcvfv","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000350000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-olm-operator","serviceAccount":"cluster-olm-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c19,c4"},"runAsNonRoot":true,"fsGroup":1000350000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:20Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:27Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:38Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:38Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:05Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.9","podIPs":[{"ip":"10.128.0.9"}],"startTime":"2026-03-12T18:13:05Z","initContainerStatuses":[{"name":"copy-catalogd-manifests","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-12T18:13:22Z","finishedAt":"2026-03-12T18:13:22Z","containerID":"cri-o://452ac1e185a248cfac36d370d36916ef0c27910988d43a12329a25e9765f77ac"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","containerID":"cri-o://452ac1e185a248cfac36d370d36916ef0c27910988d43a12329a25e9765f77ac","started":false,"volumeMounts":[{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-tcvfv","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"copy-operator-controller-manifests","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-12T18:13:27Z","finishedAt":"2026-03-12T18:13:27Z","containerID":"cri-o://fdad7d8f064f703bfbf88c807f07178484bba5e53ad147ecc9d74969fce8c221"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","containerID":"cri-o://fdad7d8f064f703bfbf88c807f07178484bba5e53ad147ecc9d74969fce8c221","started":false,"volumeMounts":[{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-tcvfv","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"containerStatuses":[{"name":"cluster-olm-operator","state":{"running":{"startedAt":"2026-03-12T18:13:37Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"W0312 18:13:34.043768 1 cmd.go:254] Using insecure, self-signed certificates\nI0312 18:13:34.907196 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0312 18:13:34.909014 1 observer_polling.go:159] Starting file observer\nI0312 18:13:34.909141 1 observer_polling.go:120] Observed file \"/var/run/secrets/serving-cert/tls.crt\" has been modified (old=\"\", new=\"bb10f2a37d17b29dcff725b9dce54a88c3d41890018c58ed76c6d80f0fc05830\")\nW0312 18:13:34.909164 1 builder.go:154] Restart triggered because of file /var/run/secrets/serving-cert/tls.crt was modified\nI0312 18:13:34.909215 1 observer_polling.go:120] Observed file \"/var/run/secrets/serving-cert/tls.key\" has been modified (old=\"\", new=\"90883dd0f9fc831bf89ef05f6b83b6df11e77d6407c32e68bbfaa353e49db4b6\")\nW0312 18:13:34.909385 1 builder.go:266] unable to get owner reference (falling back to namespace): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-cluster-olm-operator/pods\": context canceled\nI0312 18:13:34.909680 1 builder.go:298] cluster-olm-operator version 4.18.0-202602132343.p2.g88088e4.assembly.stream.el9-88088e4-88088e4bfe9f55ea7ab2c4331cebee727c8c0c34\nF0312 18:13:35.233329 1 cmd.go:179] failed checking apiserver connectivity: client rate limiter Wait returned an error: context canceled\n","startedAt":"2026-03-12T18:13:33Z","finishedAt":"2026-03-12T18:13:36Z","containerID":"cri-o://3a34f5e0d15dd4e7c330e2c8919e65deba96f9d77b56fa794a4877221990e20a"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:834063dd26fb3d2489e193489198a0d5fbe9c775a0e30173e5fcef6994fbf0f6","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:834063dd26fb3d2489e193489198a0d5fbe9c775a0e30173e5fcef6994fbf0f6","containerID":"cri-o://14be846643126f0f684988fbee828e3ae28a2a3ed42495436ab25923fcd90c1e","started":true,"volumeMounts":[{"name":"cluster-olm-operator-serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-tcvfv","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-catalogd/catalogd-controller-manager-7f8b8b6f4c-mb6tc.json0000640000000000000000000002542315154601550026006 0ustar0000000000000000{"metadata":{"name":"catalogd-controller-manager-7f8b8b6f4c-mb6tc","generateName":"catalogd-controller-manager-7f8b8b6f4c-","namespace":"openshift-catalogd","uid":"d1b3859c-20a1-4a1c-8508-86ed843768f5","resourceVersion":"8846","creationTimestamp":"2026-03-12T18:13:50Z","labels":{"control-plane":"catalogd-controller-manager","pod-template-hash":"7f8b8b6f4c"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.41/23\"],\"mac_address\":\"0a:58:0a:80:00:29\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.41/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.41\"\n ],\n \"mac\": \"0a:58:0a:80:00:29\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"manager","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"catalogd-controller-manager-7f8b8b6f4c","uid":"8f325205-9a1a-4cd9-9eed-0bb4fb7d79e0","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cache","emptyDir":{}},{"name":"catalogserver-certs","secret":{"secretName":"catalogserver-cert","items":[{"key":"tls.crt","path":"tls.crt"},{"key":"tls.key","path":"tls.key"}],"defaultMode":420,"optional":false}},{"name":"ca-certs","projected":{"sources":[{"configMap":{"name":"catalogd-trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"ca-bundle.crt"}],"optional":false}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"optional":false}}],"defaultMode":420}},{"name":"etc-containers","hostPath":{"path":"/etc/containers","type":"Directory"}},{"name":"etc-docker","hostPath":{"path":"/etc/docker","type":"Directory"}},{"name":"kube-api-access-gw4m5","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","args":["--secure-listen-address=0.0.0.0:7443","--http2-disable","--upstream=http://127.0.0.1:8080/","--logtostderr=true","--v=2"],"ports":[{"name":"https","containerPort":7443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"5m","memory":"64Mi"}},"volumeMounts":[{"name":"kube-api-access-gw4m5","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}},{"name":"manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","command":["./manager"],"args":["--leader-elect","--metrics-bind-address=127.0.0.1:8080","--external-address=catalogd-service.openshift-catalogd.svc","--tls-cert=/var/certs/tls.crt","--tls-key=/var/certs/tls.key","--v=2","--global-pull-secret=openshift-config/pull-secret"],"env":[{"name":"SSL_CERT_DIR","value":"/var/ca-certs"}],"resources":{"requests":{"cpu":"100m","memory":"200Mi"}},"volumeMounts":[{"name":"cache","mountPath":"/var/cache/"},{"name":"catalogserver-certs","mountPath":"/var/certs"},{"name":"ca-certs","readOnly":true,"mountPath":"/var/ca-certs"},{"name":"etc-containers","readOnly":true,"mountPath":"/etc/containers"},{"name":"etc-docker","readOnly":true,"mountPath":"/etc/docker"},{"name":"kube-api-access-gw4m5","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":15,"timeoutSeconds":1,"periodSeconds":20,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":5,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":10,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"catalogd-controller-manager","serviceAccount":"catalogd-controller-manager","nodeName":"master-0","securityContext":{"seLinuxOptions":{"type":"spc_t"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchExpressions":[{"key":"kubernetes.io/arch","operator":"In","values":["amd64","arm64","ppc64le","s390x"]},{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:55Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:50Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:17:19Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:17:19Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T18:13:50Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.41","podIPs":[{"ip":"10.128.0.41"}],"startTime":"2026-03-12T18:13:50Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-12T18:13:54Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","containerID":"cri-o://5706e3784ca742e5928056231dad1859cd3cb62e588cf6ac31397a2d0427db03","started":true,"volumeMounts":[{"name":"kube-api-access-gw4m5","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"manager","state":{"running":{"startedAt":"2026-03-12T18:16:42Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"ft-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"76409ee5-bc08-493f-997a-44f04569520a\"\nI0312 18:16:34.731987 1 clustercatalog_controller.go:86] \"reconcile starting\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"bbec3d86-94d6-49d1-a878-1efb95c1b6c5\"\nI0312 18:16:34.731778 1 controller.go:237] \"Shutdown signal received, waiting for all workers to finish\" controller=\"secret\" controllerGroup=\"\" controllerKind=\"Secret\"\nI0312 18:16:34.732054 1 controller.go:239] \"All workers finished\" controller=\"secret\" controllerGroup=\"\" controllerKind=\"Secret\"\nI0312 18:16:34.732448 1 clustercatalog_controller.go:134] \"reconcile ending\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"bbec3d86-94d6-49d1-a878-1efb95c1b6c5\"\nI0312 18:16:34.732496 1 clustercatalog_controller.go:86] \"reconcile starting\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-certified-operators\" namespace=\"\" name=\"openshift-certified-operators\" reconcileID=\"81c76b67-e3d7-465b-bc4b-3b13ca7e55a2\"\nI0312 18:16:34.732595 1 clustercatalog_controller.go:214] \"unpack required: current ClusterCatalog status differs from expected status\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-certified-operators\" namespace=\"\" name=\"openshift-certified-operators\" reconcileID=\"81c76b67-e3d7-465b-bc4b-3b13ca7e55a2\"\nE0312 18:16:34.731436 1 main.go:351] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\n","startedAt":"2026-03-12T18:13:55Z","finishedAt":"2026-03-12T18:16:34Z","containerID":"cri-o://736a8404a1683d56f8dbc8f71de47cc325d858c0409febcb5d511b27a322ce13"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","containerID":"cri-o://96aef0daff5b4b065b760a53564e1e05a4751150ad79dc2f9bc551c5dafe3e48","started":true,"volumeMounts":[{"name":"cache","mountPath":"/var/cache/"},{"name":"catalogserver-certs","mountPath":"/var/certs"},{"name":"ca-certs","mountPath":"/var/ca-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-containers","mountPath":"/etc/containers","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-docker","mountPath":"/etc/docker","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-gw4m5","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/namespaces_with_overlapping_uids.json0000640000000000000000000000000215154601550020176 0ustar0000000000000000[]config/ingress.json0000640000000000000000000000043615154601550013057 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"ddf9d136-ca27-442e-87a6-cfe4c11f2e31","resourceVersion":"557","generation":1,"creationTimestamp":"2026-03-12T18:06:32Z"},"spec":{"domain":"apps.sno.openstack.lab","loadBalancer":{"platform":{"type":""}}},"status":{"defaultPlacement":"ControlPlane"}}config/proxy.json0000640000000000000000000000031315154601550012560 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"71452aac-70c4-4050-86fd-add0c66dc1c5","resourceVersion":"561","generation":1,"creationTimestamp":"2026-03-12T18:06:33Z"},"spec":{"trustedCA":{"name":""}},"status":{}}config/clusteroperator/imageregistry.operator.openshift.io/imagepruner/cluster.json0000640000000000000000000000163115154601550027750 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"5a8e5b25-71e3-48fc-983d-6288c8f0f46f","resourceVersion":"6157","generation":1,"creationTimestamp":"2026-03-12T18:13:47Z"},"spec":{"schedule":"","suspend":false,"keepTagRevisions":3,"successfulJobsHistoryLimit":3,"failedJobsHistoryLimit":3,"ignoreInvalidImageReferences":true,"logLevel":"Normal"},"status":{"observedGeneration":1,"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-12T18:13:48Z","reason":"AsExpected","message":"Pruner CronJob has been created"},{"type":"Failed","status":"False","lastTransitionTime":"2026-03-12T18:13:48Z","reason":"Complete","message":"Pruner completed successfully"},{"type":"Scheduled","status":"True","lastTransitionTime":"2026-03-12T18:13:48Z","reason":"Scheduled","message":"The pruner job has been scheduled"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T18:13:48Z","reason":"AsExpected"}]}}config/apiserver.json0000640000000000000000000000121615154601550013402 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"58d83816-4bef-4b64-a0d2-3680a186c405","resourceVersion":"814","generation":1,"creationTimestamp":"2026-03-12T18:06:59Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","oauth-apiserver.openshift.io/secure-token-storage":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e"}]},"spec":{"servingCerts":{},"clientCA":{"name":""},"encryption":{},"audit":{"profile":"Default"}},"status":{}}config/authentication.json0000640000000000000000000000132315154601550014420 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"f99c9ff2-9400-4ef3-8073-c3b74ce8a68e","resourceVersion":"6701","generation":2,"creationTimestamp":"2026-03-12T18:07:01Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e"}]},"spec":{"type":"","oauthMetadata":{"name":""},"webhookTokenAuthenticator":{"kubeConfig":{"name":"webhook-authentication-integrated-oauth"}},"serviceAccountIssuer":""},"status":{"integratedOAuthMetadata":{"name":""},"oidcClients":null}}config/machineconfigpools/worker.json0000640000000000000000000000106515154601550016564 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-03-12T18:18:00Z","generation":1,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","pools.operator.machineconfiguration.openshift.io/worker":""},"name":"worker","resourceVersion":"9867","uid":"63dd6e39-f6c2-40f7-8f00-3069e1a8bd6d"},"spec":{"configuration":{},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"worker"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/worker":""}},"paused":false}}config/machineconfigpools/master.json0000640000000000000000000000117215154601550016545 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-03-12T18:18:00Z","generation":1,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","operator.machineconfiguration.openshift.io/required-for-upgrade":"","pools.operator.machineconfiguration.openshift.io/master":""},"name":"master","resourceVersion":"9866","uid":"8eb20ce4-a01e-486a-bb98-4b49602baa1d"},"spec":{"configuration":{},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"master"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/master":""}},"paused":false}}config/validatingwebhookconfigurations/performance-addon-operator.json0000640000000000000000000000552115154601550025276 0ustar0000000000000000{"metadata":{"name":"performance-addon-operator","uid":"5360adc3-701d-4c07-acb6-1ee179247c78","resourceVersion":"4871","generation":2,"creationTimestamp":"2026-03-12T18:07:25Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e","controller":true}]},"webhooks":[{"name":"vwb.performance.openshift.io","clientConfig":{"service":{"namespace":"openshift-cluster-node-tuning-operator","name":"performance-addon-operator-service","path":"/validate-performance-openshift-io-v2-performanceprofile","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["performance.openshift.io"],"apiVersions":["v2"],"resources":["performanceprofiles"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/network-node-identity.openshift.io.json0000640000000000000000000001075515154601550026735 0ustar0000000000000000{"metadata":{"name":"network-node-identity.openshift.io","uid":"ecd3a636-e388-4d64-a789-0af4c92b77c4","resourceVersion":"7188","generation":1,"creationTimestamp":"2026-03-12T18:14:07Z","ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"2cba2293-eb7a-4a6d-924f-dd735ab3a111","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"node.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/node","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["nodes/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"pod.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/pod","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["pods/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/multus.openshift.io.json0000640000000000000000000000506715154601550024023 0ustar0000000000000000{"metadata":{"name":"multus.openshift.io","uid":"6964ca5e-cfda-44ee-8be7-7c7f12518570","resourceVersion":"4868","generation":2,"creationTimestamp":"2026-03-12T18:11:58Z","labels":{"app":"multus-admission-controller"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"2cba2293-eb7a-4a6d-924f-dd735ab3a111","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"multus-validating-config.k8s.io","clientConfig":{"service":{"namespace":"openshift-multus","name":"multus-admission-controller","path":"/validate","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["k8s.cni.cncf.io"],"apiVersions":["v1"],"resources":["network-attachment-definitions"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"NoneOnDryRun","timeoutSeconds":30,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io.json0000640000000000000000000000537215154601550030635 0ustar0000000000000000{"metadata":{"name":"controlplanemachineset.machine.openshift.io","uid":"bbc808c6-84ac-44dc-b387-54cdac151089","resourceVersion":"9962","generation":2,"creationTimestamp":"2026-03-12T18:18:04Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e","controller":true}]},"webhooks":[{"name":"controlplanemachineset.machine.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"control-plane-machine-set-operator","path":"/validate-machine-openshift-io-v1-controlplanemachineset","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["machine.openshift.io"],"apiVersions":["v1"],"resources":["controlplanemachinesets"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration.json0000640000000000000000000000500215154601550032107 0ustar0000000000000000{"metadata":{"name":"cluster-baremetal-validating-webhook-configuration","uid":"b50c85dd-c173-4540-b799-fa302a26c894","resourceVersion":"10038","generation":2,"creationTimestamp":"2026-03-12T18:18:12Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"vprovisioning.kb.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-baremetal-webhook-service","path":"/validate-metal3-io-v1alpha1-provisioning","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["metal3.io"],"apiVersions":["v1alpha1"],"resources":["provisionings"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1","v1beta1"]}]}config/validatingwebhookconfigurations/autoscaling.openshift.io.json0000640000000000000000000001102715154601550024774 0ustar0000000000000000{"metadata":{"name":"autoscaling.openshift.io","uid":"231a212b-e3bd-4204-9959-55f1acf17f48","resourceVersion":"10059","generation":2,"creationTimestamp":"2026-03-12T18:18:12Z","labels":{"k8s-app":"cluster-autoscaler-operator"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"clusterautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-clusterautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1"],"resources":["clusterautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"machineautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-machineautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1beta1"],"resources":["machineautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/mutatingwebhookconfigurations/catalogd-mutating-webhook-configuration.json0000640000000000000000000000533615154601550027500 0ustar0000000000000000{"metadata":{"name":"catalogd-mutating-webhook-configuration","uid":"c306a4ab-3db4-43d2-83ba-d8ef79f96eca","resourceVersion":"5924","generation":2,"creationTimestamp":"2026-03-12T18:13:45Z","annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"inject-metadata-name.olm.operatorframework.io","clientConfig":{"service":{"namespace":"openshift-catalogd","name":"catalogd-service","path":"/mutate-olm-operatorframework-io-v1-clustercatalog","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["olm.operatorframework.io"],"apiVersions":["v1"],"resources":["clustercatalogs"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"],"reinvocationPolicy":"Never","matchConditions":[{"name":"MissingOrIncorrectMetadataNameLabel","expression":"'name' in object.metadata \u0026\u0026 (!has(object.metadata.labels) || !('olm.operatorframework.io/metadata.name' in object.metadata.labels) || object.metadata.labels['olm.operatorframework.io/metadata.name'] != object.metadata.name)"}]}]}config/schedulers/cluster.json0000640000000000000000000000052415154601550015225 0ustar0000000000000000{"kind":"Scheduler","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster","uid":"dfcca9ac-b8b2-47a5-8881-1a819cf5935a","resourceVersion":"568","generation":1,"creationTimestamp":"2026-03-12T18:06:34Z"},"spec":{"policy":{"name":""},"profileCustomizations":{"dynamicResourceAllocation":""},"mastersSchedulable":true},"status":{}}config/node/master-0.json0000640000000000000000000000605215154601550013762 0ustar0000000000000000{"metadata":{"name":"master-0","uid":"2b794e11-4c79-4c26-ab97-24c47eefd23d","resourceVersion":"10030","creationTimestamp":"2026-03-12T18:11:02Z","labels":{"beta.kubernetes.io/arch":"amd64","beta.kubernetes.io/os":"linux","kubernetes.io/arch":"amd64","kubernetes.io/hostname":"master-0","kubernetes.io/os":"linux","node-role.kubernetes.io/control-plane":"","node-role.kubernetes.io/master":"","node.openshift.io/os_id":"rhcos"},"annotations":{"k8s.ovn.org/host-cidrs":"","k8s.ovn.org/l3-gateway-config":"","k8s.ovn.org/node-chassis-id":"","k8s.ovn.org/node-encap-ips":"","k8s.ovn.org/node-id":"","k8s.ovn.org/node-masquerade-subnet":"","k8s.ovn.org/node-primary-ifaddr":"","k8s.ovn.org/node-subnets":"","k8s.ovn.org/node-transit-switch-port-ifaddr":"","k8s.ovn.org/remote-zone-migrated":"","k8s.ovn.org/zone-name":"","machineconfiguration.openshift.io/reason":"could not get ControllerConfig: controllerconfig.machineconfiguration.openshift.io \"machine-config-controller\" not found","machineconfiguration.openshift.io/state":"Degraded","volumes.kubernetes.io/controller-managed-attach-detach":"true"}},"spec":{"taints":[{"key":"node-role.kubernetes.io/master","effect":"NoSchedule"}]},"status":{"capacity":{"cpu":"12","ephemeral-storage":"209124332Ki","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"32865348Ki","pods":"250"},"allocatable":{"cpu":"11500m","ephemeral-storage":"191655242229","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"31714372Ki","pods":"250"},"conditions":[{"type":"MemoryPressure","status":"False","lastHeartbeatTime":"2026-03-12T18:18:07Z","lastTransitionTime":"2026-03-12T18:11:01Z","reason":"KubeletHasSufficientMemory","message":"kubelet has sufficient memory available"},{"type":"DiskPressure","status":"False","lastHeartbeatTime":"2026-03-12T18:18:07Z","lastTransitionTime":"2026-03-12T18:11:01Z","reason":"KubeletHasNoDiskPressure","message":"kubelet has no disk pressure"},{"type":"PIDPressure","status":"False","lastHeartbeatTime":"2026-03-12T18:18:07Z","lastTransitionTime":"2026-03-12T18:11:01Z","reason":"KubeletHasSufficientPID","message":"kubelet has sufficient PID available"},{"type":"Ready","status":"True","lastHeartbeatTime":"2026-03-12T18:18:07Z","lastTransitionTime":"2026-03-12T18:13:04Z","reason":"KubeletReady","message":"kubelet is posting ready status"}],"addresses":[{"type":"InternalIP","address":"192.168.32.10"},{"type":"Hostname","address":"master-0"}],"daemonEndpoints":{"kubeletEndpoint":{"Port":10250}},"nodeInfo":{"machineID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","systemUUID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","bootID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","kernelVersion":"5.14.0-427.111.1.el9_4.x86_64","osImage":"Red Hat Enterprise Linux CoreOS 418.94.202602172219-0","containerRuntimeVersion":"cri-o://1.31.13-8.rhaos4.18.gitd78977c.el9","kubeletVersion":"v1.31.14","kubeProxyVersion":"v1.31.14","operatingSystem":"linux","architecture":"amd64"},"runtimeHandlers":[{"name":"crun","features":{"recursiveReadOnlyMounts":true}},{"name":"","features":{"recursiveReadOnlyMounts":true}},{"name":"runc","features":{"recursiveReadOnlyMounts":true}}]}}config/network.json0000640000000000000000000000117015154601550013072 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"2b0a0a58-c672-4231-9617-670060052114","resourceVersion":"3276","generation":2,"creationTimestamp":"2026-03-12T18:06:32Z"},"spec":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","externalIP":{"policy":{}},"networkDiagnostics":{"mode":"","sourcePlacement":{"nodeSelector":null,"tolerations":null},"targetPlacement":{"nodeSelector":null,"tolerations":null}}},"status":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","clusterNetworkMTU":8900}}config/pdbs/openshift-operator-lifecycle-manager/packageserver-pdb.json0000640000000000000000000000173515154601550025122 0ustar0000000000000000{"metadata":{"name":"packageserver-pdb","namespace":"openshift-operator-lifecycle-manager","uid":"85d15797-56ef-4ed5-a556-110a4cceb99e","resourceVersion":"9914","generation":1,"creationTimestamp":"2026-03-12T18:07:17Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e","controller":true}]},"spec":{"selector":{"matchLabels":{"app":"packageserver"}},"maxUnavailable":1},"status":{"observedGeneration":1,"disruptionsAllowed":1,"currentHealthy":1,"desiredHealthy":0,"expectedPods":1,"conditions":[{"type":"DisruptionAllowed","status":"True","observedGeneration":1,"lastTransitionTime":"2026-03-12T18:18:01Z","reason":"SufficientPods","message":""}]}}config/image.json0000640000000000000000000000111715154601550012464 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"cf5ad88c-7f83-4e6d-87ce-e72d5a417338","resourceVersion":"1298","generation":1,"creationTimestamp":"2026-03-12T18:07:10Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e"}]},"spec":{"additionalTrustedCA":{"name":""},"registrySources":{},"imageStreamImportMode":""},"status":{}}config/oauth.json0000640000000000000000000000114415154601550012522 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"1f7fa1e2-3792-49a5-a3ca-553b8f1ac159","resourceVersion":"1504","generation":1,"creationTimestamp":"2026-03-12T18:07:14Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"947a8bdf-3226-4161-9e8f-3555efdfc17e"}]},"spec":{"tokenConfig":{},"templates":{"login":{"name":""},"providerSelection":{"name":""},"error":{"name":""}}},"status":{}}config/infrastructure.json0000640000000000000000000000106515154601550014464 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"cbfebe7c-dde1-4c80-b6e0-727c17763f72","resourceVersion":"544","generation":1,"creationTimestamp":"2026-03-12T18:06:31Z"},"spec":{"cloudConfig":{"name":""},"platformSpec":{"type":"None"}},"status":{"infrastructureName":"xxx-xxxxx","platform":"None","platformStatus":{"type":"None"},"etcdDiscoveryDomain":"","apiServerURL":"https://api.sno.openstack.lab:6443","apiServerInternalURI":"https://api-int.sno.openstack.lab:6443","controlPlaneTopology":"SingleReplica","infrastructureTopology":"SingleReplica","cpuPartitioning":"None"}}config/featuregate.json0000640000000000000000000000613615154601550013704 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"9f2272cc-9577-483c-b2eb-39299001d24e","resourceVersion":"646","generation":1,"creationTimestamp":"2026-03-12T18:06:53Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true"}},"spec":{},"status":{"featureGates":[{"version":"4.18.34","enabled":[{"name":"AWSEFSDriverVolumeMetrics"},{"name":"AdminNetworkPolicy"},{"name":"AlibabaPlatform"},{"name":"AzureWorkloadIdentity"},{"name":"BareMetalLoadBalancer"},{"name":"BuildCSIVolumes"},{"name":"ChunkSizeMiB"},{"name":"CloudDualStackNodeIPs"},{"name":"DisableKubeletCloudCredentialProviders"},{"name":"GCPLabelsTags"},{"name":"HardwareSpeed"},{"name":"IngressControllerLBSubnetsAWS"},{"name":"KMSv1"},{"name":"ManagedBootImages"},{"name":"ManagedBootImagesAWS"},{"name":"MultiArchInstallAWS"},{"name":"MultiArchInstallGCP"},{"name":"NetworkDiagnosticsConfig"},{"name":"NetworkLiveMigration"},{"name":"NetworkSegmentation"},{"name":"NewOLM"},{"name":"NodeDisruptionPolicy"},{"name":"OnClusterBuild"},{"name":"PersistentIPsForVirtualization"},{"name":"PrivateHostedZoneAWS"},{"name":"SetEIPForNLBIngressController"},{"name":"StreamingCollectionEncodingToJSON"},{"name":"StreamingCollectionEncodingToProtobuf"},{"name":"VSphereControlPlaneMachineSet"},{"name":"VSphereDriverConfiguration"},{"name":"VSphereMultiVCenters"},{"name":"VSphereStaticIPs"},{"name":"ValidatingAdmissionPolicy"}],"disabled":[{"name":"AWSClusterHostedDNS"},{"name":"AdditionalRoutingCapabilities"},{"name":"AutomatedEtcdBackup"},{"name":"BootcNodeManagement"},{"name":"CSIDriverSharedResource"},{"name":"ClusterAPIInstall"},{"name":"ClusterAPIInstallIBMCloud"},{"name":"ClusterMonitoringConfig"},{"name":"ConsolePluginContentSecurityPolicy"},{"name":"DNSNameResolver"},{"name":"DynamicResourceAllocation"},{"name":"EtcdBackendQuota"},{"name":"EventedPLEG"},{"name":"Example"},{"name":"ExternalOIDC"},{"name":"ExternalOIDCWithUIDAndExtraClaimMappings"},{"name":"GCPClusterHostedDNS"},{"name":"GatewayAPI"},{"name":"ImageStreamImportMode"},{"name":"IngressControllerDynamicConfigurationManager"},{"name":"InsightsConfig"},{"name":"InsightsConfigAPI"},{"name":"InsightsOnDemandDataGather"},{"name":"InsightsRuntimeExtractor"},{"name":"MachineAPIMigration"},{"name":"MachineAPIOperatorDisableMachineHealthCheckController"},{"name":"MachineAPIProviderOpenStack"},{"name":"MachineConfigNodes"},{"name":"MaxUnavailableStatefulSet"},{"name":"MetricsCollectionProfiles"},{"name":"MinimumKubeletVersion"},{"name":"MixedCPUsAllocation"},{"name":"MultiArchInstallAzure"},{"name":"NodeSwap"},{"name":"NutanixMultiSubnets"},{"name":"OVNObservability"},{"name":"OpenShiftPodSecurityAdmission"},{"name":"PinnedImages"},{"name":"PlatformOperators"},{"name":"ProcMountType"},{"name":"RouteAdvertisements"},{"name":"RouteExternalCertificate"},{"name":"ServiceAccountTokenNodeBinding"},{"name":"SignatureStores"},{"name":"SigstoreImageVerification"},{"name":"TranslateStreamCloseWebsocketRequests"},{"name":"UpgradeStatus"},{"name":"UserNamespacesPodSecurityStandards"},{"name":"UserNamespacesSupport"},{"name":"VSphereMultiNetworks"},{"name":"VolumeAttributesClass"},{"name":"VolumeGroupSnapshot"}]}]}}