insights-operator/gathers.json0000640000000000000000000004111515154624271015262 0ustar0000000000000000{"status_reports":[{"name":"clusterconfig/container_runtime_configs","duration_in_ms":18,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/certificate_signing_requests","duration_in_ms":34,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_healthchecks","duration_in_ms":28,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"conditional/rapid_container_logs","duration_in_ms":0,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkconfigurationpolicies","duration_in_ms":7,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_logging","duration_in_ms":7,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/mutating_webhook_configurations","duration_in_ms":29,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_version","duration_in_ms":18,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkstates","duration_in_ms":1,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/schedulers","duration_in_ms":19,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/feature_gates","duration_in_ms":18,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/tsdb_status","duration_in_ms":26,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/api/v1/status/tsdb\": dial tcp: lookup prometheus-k8s.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/clusterroles","duration_in_ms":43,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/infrastructures","duration_in_ms":29,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/support_secret","duration_in_ms":44,"records_count":0,"errors":["secrets \"support\" not found"],"warnings":null,"panic":null},{"name":"workloads/helmchart_info","duration_in_ms":14,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_registries","duration_in_ms":20,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_config_pools","duration_in_ms":18,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_machine_api_events","duration_in_ms":25,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"workloads","duration_in_ms":5727,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pod_network_connectivity_checks","duration_in_ms":7,"records_count":0,"errors":["the server could not find the requested resource (get podnetworkconnectivitychecks.controlplane.operator.openshift.io)"],"warnings":null,"panic":null},{"name":"clusterconfig/silenced_alerts","duration_in_ms":33,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=false\u0026inhibited=false\u0026silenced=true\": dial tcp: lookup alertmanager-main.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/aggregated_monitoring_cr_names","duration_in_ms":37,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/node_logs","duration_in_ms":191,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators_pods_and_events","duration_in_ms":16474,"records_count":62,"errors":["the record with the same name \"config/pod/openshift-authentication-operator/authentication-operator-7c6989d6c4-9j7rx.json\" was already recorded and had the fingerprint \"ea46fc2b60b7af3b534456bd3204ef68e367e927f9d8c173cc614987a566f8e8\", overwriting with the record having fingerprint \"ea46fc2b60b7af3b534456bd3204ef68e367e927f9d8c173cc614987a566f8e8\"","the record with the same name \"config/pod/openshift-apiserver-operator/openshift-apiserver-operator-799b6db4d7-jwthf.json\" was already recorded and had the fingerprint \"85464ff45f328bfe29c39c49b8b4295dd4843c3425f77dfb6f1d760373d40f5a\", overwriting with the record having fingerprint \"85464ff45f328bfe29c39c49b8b4295dd4843c3425f77dfb6f1d760373d40f5a\"","the record with the same name \"config/pod/openshift-etcd-operator/etcd-operator-5884b9cd56-xh6r9.json\" was already recorded and had the fingerprint \"afa404eefe0dcae1507e7ce72beb46c9ceb198f62dde250df361d72b2ab46a69\", overwriting with the record having fingerprint \"afa404eefe0dcae1507e7ce72beb46c9ceb198f62dde250df361d72b2ab46a69\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-xh6r9/etcd-operator_previous.log\" was already recorded and had the fingerprint \"3fc25f072a43a9034933821347a59c139c0cc6ae9f74edcd0e36f20e46f1db09\", overwriting with the record having fingerprint \"3fc25f072a43a9034933821347a59c139c0cc6ae9f74edcd0e36f20e46f1db09\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-xh6r9/etcd-operator_current.log\" was already recorded and had the fingerprint \"4269d9b92334c68ba6dcdf203e3277e59f2284e3448f6d232771818cb1ed8702\", overwriting with the record having fingerprint \"4269d9b92334c68ba6dcdf203e3277e59f2284e3448f6d232771818cb1ed8702\""],"warnings":["warning: the record with the same fingerprint \"ea46fc2b60b7af3b534456bd3204ef68e367e927f9d8c173cc614987a566f8e8\" was already recorded at path \"config/pod/openshift-authentication-operator/authentication-operator-7c6989d6c4-9j7rx.json\", recording another one with a different path \"config/pod/openshift-authentication-operator/authentication-operator-7c6989d6c4-9j7rx.json\"","warning: the record with the same fingerprint \"85464ff45f328bfe29c39c49b8b4295dd4843c3425f77dfb6f1d760373d40f5a\" was already recorded at path \"config/pod/openshift-apiserver-operator/openshift-apiserver-operator-799b6db4d7-jwthf.json\", recording another one with a different path \"config/pod/openshift-apiserver-operator/openshift-apiserver-operator-799b6db4d7-jwthf.json\"","warning: the record with the same fingerprint \"afa404eefe0dcae1507e7ce72beb46c9ceb198f62dde250df361d72b2ab46a69\" was already recorded at path \"config/pod/openshift-etcd-operator/etcd-operator-5884b9cd56-xh6r9.json\", recording another one with a different path \"config/pod/openshift-etcd-operator/etcd-operator-5884b9cd56-xh6r9.json\"","warning: the record with the same fingerprint \"3fc25f072a43a9034933821347a59c139c0cc6ae9f74edcd0e36f20e46f1db09\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-xh6r9/etcd-operator_previous.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-xh6r9/etcd-operator_previous.log\"","warning: the record with the same fingerprint \"4269d9b92334c68ba6dcdf203e3277e59f2284e3448f6d232771818cb1ed8702\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-xh6r9/etcd-operator_current.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-xh6r9/etcd-operator_current.log\""],"panic":null},{"name":"clusterconfig/sap_datahubs","duration_in_ms":33,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_cluster","duration_in_ms":17,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/dvo_metrics","duration_in_ms":23,"records_count":0,"errors":null,"warnings":["warning: no service found with label selector name=deployment-validation-operator"],"panic":null},{"name":"conditional","duration_in_ms":1025,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cluster_apiserver","duration_in_ms":17,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machines","duration_in_ms":30,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/lokistack","duration_in_ms":16,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_controlplanes","duration_in_ms":34,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_config","duration_in_ms":36,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_classes","duration_in_ms":43,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress","duration_in_ms":24,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/qemu_kubevirt_launcher_logs","duration_in_ms":106,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig","duration_in_ms":16480,"records_count":154,"errors":["function \"pod_network_connectivity_checks\" failed with an error","function \"active_alerts\" failed with an error","function \"tsdb_status\" failed with an error","function \"metrics\" failed with an error","function \"silenced_alerts\" failed with an error","function \"machine_autoscalers\" failed with an error","function \"support_secret\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-authentication-operator/authentication-operator-7c6989d6c4-9j7rx.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-apiserver-operator/openshift-apiserver-operator-799b6db4d7-jwthf.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/etcd-operator-5884b9cd56-xh6r9.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-xh6r9/etcd-operator_previous.log\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-xh6r9/etcd-operator_current.log\""],"warnings":null,"panic":null},{"name":"clusterconfig/networks","duration_in_ms":18,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/active_alerts","duration_in_ms":24,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=true\": dial tcp: lookup alertmanager-main.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/machine_autoscalers","duration_in_ms":27,"records_count":0,"errors":["machineautoscalers.autoscaling.openshift.io is forbidden: User \"system:serviceaccount:openshift-insights:gather\" cannot list resource \"machineautoscalers\" in API group \"autoscaling.openshift.io\" at the cluster scope"],"warnings":null,"panic":null},{"name":"clusterconfig/machine_configs","duration_in_ms":77,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_images","duration_in_ms":136,"records_count":14,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/proxies","duration_in_ms":19,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/overlapping_namespace_uids","duration_in_ms":19,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_pruners","duration_in_ms":20,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/metrics","duration_in_ms":28,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/federate?match%5B%5D=cluster_installer\u0026match%5B%5D=namespace%3Acontainer_cpu_usage%3Asum\u0026match%5B%5D=namespace%3Acontainer_memory_usage_bytes%3Asum\u0026match%5B%5D=vsphere_node_hw_version_total\u0026match%5B%5D=virt_platform\u0026match%5B%5D=console_helm_installs_total\u0026match%5B%5D=console_helm_upgrades_total\u0026match%5B%5D=console_helm_uninstalls_total\u0026match%5B%5D=openshift_apps_deploymentconfigs_strategy_total\u0026match%5B%5D=etcd_server_slow_apply_total\u0026match%5B%5D=etcd_server_slow_read_indexes_total\u0026match%5B%5D=haproxy_exporter_server_threshold\": dial tcp: lookup prometheus-k8s.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/olm_operators","duration_in_ms":49,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/number_of_pods_and_netnamespaces_with_sdn_annotations","duration_in_ms":54,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"conditional/remote_configuration","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/authentication","duration_in_ms":20,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/jaegers","duration_in_ms":28,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_sets","duration_in_ms":33,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/monitoring_persistent_volumes","duration_in_ms":34,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image","duration_in_ms":29,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/config_maps","duration_in_ms":68,"records_count":9,"errors":["configmaps \"cluster-monitoring-config\" not found","configmaps \"gateway-mode-config\" not found","configmaps \"insights-config\" not found"],"warnings":["warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt\""],"panic":null},{"name":"clusterconfig/openstack_dataplanenodesets","duration_in_ms":29,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanedeployments","duration_in_ms":32,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/validating_webhook_configurations","duration_in_ms":23,"records_count":6,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/crds","duration_in_ms":44,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodes","duration_in_ms":30,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_pods","duration_in_ms":17,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/oauths","duration_in_ms":33,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cost_management_metrics_configs","duration_in_ms":34,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators","duration_in_ms":60,"records_count":34,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/install_plans","duration_in_ms":11042,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/service_accounts","duration_in_ms":11610,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"workloads/workload_info","duration_in_ms":5727,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ceph_cluster","duration_in_ms":29,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pdbs","duration_in_ms":36,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/version","duration_in_ms":76,"records_count":3,"errors":null,"warnings":null,"panic":null},{"name":"conditional/conditional_gatherer_rules","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress_certificates","duration_in_ms":59,"records_count":1,"errors":null,"warnings":null,"panic":null}],"container_memory_bytes_usage":0,"uptime_seconds":23.762,"is_global_obfuscation_enabled":false}insights-operator/remote-configuration.json0000640000000000000000000000443515154624271017771 0ustar0000000000000000{"conditional_gathering_rules":[{"conditions":[{"alert":{"name":"APIRemovedInNextEUSReleaseInUse"},"type":"alert_is_firing"}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedReload"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedToSendAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"KubePodCrashLooping"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","previous":true,"tail_lines":20}}},{"conditions":[{"alert":{"name":"KubePodNotReady"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},{"conditions":[{"alert":{"name":"PrometheusOperatorSyncFailed"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},{"conditions":[{"alert":{"name":"PrometheusRemoteStorageFailures"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},{"conditions":[{"alert":{"name":"PrometheusTargetSyncFailure"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},{"conditions":[{"alert":{"name":"SamplesImagestreamImportFailing"},"type":"alert_is_firing"}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},{"conditions":[{"alert":{"name":"ThanosRuleQueueIsDroppingAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}}],"container_logs":[],"version":"1.2.0"}insights-operator/conditional-gatherer-rules.json0000640000000000000000000000577515154624271021073 0ustar0000000000000000{"version":"1.2.0","conditional_gathering_rules":[{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"APIRemovedInNextEUSReleaseInUse"}}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedReload"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedToSendAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodCrashLooping"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","tail_lines":20,"previous":true}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodNotReady"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusOperatorSyncFailed"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusRemoteStorageFailures"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusTargetSyncFailure"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"SamplesImagestreamImportFailing"}}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"ThanosRuleQueueIsDroppingAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false}],"endpoint":"https://console.redhat.com/api/gathering/v2/%s/gathering_rules"}config/workload_info.json0000640000000000000000000005556615154624270014264 0ustar0000000000000000{"pods":80,"imageCount":67,"namespaces":{"0LiT6ZNtbpYL":{"count":4,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:ac6f0695d3386e6d601f4ae507940981352fa3ad884b0fed6fb25698c5e6f916","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:0c03cb25dc6f6a865529ebc979e8d7d08492b28fd3fb93beddf30e1cb06f1245","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:ace4dcd008420277d915fe983b07bbb50fb3ab0673f28d0166424a75bc2137e7","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:c8f0fda36e9a2040dbe0537361dcd73658df4e669d846f8101a8f9f29f0be9a7","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:e207c762b7802ee0e54507d21ed1f25b19eddc511a4b824934c16c163193be6a","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:e207c762b7802ee0e54507d21ed1f25b19eddc511a4b824934c16c163193be6a","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:381e96959e3c3b08a3e2715e6024697ae14af31bd0378b49f583e984b3b9a192","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:5230462066ab36e3025524e948dd33fa6f51ee29a4f91fa469bfc268568b5fd9","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:381e96959e3c3b08a3e2715e6024697ae14af31bd0378b49f583e984b3b9a192","firstCommand":"N9KxLV2avCo2","firstArg":"BuLIUMMJnyP_"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:89cb093f319eaa04acfe9431b8697bffbc71ab670546f7ed257daa332165c626","firstCommand":"FC0eu9ID58Bm","firstArg":"47DEQpj8HBSa"}]}]},"0h5ohwdJx4S5":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","firstCommand":"buSkac1OkQU4","firstArg":"XV1E-c-gSQmZ"}]}]},"2IqVYeidVUxV":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:8ceca1efee55b9fd5089428476bbc401fe73db7c0b0f5e16d4ad28ed0f0f9d43","firstCommand":"po5yju59c7HJ"}],"containers":[{"imageID":"sha256:76bdc35338c4d0f5e5b9448fb73e3578656f908a962286692e12a0372ec721d5","firstCommand":"UcO4la9rqCTe"}]}]},"43Xz0HbE9FHX":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:1fce8b5c6b0206ecb4ddc7de47062bed853b88d4e34415e9e5a2a6bc99cf6aad","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:ff40e33e63d6c1f4e4393d5506e38def25ba20582d980fec8b81f81c867ceeec","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:08bf2da4079dafb9d9fc0718c48ed509adab6b030e9c85e3bbd21d2702ab894e","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:ff40e33e63d6c1f4e4393d5506e38def25ba20582d980fec8b81f81c867ceeec","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:b714a7ada1e295b599b432f32e1fd5b74c8cdbe6fe51e95306322b25cb873914","firstCommand":"4MEQ8E7-fUvu","firstArg":"mDEjdpyJDBZ4"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:898c67bf7fc973e99114f3148976a6c21ae0dbe413051415588fa9b995f5b331","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:ff40e33e63d6c1f4e4393d5506e38def25ba20582d980fec8b81f81c867ceeec","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:1295a1f0e74ae87f51a733e28b64c6fdb6b9a5b069a6897b3870fe52cc1c3b0b","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:ff40e33e63d6c1f4e4393d5506e38def25ba20582d980fec8b81f81c867ceeec","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]}]},"47HAKWqp7-jn":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","firstCommand":"N9KxLV2avCo2"}]}]},"4k7XyKW2A17e":{"count":1,"terminalCount":1,"shapes":[]},"5fn-sCitjq6a":{"count":3,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:9bd0b71d620cf0acbfcd1b58797dc30050bd167cb6b7a7f62c8333dd370c76d5","firstCommand":"HgS-rIunFHfD","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:3a85dab5856916220df6f05ce9d6aa10cd4fa0234093b55355246690bba05ad1","firstArg":"ESRPWfqdsWE1"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:4010a8f9d932615336227e2fd43325d4fa9025dca4bebe032106efea733fcfc3","firstArg":"zO0oxtw_mcI5"}]}]},"6KbiDGNUd_ub":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"}]}]},"6bLpdRMvgXVP":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cf9670d0f269f8d49fd9ef4981999be195f6624a4146aa93d9201eb8acc81053","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"},{"imageID":"sha256:cf9670d0f269f8d49fd9ef4981999be195f6624a4146aa93d9201eb8acc81053","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]}]},"9dJB3pvMrhr8":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:2fe5144b1f72bdcf5d5a52130f02ed86fbec3875cc4ac108ead00eaac1659e06","firstCommand":"51QuNwyM-xYf","firstArg":"r7zEsGNvlNrk"}]}]},"AN3N38xANElq":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"},{"imageID":"sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"},{"imageID":"sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","firstCommand":"FATPL2W-sitV","firstArg":"5gS4z5mOnDuY"},{"imageID":"sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"}]}]},"CMkFy_B6OMUO":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:7220d16ea511c0f0410cf45db45aaafcc64847c9cb5732ad1eff39ceb482cdba","firstCommand":"7aQQEh6Tr2m7","firstArg":"r7zEsGNvlNrk"}]}]},"C_9an18W0cU6":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"ZS9VAWJDvxuf","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"ArvlNzaZtYpC","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"PPJ_dAh1Wl4S","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","firstCommand":"5-ZY-7KtGiOe"}]}]},"EOB8Fqt74gVH":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:042e6a37747405da54cf91543d44408c9531327a2cce653c41ca851aa7c896d8","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"}]}]},"EyQn00UhCg7z":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","firstCommand":"bsRjeCtd7lVU","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","firstCommand":"ZDrZSWYe4Hpn"}]}]},"F-y2qosZEzxd":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:7220d16ea511c0f0410cf45db45aaafcc64847c9cb5732ad1eff39ceb482cdba","firstCommand":"7aQQEh6Tr2m7","firstArg":"gcNszUTvGLqr"}]}]},"ICyEPw5KVYuy":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c54c3f7cffe057ae0bdf26163d5e46744685083ae16fc97112e32beacd2d8955","firstCommand":"ijLlFtdBW-Uk","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460","firstCommand":"N9KxLV2avCo2"}]}]},"KETRwZOPBpF9":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","firstCommand":"buSkac1OkQU4","firstArg":"47DEQpj8HBSa"}]}]},"LBp1kjMRhgCD":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"MBms5agiSYKb":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:b8cb5e0caeca0fb02f3e8c72b7ddf1c49e3c602e42e119ba30c60525f1db1821","firstArg":"zO0oxtw_mcI5"}]}]},"N3z7Gdl4s2xN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:b9b8bc43bac294be3c7669cde049e388ad9d8751242051ba40f83e1c401eceda","firstCommand":"vLhjmt4GJVrQ"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"47DEQpj8HBSa"}]}]},"NJ5StnkN7lNJ":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:3f34dc492c80a3dee4643cc2291044750ac51e6e919b973de8723fa8b70bde70","firstCommand":"euUHIZmT1r6w","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:3f34dc492c80a3dee4643cc2291044750ac51e6e919b973de8723fa8b70bde70","firstCommand":"euUHIZmT1r6w"}]}]},"NuNApgGLWU3S":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:263827a457b3cc707bdd050873234f5d0892a553af5cfab13f8db75de762d4cf","firstCommand":"loDbMsNsNHAN"},{"imageID":"sha256:263827a457b3cc707bdd050873234f5d0892a553af5cfab13f8db75de762d4cf","firstCommand":"BWdk-C4p4WVi","firstArg":"ov8ZFLf4OaCu"}]}]},"QRCRK87Nh9-g":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","firstCommand":"N9KxLV2avCo2","firstArg":"aC8iSHmKHojh"},{"imageID":"sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","firstCommand":"VvlllczXFX2z","firstArg":"Yfg8wToYnj2U"}]}]},"QhwI_DkC7RkW":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"}],"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","firstCommand":"N9KxLV2avCo2"}]}]},"RGIC92MKxXzi":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:ebee49810f493f9b566740bd61256fd40b897cc51423f1efa01a02bb57ce177d","firstCommand":"RxKEaTc90uWM","firstArg":"r7zEsGNvlNrk"}]}]},"WPOX0dN4tqDv":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0","firstCommand":"9RqZYN0XQJuD"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"47DEQpj8HBSa"}]}]},"XStfgPOmHYzB":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d11f13e867f4df046ca6789bb7273da5d0c08895b3dea00949c8a5458f9e22f9","firstCommand":"AiycEq1CClLy","firstArg":"r7zEsGNvlNrk"}]}]},"YgQZCjyI6D9c":{"count":1,"terminalCount":1,"shapes":[]},"cMIdS73ad1cT":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","firstCommand":"09D_XsQaIohy","firstArg":"r7zEsGNvlNrk"}]}]},"cWNZj9dm5f4i":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","firstCommand":"WFJEBSInAJpw","firstArg":"r7zEsGNvlNrk"}]}]},"coRkJ8lvmtSk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:9b2e765b795c30c910c331c85226e5db0d56463b6c81d79ded739cba76e2b032"}]}]},"de1zmznD1F_L":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:526c5c02a8fa86a2fa83a7087d4a5c4b1c4072c0f3906163494cc3b3c1295e9b","firstCommand":"rb3iLnl9GmZR","firstArg":"r7zEsGNvlNrk"}]}]},"eCjF12pGOLUF":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d470dba32064cc62b2ab29303d6e00612304548262eaa2f4e5b40a00a26f71ce","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:d470dba32064cc62b2ab29303d6e00612304548262eaa2f4e5b40a00a26f71ce","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"}]}]},"ecUe5cl6bPwX":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:00b591b3820682dc99f16f07a3a0a4ec06dfedba63cd0f79b998ac4509fabea3","firstCommand":"pgaYl1gqTV2L","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:d74fe7cb12c554c120262683d9c4066f33ae4f60a5fad83cba419d851b98c12d","firstCommand":"kwBOP3_4oVMx","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:e9ee63a30a9b95b5801afa36e09fc583ec2cda3c5cb3c8676e478fea016abfa1","firstCommand":"buSkac1OkQU4","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:2508a5f66e509e813cb09825b5456be91b4cdd4d02f470f22a33de42c753f2b7","firstCommand":"Tt12uskXp-TN","firstArg":"zO0oxtw_mcI5"}]}]},"iAB_cGZtvYGo":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","firstCommand":"aC8iSHmKHojh","firstArg":"5gS4z5mOnDuY"}]}]},"inQbBSWydCWk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"ioFx0itCFPcs":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"}],"containers":[{"imageID":"sha256:834063dd26fb3d2489e193489198a0d5fbe9c775a0e30173e5fcef6994fbf0f6","firstCommand":"bFMn8sKmxXTo","firstArg":"zO0oxtw_mcI5"}]}]},"jmuesrd3LOV1":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c","firstCommand":"aDHd4M_0XUOd","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c","firstCommand":"wCdwTcAdXQ_H","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c","firstCommand":"jXkiIgNfKeEy","firstArg":"zO0oxtw_mcI5"}]}]},"k2lPYOlQaXUX":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab","firstCommand":"XqE_QmN1P920","firstArg":"r7zEsGNvlNrk"}]}]},"n8ih8iFf25K7":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460","firstCommand":"CX8KiHZjJyVD"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","firstCommand":"N9KxLV2avCo2"}]}]},"nMMaB9HQd060":{"count":6,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:4a4c3e6ca0cd26f7eb5270cfafbcf423cf2986d152bf5b9fc6469d40599e104e","firstArg":"aZFPdeh8u0QY"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:3ef4b76f6b989bf3e802d22aff457a019d9c232f0ea8d927ac6ce2d854fe48d7","firstArg":"5wzTZA9Ffwb3"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:3888758fa24689d4e63dfb78ed97a852c687295adcabdabf8cdc4a2beaa42398","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:3888758fa24689d4e63dfb78ed97a852c687295adcabdabf8cdc4a2beaa42398","firstCommand":"icTsn2s_EIax","firstArg":"SCcKjYHEPDKM"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:bececf32872455775075a3d35100302396ca58ae29827b24d7df086d8ac14432","firstArg":"5wzTZA9Ffwb3"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:3bedf16a5f527126e934c37d2f24886de4a54c9bd9d45b18821d02eefd8b5f9e","firstArg":"e1V8mDIYJ-Es"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:bc516f6eb3028f5169f1712ac1878d4b591174fd7c363f4ee5aa63162aa01b0e","firstArg":"Sr6QxZ9vlnXv"}]}]},"nO8YkKLJMsaW":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","firstCommand":"VvlllczXFX2z","firstArg":"47DEQpj8HBSa"}]}]},"nTf6g7hF1YMN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:28f33d62fd0b94c5ea0ebcd7a4216848c8dd671a38d901ce98f4c399b700e1c7","firstArg":"8DZ1gO9Xqn6d"}]}]},"oNeg9VIL3k3N":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:eb82e437a701ce83b70e56be8477d987da67578714dda3d9fa6628804b1b56f5","firstCommand":"oNeg9VIL3k3N","firstArg":"r7zEsGNvlNrk"}]}]},"pepxDbsB4SPa":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","firstCommand":"VvlllczXFX2z","firstArg":"r7zEsGNvlNrk"}]}]},"q1TpN3EUiKjG":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","firstCommand":"FATPL2W-sitV","firstArg":"r7zEsGNvlNrk"}]}]},"vDGHaQt8x6K_":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","firstArg":"zO0oxtw_mcI5"}]}]}}}packageserver_current.log0000640000000000000000000011302415154624262033614 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/packageserver-659d778978-djtms2026-03-12T20:54:23.923281830Z E0312 20:54:23.923225 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:54:23.923673850Z E0312 20:54:23.923620 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:54:23.924240314Z E0312 20:54:23.924180 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:54:48.206073549Z E0312 20:54:48.205917 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:54:48.206154441Z E0312 20:54:48.206054 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:54:48.206154441Z E0312 20:54:48.206056 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:54:48.212454946Z E0312 20:54:48.212368 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:54:48.212454946Z E0312 20:54:48.212414 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:54:53.911891511Z E0312 20:54:53.908470 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:54:53.911891511Z E0312 20:54:53.908763 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:54:53.911891511Z E0312 20:54:53.908775 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:54:53.911891511Z E0312 20:54:53.908928 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:54:53.911891511Z E0312 20:54:53.908976 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:54:54.052455988Z E0312 20:54:54.052357 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:54:54.060169637Z E0312 20:54:54.060092 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:18.222125278Z E0312 20:55:18.221650 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:18.222125278Z E0312 20:55:18.221991 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:18.222220681Z E0312 20:55:18.222159 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:18.222220681Z E0312 20:55:18.222188 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:18.222262982Z E0312 20:55:18.222227 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:23.904658633Z E0312 20:55:23.904558 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:23.908533060Z E0312 20:55:23.908490 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:23.909177275Z E0312 20:55:23.909144 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:23.909617206Z E0312 20:55:23.909585 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:23.910749244Z E0312 20:55:23.910717 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:32.658745136Z W0312 20:55:32.658661 1 logging.go:55] [core] [Channel #4 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.109.92:50051: connect: connection refused" 2026-03-12T20:55:47.313281512Z W0312 20:55:47.313156 1 logging.go:55] [core] [Channel #2 SubChannel #5]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.103.230:50051: connect: connection refused" 2026-03-12T20:55:48.231655570Z E0312 20:55:48.231511 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:48.231745573Z E0312 20:55:48.231663 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:48.231771334Z E0312 20:55:48.231744 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:48.231960909Z E0312 20:55:48.231879 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:48.231960909Z E0312 20:55:48.231949 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:53.936878035Z E0312 20:55:53.936765 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:53.937101561Z E0312 20:55:53.937058 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:53.937101561Z E0312 20:55:53.937070 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:53.937306957Z E0312 20:55:53.937058 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:53.937361118Z E0312 20:55:53.937068 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:54.077024184Z E0312 20:55:54.076896 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:54.084228033Z E0312 20:55:54.084116 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:56.360462540Z time="2026-03-12T20:55:56Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace 2026-03-12T20:55:56.360462540Z time="2026-03-12T20:55:56Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.109.92:50051: connect: connection refused\"" source="{redhat-marketplace openshift-marketplace}" 2026-03-12T20:55:56.361205509Z time="2026-03-12T20:55:56Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace 2026-03-12T20:55:56.361314652Z time="2026-03-12T20:55:56Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.95.166:50051: connect: connection refused\"" source="{certified-operators openshift-marketplace}" 2026-03-12T20:55:57.513955601Z time="2026-03-12T20:55:57Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace 2026-03-12T20:55:57.514028723Z time="2026-03-12T20:55:57Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.103.230:50051: connect: connection refused\"" source="{community-operators openshift-marketplace}" 2026-03-12T20:55:59.313740188Z time="2026-03-12T20:55:59Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace 2026-03-12T20:55:59.313740188Z time="2026-03-12T20:55:59Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.109.92:50051: connect: connection refused\"" source="{redhat-marketplace openshift-marketplace}" 2026-03-12T20:56:00.311614426Z time="2026-03-12T20:56:00Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace 2026-03-12T20:56:00.311699118Z time="2026-03-12T20:56:00Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.95.166:50051: connect: connection refused\"" source="{certified-operators openshift-marketplace}" 2026-03-12T20:56:01.314158680Z time="2026-03-12T20:56:01Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace 2026-03-12T20:56:01.314158680Z time="2026-03-12T20:56:01Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.103.230:50051: connect: connection refused\"" source="{community-operators openshift-marketplace}" 2026-03-12T20:56:02.313662108Z time="2026-03-12T20:56:02Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace 2026-03-12T20:56:02.313662108Z time="2026-03-12T20:56:02Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.109.92:50051: connect: connection refused\"" source="{redhat-marketplace openshift-marketplace}" 2026-03-12T20:56:03.323130915Z time="2026-03-12T20:56:03Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace 2026-03-12T20:56:04.310611863Z time="2026-03-12T20:56:04Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace 2026-03-12T20:56:04.310754467Z time="2026-03-12T20:56:04Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.103.230:50051: connect: connection refused\"" source="{community-operators openshift-marketplace}" 2026-03-12T20:56:16.377303957Z time="2026-03-12T20:56:16Z" level=info msg="connecting to source" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-03-12T20:56:16.388957017Z W0312 20:56:16.388884 1 logging.go:55] [core] [Channel #8 SubChannel #9]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.208.153:50051: connect: connection refused" 2026-03-12T20:56:17.394417684Z W0312 20:56:17.394344 1 logging.go:55] [core] [Channel #8 SubChannel #9]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.208.153:50051: connect: connection refused" 2026-03-12T20:56:18.240777110Z E0312 20:56:18.240718 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:18.240838501Z E0312 20:56:18.240783 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:18.241039837Z E0312 20:56:18.241009 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:18.241134249Z E0312 20:56:18.241101 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:18.241200081Z E0312 20:56:18.241170 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:19.106675653Z time="2026-03-12T20:56:19Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-03-12T20:56:19.106762915Z time="2026-03-12T20:56:19Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.208.153:50051: connect: connection refused\"" source="{redhat-operators openshift-marketplace}" 2026-03-12T20:56:20.106506349Z time="2026-03-12T20:56:20Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-03-12T20:56:20.106577001Z time="2026-03-12T20:56:20Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.208.153:50051: connect: connection refused\"" source="{redhat-operators openshift-marketplace}" 2026-03-12T20:56:23.911061236Z E0312 20:56:23.910974 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:23.912085672Z E0312 20:56:23.911650 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:23.912161664Z E0312 20:56:23.912127 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:23.912598694Z E0312 20:56:23.912547 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:23.912975344Z E0312 20:56:23.912943 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:38.844726460Z W0312 20:56:38.844620 1 logging.go:55] [core] [Channel #8 SubChannel #9]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.208.153:50051: i/o timeout" 2026-03-12T20:56:39.164011313Z time="2026-03-12T20:56:39Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-03-12T20:56:39.164011313Z time="2026-03-12T20:56:39Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.208.153:50051: i/o timeout\"" source="{redhat-operators openshift-marketplace}" 2026-03-12T20:56:40.165040089Z time="2026-03-12T20:56:40Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-03-12T20:56:40.165040089Z time="2026-03-12T20:56:40Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.208.153:50051: i/o timeout\"" source="{redhat-operators openshift-marketplace}" 2026-03-12T20:56:40.950357544Z W0312 20:56:40.950256 1 logging.go:55] [core] [Channel #8 SubChannel #9]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.170.255:50051: connect: connection refused" 2026-03-12T20:56:45.284749890Z W0312 20:56:45.284676 1 logging.go:55] [core] [Channel #8 SubChannel #9]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.170.255:50051: connect: connection refused" 2026-03-12T20:56:48.250958426Z E0312 20:56:48.250688 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:48.251264613Z E0312 20:56:48.251180 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:48.251925470Z E0312 20:56:48.251553 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:48.257757093Z E0312 20:56:48.257698 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:48.258192994Z E0312 20:56:48.258123 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:52.189989620Z W0312 20:56:52.189929 1 logging.go:55] [core] [Channel #8 SubChannel #9]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.170.255:50051: connect: connection refused" 2026-03-12T20:56:53.472203209Z time="2026-03-12T20:56:53Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-03-12T20:56:53.472333952Z time="2026-03-12T20:56:53Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.170.255:50051: connect: connection refused\"" source="{redhat-operators openshift-marketplace}" 2026-03-12T20:56:53.892878713Z E0312 20:56:53.890432 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.892878713Z E0312 20:56:53.890678 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.892878713Z E0312 20:56:53.890824 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.892878713Z E0312 20:56:53.890974 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.892878713Z E0312 20:56:53.891125 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:54.083921694Z E0312 20:56:54.083636 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:54.092566007Z E0312 20:56:54.091239 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:18.268469228Z E0312 20:57:18.268359 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:18.268564720Z E0312 20:57:18.268521 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:18.268671753Z E0312 20:57:18.268607 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:18.269003281Z E0312 20:57:18.268925 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:18.269003281Z E0312 20:57:18.268975 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" package-server-manager_current.log0000640000000000000000000003307115154624262036757 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-854648ff6d-cdcc82026-03-12T20:50:44.357412015Z 2026-03-12T20:50:44Z INFO setup starting manager 2026-03-12T20:50:44.357920860Z 2026-03-12T20:50:44Z INFO controller-runtime.metrics Starting metrics server 2026-03-12T20:50:44.358139337Z 2026-03-12T20:50:44Z INFO controller-runtime.metrics Serving metrics server {"bindAddress": ":9090", "secure": false} 2026-03-12T20:50:44.358402484Z 2026-03-12T20:50:44Z INFO starting server {"name": "pprof", "addr": "[::]:6060"} 2026-03-12T20:50:44.358479146Z 2026-03-12T20:50:44Z INFO starting server {"name": "health probe", "addr": "[::]:8080"} 2026-03-12T20:50:44.361752142Z I0312 20:50:44.361429 1 leaderelection.go:254] attempting to acquire leader lease openshift-operator-lifecycle-manager/packageserver-controller-lock... 2026-03-12T20:50:44.756550258Z I0312 20:50:44.754312 1 leaderelection.go:268] successfully acquired lease openshift-operator-lifecycle-manager/packageserver-controller-lock 2026-03-12T20:50:44.793409947Z 2026-03-12T20:50:44Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1alpha1.ClusterServiceVersion"} 2026-03-12T20:50:44.793409947Z 2026-03-12T20:50:44Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1.Infrastructure"} 2026-03-12T20:50:44.793409947Z 2026-03-12T20:50:44Z INFO Starting Controller {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion"} 2026-03-12T20:50:44.794135718Z 2026-03-12T20:50:44Z DEBUG events package-server-manager-854648ff6d-cdcc8_077afe5b-0492-42eb-9246-7b3d88fb5e19 became leader {"type": "Normal", "object": {"kind":"Lease","namespace":"openshift-operator-lifecycle-manager","name":"packageserver-controller-lock","uid":"f90dc61d-074c-4250-9cc3-60cc2e010fd6","apiVersion":"coordination.k8s.io/v1","resourceVersion":"8911"}, "reason": "LeaderElection"} 2026-03-12T20:50:44.929900415Z 2026-03-12T20:50:44Z INFO controllers.packageserver requeueing the packageserver deployment after encountering infrastructure event {"infrastructure": "cluster"} 2026-03-12T20:50:44.934430937Z 2026-03-12T20:50:44Z INFO Starting workers {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "worker count": 1} 2026-03-12T20:50:44.936447645Z 2026-03-12T20:50:44Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-12T20:50:44.936481326Z 2026-03-12T20:50:44Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T20:50:45.249938525Z 2026-03-12T20:50:45Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T20:50:45.249938525Z 2026-03-12T20:50:45Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-12T20:50:45.398455801Z 2026-03-12T20:50:45Z INFO controllers.packageserver attempting to create the packageserver csv 2026-03-12T20:50:45.409959094Z 2026-03-12T20:50:45Z INFO controllers.packageserver updating csv spec 2026-03-12T20:50:45.438006467Z 2026-03-12T20:50:45Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "created"} 2026-03-12T20:50:45.438006467Z 2026-03-12T20:50:45Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T20:50:45.443075385Z 2026-03-12T20:50:45Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-12T20:50:45.443075385Z 2026-03-12T20:50:45Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T20:50:45.444379653Z 2026-03-12T20:50:45Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T20:50:45.444397283Z 2026-03-12T20:50:45Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-12T20:50:45.473224768Z 2026-03-12T20:50:45Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-12T20:50:45.473293130Z 2026-03-12T20:50:45Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T20:50:45.473379063Z 2026-03-12T20:50:45Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-12T20:50:45.473401583Z 2026-03-12T20:50:45Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T20:50:45.473492737Z 2026-03-12T20:50:45Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T20:50:45.473536528Z 2026-03-12T20:50:45Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-12T20:50:45.532759645Z 2026-03-12T20:50:45Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-12T20:50:45.532759645Z 2026-03-12T20:50:45Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T20:50:45.532797336Z 2026-03-12T20:50:45Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-12T20:50:45.532797336Z 2026-03-12T20:50:45Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T20:50:45.534050182Z 2026-03-12T20:50:45Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T20:50:45.534122775Z 2026-03-12T20:50:45Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-12T20:50:45.561893300Z 2026-03-12T20:50:45Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-12T20:50:45.561893300Z 2026-03-12T20:50:45Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T20:50:45.570320554Z 2026-03-12T20:50:45Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-12T20:50:45.570320554Z 2026-03-12T20:50:45Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T20:50:45.570320554Z 2026-03-12T20:50:45Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T20:50:45.570320554Z 2026-03-12T20:50:45Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-12T20:50:45.602943620Z 2026-03-12T20:50:45Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-12T20:50:45.602943620Z 2026-03-12T20:50:45Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T20:50:45.633231028Z 2026-03-12T20:50:45Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-12T20:50:45.633231028Z 2026-03-12T20:50:45Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T20:50:45.633280870Z 2026-03-12T20:50:45Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T20:50:45.633280870Z 2026-03-12T20:50:45Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-12T20:50:45.649409177Z 2026-03-12T20:50:45Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-12T20:50:45.649966404Z 2026-03-12T20:50:45Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T20:50:45.869717216Z 2026-03-12T20:50:45Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-12T20:50:45.869717216Z 2026-03-12T20:50:45Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T20:50:45.869717216Z 2026-03-12T20:50:45Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T20:50:45.869717216Z 2026-03-12T20:50:45Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-12T20:50:45.893849695Z 2026-03-12T20:50:45Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-12T20:50:45.893849695Z 2026-03-12T20:50:45Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T20:50:45.983882515Z 2026-03-12T20:50:45Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-12T20:50:45.983882515Z 2026-03-12T20:50:45Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T20:50:45.983882515Z 2026-03-12T20:50:45Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T20:50:45.983882515Z 2026-03-12T20:50:45Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-12T20:50:45.994859484Z 2026-03-12T20:50:45Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-12T20:50:45.994859484Z 2026-03-12T20:50:45Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-12T20:52:18.836068122Z E0312 20:52:18.835951 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-03-12T20:53:18.839752585Z E0312 20:53:18.839622 1 leaderelection.go:436] error retrieving resource lock openshift-operator-lifecycle-manager/packageserver-controller-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io packageserver-controller-lock) 2026-03-12T20:54:52.848664996Z E0312 20:54:52.848573 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path kube-rbac-proxy_current.log0000640000000000000000000000160415154624262035457 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-854648ff6d-cdcc82026-03-12T20:50:24.470316934Z W0312 20:50:24.468141 1 deprecated.go:66] 2026-03-12T20:50:24.470316934Z ==== Removed Flag Warning ====================== 2026-03-12T20:50:24.470316934Z 2026-03-12T20:50:24.470316934Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-03-12T20:50:24.470316934Z 2026-03-12T20:50:24.470316934Z =============================================== 2026-03-12T20:50:24.470316934Z 2026-03-12T20:50:24.470801188Z I0312 20:50:24.470771 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-03-12T20:50:24.472267971Z I0312 20:50:24.472213 1 kube-rbac-proxy.go:347] Reading certificate files 2026-03-12T20:50:24.473554168Z I0312 20:50:24.472540 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:8443 2026-03-12T20:50:24.473554168Z I0312 20:50:24.473291 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:8443 olm-operator_current.log0000640000000000000000000007662115154624262033377 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/olm-operator-d64cfc9db-q9hnk2026-03-12T20:50:42.395790547Z {"level":"info","ts":"2026-03-12T20:50:42Z","msg":"Starting EventSource","controller":"clusteroperator","controllerGroup":"config.openshift.io","controllerKind":"ClusterOperator","source":"kind source: *v1.ClusterOperator"} 2026-03-12T20:50:42.395869920Z {"level":"info","ts":"2026-03-12T20:50:42Z","msg":"Starting EventSource","controller":"clusteroperator","controllerGroup":"config.openshift.io","controllerKind":"ClusterOperator","source":"kind source: *v1alpha1.ClusterServiceVersion"} 2026-03-12T20:50:42.395950723Z {"level":"info","ts":"2026-03-12T20:50:42Z","msg":"Starting EventSource","controller":"clusteroperator","controllerGroup":"config.openshift.io","controllerKind":"ClusterOperator","source":"channel source: 0xc0004cff10"} 2026-03-12T20:50:42.395982884Z {"level":"info","ts":"2026-03-12T20:50:42Z","msg":"Starting Controller","controller":"clusteroperator","controllerGroup":"config.openshift.io","controllerKind":"ClusterOperator"} 2026-03-12T20:50:42.396093497Z {"level":"info","ts":"2026-03-12T20:50:42Z","msg":"Starting EventSource","controller":"clusterserviceversion","controllerGroup":"operators.coreos.com","controllerKind":"ClusterServiceVersion","source":"kind source: *v1.PartialObjectMetadata"} 2026-03-12T20:50:42.396170419Z {"level":"info","ts":"2026-03-12T20:50:42Z","msg":"Starting Controller","controller":"clusterserviceversion","controllerGroup":"operators.coreos.com","controllerKind":"ClusterServiceVersion"} 2026-03-12T20:50:42.406968991Z time="2026-03-12T20:50:42Z" level=info msg="ClusterOperator api is present" monitor=clusteroperator 2026-03-12T20:50:42.406968991Z time="2026-03-12T20:50:42Z" level=info msg="initializing clusteroperator resource(s) for [operator-lifecycle-manager-packageserver]" monitor=clusteroperator 2026-03-12T20:50:42.505717195Z {"level":"info","ts":"2026-03-12T20:50:42Z","msg":"Starting workers","controller":"operator-condition-generator","controllerGroup":"operators.coreos.com","controllerKind":"ClusterServiceVersion","worker count":1} 2026-03-12T20:50:42.506914460Z {"level":"info","ts":"2026-03-12T20:50:42Z","msg":"Starting workers","controller":"operatorcondition","controllerGroup":"operators.coreos.com","controllerKind":"OperatorCondition","worker count":1} 2026-03-12T20:50:42.507697472Z {"level":"info","ts":"2026-03-12T20:50:42Z","msg":"Starting workers","controller":"subscription","controllerGroup":"operators.coreos.com","controllerKind":"Subscription","worker count":1} 2026-03-12T20:50:42.510343559Z {"level":"info","ts":"2026-03-12T20:50:42Z","msg":"Starting workers","controller":"clusterserviceversion","controllerGroup":"operators.coreos.com","controllerKind":"ClusterServiceVersion","worker count":1} 2026-03-12T20:50:42.510429991Z {"level":"info","ts":"2026-03-12T20:50:42Z","msg":"Starting workers","controller":"operator","controllerGroup":"operators.coreos.com","controllerKind":"Operator","worker count":1} 2026-03-12T20:50:42.513473799Z {"level":"info","ts":"2026-03-12T20:50:42Z","msg":"Starting workers","controller":"clusteroperator","controllerGroup":"config.openshift.io","controllerKind":"ClusterOperator","worker count":1} 2026-03-12T20:50:43.037752372Z time="2026-03-12T20:50:43Z" level=info msg="creating cluster role: olm.og.olm-operators.admin-cJW3ICOZ9Osn3oPCTb13AVfBqppCRcP8pbQVFI owned by operator group: openshift-operator-lifecycle-manager/olm-operators" 2026-03-12T20:50:43.391645713Z time="2026-03-12T20:50:43Z" level=info msg="creating cluster role: olm.og.olm-operators.edit-bVVJnBj37eRvbI1svBxms0t0mdsKB26cTBQYrx owned by operator group: openshift-operator-lifecycle-manager/olm-operators" 2026-03-12T20:50:43.392308712Z time="2026-03-12T20:50:43Z" level=info msg="initialized cluster resource - operator-lifecycle-manager-packageserver" monitor=clusteroperator 2026-03-12T20:50:43.394272809Z time="2026-03-12T20:50:43Z" level=info msg="creating cluster role: olm.og.openshift-cluster-monitoring.admin-2SOrzhaSHllEqB6Becsc9Z2BniBuXZxdBrPmIq owned by operator group: openshift-monitoring/openshift-cluster-monitoring" 2026-03-12T20:50:43.468774849Z time="2026-03-12T20:50:43Z" level=info msg="creating cluster role: olm.og.olm-operators.view-8emcFsHayyHMQwkcnb9OTLvkbp0RUOKtlNrGsV owned by operator group: openshift-operator-lifecycle-manager/olm-operators" 2026-03-12T20:50:43.468774849Z time="2026-03-12T20:50:43Z" level=info msg="creating cluster role: olm.og.openshift-cluster-monitoring.edit-brB9auo7mhdQtycRdrSZm5XlKKbUjCe698FPlD owned by operator group: openshift-monitoring/openshift-cluster-monitoring" 2026-03-12T20:50:43.489082998Z time="2026-03-12T20:50:43Z" level=info msg="creating cluster role: olm.og.global-operators.admin-3gjDVezhGPF6RBtOOpjEpDpKqO39v3NK8r4hmc owned by operator group: openshift-operators/global-operators" 2026-03-12T20:50:43.489678776Z time="2026-03-12T20:50:43Z" level=info msg="creating cluster role: olm.og.openshift-cluster-monitoring.view-9QCGFNcofBHQ2DeWEf2qFa4NWqTOGskUedO4Tz owned by operator group: openshift-monitoring/openshift-cluster-monitoring" 2026-03-12T20:50:43.534088433Z time="2026-03-12T20:50:43Z" level=info msg="creating cluster role: olm.og.global-operators.edit-aFTmGKi9ZRUPJ2Dsphpd4NvovRSYjV3grbNdzM owned by operator group: openshift-operators/global-operators" 2026-03-12T20:50:43.544921617Z time="2026-03-12T20:50:43Z" level=info msg="creating cluster role: olm.og.global-operators.view-blsDheftOYMzHYeJbysGRVymD2Yx8MmrS7Yi0E owned by operator group: openshift-operators/global-operators" 2026-03-12T20:50:45.449859792Z {"level":"error","ts":"2026-03-12T20:50:45Z","msg":"Reconciler error","controller":"operatorcondition","controllerGroup":"operators.coreos.com","controllerKind":"OperatorCondition","OperatorCondition":{"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"},"namespace":"openshift-operator-lifecycle-manager","name":"packageserver","reconcileID":"63585a22-7d63-4097-baae-078054bff43f","error":"resource name may not be empty","stacktrace":"sigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).reconcileHandler\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:316\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).processNextWorkItem\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:263\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).Start.func2.2\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:224"} 2026-03-12T20:50:45.450101798Z time="2026-03-12T20:50:45Z" level=warning msg="error adding operatorgroup annotations" csv=packageserver error="Operation cannot be fulfilled on clusterserviceversions.operators.coreos.com \"packageserver\": the object has been modified; please apply your changes to the latest version and try again" id=SXCDv namespace=openshift-operator-lifecycle-manager opgroup=olm-operators phase= 2026-03-12T20:50:45.450101798Z time="2026-03-12T20:50:45Z" level=info msg="operatorgroup incorrect" csv=packageserver error="Operation cannot be fulfilled on clusterserviceversions.operators.coreos.com \"packageserver\": the object has been modified; please apply your changes to the latest version and try again" id=SXCDv namespace=openshift-operator-lifecycle-manager phase= 2026-03-12T20:50:45.450101798Z time="2026-03-12T20:50:45Z" level=info msg="not in operatorgroup namespace" csv=packageserver id=BCRY3 namespace=openshift-operator-lifecycle-manager phase= 2026-03-12T20:50:45.450167320Z E0312 20:50:45.450119 1 queueinformer_operator.go:312] "Unhandled Error" err="sync \"openshift-operator-lifecycle-manager/packageserver\" failed: Operation cannot be fulfilled on clusterserviceversions.operators.coreos.com \"packageserver\": the object has been modified; please apply your changes to the latest version and try again" logger="UnhandledError" 2026-03-12T20:50:45.467447231Z {"level":"error","ts":"2026-03-12T20:50:45Z","msg":"Reconciler error","controller":"operatorcondition","controllerGroup":"operators.coreos.com","controllerKind":"OperatorCondition","OperatorCondition":{"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"},"namespace":"openshift-operator-lifecycle-manager","name":"packageserver","reconcileID":"b1ddeebb-1c80-4620-8869-783fc9980ff8","error":"resource name may not be empty","stacktrace":"sigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).reconcileHandler\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:316\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).processNextWorkItem\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:263\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).Start.func2.2\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:224"} 2026-03-12T20:50:45.471080517Z time="2026-03-12T20:50:45Z" level=info msg="operatorgroup incorrect" csv=packageserver error="" id=RNB+H namespace=openshift-operator-lifecycle-manager phase= 2026-03-12T20:50:45.471080517Z time="2026-03-12T20:50:45Z" level=info msg="not in operatorgroup namespace" csv=packageserver id=8cBcI namespace=openshift-operator-lifecycle-manager phase= 2026-03-12T20:50:45.478648156Z time="2026-03-12T20:50:45Z" level=warning msg="error adding operatorgroup annotations" csv=packageserver error="Operation cannot be fulfilled on clusterserviceversions.operators.coreos.com \"packageserver\": the object has been modified; please apply your changes to the latest version and try again" namespace=openshift-operator-lifecycle-manager operatorGroup=olm-operators 2026-03-12T20:50:45.478648156Z time="2026-03-12T20:50:45Z" level=warning msg="failed to annotate CSVs in operatorgroup after group change" error="Operation cannot be fulfilled on clusterserviceversions.operators.coreos.com \"packageserver\": the object has been modified; please apply your changes to the latest version and try again" namespace=openshift-operator-lifecycle-manager operatorGroup=olm-operators 2026-03-12T20:50:45.478690677Z E0312 20:50:45.478655 1 queueinformer_operator.go:312] "Unhandled Error" err="sync \"openshift-operator-lifecycle-manager/olm-operators\" failed: Operation cannot be fulfilled on clusterserviceversions.operators.coreos.com \"packageserver\": the object has been modified; please apply your changes to the latest version and try again" logger="UnhandledError" 2026-03-12T20:50:45.481335304Z time="2026-03-12T20:50:45Z" level=warning msg="error adding operatorgroup annotations" csv=packageserver error="Operation cannot be fulfilled on clusterserviceversions.operators.coreos.com \"packageserver\": the object has been modified; please apply your changes to the latest version and try again" id=2Lq5o namespace=openshift-operator-lifecycle-manager opgroup=olm-operators phase= 2026-03-12T20:50:45.481335304Z time="2026-03-12T20:50:45Z" level=info msg="operatorgroup incorrect" csv=packageserver error="Operation cannot be fulfilled on clusterserviceversions.operators.coreos.com \"packageserver\": the object has been modified; please apply your changes to the latest version and try again" id=2Lq5o namespace=openshift-operator-lifecycle-manager phase= 2026-03-12T20:50:45.481335304Z time="2026-03-12T20:50:45Z" level=info msg="not in operatorgroup namespace" csv=packageserver id=kX/zp namespace=openshift-operator-lifecycle-manager phase= 2026-03-12T20:50:45.481335304Z E0312 20:50:45.481328 1 queueinformer_operator.go:312] "Unhandled Error" err="sync \"openshift-operator-lifecycle-manager/packageserver\" failed: Operation cannot be fulfilled on clusterserviceversions.operators.coreos.com \"packageserver\": the object has been modified; please apply your changes to the latest version and try again" logger="UnhandledError" 2026-03-12T20:50:45.496064151Z time="2026-03-12T20:50:45Z" level=info msg="scheduling ClusterServiceVersion for requirement verification" csv=packageserver id=sEC03 namespace=openshift-operator-lifecycle-manager phase= 2026-03-12T20:50:45.496109893Z I0312 20:50:45.496054 1 event.go:377] Event(v1.ObjectReference{Kind:"ClusterServiceVersion", Namespace:"openshift-operator-lifecycle-manager", Name:"packageserver", UID:"b67f3065-f76c-40ab-8793-e111ee546037", APIVersion:"operators.coreos.com/v1alpha1", ResourceVersion:"8962", FieldPath:""}): type: 'Normal' reason: 'RequirementsUnknown' requirements not yet checked 2026-03-12T20:50:45.570136119Z {"level":"error","ts":"2026-03-12T20:50:45Z","msg":"Reconciler error","controller":"operatorcondition","controllerGroup":"operators.coreos.com","controllerKind":"OperatorCondition","OperatorCondition":{"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"},"namespace":"openshift-operator-lifecycle-manager","name":"packageserver","reconcileID":"71e8be6b-0689-4d12-ba05-2ec3a8a7f1ac","error":"Deployment.apps \"packageserver\" not found","stacktrace":"sigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).reconcileHandler\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:316\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).processNextWorkItem\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:263\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).Start.func2.2\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:224"} 2026-03-12T20:50:45.570253472Z {"level":"error","ts":"2026-03-12T20:50:45Z","msg":"Reconciler error","controller":"operatorcondition","controllerGroup":"operators.coreos.com","controllerKind":"OperatorCondition","OperatorCondition":{"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"},"namespace":"openshift-operator-lifecycle-manager","name":"packageserver","reconcileID":"2b984b7f-daed-4bfd-a94e-f37c5cb35558","error":"Deployment.apps \"packageserver\" not found","stacktrace":"sigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).reconcileHandler\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:316\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).processNextWorkItem\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:263\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).Start.func2.2\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:224"} 2026-03-12T20:50:45.590514549Z {"level":"error","ts":"2026-03-12T20:50:45Z","msg":"Reconciler error","controller":"operatorcondition","controllerGroup":"operators.coreos.com","controllerKind":"OperatorCondition","OperatorCondition":{"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"},"namespace":"openshift-operator-lifecycle-manager","name":"packageserver","reconcileID":"2e91c500-19ec-48d2-86d7-b3479ce9fa7e","error":"Deployment.apps \"packageserver\" not found","stacktrace":"sigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).reconcileHandler\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:316\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).processNextWorkItem\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:263\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).Start.func2.2\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:224"} 2026-03-12T20:50:45.616873894Z time="2026-03-12T20:50:45Z" level=info msg="scheduling ClusterServiceVersion for install" csv=packageserver id=gueSz namespace=openshift-operator-lifecycle-manager phase=Pending 2026-03-12T20:50:45.617189103Z I0312 20:50:45.617130 1 event.go:377] Event(v1.ObjectReference{Kind:"ClusterServiceVersion", Namespace:"openshift-operator-lifecycle-manager", Name:"packageserver", UID:"b67f3065-f76c-40ab-8793-e111ee546037", APIVersion:"operators.coreos.com/v1alpha1", ResourceVersion:"8967", FieldPath:""}): type: 'Normal' reason: 'AllRequirementsMet' all requirements found, attempting install 2026-03-12T20:50:45.635655898Z time="2026-03-12T20:50:45Z" level=info msg="scheduling ClusterServiceVersion for install" csv=packageserver id=8wZTi namespace=openshift-operator-lifecycle-manager phase=Pending 2026-03-12T20:50:45.636602066Z I0312 20:50:45.636576 1 event.go:377] Event(v1.ObjectReference{Kind:"ClusterServiceVersion", Namespace:"openshift-operator-lifecycle-manager", Name:"packageserver", UID:"b67f3065-f76c-40ab-8793-e111ee546037", APIVersion:"operators.coreos.com/v1alpha1", ResourceVersion:"8967", FieldPath:""}): type: 'Normal' reason: 'AllRequirementsMet' all requirements found, attempting install 2026-03-12T20:50:45.641314812Z time="2026-03-12T20:50:45Z" level=info msg="error updating ClusterServiceVersion status: Operation cannot be fulfilled on clusterserviceversions.operators.coreos.com \"packageserver\": the object has been modified; please apply your changes to the latest version and try again" csv=packageserver id=AIcQ+ namespace=openshift-operator-lifecycle-manager phase=Pending 2026-03-12T20:50:45.641314812Z E0312 20:50:45.641190 1 queueinformer_operator.go:312] "Unhandled Error" err="sync \"openshift-operator-lifecycle-manager/packageserver\" failed: error updating ClusterServiceVersion status: Operation cannot be fulfilled on clusterserviceversions.operators.coreos.com \"packageserver\": the object has been modified; please apply your changes to the latest version and try again" logger="UnhandledError" 2026-03-12T20:50:45.671039375Z {"level":"error","ts":"2026-03-12T20:50:45Z","msg":"Reconciler error","controller":"operatorcondition","controllerGroup":"operators.coreos.com","controllerKind":"OperatorCondition","OperatorCondition":{"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"},"namespace":"openshift-operator-lifecycle-manager","name":"packageserver","reconcileID":"a5f257a9-1aa9-4380-a608-f5d32cece493","error":"Deployment.apps \"packageserver\" not found","stacktrace":"sigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).reconcileHandler\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:316\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).processNextWorkItem\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:263\nsigs.k8s.io/controller-runtime/pkg/internal/controller.(*Controller[...]).Start.func2.2\n\t/build/vendor/sigs.k8s.io/controller-runtime/pkg/internal/controller/controller.go:224"} 2026-03-12T20:50:45.792905318Z W0312 20:50:45.792834 1 warnings.go:70] spec.template.spec.nodeSelector[node-role.kubernetes.io/master]: use "node-role.kubernetes.io/control-plane" instead 2026-03-12T20:50:45.838830709Z I0312 20:50:45.838412 1 event.go:377] Event(v1.ObjectReference{Kind:"ClusterServiceVersion", Namespace:"openshift-operator-lifecycle-manager", Name:"packageserver", UID:"b67f3065-f76c-40ab-8793-e111ee546037", APIVersion:"operators.coreos.com/v1alpha1", ResourceVersion:"8972", FieldPath:""}): type: 'Normal' reason: 'InstallSucceeded' waiting for install components to report healthy 2026-03-12T20:50:45.875869553Z time="2026-03-12T20:50:45Z" level=warning msg="reusing existing cert packageserver-service-cert" 2026-03-12T20:50:45.926221884Z W0312 20:50:45.925905 1 warnings.go:70] spec.template.spec.nodeSelector[node-role.kubernetes.io/master]: use "node-role.kubernetes.io/control-plane" instead 2026-03-12T20:50:45.951859387Z I0312 20:50:45.951771 1 event.go:377] Event(v1.ObjectReference{Kind:"ClusterServiceVersion", Namespace:"openshift-operator-lifecycle-manager", Name:"packageserver", UID:"b67f3065-f76c-40ab-8793-e111ee546037", APIVersion:"operators.coreos.com/v1alpha1", ResourceVersion:"8972", FieldPath:""}): type: 'Normal' reason: 'InstallSucceeded' waiting for install components to report healthy 2026-03-12T20:50:45.959882690Z time="2026-03-12T20:50:45Z" level=info msg="error updating ClusterServiceVersion status: Operation cannot be fulfilled on clusterserviceversions.operators.coreos.com \"packageserver\": the object has been modified; please apply your changes to the latest version and try again" csv=packageserver id=p5sqx namespace=openshift-operator-lifecycle-manager phase=InstallReady 2026-03-12T20:50:45.959980202Z E0312 20:50:45.959929 1 queueinformer_operator.go:312] "Unhandled Error" err="sync \"openshift-operator-lifecycle-manager/packageserver\" failed: error updating ClusterServiceVersion status: Operation cannot be fulfilled on clusterserviceversions.operators.coreos.com \"packageserver\": the object has been modified; please apply your changes to the latest version and try again" logger="UnhandledError" 2026-03-12T20:50:45.968532900Z time="2026-03-12T20:50:45Z" level=info msg="install strategy successful" csv=packageserver id=Zy06k namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T20:50:45.968653614Z I0312 20:50:45.968613 1 event.go:377] Event(v1.ObjectReference{Kind:"ClusterServiceVersion", Namespace:"openshift-operator-lifecycle-manager", Name:"packageserver", UID:"b67f3065-f76c-40ab-8793-e111ee546037", APIVersion:"operators.coreos.com/v1alpha1", ResourceVersion:"9002", FieldPath:""}): type: 'Normal' reason: 'InstallWaiting' apiServices not installed 2026-03-12T20:50:46.070031524Z time="2026-03-12T20:50:46Z" level=info msg="install strategy successful" csv=packageserver id=LWCst namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T20:50:46.070070065Z I0312 20:50:46.070024 1 event.go:377] Event(v1.ObjectReference{Kind:"ClusterServiceVersion", Namespace:"openshift-operator-lifecycle-manager", Name:"packageserver", UID:"b67f3065-f76c-40ab-8793-e111ee546037", APIVersion:"operators.coreos.com/v1alpha1", ResourceVersion:"9002", FieldPath:""}): type: 'Normal' reason: 'InstallWaiting' apiServices not installed 2026-03-12T20:50:46.078678964Z time="2026-03-12T20:50:46Z" level=info msg="error updating ClusterServiceVersion status: Operation cannot be fulfilled on clusterserviceversions.operators.coreos.com \"packageserver\": the object has been modified; please apply your changes to the latest version and try again" csv=packageserver id=EvSN8 namespace=openshift-operator-lifecycle-manager phase=Installing 2026-03-12T20:50:46.078716705Z E0312 20:50:46.078702 1 queueinformer_operator.go:312] "Unhandled Error" err="sync \"openshift-operator-lifecycle-manager/packageserver\" failed: error updating ClusterServiceVersion status: Operation cannot be fulfilled on clusterserviceversions.operators.coreos.com \"packageserver\": the object has been modified; please apply your changes to the latest version and try again" logger="UnhandledError" 2026-03-12T20:50:46.190606060Z time="2026-03-12T20:50:46Z" level=info msg="install strategy successful" csv=packageserver id=9NbIE namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T20:50:46.321096333Z time="2026-03-12T20:50:46Z" level=info msg="install strategy successful" csv=packageserver id=4iEPv namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T20:50:46.330389443Z time="2026-03-12T20:50:46Z" level=info msg="install strategy successful" csv=packageserver id=k1kIm namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T20:50:46.337442797Z time="2026-03-12T20:50:46Z" level=info msg="install strategy successful" csv=packageserver id=UihVK namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T20:50:46.344179442Z time="2026-03-12T20:50:46Z" level=info msg="install strategy successful" csv=packageserver id=I5UDX namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T20:50:46.362183084Z time="2026-03-12T20:50:46Z" level=info msg="install strategy successful" csv=packageserver id=mwj1l namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T20:50:46.373958046Z time="2026-03-12T20:50:46Z" level=info msg="install strategy successful" csv=packageserver id=eIkjr namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T20:50:46.438537428Z time="2026-03-12T20:50:46Z" level=info msg="install strategy successful" csv=packageserver id=xBLYD namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T20:50:46.540486575Z time="2026-03-12T20:50:46Z" level=info msg="install strategy successful" csv=packageserver id=8MUnD namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T20:50:46.647772445Z time="2026-03-12T20:50:46Z" level=info msg="install strategy successful" csv=packageserver id=FJ8q8 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T20:50:46.739188915Z time="2026-03-12T20:50:46Z" level=info msg="install strategy successful" csv=packageserver id=EpqQX namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T20:50:46.851706558Z time="2026-03-12T20:50:46Z" level=info msg="install strategy successful" csv=packageserver id=yK5kH namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T20:50:46.954003254Z time="2026-03-12T20:50:46Z" level=info msg="install strategy successful" csv=packageserver id=rnzSr namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T20:50:47.052929703Z time="2026-03-12T20:50:47Z" level=info msg="install strategy successful" csv=packageserver id=Cq91p namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T20:50:47.152450069Z time="2026-03-12T20:50:47Z" level=info msg="install strategy successful" csv=packageserver id=GPRcj namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T20:50:47.252698795Z time="2026-03-12T20:50:47Z" level=info msg="install strategy successful" csv=packageserver id=gM0OG namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T20:50:47.354031443Z time="2026-03-12T20:50:47Z" level=info msg="install strategy successful" csv=packageserver id=N0d2r namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T20:50:47.454403273Z time="2026-03-12T20:50:47Z" level=info msg="install strategy successful" csv=packageserver id=neveW namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T20:50:47.553794185Z time="2026-03-12T20:50:47Z" level=info msg="install strategy successful" csv=packageserver id=lng/F namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T20:50:47.653668061Z time="2026-03-12T20:50:47Z" level=info msg="install strategy successful" csv=packageserver id=Snj3M namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T20:50:47.733130545Z time="2026-03-12T20:50:47Z" level=info msg="install strategy successful" csv=packageserver id=Af8jo namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T20:50:48.068289133Z time="2026-03-12T20:50:48Z" level=info msg="install strategy successful" csv=packageserver id=nymVk namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T20:51:48.436833609Z time="2026-03-12T20:51:48Z" level=info msg="install strategy successful" csv=packageserver id=TtNdY namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-12T20:52:48.440229108Z time="2026-03-12T20:52:48Z" level=error msg="status update error - failed to ensure initial clusteroperator name=operator-lifecycle-manager-packageserver - the server was unable to return a response in the time allotted, but may still be processing the request (get clusteroperators.config.openshift.io operator-lifecycle-manager-packageserver)" monitor=clusteroperator 2026-03-12T20:52:48.440578425Z time="2026-03-12T20:52:48Z" level=error msg="failed to get a client for operator deployment - the server was unable to return a response in the time allotted, but may still be processing the request (get operatorgroups.operators.coreos.com)" 2026-03-12T20:55:44.150752725Z time="2026-03-12T20:55:44Z" level=error msg="status update error - failed to ensure initial clusteroperator name=operator-lifecycle-manager-packageserver - the server was unable to return a response in the time allotted, but may still be processing the request (get clusteroperators.config.openshift.io operator-lifecycle-manager-packageserver)" monitor=clusteroperator 2026-03-12T20:55:53.251726642Z time="2026-03-12T20:55:53Z" level=warning msg="install timed out" csv=packageserver id=9JX+Z namespace=openshift-operator-lifecycle-manager phase=Installing 2026-03-12T20:55:53.251984068Z I0312 20:55:53.251916 1 event.go:377] Event(v1.ObjectReference{Kind:"ClusterServiceVersion", Namespace:"openshift-operator-lifecycle-manager", Name:"packageserver", UID:"b67f3065-f76c-40ab-8793-e111ee546037", APIVersion:"operators.coreos.com/v1alpha1", ResourceVersion:"9020", FieldPath:""}): type: 'Warning' reason: 'InstallCheckFailed' install timeout 2026-03-12T20:56:27.255570495Z time="2026-03-12T20:56:27Z" level=info msg="error updating ClusterServiceVersion status: Timeout: request did not complete within requested timeout - context deadline exceeded" csv=packageserver id=Hkm32 namespace=openshift-operator-lifecycle-manager phase=Installing 2026-03-12T20:56:27.255653177Z E0312 20:56:27.255631 1 queueinformer_operator.go:312] "Unhandled Error" err="sync \"openshift-operator-lifecycle-manager/packageserver\" failed: error updating ClusterServiceVersion status: Timeout: request did not complete within requested timeout - context deadline exceeded" logger="UnhandledError" 2026-03-12T20:56:27.275010334Z time="2026-03-12T20:56:27Z" level=warning msg="install timed out" csv=packageserver id=XM/6n namespace=openshift-operator-lifecycle-manager phase=Installing 2026-03-12T20:56:27.275010334Z I0312 20:56:27.274222 1 event.go:377] Event(v1.ObjectReference{Kind:"ClusterServiceVersion", Namespace:"openshift-operator-lifecycle-manager", Name:"packageserver", UID:"b67f3065-f76c-40ab-8793-e111ee546037", APIVersion:"operators.coreos.com/v1alpha1", ResourceVersion:"9020", FieldPath:""}): type: 'Warning' reason: 'InstallCheckFailed' install timeout 2026-03-12T20:57:01.277353502Z time="2026-03-12T20:57:01Z" level=info msg="error updating ClusterServiceVersion status: Timeout: request did not complete within requested timeout - context deadline exceeded" csv=packageserver id=Sujgf namespace=openshift-operator-lifecycle-manager phase=Installing 2026-03-12T20:57:01.277957067Z E0312 20:57:01.277920 1 queueinformer_operator.go:312] "Unhandled Error" err="sync \"openshift-operator-lifecycle-manager/packageserver\" failed: error updating ClusterServiceVersion status: Timeout: request did not complete within requested timeout - context deadline exceeded" logger="UnhandledError" 2026-03-12T20:57:01.290633559Z time="2026-03-12T20:57:01Z" level=warning msg="install timed out" csv=packageserver id=FjTYo namespace=openshift-operator-lifecycle-manager phase=Installing 2026-03-12T20:57:01.290988008Z I0312 20:57:01.290949 1 event.go:377] Event(v1.ObjectReference{Kind:"ClusterServiceVersion", Namespace:"openshift-operator-lifecycle-manager", Name:"packageserver", UID:"b67f3065-f76c-40ab-8793-e111ee546037", APIVersion:"operators.coreos.com/v1alpha1", ResourceVersion:"9020", FieldPath:""}): type: 'Warning' reason: 'InstallCheckFailed' install timeout catalog-operator_current.log0000640000000000000000000005651215154624262035020 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/catalog-operator-7d9c49f57b-tpvl42026-03-12T20:56:23.097121927Z time="2026-03-12T20:56:23Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-gxjmz current-pod.namespace=openshift-marketplace id=kYVGH 2026-03-12T20:56:23.097121927Z time="2026-03-12T20:56:23Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-gxjmz current-pod.namespace=openshift-marketplace id=kYVGH 2026-03-12T20:56:23.097121927Z time="2026-03-12T20:56:23Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=kYVGH 2026-03-12T20:56:23.097121927Z time="2026-03-12T20:56:23Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=kYVGH 2026-03-12T20:56:38.145038046Z time="2026-03-12T20:56:38Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=ZuhKP 2026-03-12T20:56:38.145038046Z time="2026-03-12T20:56:38Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=ZuhKP 2026-03-12T20:56:38.154167761Z time="2026-03-12T20:56:38Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=ZuhKP 2026-03-12T20:56:38.154375206Z time="2026-03-12T20:56:38Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-gxjmz current-pod.namespace=openshift-marketplace id=ZuhKP 2026-03-12T20:56:38.154375206Z time="2026-03-12T20:56:38Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-gxjmz current-pod.namespace=openshift-marketplace id=ZuhKP 2026-03-12T20:56:38.154375206Z time="2026-03-12T20:56:38Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=ZuhKP 2026-03-12T20:56:38.154375206Z time="2026-03-12T20:56:38Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=ZuhKP 2026-03-12T20:56:38.154375206Z time="2026-03-12T20:56:38Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=ZuhKP 2026-03-12T20:56:38.178518271Z time="2026-03-12T20:56:38Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=ZuhKP 2026-03-12T20:56:38.178702686Z time="2026-03-12T20:56:38Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-gxjmz current-pod.namespace=openshift-marketplace id=ZuhKP 2026-03-12T20:56:38.178702686Z time="2026-03-12T20:56:38Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-gxjmz current-pod.namespace=openshift-marketplace id=ZuhKP 2026-03-12T20:56:38.178848889Z time="2026-03-12T20:56:38Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=ZuhKP 2026-03-12T20:56:38.178861119Z time="2026-03-12T20:56:38Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=ZuhKP 2026-03-12T20:56:38.197328326Z time="2026-03-12T20:56:38Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=y01ph 2026-03-12T20:56:38.197328326Z time="2026-03-12T20:56:38Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=y01ph 2026-03-12T20:56:38.206776948Z time="2026-03-12T20:56:38Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=y01ph 2026-03-12T20:56:38.206845750Z time="2026-03-12T20:56:38Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-gxjmz current-pod.namespace=openshift-marketplace id=y01ph 2026-03-12T20:56:38.206856800Z time="2026-03-12T20:56:38Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-gxjmz current-pod.namespace=openshift-marketplace id=y01ph 2026-03-12T20:56:38.206864730Z time="2026-03-12T20:56:38Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=y01ph 2026-03-12T20:56:38.206872980Z time="2026-03-12T20:56:38Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=y01ph 2026-03-12T20:56:38.206880510Z time="2026-03-12T20:56:38Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=y01ph 2026-03-12T20:56:38.219936853Z time="2026-03-12T20:56:38Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=y01ph 2026-03-12T20:56:38.219969194Z time="2026-03-12T20:56:38Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-gxjmz current-pod.namespace=openshift-marketplace id=y01ph 2026-03-12T20:56:38.219979724Z time="2026-03-12T20:56:38Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-gxjmz current-pod.namespace=openshift-marketplace id=y01ph 2026-03-12T20:56:38.220081266Z time="2026-03-12T20:56:38Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=y01ph 2026-03-12T20:56:38.220081266Z time="2026-03-12T20:56:38Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=y01ph 2026-03-12T20:56:39.097744309Z time="2026-03-12T20:56:39Z" level=info msg="state.Key.Namespace=openshift-marketplace state.Key.Name=redhat-operators state.State=TRANSIENT_FAILURE" 2026-03-12T20:56:39.097744309Z time="2026-03-12T20:56:39Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Qkuxv 2026-03-12T20:56:39.097744309Z time="2026-03-12T20:56:39Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Qkuxv 2026-03-12T20:56:39.105078850Z time="2026-03-12T20:56:39Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Qkuxv 2026-03-12T20:56:39.105241154Z time="2026-03-12T20:56:39Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-gxjmz current-pod.namespace=openshift-marketplace id=Qkuxv 2026-03-12T20:56:39.105241154Z time="2026-03-12T20:56:39Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-gxjmz current-pod.namespace=openshift-marketplace id=Qkuxv 2026-03-12T20:56:39.105241154Z time="2026-03-12T20:56:39Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=Qkuxv 2026-03-12T20:56:39.105241154Z time="2026-03-12T20:56:39Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Qkuxv 2026-03-12T20:56:39.105271645Z time="2026-03-12T20:56:39Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Qkuxv 2026-03-12T20:56:39.149850034Z time="2026-03-12T20:56:39Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Qkuxv 2026-03-12T20:56:39.150113220Z time="2026-03-12T20:56:39Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-gxjmz current-pod.namespace=openshift-marketplace id=Qkuxv 2026-03-12T20:56:39.150113220Z time="2026-03-12T20:56:39Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-gxjmz current-pod.namespace=openshift-marketplace id=Qkuxv 2026-03-12T20:56:39.150411778Z time="2026-03-12T20:56:39Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Qkuxv 2026-03-12T20:56:39.150411778Z time="2026-03-12T20:56:39Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Qkuxv 2026-03-12T20:56:39.164295480Z time="2026-03-12T20:56:39Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=PFX4s 2026-03-12T20:56:39.164295480Z time="2026-03-12T20:56:39Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=PFX4s 2026-03-12T20:56:39.551077099Z time="2026-03-12T20:56:39Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=PFX4s 2026-03-12T20:56:39.551242013Z time="2026-03-12T20:56:39Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-gxjmz current-pod.namespace=openshift-marketplace id=PFX4s 2026-03-12T20:56:39.551242013Z time="2026-03-12T20:56:39Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-gxjmz current-pod.namespace=openshift-marketplace id=PFX4s 2026-03-12T20:56:39.551288604Z time="2026-03-12T20:56:39Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=PFX4s 2026-03-12T20:56:39.551288604Z time="2026-03-12T20:56:39Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=PFX4s 2026-03-12T20:56:39.551306184Z time="2026-03-12T20:56:39Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=PFX4s 2026-03-12T20:56:40.149240319Z time="2026-03-12T20:56:40Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=PFX4s 2026-03-12T20:56:40.149370032Z time="2026-03-12T20:56:40Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-gxjmz current-pod.namespace=openshift-marketplace id=PFX4s 2026-03-12T20:56:40.149389733Z time="2026-03-12T20:56:40Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-gxjmz current-pod.namespace=openshift-marketplace id=PFX4s 2026-03-12T20:56:40.149566767Z time="2026-03-12T20:56:40Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=PFX4s 2026-03-12T20:56:40.149566767Z time="2026-03-12T20:56:40Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=PFX4s 2026-03-12T20:56:40.164763142Z time="2026-03-12T20:56:40Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Xq31R 2026-03-12T20:56:40.164763142Z time="2026-03-12T20:56:40Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Xq31R 2026-03-12T20:56:40.548913644Z time="2026-03-12T20:56:40Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Xq31R 2026-03-12T20:56:40.548913644Z time="2026-03-12T20:56:40Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-gxjmz current-pod.namespace=openshift-marketplace id=Xq31R 2026-03-12T20:56:40.548913644Z time="2026-03-12T20:56:40Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-gxjmz current-pod.namespace=openshift-marketplace id=Xq31R 2026-03-12T20:56:40.548913644Z time="2026-03-12T20:56:40Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=Xq31R 2026-03-12T20:56:40.548913644Z time="2026-03-12T20:56:40Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Xq31R 2026-03-12T20:56:40.548913644Z time="2026-03-12T20:56:40Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Xq31R 2026-03-12T20:56:41.148737997Z time="2026-03-12T20:56:41Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Xq31R 2026-03-12T20:56:41.148953952Z time="2026-03-12T20:56:41Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-gxjmz current-pod.namespace=openshift-marketplace id=Xq31R 2026-03-12T20:56:41.148953952Z time="2026-03-12T20:56:41Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-gxjmz current-pod.namespace=openshift-marketplace id=Xq31R 2026-03-12T20:56:41.149120876Z time="2026-03-12T20:56:41Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Xq31R 2026-03-12T20:56:41.149120876Z time="2026-03-12T20:56:41Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Xq31R 2026-03-12T20:56:53.359847369Z time="2026-03-12T20:56:53Z" level=info msg="state.Key.Namespace=openshift-marketplace state.Key.Name=redhat-operators state.State=READY" 2026-03-12T20:56:53.359979642Z time="2026-03-12T20:56:53Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Aq9ap 2026-03-12T20:56:53.360051883Z time="2026-03-12T20:56:53Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Aq9ap 2026-03-12T20:56:53.360460683Z time="2026-03-12T20:56:53Z" level=info msg="resolving sources" id=Z7VoQ namespace=openshift-marketplace 2026-03-12T20:56:53.360460683Z time="2026-03-12T20:56:53Z" level=info msg="checking if subscriptions need update" id=Z7VoQ namespace=openshift-marketplace 2026-03-12T20:56:53.381956524Z time="2026-03-12T20:56:53Z" level=info msg="No subscriptions were found in namespace openshift-marketplace" id=Z7VoQ namespace=openshift-marketplace 2026-03-12T20:56:53.403230848Z time="2026-03-12T20:56:53Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Aq9ap 2026-03-12T20:56:53.403230848Z time="2026-03-12T20:56:53Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-gxjmz current-pod.namespace=openshift-marketplace id=Aq9ap 2026-03-12T20:56:53.403230848Z time="2026-03-12T20:56:53Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-gxjmz current-pod.namespace=openshift-marketplace id=Aq9ap 2026-03-12T20:56:53.403230848Z time="2026-03-12T20:56:53Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=Aq9ap 2026-03-12T20:56:53.403289230Z time="2026-03-12T20:56:53Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Aq9ap 2026-03-12T20:56:53.403289230Z time="2026-03-12T20:56:53Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Aq9ap 2026-03-12T20:56:53.456231116Z time="2026-03-12T20:56:53Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Aq9ap 2026-03-12T20:56:53.456358359Z time="2026-03-12T20:56:53Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-gxjmz current-pod.namespace=openshift-marketplace id=Aq9ap 2026-03-12T20:56:53.456358359Z time="2026-03-12T20:56:53Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-gxjmz current-pod.namespace=openshift-marketplace id=Aq9ap 2026-03-12T20:56:53.456988924Z time="2026-03-12T20:56:53Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Aq9ap 2026-03-12T20:56:53.456988924Z time="2026-03-12T20:56:53Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=Aq9ap 2026-03-12T20:56:53.487059616Z time="2026-03-12T20:56:53Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=zTE08 2026-03-12T20:56:53.487059616Z time="2026-03-12T20:56:53Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=zTE08 2026-03-12T20:56:53.516178474Z time="2026-03-12T20:56:53Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=zTE08 2026-03-12T20:56:53.516291107Z time="2026-03-12T20:56:53Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-gxjmz current-pod.namespace=openshift-marketplace id=zTE08 2026-03-12T20:56:53.516291107Z time="2026-03-12T20:56:53Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-gxjmz current-pod.namespace=openshift-marketplace id=zTE08 2026-03-12T20:56:53.516302757Z time="2026-03-12T20:56:53Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=zTE08 2026-03-12T20:56:53.516310417Z time="2026-03-12T20:56:53Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=zTE08 2026-03-12T20:56:53.516318177Z time="2026-03-12T20:56:53Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=zTE08 2026-03-12T20:56:53.558876976Z time="2026-03-12T20:56:53Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=zTE08 2026-03-12T20:56:53.558876976Z time="2026-03-12T20:56:53Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-gxjmz current-pod.namespace=openshift-marketplace id=zTE08 2026-03-12T20:56:53.558876976Z time="2026-03-12T20:56:53Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-gxjmz current-pod.namespace=openshift-marketplace id=zTE08 2026-03-12T20:56:53.558876976Z time="2026-03-12T20:56:53Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=zTE08 2026-03-12T20:56:53.558876976Z time="2026-03-12T20:56:53Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=zTE08 config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-xh6r9/etcd-operator_current.log0000640000000000000000000001120615154624262031075 0ustar00000000000000002026-03-12T20:54:10.232587971Z I0312 20:54:10.232245 1 profiler.go:21] Starting profiling endpoint at http://127.0.0.1:6060/debug/pprof/ 2026-03-12T20:54:10.233682898Z I0312 20:54:10.233490 1 observer_polling.go:159] Starting file observer 2026-03-12T20:54:10.234545750Z I0312 20:54:10.234461 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-12T20:54:10.234962760Z I0312 20:54:10.234837 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-12T20:54:10.237621435Z I0312 20:54:10.237535 1 observer_polling.go:159] Starting file observer 2026-03-12T20:55:10.249280877Z W0312 20:55:10.249127 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods etcd-operator-5884b9cd56-xh6r9) 2026-03-12T20:55:10.249467072Z I0312 20:55:10.249427 1 builder.go:304] openshift-cluster-etcd-operator version 4.18.0-202602170912.p2.gb7e21f5.assembly.stream.el9-b7e21f5-b7e21f52fab30ac18bb890c61f724332f332b934 2026-03-12T20:55:33.554238316Z I0312 20:55:33.552360 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-12T20:55:33.554238316Z W0312 20:55:33.552388 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-12T20:55:33.554238316Z W0312 20:55:33.552393 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-12T20:55:33.554238316Z W0312 20:55:33.552417 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-12T20:55:33.554238316Z W0312 20:55:33.552421 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-12T20:55:33.554238316Z W0312 20:55:33.552424 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-12T20:55:33.554238316Z W0312 20:55:33.552429 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-12T20:55:33.570798147Z I0312 20:55:33.570189 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-12T20:55:33.570798147Z I0312 20:55:33.570231 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-12T20:55:33.570798147Z I0312 20:55:33.570268 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-12T20:55:33.570798147Z I0312 20:55:33.570283 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-12T20:55:33.570798147Z I0312 20:55:33.570298 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-12T20:55:33.570798147Z I0312 20:55:33.570303 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-12T20:55:33.571372192Z I0312 20:55:33.570933 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-12T20:55:33.571372192Z I0312 20:55:33.571014 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-12T20:55:33.571372192Z I0312 20:55:33.571184 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-12T20:55:33.671404581Z I0312 20:55:33.671283 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-12T20:55:33.671404581Z I0312 20:55:33.671360 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-12T20:55:33.671509914Z I0312 20:55:33.671462 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-12T20:55:58.815142568Z I0312 20:55:58.811117 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-12T20:55:58.815142568Z I0312 20:55:58.811642 1 leaderelection.go:254] attempting to acquire leader lease openshift-etcd-operator/openshift-cluster-etcd-operator-lock... config/pod/openshift-etcd-operator/logs/etcd-operator-5884b9cd56-xh6r9/etcd-operator_previous.log0000640000000000000000000004321315154624262031272 0ustar00000000000000002026-03-12T20:51:05.338431160Z I0312 20:51:05.338425 1 base_controller.go:123] Shutting down worker of MachineDeletionHooksController controller ... 2026-03-12T20:51:05.338476251Z I0312 20:51:05.338451 1 base_controller.go:113] All BootstrapTeardownController workers have been terminated 2026-03-12T20:51:05.338487792Z I0312 20:51:05.338474 1 base_controller.go:113] All MachineDeletionHooksController workers have been terminated 2026-03-12T20:51:05.338519652Z E0312 20:51:05.338368 1 base_controller.go:279] "Unhandled Error" err="EtcdCertSignerController reconciliation failed: could not get current etcd-all-bundles configmap Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/configmaps/etcd-all-bundles\": context canceled" 2026-03-12T20:51:05.338561473Z I0312 20:51:05.338399 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-12T20:51:05.338600124Z I0312 20:51:05.337926 1 base_controller.go:159] All StatusSyncer_etcd post start hooks have been terminated 2026-03-12T20:51:05.338634015Z I0312 20:51:05.338453 1 base_controller.go:181] Shutting down ClusterMemberController ... 2026-03-12T20:51:05.338688217Z I0312 20:51:05.338654 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-12T20:51:05.338700167Z I0312 20:51:05.338686 1 controller_manager.go:54] RevisionController controller terminated 2026-03-12T20:51:05.338744009Z E0312 20:51:05.338713 1 base_controller.go:279] "Unhandled Error" err="ScriptController reconciliation failed: \"configmap/etcd-pod\": Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/configmaps/etcd-scripts\": context canceled" 2026-03-12T20:51:05.338851282Z I0312 20:51:05.338505 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2026-03-12T20:51:05.338903633Z I0312 20:51:05.337927 1 base_controller.go:181] Shutting down MissingStaticPodController ... 2026-03-12T20:51:05.338952614Z I0312 20:51:05.338937 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-03-12T20:51:05.339076698Z I0312 20:51:05.339061 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-03-12T20:51:05.339264062Z I0312 20:51:05.339219 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-12T20:51:05.339264062Z I0312 20:51:05.339237 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-12T20:51:05.339264062Z I0312 20:51:05.339243 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-03-12T20:51:05.339278833Z I0312 20:51:05.339261 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-12T20:51:05.339289483Z I0312 20:51:05.339278 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-12T20:51:05.339321714Z I0312 20:51:05.339295 1 base_controller.go:181] Shutting down Installer ... 2026-03-12T20:51:05.339350495Z I0312 20:51:05.338982 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"42a63ddc-181d-4c32-b91b-8a01368e1034", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'ScriptControllerErrorUpdatingStatus' client rate limiter Wait returned an error: context canceled 2026-03-12T20:51:05.339404426Z I0312 20:51:05.338839 1 base_controller.go:113] All StatusSyncer_etcd workers have been terminated 2026-03-12T20:51:05.339453647Z I0312 20:51:05.339427 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-12T20:51:05.339453647Z I0312 20:51:05.339447 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-12T20:51:05.339533109Z I0312 20:51:05.339362 1 base_controller.go:181] Shutting down TargetConfigController ... 2026-03-12T20:51:05.339533109Z I0312 20:51:05.337905 1 base_controller.go:181] Shutting down DefragController ... 2026-03-12T20:51:05.339545410Z I0312 20:51:05.339531 1 base_controller.go:113] All DefragController workers have been terminated 2026-03-12T20:51:05.339582921Z E0312 20:51:05.339554 1 base_controller.go:279] "Unhandled Error" err="etcd-StaticPodState reconciliation failed: unable to ApplyStatus for operator using fieldManager \"etcd-StaticPodState\": client rate limiter Wait returned an error: context canceled" 2026-03-12T20:51:05.339625302Z I0312 20:51:05.339600 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-03-12T20:51:05.339625302Z I0312 20:51:05.339615 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-12T20:51:05.339625302Z I0312 20:51:05.339621 1 base_controller.go:113] All Installer workers have been terminated 2026-03-12T20:51:05.339638312Z I0312 20:51:05.339627 1 controller_manager.go:54] Installer controller terminated 2026-03-12T20:51:05.339651292Z I0312 20:51:05.339643 1 base_controller.go:181] Shutting down etcd-Node ... 2026-03-12T20:51:05.340260019Z I0312 20:51:05.339660 1 base_controller.go:181] Shutting down etcd ... 2026-03-12T20:51:05.340260019Z I0312 20:51:05.339694 1 base_controller.go:123] Shutting down worker of etcd-Node controller ... 2026-03-12T20:51:05.340260019Z I0312 20:51:05.339704 1 base_controller.go:113] All etcd-Node workers have been terminated 2026-03-12T20:51:05.340260019Z I0312 20:51:05.339709 1 controller_manager.go:54] etcd-Node controller terminated 2026-03-12T20:51:05.340260019Z I0312 20:51:05.339721 1 base_controller.go:123] Shutting down worker of etcd controller ... 2026-03-12T20:51:05.340260019Z I0312 20:51:05.339731 1 base_controller.go:113] All etcd workers have been terminated 2026-03-12T20:51:05.340260019Z I0312 20:51:05.339747 1 base_controller.go:181] Shutting down EtcdEndpointsController ... 2026-03-12T20:51:05.340260019Z I0312 20:51:05.339758 1 base_controller.go:123] Shutting down worker of EtcdEndpointsController controller ... 2026-03-12T20:51:05.340260019Z I0312 20:51:05.339771 1 base_controller.go:113] All EtcdEndpointsController workers have been terminated 2026-03-12T20:51:05.340260019Z I0312 20:51:05.339786 1 base_controller.go:181] Shutting down GuardController ... 2026-03-12T20:51:05.340260019Z I0312 20:51:05.339800 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-03-12T20:51:05.340260019Z I0312 20:51:05.339832 1 base_controller.go:113] All GuardController workers have been terminated 2026-03-12T20:51:05.340260019Z I0312 20:51:05.339832 1 base_controller.go:123] Shutting down worker of EtcdCertSignerController controller ... 2026-03-12T20:51:05.340260019Z I0312 20:51:05.339838 1 controller_manager.go:54] GuardController controller terminated 2026-03-12T20:51:05.340260019Z I0312 20:51:05.339854 1 base_controller.go:113] All EtcdCertSignerController workers have been terminated 2026-03-12T20:51:05.340260019Z I0312 20:51:05.339868 1 base_controller.go:123] Shutting down worker of ScriptController controller ... 2026-03-12T20:51:05.340260019Z I0312 20:51:05.339869 1 base_controller.go:123] Shutting down worker of etcd-InstallerState controller ... 2026-03-12T20:51:05.340260019Z I0312 20:51:05.339878 1 base_controller.go:113] All ScriptController workers have been terminated 2026-03-12T20:51:05.340260019Z I0312 20:51:05.339882 1 base_controller.go:113] All etcd-InstallerState workers have been terminated 2026-03-12T20:51:05.340260019Z I0312 20:51:05.339888 1 controller_manager.go:54] etcd-InstallerState controller terminated 2026-03-12T20:51:05.340260019Z E0312 20:51:05.340074 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: [\"manifests/installer-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/serviceaccounts/installer-sa\": context canceled, \"manifests/installer-cluster-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"BackingResourceController-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-12T20:51:05.340421393Z E0312 20:51:05.340383 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-12T20:51:05.341170312Z I0312 20:51:05.341070 1 base_controller.go:123] Shutting down worker of etcd-StaticPodState controller ... 2026-03-12T20:51:05.341170312Z I0312 20:51:05.341111 1 base_controller.go:113] All etcd-StaticPodState workers have been terminated 2026-03-12T20:51:05.341170312Z I0312 20:51:05.341124 1 controller_manager.go:54] etcd-StaticPodState controller terminated 2026-03-12T20:51:05.341272075Z I0312 20:51:05.341248 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-03-12T20:51:05.341272075Z I0312 20:51:05.341265 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-03-12T20:51:05.341291325Z I0312 20:51:05.341270 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-12T20:51:05.341330836Z I0312 20:51:05.341309 1 envvarcontroller.go:252] Shutting down EnvVarController 2026-03-12T20:51:05.341584274Z I0312 20:51:05.341415 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-12T20:51:05.341584274Z I0312 20:51:05.341434 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-12T20:51:05.341584274Z I0312 20:51:05.341444 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-12T20:51:05.341603044Z I0312 20:51:05.341593 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-12T20:51:05.341659606Z I0312 20:51:05.341610 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-12T20:51:05.341659606Z I0312 20:51:05.341632 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-12T20:51:05.342258971Z I0312 20:51:05.341954 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-1358834466/tls.crt::/tmp/serving-cert-1358834466/tls.key" 2026-03-12T20:51:05.342258971Z I0312 20:51:05.342010 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-12T20:51:05.342258971Z I0312 20:51:05.342016 1 builder.go:335] server exited 2026-03-12T20:51:05.342258971Z I0312 20:51:05.342032 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-12T20:51:05.342258971Z I0312 20:51:05.342041 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-12T20:51:05.344533141Z E0312 20:51:05.344435 1 base_controller.go:279] "Unhandled Error" err="EtcdStaticResources-StaticResources reconciliation failed: [\"etcd/svc.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/services/etcd\": context canceled, \"etcd/sm.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/minimal-sm.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/prometheus-role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/prometheus-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/backups-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/backups-cr.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/backups-crb.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"EtcdStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-12T20:51:05.345744293Z I0312 20:51:05.345710 1 base_controller.go:123] Shutting down worker of EtcdStaticResources-StaticResources controller ... 2026-03-12T20:51:05.345765004Z I0312 20:51:05.345744 1 base_controller.go:113] All EtcdStaticResources-StaticResources workers have been terminated 2026-03-12T20:51:06.442325743Z I0312 20:51:06.442268 1 etcdcli_pool.go:70] creating a new cached client 2026-03-12T20:51:08.326721423Z I0312 20:51:08.326662 1 etcdcli_pool.go:70] creating a new cached client 2026-03-12T20:51:10.181215485Z I0312 20:51:10.181158 1 observer_polling.go:120] Observed file "/var/run/secrets/etcd-client/tls.crt" has been modified (old="", new="9942e8abe3604563c519a9c154e78683fef7817fe1dcd4b6a0cc650c05fa3cee") 2026-03-12T20:51:10.181215485Z I0312 20:51:10.181191 1 cmd.go:173] exiting because "/var/run/secrets/etcd-client/tls.crt" changed 2026-03-12T20:51:10.181264636Z I0312 20:51:10.181233 1 observer_polling.go:120] Observed file "/var/run/secrets/etcd-client/tls.key" has been modified (old="", new="36e33cb70ecf45aef86d50a97b4888b0b9c2e57cb5aa61096ce01befb1ddf8c9") 2026-03-12T20:51:10.181264636Z I0312 20:51:10.181239 1 cmd.go:173] exiting because "/var/run/secrets/etcd-client/tls.key" changed 2026-03-12T20:51:10.181302137Z I0312 20:51:10.181285 1 observer_polling.go:111] Observed file "/var/run/configmaps/etcd-ca/ca-bundle.crt" has been created (hash="f22c8c30ed1507dda4c878082e31179650b72865b495ddb1d946a8ba85288539") 2026-03-12T20:51:10.181302137Z I0312 20:51:10.181294 1 cmd.go:173] exiting because "/var/run/configmaps/etcd-ca/ca-bundle.crt" changed 2026-03-12T20:51:10.181350829Z I0312 20:51:10.181333 1 observer_polling.go:111] Observed file "/var/run/configmaps/etcd-service-ca/service-ca.crt" has been created (hash="bf90b60155b2ed548bba87becbd59c97ad767401eea1162d562bb5a4e77f8fc0") 2026-03-12T20:51:10.181350829Z I0312 20:51:10.181341 1 cmd.go:173] exiting because "/var/run/configmaps/etcd-service-ca/service-ca.crt" changed 2026-03-12T20:51:10.181409910Z I0312 20:51:10.181393 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="6ce75da73c7fa947ae7252515a4eeb03d3e2e8133304dd8d28fa1cc1d4c8190e") 2026-03-12T20:51:10.181409910Z I0312 20:51:10.181404 1 cmd.go:173] exiting because "/var/run/secrets/serving-cert/tls.crt" changed 2026-03-12T20:51:10.181456891Z I0312 20:51:10.181442 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="73935dea200aadfc1d214d58e43bcddf12e55088125f92565c86c8702556ce46") 2026-03-12T20:51:10.181456891Z I0312 20:51:10.181449 1 cmd.go:173] exiting because "/var/run/secrets/serving-cert/tls.key" changed 2026-03-12T20:51:10.340307220Z I0312 20:51:10.337738 1 observer_polling.go:162] Shutting down file observer 2026-03-12T20:51:21.443252736Z W0312 20:51:21.443154 1 etcdcli_pool.go:73] could not create a new cached client after 1 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-12T20:51:23.328133417Z W0312 20:51:23.328049 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2026-03-12T20:51:23.329607406Z E0312 20:51:23.329579 1 base_controller.go:279] "Unhandled Error" err="ClusterMemberRemovalController reconciliation failed: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries" 2026-03-12T20:51:23.330911540Z I0312 20:51:23.330878 1 base_controller.go:123] Shutting down worker of ClusterMemberRemovalController controller ... 2026-03-12T20:51:23.330930180Z I0312 20:51:23.330923 1 base_controller.go:113] All ClusterMemberRemovalController workers have been terminated 2026-03-12T20:51:25.444278040Z I0312 20:51:25.444218 1 etcdcli_pool.go:70] creating a new cached client 2026-03-12T20:51:39.343448205Z E0312 20:51:39.343361 1 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{etcd-operator.189c33372c6d01d9 openshift-etcd-operator 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Deployment,Namespace:openshift-etcd-operator,Name:etcd-operator,UID:42a63ddc-181d-4c32-b91b-8a01368e1034,APIVersion:apps/v1,ResourceVersion:,FieldPath:,},Reason:ScriptControllerErrorUpdatingStatus,Message:client rate limiter Wait returned an error: context canceled,Source:EventSource{Component:openshift-cluster-etcd-operator-script-controller-scriptcontroller,Host:,},FirstTimestamp:2026-03-12 20:51:05.338692057 +0000 UTC m=+75.255896008,LastTimestamp:2026-03-12 20:51:05.338692057 +0000 UTC m=+75.255896008,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:openshift-cluster-etcd-operator-script-controller-scriptcontroller,ReportingInstance:,}" 2026-03-12T20:51:39.343712642Z E0312 20:51:39.343672 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-12T20:51:39.343865956Z W0312 20:51:39.343838 1 leaderelection.go:84] leader election lost config/pod/openshift-etcd-operator/etcd-operator-5884b9cd56-xh6r9.json0000640000000000000000000001576315154624262024023 0ustar0000000000000000{"metadata":{"name":"etcd-operator-5884b9cd56-xh6r9","generateName":"etcd-operator-5884b9cd56-","namespace":"openshift-etcd-operator","uid":"5471994f-769e-4124-b7d0-01f5358fc18f","resourceVersion":"9144","creationTimestamp":"2026-03-12T20:48:18Z","labels":{"app":"etcd-operator","pod-template-hash":"5884b9cd56"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.16/23\"],\"mac_address\":\"0a:58:0a:80:00:10\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.16/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.16\"\n ],\n \"mac\": \"0a:58:0a:80:00:10\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"etcd-operator-5884b9cd56","uid":"ddfb0675-ab18-49ba-9d1c-63d40880ba94","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"etcd-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"etcd-operator-config","defaultMode":420}},{"name":"etcd-ca","configMap":{"name":"etcd-ca-bundle","defaultMode":420}},{"name":"etcd-service-ca","configMap":{"name":"etcd-service-ca-bundle","defaultMode":420}},{"name":"etcd-client","secret":{"secretName":"etcd-client","defaultMode":420}},{"name":"kube-api-access-f7rrv","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"etcd-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","command":["cluster-etcd-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml","--terminate-on-files=/var/run/secrets/serving-cert/tls.crt","--terminate-on-files=/var/run/secrets/serving-cert/tls.key","--terminate-on-files=/var/run/secrets/etcd-client/tls.crt","--terminate-on-files=/var/run/secrets/etcd-client/tls.key","--terminate-on-files=/var/run/configmaps/etcd-ca/ca-bundle.crt","--terminate-on-files=/var/run/configmaps/etcd-service-ca/service-ca.crt"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.34"},{"name":"OPENSHIFT_PROFILE","value":"web"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-f7rrv","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":60,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"etcd-operator","serviceAccount":"etcd-operator","nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:48Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:34Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:54:43Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:54:43Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:34Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.16","podIPs":[{"ip":"10.128.0.16"}],"startTime":"2026-03-12T20:49:34Z","containerStatuses":[{"name":"etcd-operator","state":{"running":{"startedAt":"2026-03-12T20:54:10Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-12T20:49:50Z","finishedAt":"2026-03-12T20:51:39Z","containerID":"cri-o://7ca674391c532a062d85de3aad380be9933e23e79819377498f98ef87ee56f1c"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","containerID":"cri-o://a84299e61aaa1595e3e07b0769d34f43309447a83e058608971fd9878868932d","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-f7rrv","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-apiserver-check-endpoints_current.log0000640000000000000000000003312115154624262033671 0ustar0000000000000000config/pod/openshift-apiserver/logs/apiserver-84fb785f4-kl52q2026-03-12T20:50:25.067756538Z W0312 20:50:25.067530 1 cmd.go:257] Using insecure, self-signed certificates 2026-03-12T20:50:25.068294613Z I0312 20:50:25.068262 1 crypto.go:601] Generating new CA for check-endpoints-signer@1773348625 cert, and key in /tmp/serving-cert-971930148/serving-signer.crt, /tmp/serving-cert-971930148/serving-signer.key 2026-03-12T20:50:25.551694019Z I0312 20:50:25.551614 1 observer_polling.go:159] Starting file observer 2026-03-12T20:50:25.565583012Z I0312 20:50:25.565522 1 builder.go:304] check-endpoints version 4.18.0-202602132343.p2.ge9bc909.assembly.stream.el9-e9bc909-e9bc90906c726823f154c78d3e568c98ff77b6a5 2026-03-12T20:50:25.566436237Z I0312 20:50:25.566397 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/tmp/serving-cert-971930148/tls.crt::/tmp/serving-cert-971930148/tls.key" 2026-03-12T20:50:26.017239408Z I0312 20:50:26.017184 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-03-12T20:50:26.018570907Z I0312 20:50:26.018540 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-03-12T20:50:26.018570907Z I0312 20:50:26.018557 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-03-12T20:50:26.018596387Z I0312 20:50:26.018576 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-03-12T20:50:26.018596387Z I0312 20:50:26.018581 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-03-12T20:50:26.024886259Z I0312 20:50:26.024764 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-12T20:50:26.024886259Z W0312 20:50:26.024798 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-12T20:50:26.024886259Z W0312 20:50:26.024818 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-12T20:50:26.024886259Z W0312 20:50:26.024824 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-12T20:50:26.024886259Z W0312 20:50:26.024828 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-12T20:50:26.024886259Z W0312 20:50:26.024832 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-12T20:50:26.024886259Z W0312 20:50:26.024835 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-12T20:50:26.025060484Z I0312 20:50:26.025018 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-03-12T20:50:26.028571496Z I0312 20:50:26.028518 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-12T20:50:26.028605697Z I0312 20:50:26.028570 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-12T20:50:26.028644578Z I0312 20:50:26.028614 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-12T20:50:26.028644578Z I0312 20:50:26.028633 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-12T20:50:26.028669779Z I0312 20:50:26.028650 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-12T20:50:26.028669779Z I0312 20:50:26.028661 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-12T20:50:26.028791173Z I0312 20:50:26.028768 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-12T20:50:26.028791173Z I0312 20:50:26.028779 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-12T20:50:26.029109732Z I0312 20:50:26.029041 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/tmp/serving-cert-971930148/tls.crt::/tmp/serving-cert-971930148/tls.key" 2026-03-12T20:50:26.029124642Z I0312 20:50:26.029100 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-971930148/tls.crt::/tmp/serving-cert-971930148/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1773348625\" (2026-03-12 20:50:24 +0000 UTC to 2026-04-11 20:50:25 +0000 UTC (now=2026-03-12 20:50:26.02906856 +0000 UTC))" 2026-03-12T20:50:26.029297727Z I0312 20:50:26.029247 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773348626\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773348625\" (2026-03-12 19:50:25 +0000 UTC to 2027-03-12 19:50:25 +0000 UTC (now=2026-03-12 20:50:26.029216855 +0000 UTC))" 2026-03-12T20:50:26.029420790Z I0312 20:50:26.029377 1 secure_serving.go:213] Serving securely on [::]:17698 2026-03-12T20:50:26.029432081Z I0312 20:50:26.029426 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-03-12T20:50:26.029460812Z I0312 20:50:26.029445 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-12T20:50:26.030953875Z I0312 20:50:26.030925 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:50:26.031608594Z I0312 20:50:26.031573 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:50:26.033852070Z I0312 20:50:26.032246 1 base_controller.go:76] Waiting for caches to sync for CheckEndpointsTimeToStart 2026-03-12T20:50:26.033852070Z I0312 20:50:26.032952 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:50:26.129501243Z I0312 20:50:26.129297 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-12T20:50:26.130160071Z I0312 20:50:26.129978 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-12 20:33:19 +0000 UTC to 2036-03-09 20:33:19 +0000 UTC (now=2026-03-12 20:50:26.129940935 +0000 UTC))" 2026-03-12T20:50:26.130160071Z I0312 20:50:26.130021 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-12 20:40:02 +0000 UTC to 2026-03-13 20:40:02 +0000 UTC (now=2026-03-12 20:50:26.130004397 +0000 UTC))" 2026-03-12T20:50:26.130160071Z I0312 20:50:26.130038 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-12 20:40:02 +0000 UTC to 2027-03-12 20:40:02 +0000 UTC (now=2026-03-12 20:50:26.130026908 +0000 UTC))" 2026-03-12T20:50:26.130160071Z I0312 20:50:26.130059 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-12 20:40:02 +0000 UTC to 2027-03-12 20:40:02 +0000 UTC (now=2026-03-12 20:50:26.130043938 +0000 UTC))" 2026-03-12T20:50:26.130160071Z I0312 20:50:26.130075 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-12 20:39:59 +0000 UTC to 2036-03-09 20:39:59 +0000 UTC (now=2026-03-12 20:50:26.130065019 +0000 UTC))" 2026-03-12T20:50:26.130274715Z I0312 20:50:26.130247 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-971930148/tls.crt::/tmp/serving-cert-971930148/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1773348625\" (2026-03-12 20:50:24 +0000 UTC to 2026-04-11 20:50:25 +0000 UTC (now=2026-03-12 20:50:26.130231763 +0000 UTC))" 2026-03-12T20:50:26.130431540Z I0312 20:50:26.130409 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773348626\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773348625\" (2026-03-12 19:50:25 +0000 UTC to 2027-03-12 19:50:25 +0000 UTC (now=2026-03-12 20:50:26.130393968 +0000 UTC))" 2026-03-12T20:50:26.130527713Z I0312 20:50:26.129130 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-12T20:50:26.130681807Z I0312 20:50:26.130659 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-12T20:50:26.130979746Z I0312 20:50:26.130955 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-12 20:33:19 +0000 UTC to 2036-03-09 20:33:19 +0000 UTC (now=2026-03-12 20:50:26.130939304 +0000 UTC))" 2026-03-12T20:50:26.131023287Z I0312 20:50:26.131002 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-12 20:40:02 +0000 UTC to 2026-03-13 20:40:02 +0000 UTC (now=2026-03-12 20:50:26.130969195 +0000 UTC))" 2026-03-12T20:50:26.131045837Z I0312 20:50:26.131031 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-12 20:40:02 +0000 UTC to 2027-03-12 20:40:02 +0000 UTC (now=2026-03-12 20:50:26.131013887 +0000 UTC))" 2026-03-12T20:50:26.131074028Z I0312 20:50:26.131054 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-12 20:40:02 +0000 UTC to 2027-03-12 20:40:02 +0000 UTC (now=2026-03-12 20:50:26.131039507 +0000 UTC))" 2026-03-12T20:50:26.131087209Z I0312 20:50:26.131081 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-12 20:39:59 +0000 UTC to 2036-03-09 20:39:59 +0000 UTC (now=2026-03-12 20:50:26.131064398 +0000 UTC))" 2026-03-12T20:50:26.131118139Z I0312 20:50:26.131099 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-12 20:39:59 +0000 UTC to 2026-03-13 20:39:59 +0000 UTC (now=2026-03-12 20:50:26.131087679 +0000 UTC))" 2026-03-12T20:50:26.131277844Z I0312 20:50:26.131257 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-971930148/tls.crt::/tmp/serving-cert-971930148/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1773348625\" (2026-03-12 20:50:24 +0000 UTC to 2026-04-11 20:50:25 +0000 UTC (now=2026-03-12 20:50:26.131242443 +0000 UTC))" 2026-03-12T20:50:26.131417858Z I0312 20:50:26.131398 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773348626\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773348625\" (2026-03-12 19:50:25 +0000 UTC to 2027-03-12 19:50:25 +0000 UTC (now=2026-03-12 20:50:26.131385107 +0000 UTC))" 2026-03-12T20:50:26.364458346Z I0312 20:50:26.364372 1 reflector.go:368] Caches populated for *v1.CustomResourceDefinition from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:50:26.432623521Z I0312 20:50:26.432564 1 base_controller.go:82] Caches are synced for CheckEndpointsTimeToStart 2026-03-12T20:50:26.432705344Z I0312 20:50:26.432692 1 base_controller.go:119] Starting #1 worker of CheckEndpointsTimeToStart controller ... config/pod/openshift-apiserver/logs/apiserver-84fb785f4-kl52q/openshift-apiserver_current.log0000640000000000000000000011402415154624262030676 0ustar00000000000000002026-03-12T20:56:53.891509660Z E0312 20:56:53.891288 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.900533222Z E0312 20:56:53.899971 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.900533222Z E0312 20:56:53.900364 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.900533222Z E0312 20:56:53.900519 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.900698256Z E0312 20:56:53.900664 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.900932171Z E0312 20:56:53.900903 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.901119667Z E0312 20:56:53.901100 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.901284721Z E0312 20:56:53.901266 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.901425634Z E0312 20:56:53.901406 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.901556947Z E0312 20:56:53.901533 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.901702951Z E0312 20:56:53.901671 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.901726321Z E0312 20:56:53.901706 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.902192382Z E0312 20:56:53.902156 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.902382977Z E0312 20:56:53.902360 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.902531091Z E0312 20:56:53.902508 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.902568242Z E0312 20:56:53.902544 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.902710106Z E0312 20:56:53.902676 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.902763737Z E0312 20:56:53.902741 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.902844739Z E0312 20:56:53.902682 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.902915161Z E0312 20:56:53.902882 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.903036994Z E0312 20:56:53.903016 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.915908421Z E0312 20:56:53.915825 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.915908421Z E0312 20:56:53.915843 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.916168507Z E0312 20:56:53.916111 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.916255679Z E0312 20:56:53.916202 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.916918106Z E0312 20:56:53.916320 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.916918106Z E0312 20:56:53.916371 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.916918106Z E0312 20:56:53.916452 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.916918106Z E0312 20:56:53.916565 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.916918106Z E0312 20:56:53.916613 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.923019426Z E0312 20:56:53.922437 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.980136405Z E0312 20:56:53.979515 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.987794563Z E0312 20:56:53.987401 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:54.003019329Z E0312 20:56:54.000787 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:54.003019329Z E0312 20:56:54.001274 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:54.009226132Z E0312 20:56:54.009178 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:54.011835547Z E0312 20:56:54.009529 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:54.016375159Z E0312 20:56:54.014607 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:54.016375159Z E0312 20:56:54.014846 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:54.031523122Z E0312 20:56:54.025423 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:54.031523122Z E0312 20:56:54.025624 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:54.034695910Z E0312 20:56:54.034654 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:54.037841228Z E0312 20:56:54.035057 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:54.044707857Z E0312 20:56:54.044665 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:54.046040020Z E0312 20:56:54.046005 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:54.055910683Z E0312 20:56:54.055601 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:54.063903611Z E0312 20:56:54.060999 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:54.069844937Z E0312 20:56:54.069201 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:54.076891791Z E0312 20:56:54.076074 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:54.921949620Z E0312 20:56:54.921871 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:54.922099134Z E0312 20:56:54.922058 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:54.922295778Z E0312 20:56:54.922260 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:54.923026316Z E0312 20:56:54.922473 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:54.923026316Z E0312 20:56:54.922495 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:55.010097854Z E0312 20:56:55.008323 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:55.010097854Z E0312 20:56:55.008347 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:55.010097854Z E0312 20:56:55.008386 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:55.010097854Z E0312 20:56:55.008423 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:55.010097854Z E0312 20:56:55.008510 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:55.010097854Z E0312 20:56:55.008633 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:55.010097854Z E0312 20:56:55.008640 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:55.010097854Z E0312 20:56:55.008327 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:55.010097854Z E0312 20:56:55.008781 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:55.010097854Z E0312 20:56:55.008924 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:57.606495170Z I0312 20:56:57.606400 1 policy_source.go:224] refreshing policies 2026-03-12T20:56:58.607014773Z I0312 20:56:58.606946 1 policy_source.go:224] refreshing policies 2026-03-12T20:57:08.622643155Z I0312 20:57:08.622557 1 policy_source.go:224] refreshing policies 2026-03-12T20:57:08.646378090Z I0312 20:57:08.646229 1 policy_source.go:419] informer started for config.openshift.io/v1, Kind=Infrastructure 2026-03-12T20:57:08.648320408Z I0312 20:57:08.648276 1 reflector.go:368] Caches populated for config.openshift.io/v1, Resource=infrastructures from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:57:09.655971196Z I0312 20:57:09.655888 1 policy_source.go:224] refreshing policies 2026-03-12T20:57:13.753984522Z E0312 20:57:13.753905 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:13.754327290Z E0312 20:57:13.754252 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:13.754393982Z E0312 20:57:13.754353 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:13.754652568Z E0312 20:57:13.754598 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:13.754938035Z E0312 20:57:13.754888 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:13.790562794Z E0312 20:57:13.790498 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:13.790637976Z E0312 20:57:13.790592 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:13.791451195Z E0312 20:57:13.791037 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:13.791451195Z E0312 20:57:13.791106 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:13.791451195Z E0312 20:57:13.791404 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:13.843389657Z E0312 20:57:13.843281 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:13.843475969Z E0312 20:57:13.843403 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:13.843751936Z E0312 20:57:13.843689 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:13.843884089Z E0312 20:57:13.843831 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:13.843903859Z E0312 20:57:13.843891 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:14.201352314Z E0312 20:57:14.201240 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:14.201426345Z E0312 20:57:14.201363 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:14.201426345Z E0312 20:57:14.201377 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:14.201493727Z E0312 20:57:14.201441 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:14.201505827Z E0312 20:57:14.201487 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:14.970351817Z E0312 20:57:14.970241 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:14.970351817Z E0312 20:57:14.970278 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:14.970620324Z E0312 20:57:14.970549 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:14.970861190Z E0312 20:57:14.970747 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:14.970996363Z E0312 20:57:14.970563 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:14.990944955Z E0312 20:57:14.990859 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:14.990988276Z E0312 20:57:14.990952 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:14.991095438Z E0312 20:57:14.991034 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:14.991281173Z E0312 20:57:14.991249 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:14.991945170Z E0312 20:57:14.991414 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" openshift-apiserver-operator_current.log0000640000000000000000000001001315154624262040450 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-799b6db4d7-jwthf2026-03-12T20:54:44.608498400Z I0312 20:54:44.608342 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-12T20:54:44.608498400Z I0312 20:54:44.608455 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-12T20:54:44.612792305Z I0312 20:54:44.610986 1 observer_polling.go:159] Starting file observer 2026-03-12T20:55:23.335015484Z I0312 20:55:23.331783 1 builder.go:304] openshift-apiserver-operator version - 2026-03-12T20:55:33.575222428Z I0312 20:55:33.572328 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-12T20:55:33.575222428Z W0312 20:55:33.572365 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-12T20:55:33.575222428Z W0312 20:55:33.572371 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-12T20:55:33.575222428Z W0312 20:55:33.572374 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-12T20:55:33.575222428Z W0312 20:55:33.572378 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-12T20:55:33.575222428Z W0312 20:55:33.572381 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-12T20:55:33.575222428Z W0312 20:55:33.572384 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-12T20:55:33.592968379Z I0312 20:55:33.589434 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-12T20:55:33.592968379Z I0312 20:55:33.589607 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-12T20:55:33.592968379Z I0312 20:55:33.589655 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-12T20:55:33.592968379Z I0312 20:55:33.589718 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-12T20:55:33.592968379Z I0312 20:55:33.590002 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-12T20:55:33.592968379Z I0312 20:55:33.590156 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-12T20:55:33.592968379Z I0312 20:55:33.590174 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-12T20:55:33.592968379Z I0312 20:55:33.590204 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-12T20:55:33.592968379Z I0312 20:55:33.590217 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-12T20:55:33.690353153Z I0312 20:55:33.690232 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-12T20:55:33.690353153Z I0312 20:55:33.690293 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-12T20:55:33.690477976Z I0312 20:55:33.690423 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-12T20:55:58.814074932Z I0312 20:55:58.812291 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-12T20:55:58.814074932Z I0312 20:55:58.812614 1 leaderelection.go:254] attempting to acquire leader lease openshift-apiserver-operator/openshift-apiserver-operator-lock... openshift-apiserver-operator_previous.log0000640000000000000000000000221715154624262040651 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-799b6db4d7-jwthf2026-03-12T20:51:54.189124634Z I0312 20:51:54.188949 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-12T20:51:54.189353400Z I0312 20:51:54.189317 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-12T20:51:54.189912235Z I0312 20:51:54.189854 1 observer_polling.go:159] Starting file observer 2026-03-12T20:52:54.196900649Z W0312 20:52:54.196821 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods) 2026-03-12T20:52:54.197147275Z I0312 20:52:54.197122 1 builder.go:304] openshift-apiserver-operator version - 2026-03-12T20:53:24.405570432Z F0312 20:53:24.405483 1 cmd.go:182] failed checking apiserver connectivity: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-apiserver-operator/leases/openshift-apiserver-operator-lock": context deadline exceeded config/pod/openshift-apiserver-operator/openshift-apiserver-operator-799b6db4d7-jwthf.json0000640000000000000000000001640215154624262030373 0ustar0000000000000000{"metadata":{"name":"openshift-apiserver-operator-799b6db4d7-jwthf","generateName":"openshift-apiserver-operator-799b6db4d7-","namespace":"openshift-apiserver-operator","uid":"15ebfbd8-0782-431a-88a3-83af328498d2","resourceVersion":"9161","creationTimestamp":"2026-03-12T20:48:17Z","labels":{"app":"openshift-apiserver-operator","pod-template-hash":"799b6db4d7"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.7/23\"],\"mac_address\":\"0a:58:0a:80:00:07\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.7/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.7\"\n ],\n \"mac\": \"0a:58:0a:80:00:07\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-apiserver-operator-799b6db4d7","uid":"9cfaed67-b485-4765-944c-056715ba984e","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access-mbbc5","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab","command":["cluster-openshift-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.34"},{"name":"KUBE_APISERVER_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-mbbc5","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-apiserver-operator","serviceAccount":"openshift-apiserver-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c16,c10"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:48Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:34Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:55:15Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:55:15Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:34Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.7","podIPs":[{"ip":"10.128.0.7"}],"startTime":"2026-03-12T20:49:34Z","containerStatuses":[{"name":"openshift-apiserver-operator","state":{"running":{"startedAt":"2026-03-12T20:54:44Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0312 20:51:54.188949 1 cmd.go:253] Using service-serving-cert provided certificates\nI0312 20:51:54.189317 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0312 20:51:54.189854 1 observer_polling.go:159] Starting file observer\nW0312 20:52:54.196821 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods)\nI0312 20:52:54.197122 1 builder.go:304] openshift-apiserver-operator version -\nF0312 20:53:24.405483 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-apiserver-operator/leases/openshift-apiserver-operator-lock\": context deadline exceeded\n","startedAt":"2026-03-12T20:51:54Z","finishedAt":"2026-03-12T20:53:24Z","containerID":"cri-o://ac220be40864e46bcbfeebc937d699a58348f8eb40ed949885e1f1fa2e71ed44"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab","containerID":"cri-o://e30269190a498d005bfdfd571d5482a0e8b4091c328fc5801393ccfec9968c4e","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-mbbc5","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-scheduler-operator-container_current.log0000640000000000000000000001021515154624262042667 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-5c74bfc494-269gt2026-03-12T20:54:44.727603099Z I0312 20:54:44.727459 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-12T20:54:44.727603099Z I0312 20:54:44.727580 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-12T20:54:44.729043975Z I0312 20:54:44.729006 1 observer_polling.go:159] Starting file observer 2026-03-12T20:55:23.331701872Z I0312 20:55:23.331571 1 builder.go:304] openshift-cluster-kube-scheduler-operator version 4.18.0-202602132343.p2.gc7b5163.assembly.stream.el9-c7b5163-c7b51633b67e3e2860ca053930422f69e17bd40a 2026-03-12T20:55:33.553018895Z I0312 20:55:33.552218 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-12T20:55:33.553018895Z W0312 20:55:33.552254 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-12T20:55:33.553018895Z W0312 20:55:33.552259 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-12T20:55:33.553018895Z W0312 20:55:33.552266 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-12T20:55:33.553018895Z W0312 20:55:33.552270 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-12T20:55:33.553018895Z W0312 20:55:33.552273 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-12T20:55:33.553018895Z W0312 20:55:33.552276 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-12T20:55:33.567395063Z I0312 20:55:33.567306 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-12T20:55:33.567395063Z I0312 20:55:33.567348 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-12T20:55:33.567496425Z I0312 20:55:33.567408 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-12T20:55:33.567496425Z I0312 20:55:33.567463 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-12T20:55:33.567496425Z I0312 20:55:33.567484 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-12T20:55:33.567496425Z I0312 20:55:33.567491 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-12T20:55:33.568203693Z I0312 20:55:33.568167 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-12T20:55:33.568254544Z I0312 20:55:33.568194 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-12T20:55:33.568270935Z I0312 20:55:33.568166 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-12T20:55:33.667689689Z I0312 20:55:33.667608 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-12T20:55:33.667867894Z I0312 20:55:33.667632 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-12T20:55:33.667938985Z I0312 20:55:33.667665 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-12T20:55:58.815087397Z I0312 20:55:58.810739 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-12T20:55:58.815087397Z I0312 20:55:58.811081 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-scheduler-operator/openshift-cluster-kube-scheduler-operator-lock... kube-scheduler-operator-container_previous.log0000640000000000000000000004173715154624262043076 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-5c74bfc494-269gt2026-03-12T20:50:43.369928133Z I0312 20:50:43.367587 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"28410907-b2ae-4405-b309-0ffa5d69deab", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'PodCreated' Created Pod/installer-4-master-0 -n openshift-kube-scheduler because it was missing 2026-03-12T20:50:43.965489351Z I0312 20:50:43.965304 1 installer_controller.go:550] "master-0" is in transition to 4, but has not made progress because installer is not finished, but in Pending phase 2026-03-12T20:50:45.965884853Z I0312 20:50:45.963315 1 request.go:700] Waited for 1.078771499s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/serviceaccounts/installer-sa 2026-03-12T20:50:46.166862281Z I0312 20:50:46.165779 1 installer_controller.go:550] "master-0" is in transition to 4, but has not made progress because installer is not finished, but in Running phase 2026-03-12T20:50:47.164243130Z I0312 20:50:47.163091 1 request.go:700] Waited for 1.107748239s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller 2026-03-12T20:51:05.802593348Z I0312 20:51:05.802489 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="1dc9a7f9a6d420b51f39ded32e208026ac32da795278417b5ce9692ea9990782") 2026-03-12T20:51:05.802593348Z W0312 20:51:05.802552 1 builder.go:160] Restart triggered because of file /var/run/secrets/serving-cert/tls.crt was created 2026-03-12T20:51:05.802666240Z I0312 20:51:05.802618 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="da57b590cd6b0cd4d1dd69c4000ce42824b8ab114706430c0b02bb9c41939c1d") 2026-03-12T20:51:05.802858095Z I0312 20:51:05.802784 1 base_controller.go:181] Shutting down cluster-kube-scheduler-operator-UnsupportedConfigOverrides ... 2026-03-12T20:51:05.802858095Z I0312 20:51:05.802828 1 base_controller.go:181] Shutting down StatusSyncer_kube-scheduler ... 2026-03-12T20:51:05.802858095Z E0312 20:51:05.802791 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-scheduler-operator/leases/openshift-cluster-kube-scheduler-operator-lock?timeout=4m0s": context canceled, falling back to slow path 2026-03-12T20:51:05.802858095Z I0312 20:51:05.802844 1 base_controller.go:181] Shutting down PruneController ... 2026-03-12T20:51:05.802899816Z I0312 20:51:05.802854 1 base_controller.go:181] Shutting down kube-scheduler-Node ... 2026-03-12T20:51:05.802899816Z I0312 20:51:05.802863 1 base_controller.go:181] Shutting down kube-controller-manager-RemoveStaleConditions ... 2026-03-12T20:51:05.802955057Z I0312 20:51:05.802918 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-12T20:51:05.802975958Z I0312 20:51:05.802953 1 base_controller.go:181] Shutting down MissingStaticPodController ... 2026-03-12T20:51:05.802975958Z E0312 20:51:05.802965 1 leaderelection.go:436] error retrieving resource lock openshift-kube-scheduler-operator/openshift-cluster-kube-scheduler-operator-lock: client rate limiter Wait returned an error: context canceled 2026-03-12T20:51:05.803079620Z I0312 20:51:05.802990 1 leaderelection.go:297] failed to renew lease openshift-kube-scheduler-operator/openshift-cluster-kube-scheduler-operator-lock: timed out waiting for the condition 2026-03-12T20:51:05.803211654Z I0312 20:51:05.803161 1 base_controller.go:181] Shutting down Installer ... 2026-03-12T20:51:05.803325107Z I0312 20:51:05.803277 1 genericapiserver.go:691] "[graceful-termination] pre-shutdown hooks completed" name="PreShutdownHooksStopped" 2026-03-12T20:51:05.803433779Z I0312 20:51:05.803331 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2026-03-12T20:51:05.803468330Z I0312 20:51:05.803442 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-12T20:51:05.803865232Z E0312 20:51:05.803748 1 base_controller.go:279] "Unhandled Error" err="kube-scheduler-StaticPodState reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-scheduler-StaticPodState\": client rate limiter Wait returned an error: context canceled" 2026-03-12T20:51:05.803865232Z I0312 20:51:05.803781 1 base_controller.go:181] Shutting down GuardController ... 2026-03-12T20:51:05.803865232Z I0312 20:51:05.803790 1 base_controller.go:181] Shutting down kube-scheduler-InstallerState ... 2026-03-12T20:51:05.803865232Z E0312 20:51:05.803836 1 base_controller.go:279] "Unhandled Error" err="kube-scheduler-InstallerState reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": context canceled" 2026-03-12T20:51:05.803865232Z I0312 20:51:05.803850 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-03-12T20:51:05.803865232Z I0312 20:51:05.803856 1 base_controller.go:113] All GuardController workers have been terminated 2026-03-12T20:51:05.803909583Z I0312 20:51:05.803864 1 controller_manager.go:54] GuardController controller terminated 2026-03-12T20:51:05.803909583Z I0312 20:51:05.803877 1 base_controller.go:123] Shutting down worker of kube-scheduler-Node controller ... 2026-03-12T20:51:05.803909583Z I0312 20:51:05.803883 1 base_controller.go:113] All kube-scheduler-Node workers have been terminated 2026-03-12T20:51:05.803909583Z I0312 20:51:05.803887 1 controller_manager.go:54] kube-scheduler-Node controller terminated 2026-03-12T20:51:05.803909583Z I0312 20:51:05.803896 1 base_controller.go:123] Shutting down worker of StatusSyncer_kube-scheduler controller ... 2026-03-12T20:51:05.803909583Z I0312 20:51:05.803901 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-03-12T20:51:05.803935223Z I0312 20:51:05.803906 1 base_controller.go:113] All PruneController workers have been terminated 2026-03-12T20:51:05.803935223Z I0312 20:51:05.803911 1 controller_manager.go:54] PruneController controller terminated 2026-03-12T20:51:05.803935223Z I0312 20:51:05.803919 1 base_controller.go:181] Shutting down kube-scheduler ... 2026-03-12T20:51:05.803935223Z I0312 20:51:05.803928 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2026-03-12T20:51:05.804224151Z W0312 20:51:05.804143 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerDegraded"].reason is missing; this will eventually be fatal 2026-03-12T20:51:05.804224151Z W0312 20:51:05.804167 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2026-03-12T20:51:05.804224151Z W0312 20:51:05.804173 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-03-12T20:51:05.804313563Z E0312 20:51:05.804268 1 base_controller.go:279] "Unhandled Error" err="Installer reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-scheduler-Installer\": client rate limiter Wait returned an error: context canceled" 2026-03-12T20:51:05.804313563Z I0312 20:51:05.804288 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-12T20:51:05.804338574Z I0312 20:51:05.804311 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-03-12T20:51:05.804338574Z I0312 20:51:05.804331 1 base_controller.go:123] Shutting down worker of cluster-kube-scheduler-operator-UnsupportedConfigOverrides controller ... 2026-03-12T20:51:05.804369894Z I0312 20:51:05.804343 1 base_controller.go:113] All cluster-kube-scheduler-operator-UnsupportedConfigOverrides workers have been terminated 2026-03-12T20:51:05.804369894Z I0312 20:51:05.804357 1 controller_manager.go:54] cluster-kube-scheduler-operator-UnsupportedConfigOverrides controller terminated 2026-03-12T20:51:05.804369894Z I0312 20:51:05.802827 1 base_controller.go:181] Shutting down kube-scheduler-StaticPodState ... 2026-03-12T20:51:05.804392255Z I0312 20:51:05.802836 1 base_controller.go:159] All StatusSyncer_kube-scheduler post start hooks have been terminated 2026-03-12T20:51:05.804392255Z I0312 20:51:05.804381 1 base_controller.go:113] All StatusSyncer_kube-scheduler workers have been terminated 2026-03-12T20:51:05.804392255Z I0312 20:51:05.802973 1 base_controller.go:181] Shutting down TargetConfigController ... 2026-03-12T20:51:05.804414206Z I0312 20:51:05.802972 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-03-12T20:51:05.804414206Z I0312 20:51:05.804392 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-12T20:51:05.804414206Z I0312 20:51:05.804405 1 base_controller.go:123] Shutting down worker of MissingStaticPodController controller ... 2026-03-12T20:51:05.804435976Z I0312 20:51:05.804413 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-12T20:51:05.804435976Z I0312 20:51:05.804422 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-12T20:51:05.804435976Z I0312 20:51:05.804429 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-12T20:51:05.804457967Z I0312 20:51:05.804432 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-12T20:51:05.804457967Z I0312 20:51:05.804439 1 controller_manager.go:54] RevisionController controller terminated 2026-03-12T20:51:05.804457967Z I0312 20:51:05.804417 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-03-12T20:51:05.804457967Z I0312 20:51:05.804451 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-12T20:51:05.804479947Z I0312 20:51:05.804454 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-03-12T20:51:05.804479947Z I0312 20:51:05.804459 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-12T20:51:05.804479947Z I0312 20:51:05.804466 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-03-12T20:51:05.804479947Z I0312 20:51:05.804472 1 base_controller.go:123] Shutting down worker of kube-scheduler controller ... 2026-03-12T20:51:05.804501608Z I0312 20:51:05.804478 1 base_controller.go:181] Shutting down KubeControllerManagerStaticResources-StaticResources ... 2026-03-12T20:51:05.804501608Z I0312 20:51:05.804487 1 base_controller.go:113] All kube-scheduler workers have been terminated 2026-03-12T20:51:05.804673172Z I0312 20:51:05.804601 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-12T20:51:05.804673172Z I0312 20:51:05.804644 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-12T20:51:05.804700343Z I0312 20:51:05.804673 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-12T20:51:05.804845747Z E0312 20:51:05.804769 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: [\"manifests/installer-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/serviceaccounts/installer-sa\": context canceled, \"manifests/installer-cluster-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"BackingResourceController-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-12T20:51:05.804845747Z I0312 20:51:05.804798 1 base_controller.go:123] Shutting down worker of kube-scheduler-StaticPodState controller ... 2026-03-12T20:51:05.804845747Z I0312 20:51:05.804832 1 base_controller.go:113] All kube-scheduler-StaticPodState workers have been terminated 2026-03-12T20:51:05.804845747Z I0312 20:51:05.804838 1 controller_manager.go:54] kube-scheduler-StaticPodState controller terminated 2026-03-12T20:51:05.804885508Z I0312 20:51:05.804847 1 base_controller.go:123] Shutting down worker of kube-scheduler-InstallerState controller ... 2026-03-12T20:51:05.804885508Z I0312 20:51:05.804852 1 base_controller.go:113] All kube-scheduler-InstallerState workers have been terminated 2026-03-12T20:51:05.804885508Z I0312 20:51:05.804848 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-12T20:51:05.804981410Z I0312 20:51:05.804938 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-12T20:51:05.805004372Z I0312 20:51:05.804981 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-12T20:51:05.805023712Z I0312 20:51:05.804858 1 controller_manager.go:54] kube-scheduler-InstallerState controller terminated 2026-03-12T20:51:05.805042373Z I0312 20:51:05.805030 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-12T20:51:05.805061473Z I0312 20:51:05.805043 1 builder.go:335] server exited 2026-03-12T20:51:05.805209217Z I0312 20:51:05.805133 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-3637770309/tls.crt::/tmp/serving-cert-3637770309/tls.key" 2026-03-12T20:51:05.805398922Z I0312 20:51:05.805333 1 base_controller.go:123] Shutting down worker of kube-controller-manager-RemoveStaleConditions controller ... 2026-03-12T20:51:05.805398922Z I0312 20:51:05.805357 1 base_controller.go:113] All kube-controller-manager-RemoveStaleConditions workers have been terminated 2026-03-12T20:51:05.805398922Z I0312 20:51:05.805390 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-03-12T20:51:05.805430003Z I0312 20:51:05.805399 1 base_controller.go:113] All Installer workers have been terminated 2026-03-12T20:51:05.805430003Z I0312 20:51:05.805404 1 controller_manager.go:54] Installer controller terminated 2026-03-12T20:51:05.806013537Z E0312 20:51:05.805934 1 base_controller.go:279] "Unhandled Error" err="KubeControllerManagerStaticResources-StaticResources reconciliation failed: [\"assets/kube-scheduler/sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/serviceaccounts/openshift-kube-scheduler-sa\": context canceled, \"assets/kube-scheduler/localhost-recovery-client-crb.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/localhost-recovery-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"KubeControllerManagerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-12T20:51:05.806013537Z I0312 20:51:05.805965 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-03-12T20:51:05.806013537Z I0312 20:51:05.805974 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-03-12T20:51:05.806013537Z I0312 20:51:05.805982 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-12T20:51:05.807677911Z I0312 20:51:05.807630 1 base_controller.go:123] Shutting down worker of KubeControllerManagerStaticResources-StaticResources controller ... 2026-03-12T20:51:05.807677911Z I0312 20:51:05.807645 1 base_controller.go:113] All KubeControllerManagerStaticResources-StaticResources workers have been terminated 2026-03-12T20:51:05.808568815Z E0312 20:51:05.808515 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-12T20:51:05.809713405Z I0312 20:51:05.809671 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-12T20:51:05.809713405Z I0312 20:51:05.809690 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-12T20:51:10.805918285Z I0312 20:51:10.802456 1 observer_polling.go:162] Shutting down file observer 2026-03-12T20:51:39.812135101Z E0312 20:51:39.811968 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-12T20:51:39.812135101Z W0312 20:51:39.812016 1 leaderelection.go:84] leader election lost config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-5c74bfc494-269gt.json0000640000000000000000000001365715154624262031732 0ustar0000000000000000{"metadata":{"name":"openshift-kube-scheduler-operator-5c74bfc494-269gt","generateName":"openshift-kube-scheduler-operator-5c74bfc494-","namespace":"openshift-kube-scheduler-operator","uid":"4a67ecf3-823d-4948-a5cb-8bd1eb9f259c","resourceVersion":"9153","creationTimestamp":"2026-03-12T20:48:18Z","labels":{"app":"openshift-kube-scheduler-operator","pod-template-hash":"5c74bfc494"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.17/23\"],\"mac_address\":\"0a:58:0a:80:00:11\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.17/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.17\"\n ],\n \"mac\": \"0a:58:0a:80:00:11\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-kube-scheduler-operator-5c74bfc494","uid":"66a0a1e8-8de7-4f10-bcdd-75e3b9d31614","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-scheduler-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-kube-scheduler-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-scheduler-operator-container","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","command":["cluster-kube-scheduler-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-kube-scheduler-operator","serviceAccount":"openshift-kube-scheduler-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:48Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:34Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:54:45Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:54:45Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:34Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.17","podIPs":[{"ip":"10.128.0.17"}],"startTime":"2026-03-12T20:49:34Z","containerStatuses":[{"name":"kube-scheduler-operator-container","state":{"running":{"startedAt":"2026-03-12T20:54:44Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-12T20:49:50Z","finishedAt":"2026-03-12T20:51:40Z","containerID":"cri-o://e0a2c06e46bef70f1a83d73f16311ff0724aeeddd6bc3dab0e6a4952ddc0acb3"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","containerID":"cri-o://1d13c664a16a834bb594ce779624d3af44ce1b13763cae9c9fac074c11de4252","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-scheduler/logs/installer-4-master-0/installer_current.log0000640000000000000000000001471115154624262027173 0ustar00000000000000002026-03-12T20:50:45.539158410Z I0312 20:50:45.538914 1 cmd.go:95] &{ true {false} installer true map[cert-dir:0xc000890500 cert-secrets:0xc000890280 configmaps:0xc000615cc0 namespace:0xc000615ae0 optional-configmaps:0xc000615e00 optional-secrets:0xc000615d60 pod:0xc000615b80 pod-manifest-dir:0xc0008900a0 resource-dir:0xc000890000 revision:0xc000615a40 secrets:0xc000615c20 v:0xc000890f00] [0xc000890f00 0xc000615a40 0xc000615ae0 0xc000615b80 0xc000890000 0xc0008900a0 0xc000615cc0 0xc000615e00 0xc000615d60 0xc000615c20 0xc000890500 0xc000890280] [] map[cert-configmaps:0xc000890320 cert-dir:0xc000890500 cert-secrets:0xc000890280 configmaps:0xc000615cc0 help:0xc0008912c0 kubeconfig:0xc0006159a0 log-flush-frequency:0xc000890e60 namespace:0xc000615ae0 optional-cert-configmaps:0xc000890460 optional-cert-secrets:0xc0008903c0 optional-configmaps:0xc000615e00 optional-secrets:0xc000615d60 pod:0xc000615b80 pod-manifest-dir:0xc0008900a0 pod-manifests-lock-file:0xc0008901e0 resource-dir:0xc000890000 revision:0xc000615a40 secrets:0xc000615c20 timeout-duration:0xc000890140 v:0xc000890f00 vmodule:0xc000890fa0] [0xc0006159a0 0xc000615a40 0xc000615ae0 0xc000615b80 0xc000615c20 0xc000615cc0 0xc000615d60 0xc000615e00 0xc000890000 0xc0008900a0 0xc000890140 0xc0008901e0 0xc000890280 0xc000890320 0xc0008903c0 0xc000890460 0xc000890500 0xc000890e60 0xc000890f00 0xc000890fa0 0xc0008912c0] [0xc000890320 0xc000890500 0xc000890280 0xc000615cc0 0xc0008912c0 0xc0006159a0 0xc000890e60 0xc000615ae0 0xc000890460 0xc0008903c0 0xc000615e00 0xc000615d60 0xc000615b80 0xc0008900a0 0xc0008901e0 0xc000890000 0xc000615a40 0xc000615c20 0xc000890140 0xc000890f00 0xc000890fa0] map[104:0xc0008912c0 118:0xc000890f00] [] -1 0 0xc0006c89c0 true 0x223d9a0 []} 2026-03-12T20:50:45.539318386Z I0312 20:50:45.539161 1 cmd.go:96] (*installerpod.InstallOptions)(0xc0007cd520)({ 2026-03-12T20:50:45.539318386Z KubeConfig: (string) "", 2026-03-12T20:50:45.539318386Z KubeClient: (kubernetes.Interface) , 2026-03-12T20:50:45.539318386Z Revision: (string) (len=1) "4", 2026-03-12T20:50:45.539318386Z NodeName: (string) "", 2026-03-12T20:50:45.539318386Z Namespace: (string) (len=24) "openshift-kube-scheduler", 2026-03-12T20:50:45.539318386Z Clock: (clock.RealClock) { 2026-03-12T20:50:45.539318386Z }, 2026-03-12T20:50:45.539318386Z PodConfigMapNamePrefix: (string) (len=18) "kube-scheduler-pod", 2026-03-12T20:50:45.539318386Z SecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-12T20:50:45.539318386Z (string) (len=31) "localhost-recovery-client-token" 2026-03-12T20:50:45.539318386Z }, 2026-03-12T20:50:45.539318386Z OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-12T20:50:45.539318386Z (string) (len=12) "serving-cert" 2026-03-12T20:50:45.539318386Z }, 2026-03-12T20:50:45.539318386Z ConfigMapNamePrefixes: ([]string) (len=5 cap=8) { 2026-03-12T20:50:45.539318386Z (string) (len=18) "kube-scheduler-pod", 2026-03-12T20:50:45.539318386Z (string) (len=6) "config", 2026-03-12T20:50:45.539318386Z (string) (len=17) "serviceaccount-ca", 2026-03-12T20:50:45.539318386Z (string) (len=20) "scheduler-kubeconfig", 2026-03-12T20:50:45.539318386Z (string) (len=37) "kube-scheduler-cert-syncer-kubeconfig" 2026-03-12T20:50:45.539318386Z }, 2026-03-12T20:50:45.539318386Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-12T20:50:45.539318386Z (string) (len=16) "policy-configmap" 2026-03-12T20:50:45.539318386Z }, 2026-03-12T20:50:45.539318386Z CertSecretNames: ([]string) (len=1 cap=1) { 2026-03-12T20:50:45.539318386Z (string) (len=30) "kube-scheduler-client-cert-key" 2026-03-12T20:50:45.539318386Z }, 2026-03-12T20:50:45.539318386Z OptionalCertSecretNamePrefixes: ([]string) , 2026-03-12T20:50:45.539318386Z CertConfigMapNamePrefixes: ([]string) , 2026-03-12T20:50:45.539318386Z OptionalCertConfigMapNamePrefixes: ([]string) , 2026-03-12T20:50:45.539318386Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-scheduler-certs", 2026-03-12T20:50:45.539318386Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-12T20:50:45.539318386Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-12T20:50:45.539318386Z Timeout: (time.Duration) 2m0s, 2026-03-12T20:50:45.539318386Z StaticPodManifestsLockFile: (string) "", 2026-03-12T20:50:45.539318386Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-12T20:50:45.539318386Z KubeletVersion: (string) "" 2026-03-12T20:50:45.539318386Z }) 2026-03-12T20:50:45.541545529Z I0312 20:50:45.541486 1 cmd.go:413] Getting controller reference for node master-0 2026-03-12T20:50:45.555899675Z I0312 20:50:45.552521 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-12T20:50:45.555899675Z I0312 20:50:45.552579 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-12T20:50:45.555899675Z I0312 20:50:45.552591 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-12T20:50:45.558474730Z I0312 20:50:45.558350 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting 2026-03-12T20:51:09.563445948Z W0312 20:51:09.563350 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T20:51:29.562140618Z W0312 20:51:29.562013 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T20:51:49.562134584Z W0312 20:51:49.562040 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T20:52:03.564917445Z W0312 20:52:03.564733 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T20:52:03.564917445Z F0312 20:52:03.564784 1 cmd.go:109] timed out waiting for the condition config/pod/openshift-kube-scheduler/installer-4-master-0.json0000640000000000000000000001642615154624262022665 0ustar0000000000000000{"metadata":{"name":"installer-4-master-0","namespace":"openshift-kube-scheduler","uid":"954fe7f9-e138-49ab-ab8e-504b75914100","resourceVersion":"9133","creationTimestamp":"2026-03-12T20:50:43Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.49/23\"],\"mac_address\":\"0a:58:0a:80:00:31\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.49/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.49\"\n ],\n \"mac\": \"0a:58:0a:80:00:31\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-4","uid":"cad42b42-1de8-4973-ba0e-fc73cf6fa102"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","command":["cluster-kube-scheduler-operator","installer"],"args":["-v=2","--revision=4","--namespace=openshift-kube-scheduler","--pod=kube-scheduler-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-scheduler-pod","--configmaps=config","--configmaps=serviceaccount-ca","--optional-configmaps=policy-configmap","--configmaps=scheduler-kubeconfig","--configmaps=kube-scheduler-cert-syncer-kubeconfig","--optional-secrets=serving-cert","--secrets=localhost-recovery-client-token","--cert-dir=/etc/kubernetes/static-pod-resources/kube-scheduler-certs","--cert-secrets=kube-scheduler-client-cert-key"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"imagePullSecrets":[{"name":"installer-sa-dockercfg-dhrfh"}],"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:54:44Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:50:43Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:54:43Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:54:43Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:50:43Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.49","podIPs":[{"ip":"10.128.0.49"}],"startTime":"2026-03-12T20:50:43Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0312 20:50:45.541486 1 cmd.go:413] Getting controller reference for node master-0\nI0312 20:50:45.552521 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0312 20:50:45.552579 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0312 20:50:45.552591 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0312 20:50:45.558350 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\nW0312 20:51:09.563350 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nW0312 20:51:29.562013 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nW0312 20:51:49.562040 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nW0312 20:52:03.564733 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nF0312 20:52:03.564784 1 cmd.go:109] timed out waiting for the condition\n","startedAt":"2026-03-12T20:50:45Z","finishedAt":"2026-03-12T20:52:03Z","containerID":"cri-o://41e5296df7c3d4b1110f31058e02c84e5cd9852b203025b79d16be32d4b3de88"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","containerID":"cri-o://41e5296df7c3d4b1110f31058e02c84e5cd9852b203025b79d16be32d4b3de88","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}config/pod/kube-system/logs/bootstrap-kube-scheduler-master-0/kube-scheduler_current.log0000640000000000000000000005453515154624262030240 0ustar00000000000000002026-03-12T20:52:09.526737006Z weight: 1 2026-03-12T20:52:09.526737006Z - name: DefaultBinder 2026-03-12T20:52:09.526737006Z weight: 0 2026-03-12T20:52:09.526737006Z permit: {} 2026-03-12T20:52:09.526737006Z postBind: {} 2026-03-12T20:52:09.526737006Z postFilter: {} 2026-03-12T20:52:09.526737006Z preBind: {} 2026-03-12T20:52:09.526737006Z preEnqueue: {} 2026-03-12T20:52:09.526737006Z preFilter: {} 2026-03-12T20:52:09.526737006Z preScore: {} 2026-03-12T20:52:09.526737006Z queueSort: {} 2026-03-12T20:52:09.526737006Z reserve: {} 2026-03-12T20:52:09.526737006Z score: {} 2026-03-12T20:52:09.526737006Z schedulerName: default-scheduler 2026-03-12T20:52:09.526737006Z > 2026-03-12T20:52:09.529528952Z I0312 20:52:09.529457 1 server.go:172] "Starting Kubernetes Scheduler" version="v1.31.14" 2026-03-12T20:52:09.529528952Z I0312 20:52:09.529503 1 server.go:174] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" 2026-03-12T20:52:09.533174807Z I0312 20:52:09.533137 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-12T20:52:09.533259199Z I0312 20:52:09.533243 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-12T20:52:09.533583666Z I0312 20:52:09.533539 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" 2026-03-12T20:52:09.533707569Z I0312 20:52:09.533666 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" certDetail="\"localhost@1773348669\" [serving] validServingFor=[127.0.0.1,localhost,localhost] issuer=\"localhost-ca@1773348668\" (2026-03-12 19:51:08 +0000 UTC to 2027-03-12 19:51:08 +0000 UTC (now=2026-03-12 20:52:09.533576716 +0000 UTC))" 2026-03-12T20:52:09.534033878Z I0312 20:52:09.533953 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773348669\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773348669\" (2026-03-12 19:51:09 +0000 UTC to 2029-03-12 19:51:09 +0000 UTC (now=2026-03-12 20:52:09.533936316 +0000 UTC))" 2026-03-12T20:52:09.534049788Z I0312 20:52:09.534036 1 secure_serving.go:213] Serving securely on [::]:10259 2026-03-12T20:52:09.534092419Z I0312 20:52:09.534080 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-12T20:52:09.538317658Z I0312 20:52:09.538284 1 reflector.go:368] Caches populated for *v1.CSIDriver from k8s.io/client-go/informers/factory.go:160 2026-03-12T20:52:09.538403330Z I0312 20:52:09.538359 1 reflector.go:368] Caches populated for *v1.CSIStorageCapacity from k8s.io/client-go/informers/factory.go:160 2026-03-12T20:52:09.538647045Z I0312 20:52:09.538632 1 reflector.go:368] Caches populated for *v1.StorageClass from k8s.io/client-go/informers/factory.go:160 2026-03-12T20:52:09.538938192Z I0312 20:52:09.538904 1 reflector.go:368] Caches populated for *v1.StatefulSet from k8s.io/client-go/informers/factory.go:160 2026-03-12T20:52:09.539057525Z I0312 20:52:09.539043 1 reflector.go:368] Caches populated for *v1.PodDisruptionBudget from k8s.io/client-go/informers/factory.go:160 2026-03-12T20:52:09.540059498Z I0312 20:52:09.539933 1 reflector.go:368] Caches populated for *v1.CSINode from k8s.io/client-go/informers/factory.go:160 2026-03-12T20:52:09.540898307Z I0312 20:52:09.540860 1 reflector.go:368] Caches populated for *v1.Node from k8s.io/client-go/informers/factory.go:160 2026-03-12T20:52:09.540924979Z I0312 20:52:09.540893 1 reflector.go:368] Caches populated for *v1.ConfigMap from runtime/asm_amd64.s:1695 2026-03-12T20:52:09.542915915Z I0312 20:52:09.542862 1 reflector.go:368] Caches populated for *v1.ReplicationController from k8s.io/client-go/informers/factory.go:160 2026-03-12T20:52:09.543142100Z I0312 20:52:09.543108 1 node_tree.go:65] "Added node in listed group to NodeTree" node="master-0" zone="" 2026-03-12T20:52:09.548471835Z I0312 20:52:09.548451 1 reflector.go:368] Caches populated for *v1.VolumeAttachment from k8s.io/client-go/informers/factory.go:160 2026-03-12T20:52:09.548803123Z I0312 20:52:09.548789 1 reflector.go:368] Caches populated for *v1.PersistentVolume from k8s.io/client-go/informers/factory.go:160 2026-03-12T20:52:09.549104310Z I0312 20:52:09.549088 1 reflector.go:368] Caches populated for *v1.PersistentVolumeClaim from k8s.io/client-go/informers/factory.go:160 2026-03-12T20:52:09.553989734Z I0312 20:52:09.553944 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go/informers/factory.go:160 2026-03-12T20:52:09.556517784Z I0312 20:52:09.556477 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go/informers/factory.go:160 2026-03-12T20:52:09.558939410Z I0312 20:52:09.558480 1 reflector.go:368] Caches populated for *v1.ReplicaSet from k8s.io/client-go/informers/factory.go:160 2026-03-12T20:52:09.561102831Z I0312 20:52:09.561044 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go/informers/factory.go:160 2026-03-12T20:52:09.633628648Z I0312 20:52:09.633481 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-12T20:52:09.634172750Z I0312 20:52:09.634086 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-12 20:33:19 +0000 UTC to 2036-03-09 20:33:19 +0000 UTC (now=2026-03-12 20:52:09.634057638 +0000 UTC))" 2026-03-12T20:52:09.634172750Z I0312 20:52:09.634141 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-12 20:40:02 +0000 UTC to 2026-03-13 20:40:02 +0000 UTC (now=2026-03-12 20:52:09.634129709 +0000 UTC))" 2026-03-12T20:52:09.634201701Z I0312 20:52:09.634173 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-12 20:40:02 +0000 UTC to 2027-03-12 20:40:02 +0000 UTC (now=2026-03-12 20:52:09.63416298 +0000 UTC))" 2026-03-12T20:52:09.634219351Z I0312 20:52:09.634201 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-12 20:40:02 +0000 UTC to 2027-03-12 20:40:02 +0000 UTC (now=2026-03-12 20:52:09.634192141 +0000 UTC))" 2026-03-12T20:52:09.634270922Z I0312 20:52:09.634226 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-12 20:39:59 +0000 UTC to 2036-03-09 20:39:59 +0000 UTC (now=2026-03-12 20:52:09.634216161 +0000 UTC))" 2026-03-12T20:52:09.634563409Z I0312 20:52:09.634499 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" certDetail="\"localhost@1773348669\" [serving] validServingFor=[127.0.0.1,localhost,localhost] issuer=\"localhost-ca@1773348668\" (2026-03-12 19:51:08 +0000 UTC to 2027-03-12 19:51:08 +0000 UTC (now=2026-03-12 20:52:09.634483247 +0000 UTC))" 2026-03-12T20:52:09.634869167Z I0312 20:52:09.634741 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773348669\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773348669\" (2026-03-12 19:51:09 +0000 UTC to 2029-03-12 19:51:09 +0000 UTC (now=2026-03-12 20:52:09.634719353 +0000 UTC))" 2026-03-12T20:52:09.635131513Z I0312 20:52:09.635061 1 leaderelection.go:254] attempting to acquire leader lease kube-system/kube-scheduler... 2026-03-12T20:52:14.636658166Z E0312 20:52:14.636557 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T20:52:23.519773701Z E0312 20:52:23.519611 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T20:52:31.801747334Z E0312 20:52:31.801551 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T20:52:40.652197882Z E0312 20:52:40.651977 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T20:52:49.209316331Z E0312 20:52:49.209187 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T20:52:56.878854135Z E0312 20:52:56.878699 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T20:53:03.942599477Z E0312 20:53:03.942419 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T20:53:12.823347075Z E0312 20:53:12.823165 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T20:53:20.558880477Z E0312 20:53:20.558654 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T20:53:27.895911166Z E0312 20:53:27.895759 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T20:53:36.756405786Z E0312 20:53:36.756237 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": context deadline exceeded 2026-03-12T20:53:44.459186577Z E0312 20:53:44.459046 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T20:53:53.208356831Z E0312 20:53:53.208164 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": context deadline exceeded 2026-03-12T20:54:01.547546814Z E0312 20:54:01.547385 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T20:54:09.937369092Z E0312 20:54:09.936670 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T20:54:17.711275558Z E0312 20:54:17.711170 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T20:54:26.358678435Z E0312 20:54:26.358597 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T20:54:34.658220015Z E0312 20:54:34.658032 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T20:54:42.269478465Z E0312 20:54:42.269304 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T20:54:50.054458136Z E0312 20:54:50.054321 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T20:54:57.276966384Z E0312 20:54:57.276849 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T20:55:04.690826399Z E0312 20:55:04.690689 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T20:55:12.320452122Z E0312 20:55:12.320283 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T20:55:20.990557979Z E0312 20:55:20.990354 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T20:55:46.049663899Z I0312 20:55:46.049189 1 leaderelection.go:268] successfully acquired lease kube-system/kube-scheduler 2026-03-12T20:55:46.050135061Z I0312 20:55:46.050079 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress/router-default-79f8cd6fdd-hsv57" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T20:55:46.050628084Z I0312 20:55:46.050556 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497-dfmtk" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T20:55:46.051099335Z I0312 20:55:46.051045 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-network-diagnostics/network-check-source-7c67b67d47-bv4x6" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T20:56:15.989040373Z I0312 20:56:15.988927 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-operators-bq6pw" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:56:16.338881041Z I0312 20:56:16.337765 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-operators-2mrdc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:56:17.715767072Z I0312 20:56:17.715070 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-operators-gxjmz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:56:28.946074692Z I0312 20:56:28.944760 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-machine-approver/machine-approver-955fcfb87-57dhl" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:56:53.277397035Z I0312 20:56:53.277288 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-samples-operator/cluster-samples-operator-664cb58b85-wjpf9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:56:53.387142121Z I0312 20:56:53.378283 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-insights/insights-operator-8f89dfddd-lc7jk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:56:53.387142121Z I0312 20:56:53.385656 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-credential-operator/cloud-credential-operator-55d85b7b47-j79ht" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:56:53.401492576Z I0312 20:56:53.399676 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/cluster-storage-operator-6fbfc8dc8f-ftxzs" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:56:53.403490305Z I0312 20:56:53.402677 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945-ml8vb" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:56:53.482872953Z I0312 20:56:53.480565 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-operator-fdb5c78b5-7p8w8" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:56:53.482872953Z I0312 20:56:53.480628 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/machine-api-operator-84bf6db4f9-sh67s" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:56:53.495084394Z I0312 20:56:53.494387 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/cluster-autoscaler-operator-69576476f7-r6rcq" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:56:53.495084394Z I0312 20:56:53.494940 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/cluster-baremetal-operator-5cdb4c5598-fnxjc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:56:54.585668707Z I0312 20:56:54.585476 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-machine-approver/machine-approver-754bdc9f9d-hj9bb" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:56:57.911189914Z I0312 20:56:57.911102 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-daemon-n5wh9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:57:07.637065180Z I0312 20:57:07.635762 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7c8df9b496-btpxl" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:57:08.930736412Z I0312 20:57:08.930672 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-controller-ff46b7bdf-c7jz8" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:57:10.068521219Z I0312 20:57:10.068419 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ingress/router-default-79f8cd6fdd-hsv57" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:57:10.073005480Z I0312 20:57:10.072698 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-diagnostics/network-check-source-7c67b67d47-bv4x6" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:57:10.073757248Z I0312 20:57:10.073708 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497-dfmtk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:57:13.432514974Z I0312 20:57:13.432411 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-server-mz2sr" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:57:14.484512796Z I0312 20:57:14.484410 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/prometheus-operator-5ff8674d55-8fpdl" node="master-0" evaluatedNodes=1 feasibleNodes=1 config/pod/kube-system/logs/bootstrap-kube-scheduler-master-0/kube-scheduler_previous.log0000640000000000000000000006646315154624262030435 0ustar00000000000000002026-03-12T20:48:08.962866217Z I0312 20:48:08.962747 1 schedule_one.go:1051] "Unable to schedule pod; no nodes are registered to the cluster; waiting" pod="assisted-installer/assisted-installer-controller-jffs8" 2026-03-12T20:48:16.720734401Z I0312 20:48:16.720618 1 node_tree.go:65] "Added node in listed group to NodeTree" node="master-0" zone="" 2026-03-12T20:48:16.781326811Z I0312 20:48:16.780963 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/catalog-operator-7d9c49f57b-tpvl4" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T20:48:16.879670286Z I0312 20:48:16.879548 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-marketplace/marketplace-operator-64bf9778cb-hxqgw" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T20:48:16.980496911Z I0312 20:48:16.980414 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/cluster-monitoring-operator-674cbfbd9d-j9tpt" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T20:48:17.082929636Z I0312 20:48:17.082799 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/package-server-manager-854648ff6d-cdcc8" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T20:48:17.179175430Z I0312 20:48:17.179082 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/olm-operator-d64cfc9db-q9hnk" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T20:48:17.279603327Z I0312 20:48:17.279412 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-storage-version-migrator-operator/kube-storage-version-migrator-operator-7f65c457f5-qfbrj" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T20:48:17.375730327Z I0312 20:48:17.374488 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-service-ca-operator/service-ca-operator-69b6fc6b88-f62j6" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T20:48:17.480587031Z I0312 20:48:17.480309 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-storage-operator/csi-snapshot-controller-operator-5685fbc7d-kf949" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T20:48:17.581184081Z I0312 20:48:17.581009 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-apiserver-operator/openshift-apiserver-operator-799b6db4d7-jwthf" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T20:48:17.679093666Z I0312 20:48:17.678583 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-dns-operator/dns-operator-589895fbb7-tvrxp" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T20:48:17.781381317Z I0312 20:48:17.781047 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-66c7586884-69rp9" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T20:48:17.885230525Z I0312 20:48:17.885096 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-olm-operator/cluster-olm-operator-77899cf6d-kbwlh" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T20:48:17.979946223Z I0312 20:48:17.979832 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-authentication-operator/authentication-operator-7c6989d6c4-9j7rx" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T20:48:18.081883796Z I0312 20:48:18.081732 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager-operator/openshift-controller-manager-operator-8565d84698-vp2hs" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T20:48:18.187448736Z I0312 20:48:18.187379 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-version/cluster-version-operator-745944c6b7-wddgl" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:48:18.280730428Z I0312 20:48:18.280590 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-config-operator/openshift-config-operator-64488f9d78-zsd76" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T20:48:18.378751575Z I0312 20:48:18.378661 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-etcd-operator/etcd-operator-5884b9cd56-xh6r9" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T20:48:18.481020256Z I0312 20:48:18.480931 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress-operator/ingress-operator-677db989d6-qpf68" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T20:48:18.584679410Z I0312 20:48:18.584575 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-apiserver-operator/kube-apiserver-operator-68bd585b-56nzk" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T20:48:18.676605609Z I0312 20:48:18.676488 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-5c74bfc494-269gt" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T20:48:18.786630638Z I0312 20:48:18.786489 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/network-operator-7c649bf6d4-62t2f" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:48:18.879494090Z I0312 20:48:18.879084 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-image-registry/cluster-image-registry-operator-86d6d77c7c-hmtz5" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T20:48:18.978695686Z I0312 20:48:18.978615 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-controller-manager-operator/kube-controller-manager-operator-86d7cdfdfb-f2kg4" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T20:48:18.984103238Z I0312 20:48:18.983980 1 schedule_one.go:314] "Successfully bound pod to node" pod="assisted-installer/assisted-installer-controller-jffs8" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:48:32.035092212Z I0312 20:48:32.034979 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/mtu-prober-6d5g7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:48:41.927521458Z I0312 20:48:41.927436 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-gnmmm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:48:42.134665632Z I0312 20:48:42.134553 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-additional-cni-plugins-trlxw" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:48:42.918673418Z I0312 20:48:42.918578 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/network-metrics-daemon-brdcd" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:48:44.903617863Z I0312 20:48:44.903299 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-multus/multus-admission-controller-8d675b596-98j9w" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T20:48:54.320875150Z I0312 20:48:54.318692 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-control-plane-66b55d57d-vq95t" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:48:54.526126804Z I0312 20:48:54.526047 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-node-wr664" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:48:56.512118002Z I0312 20:48:56.512036 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-network-diagnostics/network-check-source-7c67b67d47-bv4x6" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T20:48:57.507455400Z I0312 20:48:57.507379 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-diagnostics/network-check-target-h26wj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:49:01.601544983Z I0312 20:49:01.601031 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-node-identity/network-node-identity-48hk7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:49:22.233205317Z I0312 20:49:22.233053 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-node-nhrpd" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:49:34.817611105Z I0312 20:49:34.817523 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/catalog-operator-7d9c49f57b-tpvl4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:49:34.826984598Z I0312 20:49:34.826588 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-storage-version-migrator-operator/kube-storage-version-migrator-operator-7f65c457f5-qfbrj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:49:34.828863614Z I0312 20:49:34.828401 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-config-operator/openshift-config-operator-64488f9d78-zsd76" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:49:34.828863614Z I0312 20:49:34.828504 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-66c7586884-69rp9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:49:34.828863614Z I0312 20:49:34.828555 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-apiserver-operator/kube-apiserver-operator-68bd585b-56nzk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:49:34.830425623Z I0312 20:49:34.829696 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-olm-operator/cluster-olm-operator-77899cf6d-kbwlh" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:49:34.830425623Z I0312 20:49:34.829790 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager-operator/openshift-controller-manager-operator-8565d84698-vp2hs" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:49:34.830425623Z I0312 20:49:34.829893 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-etcd-operator/etcd-operator-5884b9cd56-xh6r9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:49:34.830425623Z I0312 20:49:34.829962 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-5c74bfc494-269gt" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:49:34.830425623Z I0312 20:49:34.830043 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-admission-controller-8d675b596-98j9w" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:49:34.830425623Z I0312 20:49:34.830091 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-authentication-operator/authentication-operator-7c6989d6c4-9j7rx" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:49:34.830425623Z I0312 20:49:34.830222 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/csi-snapshot-controller-operator-5685fbc7d-kf949" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:49:34.830425623Z I0312 20:49:34.830325 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-controller-manager-operator/kube-controller-manager-operator-86d7cdfdfb-f2kg4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:49:34.830425623Z I0312 20:49:34.830377 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/marketplace-operator-64bf9778cb-hxqgw" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:49:34.830479974Z I0312 20:49:34.830428 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/olm-operator-d64cfc9db-q9hnk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:49:34.831061309Z I0312 20:49:34.830524 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-image-registry/cluster-image-registry-operator-86d6d77c7c-hmtz5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:49:34.831061309Z I0312 20:49:34.830783 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver-operator/openshift-apiserver-operator-799b6db4d7-jwthf" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:49:34.831061309Z I0312 20:49:34.831004 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns-operator/dns-operator-589895fbb7-tvrxp" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:49:34.831359527Z I0312 20:49:34.831202 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ingress-operator/ingress-operator-677db989d6-qpf68" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:49:34.831359527Z I0312 20:49:34.831299 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/package-server-manager-854648ff6d-cdcc8" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:49:34.831359527Z I0312 20:49:34.831340 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/cluster-monitoring-operator-674cbfbd9d-j9tpt" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:49:34.851949129Z I0312 20:49:34.850725 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-service-ca-operator/service-ca-operator-69b6fc6b88-f62j6" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:49:34.880087438Z I0312 20:49:34.878543 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/iptables-alerter-krpjj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:49:50.793497960Z I0312 20:49:50.793408 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-storage-version-migrator/migrator-57ccdf9b5-jd4pv" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:49:51.426405167Z I0312 20:49:51.426298 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/csi-snapshot-controller-7577d6f48-8fk8w" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:49:52.029735067Z I0312 20:49:52.029450 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-6f7fd6c796-bpd4m" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:49:53.135017279Z I0312 20:49:53.134834 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-7f8b99b9cb-tvsj5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:49:53.149293814Z I0312 20:49:53.149216 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-74bd6c479b-c7dgc" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-12T20:49:53.279395949Z I0312 20:49:53.279277 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-service-ca/service-ca-84bfdbbb7f-4zjqp" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:49:54.701209589Z I0312 20:49:54.701143 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-7bdc948d9f-tqqj7" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-12T20:49:56.113871413Z I0312 20:49:56.112583 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-7bdc948d9f-tqqj7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:50:01.881305190Z I0312 20:50:01.880301 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver/apiserver-75bc5477df-fvl5w" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:50:05.738504349Z I0312 20:50:05.736947 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-apiserver/apiserver-84fb785f4-kl52q" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-12T20:50:07.175738313Z I0312 20:50:07.175651 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver/apiserver-84fb785f4-kl52q" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:50:13.036850698Z I0312 20:50:13.036068 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-5d6659f685-v5vf6" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-12T20:50:13.062057639Z I0312 20:50:13.060237 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-5c8884dcfd-psljl" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-12T20:50:14.239267653Z I0312 20:50:14.239191 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-5d6659f685-v5vf6" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-12T20:50:14.249107848Z I0312 20:50:14.249027 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-5c8884dcfd-psljl" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:50:14.993119820Z I0312 20:50:14.992994 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-oauth-apiserver/apiserver-7946996f87-nzb7c" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:50:16.192819836Z I0312 20:50:16.192318 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-catalogd/catalogd-controller-manager-7f8b8b6f4c-zgjqw" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:50:16.192819836Z I0312 20:50:16.192632 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-node-tuning-operator/tuned-btxk2" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:50:16.296914174Z I0312 20:50:16.294873 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-controller/operator-controller-controller-manager-6598bfb6c4-hdd4n" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:50:16.618906420Z I0312 20:50:16.618668 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns/dns-default-pp258" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:50:17.047917620Z I0312 20:50:17.047342 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns/node-resolver-9t4hh" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:50:17.123354748Z I0312 20:50:17.123073 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-5d6659f685-v5vf6" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:50:17.162295196Z I0312 20:50:17.162209 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress/router-default-79f8cd6fdd-hsv57" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T20:50:31.676219931Z I0312 20:50:31.676142 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-6dfdd9fb89-wjn86" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-12T20:50:31.781393400Z I0312 20:50:31.781322 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-657bd6d846-tffzs" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-12T20:50:31.980937286Z I0312 20:50:31.980778 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-version/cluster-version-operator-8c9c967c7-g4bkd" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:50:32.394458186Z I0312 20:50:32.393661 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497-dfmtk" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-12T20:50:33.238689995Z I0312 20:50:33.237194 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-657bd6d846-tffzs" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:50:33.238689995Z I0312 20:50:33.237661 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-6dfdd9fb89-wjn86" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:50:44.829416132Z I0312 20:50:44.829351 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/community-operators-jblsg" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:50:45.017234797Z I0312 20:50:45.017180 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/certified-operators-94rll" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:50:45.848205261Z I0312 20:50:45.848107 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/packageserver-659d778978-djtms" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:50:46.417882209Z I0312 20:50:46.417775 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-marketplace-66qvj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:50:46.513012268Z I0312 20:50:46.512897 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/control-plane-machine-set-operator-6686554ddc-xzwfp" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:50:48.063648948Z I0312 20:50:48.063162 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-operators-lbgrl" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-12T20:50:54.033170657Z E0312 20:50:54.033060 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers), falling back to slow path 2026-03-12T20:50:59.032118032Z E0312 20:50:59.032003 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": context deadline exceeded 2026-03-12T20:50:59.032118032Z I0312 20:50:59.032047 1 leaderelection.go:297] failed to renew lease kube-system/kube-scheduler: timed out waiting for the condition 2026-03-12T20:51:04.033897132Z E0312 20:51:04.032541 1 leaderelection.go:322] Failed to release lock: Put "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-12T20:51:04.033897132Z E0312 20:51:04.032592 1 server.go:309] "Leaderelection lost" config/pod/kube-system/bootstrap-kube-scheduler-master-0.json0000640000000000000000000000705515154624262023013 0ustar0000000000000000{"metadata":{"name":"bootstrap-kube-scheduler-master-0","namespace":"kube-system","uid":"e079b0a4-274f-4e25-9dca-48e63d6c4aff","resourceVersion":"9142","creationTimestamp":"2026-03-12T20:49:15Z","labels":{"openshift.io/component":"scheduler","openshift.io/control-plane":"true"},"annotations":{"kubernetes.io/config.hash":"a1a56802af72ce1aac6b5077f1695ac0","kubernetes.io/config.mirror":"a1a56802af72ce1aac6b5077f1695ac0","kubernetes.io/config.seen":"2026-03-12T20:47:42.724732430Z","kubernetes.io/config.source":"file","openshift.io/run-level":"0","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"2dfae8b8-e7f5-4d57-9eba-36a0bb1a6e83","controller":true}]},"spec":{"volumes":[{"name":"secrets","hostPath":{"path":"/etc/kubernetes/bootstrap-secrets","type":""}},{"name":"logs","hostPath":{"path":"/var/log/bootstrap-control-plane","type":""}}],"containers":[{"name":"kube-scheduler","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","command":["hyperkube","kube-scheduler"],"args":["--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--leader-elect=true","--cert-dir=/var/run/kubernetes","--authentication-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--v=2"],"resources":{"requests":{"cpu":"15m","memory":"50Mi"}},"volumeMounts":[{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priority":0,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:48Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:48Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:51:09Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:51:09Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:48Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-12T20:49:48Z","containerStatuses":[{"name":"kube-scheduler","state":{"running":{"startedAt":"2026-03-12T20:51:08Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","startedAt":"2026-03-12T20:47:51Z","finishedAt":"2026-03-12T20:51:05Z","containerID":"cri-o://dc7d8b29ebb567785e771d22b9996a6a97141570cdafc6702bfef40b35ac45e8"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","containerID":"cri-o://bb2ea5b36a5078a0f6bfe1f1daf8d78310cc27ab4b84afa4566e18c230d38fb8","started":true}],"qosClass":"Burstable"}}kube-controller-manager-operator_current.log0000640000000000000000000001020415154624262044444 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-86d7cdfdfb-f2kg42026-03-12T20:54:44.726893172Z I0312 20:54:44.725145 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-12T20:54:44.726893172Z I0312 20:54:44.725252 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-12T20:54:44.726893172Z I0312 20:54:44.725989 1 observer_polling.go:159] Starting file observer 2026-03-12T20:55:23.331523657Z I0312 20:55:23.331369 1 builder.go:304] kube-controller-manager-operator version 4.18.0-202602162248.p2.g6347fc8.assembly.stream.el9-6347fc8-6347fc8179b2a04d51c99432ae612bf4df595dc0 2026-03-12T20:55:33.578771706Z I0312 20:55:33.575112 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-12T20:55:33.578771706Z W0312 20:55:33.577868 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-12T20:55:33.578771706Z W0312 20:55:33.577885 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-12T20:55:33.578771706Z W0312 20:55:33.577897 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-12T20:55:33.578771706Z W0312 20:55:33.577910 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-12T20:55:33.578771706Z W0312 20:55:33.577917 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-12T20:55:33.578771706Z W0312 20:55:33.577924 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-12T20:55:33.594464936Z I0312 20:55:33.594342 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-12T20:55:33.594464936Z I0312 20:55:33.594395 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-12T20:55:33.594627221Z I0312 20:55:33.594495 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-12T20:55:33.594627221Z I0312 20:55:33.594612 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-12T20:55:33.595111813Z I0312 20:55:33.595002 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-12T20:55:33.595259176Z I0312 20:55:33.595036 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-12T20:55:33.595517553Z I0312 20:55:33.595034 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-12T20:55:33.595776229Z I0312 20:55:33.594444 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-12T20:55:33.595894152Z I0312 20:55:33.595864 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-12T20:55:33.695660746Z I0312 20:55:33.695566 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-12T20:55:33.695759898Z I0312 20:55:33.695630 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-12T20:55:33.697069471Z I0312 20:55:33.696745 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-12T20:55:58.813675862Z I0312 20:55:58.813611 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-12T20:55:58.822055830Z I0312 20:55:58.821058 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-controller-manager-operator/kube-controller-manager-operator-lock... kube-controller-manager-operator_previous.log0000640000000000000000000004223215154624262044644 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-86d7cdfdfb-f2kg42026-03-12T20:51:05.613390012Z I0312 20:51:05.613372 1 base_controller.go:181] Shutting down KubeControllerManagerStaticResources-StaticResources ... 2026-03-12T20:51:05.613390012Z I0312 20:51:05.613374 1 leaderelection.go:297] failed to renew lease openshift-kube-controller-manager-operator/kube-controller-manager-operator-lock: timed out waiting for the condition 2026-03-12T20:51:05.613402572Z I0312 20:51:05.613389 1 base_controller.go:181] Shutting down CertRotationController ... 2026-03-12T20:51:05.613402572Z I0312 20:51:05.613395 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-12T20:51:05.613425333Z I0312 20:51:05.613418 1 base_controller.go:181] Shutting down kube-controller-manager-Node ... 2026-03-12T20:51:05.613432993Z I0312 20:51:05.613426 1 base_controller.go:181] Shutting down kube-controller-manager-operator-UnsupportedConfigOverrides ... 2026-03-12T20:51:05.613440813Z I0312 20:51:05.613434 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-03-12T20:51:05.613450414Z I0312 20:51:05.613444 1 base_controller.go:181] Shutting down StatusSyncer_kube-controller-manager ... 2026-03-12T20:51:05.613450414Z I0312 20:51:05.613447 1 base_controller.go:159] All StatusSyncer_kube-controller-manager post start hooks have been terminated 2026-03-12T20:51:05.613476294Z I0312 20:51:05.613458 1 base_controller.go:181] Shutting down GarbageCollectorWatcherController ... 2026-03-12T20:51:05.613476294Z I0312 20:51:05.613468 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2026-03-12T20:51:05.613634568Z I0312 20:51:05.613596 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-03-12T20:51:05.613828383Z I0312 20:51:05.613789 1 base_controller.go:181] Shutting down kube-controller-manager-InstallerState ... 2026-03-12T20:51:05.613906235Z E0312 20:51:05.613883 1 base_controller.go:279] "Unhandled Error" err="kube-controller-manager-InstallerState reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": context canceled" 2026-03-12T20:51:05.613929106Z I0312 20:51:05.613914 1 base_controller.go:181] Shutting down GuardController ... 2026-03-12T20:51:05.613936896Z I0312 20:51:05.613928 1 base_controller.go:181] Shutting down Installer ... 2026-03-12T20:51:05.613981677Z I0312 20:51:05.613954 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-12T20:51:05.613989838Z I0312 20:51:05.613961 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-12T20:51:05.614800599Z I0312 20:51:05.614754 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-12T20:51:05.614929552Z I0312 20:51:05.614823 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-12T20:51:05.614929552Z I0312 20:51:05.614897 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-12T20:51:05.614929552Z I0312 20:51:05.614911 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-12T20:51:05.614929552Z I0312 20:51:05.614921 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-12T20:51:05.615109597Z I0312 20:51:05.613982 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-12T20:51:05.615276431Z W0312 20:51:05.615239 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerDegraded"].reason is missing; this will eventually be fatal 2026-03-12T20:51:05.615276431Z W0312 20:51:05.615259 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2026-03-12T20:51:05.615276431Z W0312 20:51:05.615263 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-03-12T20:51:05.615360704Z I0312 20:51:05.615328 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-12T20:51:05.615360704Z I0312 20:51:05.615346 1 builder.go:335] server exited 2026-03-12T20:51:05.615360704Z E0312 20:51:05.615347 1 base_controller.go:279] "Unhandled Error" err="Installer reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-controller-manager-Installer\": client rate limiter Wait returned an error: context canceled" 2026-03-12T20:51:05.615370974Z I0312 20:51:05.615363 1 base_controller.go:123] Shutting down worker of kube-controller-manager-InstallerState controller ... 2026-03-12T20:51:05.615380394Z I0312 20:51:05.615374 1 base_controller.go:113] All kube-controller-manager-InstallerState workers have been terminated 2026-03-12T20:51:05.615388184Z I0312 20:51:05.615382 1 controller_manager.go:54] kube-controller-manager-InstallerState controller terminated 2026-03-12T20:51:05.615411825Z I0312 20:51:05.615394 1 base_controller.go:181] Shutting down MissingStaticPodController ... 2026-03-12T20:51:05.615411825Z I0312 20:51:05.615407 1 base_controller.go:181] Shutting down kube-controller-manager-StaticPodState ... 2026-03-12T20:51:05.616038132Z I0312 20:51:05.616008 1 base_controller.go:181] Shutting down TargetConfigController ... 2026-03-12T20:51:05.616038132Z I0312 20:51:05.616016 1 base_controller.go:123] Shutting down worker of StatusSyncer_kube-controller-manager controller ... 2026-03-12T20:51:05.616038132Z I0312 20:51:05.616030 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-12T20:51:05.616056662Z I0312 20:51:05.616041 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-12T20:51:05.616056662Z I0312 20:51:05.616052 1 base_controller.go:123] Shutting down worker of kube-controller-manager-Node controller ... 2026-03-12T20:51:05.616065043Z I0312 20:51:05.616055 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-12T20:51:05.616065043Z I0312 20:51:05.616060 1 base_controller.go:113] All kube-controller-manager-Node workers have been terminated 2026-03-12T20:51:05.616078023Z I0312 20:51:05.616069 1 controller_manager.go:54] kube-controller-manager-Node controller terminated 2026-03-12T20:51:05.616086073Z I0312 20:51:05.616070 1 base_controller.go:181] Shutting down SATokenSignerController ... 2026-03-12T20:51:05.616086073Z I0312 20:51:05.616066 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-03-12T20:51:05.616095293Z I0312 20:51:05.616089 1 base_controller.go:113] All GuardController workers have been terminated 2026-03-12T20:51:05.616102664Z I0312 20:51:05.616095 1 controller_manager.go:54] GuardController controller terminated 2026-03-12T20:51:05.616110054Z I0312 20:51:05.616103 1 base_controller.go:123] Shutting down worker of kube-controller-manager-operator-UnsupportedConfigOverrides controller ... 2026-03-12T20:51:05.616117524Z I0312 20:51:05.616111 1 base_controller.go:113] All kube-controller-manager-operator-UnsupportedConfigOverrides workers have been terminated 2026-03-12T20:51:05.616124834Z I0312 20:51:05.616117 1 controller_manager.go:54] kube-controller-manager-operator-UnsupportedConfigOverrides controller terminated 2026-03-12T20:51:05.616132064Z I0312 20:51:05.616125 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-12T20:51:05.616139664Z I0312 20:51:05.616133 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-12T20:51:05.616147535Z I0312 20:51:05.616138 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-03-12T20:51:05.616147535Z I0312 20:51:05.616033 1 base_controller.go:113] All StatusSyncer_kube-controller-manager workers have been terminated 2026-03-12T20:51:05.616163805Z I0312 20:51:05.616152 1 base_controller.go:123] Shutting down worker of MissingStaticPodController controller ... 2026-03-12T20:51:05.616163805Z I0312 20:51:05.616159 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-03-12T20:51:05.616173005Z I0312 20:51:05.616165 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-03-12T20:51:05.616224317Z I0312 20:51:05.616199 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-1448259631/tls.crt::/tmp/serving-cert-1448259631/tls.key" 2026-03-12T20:51:05.616438132Z I0312 20:51:05.616294 1 base_controller.go:123] Shutting down worker of GarbageCollectorWatcherController controller ... 2026-03-12T20:51:05.616438132Z I0312 20:51:05.616307 1 base_controller.go:113] All GarbageCollectorWatcherController workers have been terminated 2026-03-12T20:51:05.616438132Z I0312 20:51:05.616335 1 base_controller.go:181] Shutting down kube-controller-manager ... 2026-03-12T20:51:05.616438132Z I0312 20:51:05.616350 1 base_controller.go:181] Shutting down PruneController ... 2026-03-12T20:51:05.616438132Z I0312 20:51:05.616360 1 base_controller.go:181] Shutting down WorkerLatencyProfile ... 2026-03-12T20:51:05.616438132Z I0312 20:51:05.616386 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-03-12T20:51:05.616438132Z I0312 20:51:05.616393 1 base_controller.go:113] All Installer workers have been terminated 2026-03-12T20:51:05.616438132Z I0312 20:51:05.616399 1 controller_manager.go:54] Installer controller terminated 2026-03-12T20:51:05.616438132Z I0312 20:51:05.616408 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-12T20:51:05.616438132Z I0312 20:51:05.616422 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2026-03-12T20:51:05.616749770Z I0312 20:51:05.616725 1 base_controller.go:123] Shutting down worker of WorkerLatencyProfile controller ... 2026-03-12T20:51:05.616784741Z I0312 20:51:05.616775 1 base_controller.go:113] All WorkerLatencyProfile workers have been terminated 2026-03-12T20:51:05.616847163Z I0312 20:51:05.616834 1 base_controller.go:123] Shutting down worker of kube-controller-manager controller ... 2026-03-12T20:51:05.616881983Z I0312 20:51:05.616873 1 base_controller.go:113] All kube-controller-manager workers have been terminated 2026-03-12T20:51:05.616910974Z I0312 20:51:05.616902 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-03-12T20:51:05.616935545Z I0312 20:51:05.616927 1 base_controller.go:113] All PruneController workers have been terminated 2026-03-12T20:51:05.616962065Z I0312 20:51:05.616954 1 controller_manager.go:54] PruneController controller terminated 2026-03-12T20:51:05.616981646Z E0312 20:51:05.616848 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-12T20:51:05.617058248Z I0312 20:51:05.617044 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-12T20:51:05.617087659Z I0312 20:51:05.617079 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-12T20:51:05.617111489Z I0312 20:51:05.617103 1 controller_manager.go:54] RevisionController controller terminated 2026-03-12T20:51:05.617415868Z I0312 20:51:05.617401 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-12T20:51:05.617447399Z I0312 20:51:05.617438 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-12T20:51:05.618291321Z E0312 20:51:05.618236 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: [\"manifests/installer-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/serviceaccounts/installer-sa\": context canceled, \"manifests/installer-cluster-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"BackingResourceController-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-12T20:51:05.618291321Z I0312 20:51:05.618274 1 base_controller.go:123] Shutting down worker of SATokenSignerController controller ... 2026-03-12T20:51:05.618291321Z I0312 20:51:05.618284 1 base_controller.go:113] All SATokenSignerController workers have been terminated 2026-03-12T20:51:05.618579658Z E0312 20:51:05.618533 1 base_controller.go:279] "Unhandled Error" err="KubeControllerManagerStaticResources-StaticResources reconciliation failed: [\"assets/kube-controller-manager/sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/serviceaccounts/kube-controller-manager-sa\": context canceled, \"assets/kube-controller-manager/recycler-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/localhost-recovery-client-crb.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/localhost-recovery-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/csr_approver_clusterrole.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/csr_approver_clusterrolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-binding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/gce/cloud-provider-role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/gce/cloud-provider-binding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"KubeControllerManagerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-12T20:51:05.618590328Z E0312 20:51:05.618577 1 base_controller.go:279] "Unhandled Error" err="kube-controller-manager-StaticPodState reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-controller-manager-StaticPodState\": client rate limiter Wait returned an error: context canceled" 2026-03-12T20:51:05.619287887Z E0312 20:51:05.619243 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-12T20:51:05.619363499Z I0312 20:51:05.619326 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-03-12T20:51:05.619363499Z I0312 20:51:05.619346 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-03-12T20:51:05.619363499Z I0312 20:51:05.619354 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-12T20:51:05.619821281Z I0312 20:51:05.619767 1 base_controller.go:123] Shutting down worker of kube-controller-manager-StaticPodState controller ... 2026-03-12T20:51:05.619821281Z I0312 20:51:05.619784 1 base_controller.go:113] All kube-controller-manager-StaticPodState workers have been terminated 2026-03-12T20:51:05.619821281Z I0312 20:51:05.619795 1 controller_manager.go:54] kube-controller-manager-StaticPodState controller terminated 2026-03-12T20:51:05.619840781Z I0312 20:51:05.619796 1 base_controller.go:123] Shutting down worker of KubeControllerManagerStaticResources-StaticResources controller ... 2026-03-12T20:51:05.619840781Z I0312 20:51:05.619830 1 base_controller.go:113] All KubeControllerManagerStaticResources-StaticResources workers have been terminated 2026-03-12T20:51:05.620976931Z I0312 20:51:05.620907 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-12T20:51:05.620976931Z I0312 20:51:05.620929 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-12T20:51:10.612959730Z I0312 20:51:10.612893 1 observer_polling.go:162] Shutting down file observer 2026-03-12T20:51:39.617117523Z E0312 20:51:39.617003 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-12T20:51:39.617117523Z W0312 20:51:39.617056 1 leaderelection.go:84] leader election lost kube-controller-manager-operator-86d7cdfdfb-f2kg4.json0000640000000000000000000001451015154624262033562 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator{"metadata":{"name":"kube-controller-manager-operator-86d7cdfdfb-f2kg4","generateName":"kube-controller-manager-operator-86d7cdfdfb-","namespace":"openshift-kube-controller-manager-operator","uid":"96bd86df-2101-47f5-844b-1332261c66f1","resourceVersion":"9164","creationTimestamp":"2026-03-12T20:48:18Z","labels":{"app":"kube-controller-manager-operator","pod-template-hash":"86d7cdfdfb"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.25/23\"],\"mac_address\":\"0a:58:0a:80:00:19\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.25/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.25\"\n ],\n \"mac\": \"0a:58:0a:80:00:19\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-controller-manager-operator-86d7cdfdfb","uid":"d4d8d230-3d6e-4168-a3e3-5102a3ca46e1","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","command":["cluster-kube-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56"},{"name":"CLUSTER_POLICY_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609"},{"name":"TOOLS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:35768a0c3eb24134dd38633e8acfc7db69ee96b2fd660e9bba3b8c996452fef7"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-controller-manager-operator","serviceAccount":"kube-controller-manager-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:48Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:34Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:55:15Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:55:15Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:34Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.25","podIPs":[{"ip":"10.128.0.25"}],"startTime":"2026-03-12T20:49:34Z","containerStatuses":[{"name":"kube-controller-manager-operator","state":{"running":{"startedAt":"2026-03-12T20:54:44Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-12T20:49:49Z","finishedAt":"2026-03-12T20:51:39Z","containerID":"cri-o://e6ccd74a2af6fdce722a0e3dca22b3f124868515fcf641e0b36f66e322f8d4c3"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","containerID":"cri-o://249a7dffa361592f6c3fc3dfb8d871762e2347411c14fdf281e698f89aa84b04","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-controller-manager-recovery-controller_current.log0000640000000000000000000003104315154624262042046 0ustar0000000000000000config/pod/openshift-kube-controller-manager/logs/kube-controller-manager-master-02026-03-12T20:56:33.092834770Z + timeout 3m /bin/bash -exuo pipefail -c 'while [ -n "$(ss -Htanop \( sport = 9443 \))" ]; do sleep 1; done' 2026-03-12T20:56:33.098595992Z ++ ss -Htanop '(' sport = 9443 ')' 2026-03-12T20:56:33.108341322Z + '[' -n '' ']' 2026-03-12T20:56:33.109329887Z + exec cluster-kube-controller-manager-operator cert-recovery-controller --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig --namespace=openshift-kube-controller-manager --listen=0.0.0.0:9443 -v=2 2026-03-12T20:56:33.180586264Z W0312 20:56:33.180293 1 cmd.go:257] Using insecure, self-signed certificates 2026-03-12T20:56:33.180953593Z I0312 20:56:33.180921 1 crypto.go:601] Generating new CA for cert-recovery-controller-signer@1773348993 cert, and key in /tmp/serving-cert-1148600613/serving-signer.crt, /tmp/serving-cert-1148600613/serving-signer.key 2026-03-12T20:56:33.662673532Z I0312 20:56:33.662529 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-12T20:56:33.667008149Z I0312 20:56:33.664100 1 observer_polling.go:159] Starting file observer 2026-03-12T20:56:33.667008149Z I0312 20:56:33.664302 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-12T20:56:33.667008149Z I0312 20:56:33.664327 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-12T20:56:33.672919234Z W0312 20:56:33.672841 1 builder.go:272] unable to get owner reference (falling back to namespace): Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/pods": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-12T20:56:33.673082718Z I0312 20:56:33.673041 1 builder.go:304] cert-recovery-controller version 4.18.0-202602162248.p2.g6347fc8.assembly.stream.el9-6347fc8-6347fc8179b2a04d51c99432ae612bf4df595dc0 2026-03-12T20:56:33.677455696Z W0312 20:56:33.677363 1 builder.go:364] unable to get control plane topology, using HA cluster values for leader election: Get "https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-12T20:56:33.677842036Z I0312 20:56:33.677760 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-controller-manager/cert-recovery-controller-lock... 2026-03-12T20:56:33.684907540Z I0312 20:56:33.682597 1 event.go:377] Event(v1.ObjectReference{Kind:"Namespace", Namespace:"openshift-kube-controller-manager", Name:"openshift-kube-controller-manager", UID:"", APIVersion:"v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'ControlPlaneTopology' unable to get control plane topology, using HA cluster values for leader election: Get "https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-12T20:56:33.686664863Z E0312 20:56:33.686563 1 leaderelection.go:436] error retrieving resource lock openshift-kube-controller-manager/cert-recovery-controller-lock: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-controller-manager/leases/cert-recovery-controller-lock?timeout=1m47s": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-12T20:56:33.689654567Z E0312 20:56:33.689584 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-controller-manager.189c33839eef0941 openshift-kube-controller-manager 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-controller-manager,Name:openshift-kube-controller-manager,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-12 20:56:33.677330753 +0000 UTC m=+0.560074052,LastTimestamp:2026-03-12 20:56:33.677330753 +0000 UTC m=+0.560074052,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-03-12T20:56:39.543672976Z E0312 20:56:39.543608 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-controller-manager.189c33839eef0941 openshift-kube-controller-manager 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-controller-manager,Name:openshift-kube-controller-manager,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-12 20:56:33.677330753 +0000 UTC m=+0.560074052,LastTimestamp:2026-03-12 20:56:33.677330753 +0000 UTC m=+0.560074052,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-03-12T20:56:49.551299812Z E0312 20:56:49.551220 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-controller-manager.189c33839eef0941 openshift-kube-controller-manager 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-controller-manager,Name:openshift-kube-controller-manager,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-12 20:56:33.677330753 +0000 UTC m=+0.560074052,LastTimestamp:2026-03-12 20:56:33.677330753 +0000 UTC m=+0.560074052,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-03-12T20:56:59.555357178Z E0312 20:56:59.555304 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-controller-manager.189c33839eef0941 openshift-kube-controller-manager 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-controller-manager,Name:openshift-kube-controller-manager,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-12 20:56:33.677330753 +0000 UTC m=+0.560074052,LastTimestamp:2026-03-12 20:56:33.677330753 +0000 UTC m=+0.560074052,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-03-12T20:57:09.561026165Z E0312 20:57:09.560960 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-controller-manager.189c33839eef0941 openshift-kube-controller-manager 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-controller-manager,Name:openshift-kube-controller-manager,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-12 20:56:33.677330753 +0000 UTC m=+0.560074052,LastTimestamp:2026-03-12 20:56:33.677330753 +0000 UTC m=+0.560074052,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" kube-controller-manager-cert-syncer_current.log0000640000000000000000000003362515154624262040275 0ustar0000000000000000config/pod/openshift-kube-controller-manager/logs/kube-controller-manager-master-02026-03-12T20:56:32.767018265Z I0312 20:56:32.766639 1 observer_polling.go:159] Starting file observer 2026-03-12T20:56:32.767018265Z I0312 20:56:32.766666 1 base_controller.go:76] Waiting for caches to sync for CertSyncController 2026-03-12T20:56:32.773887505Z W0312 20:56:32.771941 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-12T20:56:32.773887505Z E0312 20:56:32.772078 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-12T20:56:32.774181002Z W0312 20:56:32.774108 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-12T20:56:32.774200882Z E0312 20:56:32.774184 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-12T20:56:33.726138167Z W0312 20:56:33.726017 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-12T20:56:33.726225069Z E0312 20:56:33.726142 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-12T20:56:34.249012391Z W0312 20:56:34.248907 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-12T20:56:34.249122314Z E0312 20:56:34.249022 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-12T20:56:35.794728248Z W0312 20:56:35.794615 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-12T20:56:35.794728248Z E0312 20:56:35.794694 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-12T20:56:36.669762226Z W0312 20:56:36.669639 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-12T20:56:36.669762226Z E0312 20:56:36.669711 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-12T20:56:39.568265222Z W0312 20:56:39.568142 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-12T20:56:39.568265222Z E0312 20:56:39.568241 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-12T20:56:40.894043706Z W0312 20:56:40.893537 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-12T20:56:40.894043706Z E0312 20:56:40.893636 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-12T20:56:47.288412500Z W0312 20:56:47.288273 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-12T20:56:47.288412500Z E0312 20:56:47.288378 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-12T20:56:47.683250876Z W0312 20:56:47.683125 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-12T20:56:47.683250876Z E0312 20:56:47.683215 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-12T20:57:07.247933225Z W0312 20:57:07.247481 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-12T20:57:07.247933225Z E0312 20:57:07.247605 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-12T20:57:09.918793478Z W0312 20:57:09.918647 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-12T20:57:09.918862679Z E0312 20:57:09.918782 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" cluster-policy-controller_current.log0000640000000000000000000005434515154624262036463 0ustar0000000000000000config/pod/openshift-kube-controller-manager/logs/kube-controller-manager-master-02026-03-12T20:56:35.203241632Z E0312 20:56:35.203215 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-route-controller-manager" should be enqueued: namespace "openshift-route-controller-manager" not found 2026-03-12T20:56:35.203241632Z E0312 20:56:35.203223 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-service-ca-operator" should be enqueued: namespace "openshift-service-ca-operator" not found 2026-03-12T20:56:35.203261772Z E0312 20:56:35.203243 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-service-ca-operator" should be enqueued: namespace "openshift-service-ca-operator" not found 2026-03-12T20:56:35.203280863Z E0312 20:56:35.203258 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-service-ca-operator" should be enqueued: namespace "openshift-service-ca-operator" not found 2026-03-12T20:56:35.203299653Z E0312 20:56:35.203286 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-service-ca-operator" should be enqueued: namespace "openshift-service-ca-operator" not found 2026-03-12T20:56:35.203325304Z E0312 20:56:35.203312 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-service-ca" should be enqueued: namespace "openshift-service-ca" not found 2026-03-12T20:56:35.203345424Z E0312 20:56:35.203322 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-service-ca" should be enqueued: namespace "openshift-service-ca" not found 2026-03-12T20:56:35.203345424Z E0312 20:56:35.203333 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-service-ca" should be enqueued: namespace "openshift-service-ca" not found 2026-03-12T20:56:35.203373035Z E0312 20:56:35.203358 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-service-ca" should be enqueued: namespace "openshift-service-ca" not found 2026-03-12T20:56:35.203395475Z E0312 20:56:35.203375 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-user-workload-monitoring" should be enqueued: namespace "openshift-user-workload-monitoring" not found 2026-03-12T20:56:35.203395475Z E0312 20:56:35.203387 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-user-workload-monitoring" should be enqueued: namespace "openshift-user-workload-monitoring" not found 2026-03-12T20:56:35.203424406Z E0312 20:56:35.203401 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-user-workload-monitoring" should be enqueued: namespace "openshift-user-workload-monitoring" not found 2026-03-12T20:56:35.203424406Z E0312 20:56:35.203413 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-vsphere-infra" should be enqueued: namespace "openshift-vsphere-infra" not found 2026-03-12T20:56:35.203444477Z E0312 20:56:35.203426 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-vsphere-infra" should be enqueued: namespace "openshift-vsphere-infra" not found 2026-03-12T20:56:35.203465087Z E0312 20:56:35.203441 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-vsphere-infra" should be enqueued: namespace "openshift-vsphere-infra" not found 2026-03-12T20:56:35.203465087Z E0312 20:56:35.203458 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift" should be enqueued: namespace "openshift" not found 2026-03-12T20:56:35.203486048Z E0312 20:56:35.203469 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift" should be enqueued: namespace "openshift" not found 2026-03-12T20:56:35.203504938Z E0312 20:56:35.203482 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift" should be enqueued: namespace "openshift" not found 2026-03-12T20:56:35.295443916Z I0312 20:56:35.295337 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:35.494307339Z I0312 20:56:35.494164 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:35.642023352Z I0312 20:56:35.641918 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:35.677193480Z I0312 20:56:35.677087 1 reflector.go:368] Caches populated for *v1.Secret from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:35.696642929Z I0312 20:56:35.696567 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:35.781789558Z I0312 20:56:35.781677 1 reflector.go:368] Caches populated for *v1.PodTemplate from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:35.892753185Z I0312 20:56:35.892664 1 request.go:700] Waited for 1.000516583s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/apis/tuned.openshift.io/v1/profiles?limit=500&resourceVersion=0 2026-03-12T20:56:35.895650917Z I0312 20:56:35.895564 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:35.981199966Z I0312 20:56:35.981089 1 reflector.go:368] Caches populated for *v1.ResourceQuota from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:36.038075608Z W0312 20:56:36.037944 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-12T20:56:36.038075608Z E0312 20:56:36.038004 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-12T20:56:36.094579752Z I0312 20:56:36.094483 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:36.200406231Z I0312 20:56:36.200299 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:36.294592175Z I0312 20:56:36.294474 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:36.326035380Z E0312 20:56:36.325539 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-cloud-controller-manager" should be enqueued: namespace "openshift-cloud-controller-manager" not found 2026-03-12T20:56:36.329953856Z E0312 20:56:36.329876 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-cloud-controller-manager" should be enqueued: namespace "openshift-cloud-controller-manager" not found 2026-03-12T20:56:36.380736038Z I0312 20:56:36.380630 1 reflector.go:368] Caches populated for *v1.PersistentVolumeClaim from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:36.493903429Z I0312 20:56:36.493785 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:36.596758365Z I0312 20:56:36.596637 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:36.671406577Z I0312 20:56:36.671313 1 shared_informer.go:320] Caches are synced for privileged-namespaces-psa-label-syncer 2026-03-12T20:56:36.690494957Z I0312 20:56:36.690382 1 base_controller.go:74] Caches are synced for namespace-security-allocation-controller 2026-03-12T20:56:36.690494957Z I0312 20:56:36.690454 1 base_controller.go:111] Starting #1 worker of namespace-security-allocation-controller controller ... 2026-03-12T20:56:36.690550138Z I0312 20:56:36.690516 1 namespace_scc_allocation_controller.go:111] Repairing SCC UID Allocations 2026-03-12T20:56:36.691698666Z I0312 20:56:36.691637 1 base_controller.go:74] Caches are synced for pod-security-admission-label-synchronization-controller 2026-03-12T20:56:36.691698666Z I0312 20:56:36.691667 1 base_controller.go:111] Starting #1 worker of pod-security-admission-label-synchronization-controller controller ... 2026-03-12T20:56:36.693927322Z I0312 20:56:36.693889 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:36.839086472Z I0312 20:56:36.838985 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:36.894232241Z I0312 20:56:36.894139 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:36.979013432Z I0312 20:56:36.978912 1 request.go:700] Waited for 2.084636207s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/api/v1/limitranges?limit=500&resourceVersion=0 2026-03-12T20:56:36.981593515Z I0312 20:56:36.981527 1 reflector.go:368] Caches populated for *v1.LimitRange from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:37.095353151Z I0312 20:56:37.095257 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:37.181393182Z I0312 20:56:37.181275 1 reflector.go:368] Caches populated for *v1.ReplicationController from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:37.293683321Z I0312 20:56:37.293606 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:37.337431890Z I0312 20:56:37.337304 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "prometheus-k8s-machine-api-operator" not found 2026-03-12T20:56:37.495011376Z I0312 20:56:37.494799 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:37.618591613Z I0312 20:56:37.618427 1 namespace_scc_allocation_controller.go:116] Repair complete 2026-03-12T20:56:37.695181002Z I0312 20:56:37.694932 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:37.893920673Z I0312 20:56:37.893748 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:38.092842189Z I0312 20:56:38.092423 1 request.go:700] Waited for 3.19993239s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/apis/cloudcredential.openshift.io/v1/credentialsrequests?limit=500&resourceVersion=0 2026-03-12T20:56:38.096603962Z I0312 20:56:38.096559 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:38.294948072Z I0312 20:56:38.294838 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:38.495025716Z I0312 20:56:38.494901 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:38.677264040Z W0312 20:56:38.677170 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-12T20:56:38.677340692Z E0312 20:56:38.677249 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-12T20:56:38.694532546Z I0312 20:56:38.694437 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:38.895101572Z I0312 20:56:38.894481 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:39.095250038Z I0312 20:56:39.095160 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:39.292606594Z I0312 20:56:39.292465 1 request.go:700] Waited for 4.39953133s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/apis/infrastructure.cluster.x-k8s.io/v1beta1/metal3remediations?limit=500&resourceVersion=0 2026-03-12T20:56:39.295663190Z I0312 20:56:39.295118 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:39.494710198Z I0312 20:56:39.494588 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:39.694712240Z I0312 20:56:39.694627 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:39.894045475Z I0312 20:56:39.893957 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:40.094513930Z I0312 20:56:40.094377 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:40.294798169Z I0312 20:56:40.294621 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:40.492120555Z I0312 20:56:40.492050 1 request.go:700] Waited for 5.598942588s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/apis/machine.openshift.io/v1/controlplanemachinesets?limit=500&resourceVersion=0 2026-03-12T20:56:40.493875368Z I0312 20:56:40.493796 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:40.694142796Z I0312 20:56:40.693974 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:40.895614325Z I0312 20:56:40.895504 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:41.094828657Z I0312 20:56:41.094700 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:41.294154482Z I0312 20:56:41.294054 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:41.492511183Z I0312 20:56:41.492445 1 request.go:700] Waited for 6.599117552s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/apis/monitoring.coreos.com/v1/podmonitors?limit=500&resourceVersion=0 2026-03-12T20:56:41.494892702Z I0312 20:56:41.494861 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:41.695070639Z I0312 20:56:41.694983 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:41.894194829Z I0312 20:56:41.894084 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:42.094127259Z I0312 20:56:42.094016 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:42.294232654Z I0312 20:56:42.294147 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:42.492633296Z I0312 20:56:42.492517 1 request.go:700] Waited for 7.598902437s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/apis/helm.openshift.io/v1beta1/projecthelmchartrepositories?limit=500&resourceVersion=0 2026-03-12T20:56:42.495256561Z I0312 20:56:42.495174 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:42.694708550Z I0312 20:56:42.694611 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:42.894648121Z I0312 20:56:42.894567 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:43.093980246Z I0312 20:56:43.093508 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:43.294595123Z I0312 20:56:43.294457 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:56:43.295649629Z I0312 20:56:43.295562 1 reconciliation_controller.go:224] synced cluster resource quota controller 2026-03-12T20:56:43.380933762Z I0312 20:56:43.380847 1 reconciliation_controller.go:149] Caches are synced 2026-03-12T20:56:45.047422957Z W0312 20:56:45.047308 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-12T20:56:45.047422957Z E0312 20:56:45.047379 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-12T20:56:52.344433879Z W0312 20:56:52.344326 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-12T20:56:52.344513411Z E0312 20:56:52.344424 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-12T20:57:09.982746564Z W0312 20:57:09.981628 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-12T20:57:09.982746564Z E0312 20:57:09.981717 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-12T20:57:13.303496883Z I0312 20:57:13.303375 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-12T20:57:13.303496883Z E0312 20:57:13.303471 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" kube-controller-manager_current.log0000640000000000000000000007344715154624262036047 0ustar0000000000000000config/pod/openshift-kube-controller-manager/logs/kube-controller-manager-master-02026-03-12T20:56:56.628850092Z I0312 20:56:56.628831 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-oauth-apiserver, name: revision-status-1, uid: 12d4bec6-60af-44a8-9022-4ee8be9a473a]" virtual=false 2026-03-12T20:56:56.633911306Z I0312 20:56:56.633875 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-machine-api, name: cluster-baremetal-operator-images, uid: f2af784c-45bb-4cde-a17b-a389d9c73076]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}] 2026-03-12T20:56:56.633968977Z I0312 20:56:56.633952 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-ovn-kubernetes, name: ovnkube-config, uid: 09ae7d20-21af-410a-99db-58563e4c02f4]" virtual=false 2026-03-12T20:56:56.637378132Z I0312 20:56:56.637341 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-machine-api, name: kube-rbac-proxy, uid: 35b258c8-4507-4d7c-9019-33ebf2049260]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}] 2026-03-12T20:56:56.637440823Z I0312 20:56:56.637424 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-ovn-kubernetes, name: ovnkube-script-lib, uid: 42e25171-6d34-4fb8-98ff-89b072bfa49b]" virtual=false 2026-03-12T20:56:56.640517209Z I0312 20:56:56.640489 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-machine-api, name: kube-rbac-proxy-cluster-autoscaler-operator, uid: 8e5f1dbc-db27-465f-b025-a29f77e2e3e9]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}] 2026-03-12T20:56:56.640592981Z I0312 20:56:56.640573 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-service-ca-operator, name: service-ca-operator-config, uid: 81114bd0-40cc-4f7d-af88-a8c58e59d2bb]" virtual=false 2026-03-12T20:56:56.644593569Z I0312 20:56:56.644269 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-machine-api, name: machine-api-operator-images, uid: 297b8025-3026-40c4-acea-8ae9cde19b81]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}] 2026-03-12T20:56:56.647527752Z I0312 20:56:56.647487 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-machine-api, name: mao-trusted-ca, uid: 1d47666f-18b0-4aea-8fea-eebbd0b23075]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695"}] 2026-03-12T20:56:56.657022186Z I0312 20:56:56.656964 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-machine-config-operator, name: coreos-bootimages, uid: c76602b6-82c0-4808-8890-fa7a89a96599]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}] 2026-03-12T20:56:56.661826194Z I0312 20:56:56.661758 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-machine-config-operator, name: kube-rbac-proxy, uid: c19a52dd-ab15-47d7-964f-cf652b88093e]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}] 2026-03-12T20:56:56.666595022Z I0312 20:56:56.666545 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-machine-config-operator, name: machine-config-operator-images, uid: 633ba86b-a866-4df0-9e34-0c0ce6544df5]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}] 2026-03-12T20:56:56.667962496Z I0312 20:56:56.667920 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-machine-config-operator, name: machine-config-osimageurl, uid: 21e237c4-ae33-44c6-b778-efb3d79d9b59]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}] 2026-03-12T20:56:56.674364303Z I0312 20:56:56.674303 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-marketplace, name: marketplace-trusted-ca, uid: b400f736-edda-4762-a1a6-325b87ea99a9]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}] 2026-03-12T20:56:56.677387368Z I0312 20:56:56.677338 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-monitoring, name: telemetry-config, uid: 36c4fe63-ca40-4be6-b830-871fae272995]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}] 2026-03-12T20:56:56.689718372Z I0312 20:56:56.689660 1 garbagecollector.go:587] "item doesn't have an owner, continue on next item" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-oauth-apiserver, name: revision-status-1, uid: 12d4bec6-60af-44a8-9022-4ee8be9a473a]" 2026-03-12T20:56:56.695037013Z I0312 20:56:56.694986 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-multus, name: cni-copy-resources, uid: 4ba7e227-8f3c-4ecd-a395-1139b09c5e79]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"e3993f2f-7854-4c11-bdac-85912b157c72","controller":true,"blockOwnerDeletion":true}] 2026-03-12T20:56:56.708234968Z I0312 20:56:56.708164 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-multus, name: default-cni-sysctl-allowlist, uid: 30dc27c7-92d9-406f-b0fc-6a7221dff2e7]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"e3993f2f-7854-4c11-bdac-85912b157c72","controller":true,"blockOwnerDeletion":true}] 2026-03-12T20:56:56.710491804Z I0312 20:56:56.710447 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-multus, name: multus-daemon-config, uid: 6de1cf16-05f4-4e8e-9719-466cbf572560]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"e3993f2f-7854-4c11-bdac-85912b157c72","controller":true,"blockOwnerDeletion":true}] 2026-03-12T20:56:56.714714009Z I0312 20:56:56.714663 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-multus, name: whereabouts-config, uid: 2d85b535-ad03-457f-9d47-84827afb7ccf]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"e3993f2f-7854-4c11-bdac-85912b157c72","controller":true,"blockOwnerDeletion":true}] 2026-03-12T20:56:56.737141662Z I0312 20:56:56.737008 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-network-node-identity, name: ovnkube-identity-cm, uid: b390ca46-2903-4e91-ae04-01914f293a17]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"e3993f2f-7854-4c11-bdac-85912b157c72","controller":true,"blockOwnerDeletion":true}] 2026-03-12T20:56:56.741657143Z I0312 20:56:56.741004 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-ovn-kubernetes, name: ovnkube-config, uid: 09ae7d20-21af-410a-99db-58563e4c02f4]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"e3993f2f-7854-4c11-bdac-85912b157c72","controller":true,"blockOwnerDeletion":true}] 2026-03-12T20:56:56.741657143Z I0312 20:56:56.741127 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-service-ca-operator, name: service-ca-operator-config, uid: 81114bd0-40cc-4f7d-af88-a8c58e59d2bb]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}] 2026-03-12T20:56:56.741706084Z I0312 20:56:56.741639 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-network-operator, name: applied-cluster, uid: ababb1bb-bfac-4088-85f1-66dba1a87a06]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"e3993f2f-7854-4c11-bdac-85912b157c72","controller":true,"blockOwnerDeletion":true}] 2026-03-12T20:56:56.742724029Z I0312 20:56:56.741787 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-ovn-kubernetes, name: ovnkube-script-lib, uid: 42e25171-6d34-4fb8-98ff-89b072bfa49b]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"e3993f2f-7854-4c11-bdac-85912b157c72","controller":true,"blockOwnerDeletion":true}] 2026-03-12T20:56:56.742724029Z I0312 20:56:56.742018 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-network-operator, name: iptables-alerter-script, uid: 12653092-4b82-418f-9e42-708eb619c3dc]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"e3993f2f-7854-4c11-bdac-85912b157c72","controller":true,"blockOwnerDeletion":true}] 2026-03-12T20:56:57.252255444Z I0312 20:56:57.251769 1 replica_set.go:624] "Too many replicas" logger="replicaset-controller" replicaSet="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945" need=0 deleting=1 2026-03-12T20:56:57.252255444Z I0312 20:56:57.251846 1 replica_set.go:251] "Found related ReplicaSets" logger="replicaset-controller" replicaSet="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945" relatedReplicaSets=["openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945"] 2026-03-12T20:56:57.252255444Z I0312 20:56:57.251878 1 controller_utils.go:608] "Deleting pod" logger="replicaset-controller" controller="cluster-cloud-controller-manager-operator-559568b945" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945-ml8vb" 2026-03-12T20:56:57.271426127Z I0312 20:56:57.271334 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945" duration="19.602924ms" 2026-03-12T20:56:57.292848665Z I0312 20:56:57.292749 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945" duration="21.342567ms" 2026-03-12T20:56:57.292960488Z I0312 20:56:57.292914 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945" duration="65.602µs" 2026-03-12T20:56:57.758341964Z I0312 20:56:57.758195 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-storage-operator/cluster-storage-operator-6fbfc8dc8f" duration="49.571µs" 2026-03-12T20:56:57.776893572Z I0312 20:56:57.776797 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/machine-api-operator-84bf6db4f9" duration="42.461µs" 2026-03-12T20:56:57.797616592Z I0312 20:56:57.797363 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-credential-operator/cloud-credential-operator-55d85b7b47" duration="55.501µs" 2026-03-12T20:56:57.819788359Z I0312 20:56:57.819511 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-autoscaler-operator-69576476f7" duration="45.771µs" 2026-03-12T20:56:57.841337021Z I0312 20:56:57.841063 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-baremetal-operator-5cdb4c5598" duration="49.011µs" 2026-03-12T20:56:57.857352526Z I0312 20:56:57.857216 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-samples-operator/cluster-samples-operator-664cb58b85" duration="38.541µs" 2026-03-12T20:56:57.877560945Z I0312 20:56:57.876232 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-8f89dfddd" duration="29.671µs" 2026-03-12T20:57:05.524733661Z I0312 20:57:05.524048 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-autoscaler-operator-69576476f7" duration="13.335399ms" 2026-03-12T20:57:05.524733661Z I0312 20:57:05.524225 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-autoscaler-operator-69576476f7" duration="50.691µs" 2026-03-12T20:57:05.639257565Z I0312 20:57:05.639078 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-baremetal-operator-5cdb4c5598" duration="9.73027ms" 2026-03-12T20:57:05.639984244Z I0312 20:57:05.639943 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/cluster-baremetal-operator-5cdb4c5598" duration="713.679µs" 2026-03-12T20:57:05.675704474Z I0312 20:57:05.675467 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-samples-operator/cluster-samples-operator-664cb58b85" duration="15.148504ms" 2026-03-12T20:57:05.675704474Z I0312 20:57:05.675561 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-samples-operator/cluster-samples-operator-664cb58b85" duration="54.311µs" 2026-03-12T20:57:05.713361493Z I0312 20:57:05.712611 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-8f89dfddd" duration="22.416753ms" 2026-03-12T20:57:05.713361493Z I0312 20:57:05.712666 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-8f89dfddd" duration="25.691µs" 2026-03-12T20:57:05.731382857Z I0312 20:57:05.728712 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-storage-operator/cluster-storage-operator-6fbfc8dc8f" duration="10.250563ms" 2026-03-12T20:57:05.731382857Z I0312 20:57:05.728864 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cluster-storage-operator/cluster-storage-operator-6fbfc8dc8f" duration="78.092µs" 2026-03-12T20:57:05.755243256Z I0312 20:57:05.755071 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/machine-api-operator-84bf6db4f9" duration="10.787086ms" 2026-03-12T20:57:05.755243256Z I0312 20:57:05.755193 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/machine-api-operator-84bf6db4f9" duration="85.672µs" 2026-03-12T20:57:05.774850519Z I0312 20:57:05.774758 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-credential-operator/cloud-credential-operator-55d85b7b47" duration="11.731799ms" 2026-03-12T20:57:05.775074424Z I0312 20:57:05.775011 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-credential-operator/cloud-credential-operator-55d85b7b47" duration="50.311µs" 2026-03-12T20:57:07.253985893Z I0312 20:57:07.252177 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945" duration="68.612µs" 2026-03-12T20:57:07.332832298Z I0312 20:57:07.332679 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945" duration="49.923µs" 2026-03-12T20:57:07.583145050Z I0312 20:57:07.583055 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945" duration="41.491µs" 2026-03-12T20:57:07.595327401Z I0312 20:57:07.592902 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945" duration="44.731µs" 2026-03-12T20:57:07.613355256Z I0312 20:57:07.613257 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7c8df9b496" need=1 creating=1 2026-03-12T20:57:07.634783314Z I0312 20:57:07.634705 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator" err="Operation cannot be fulfilled on deployments.apps \"cluster-cloud-controller-manager-operator\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-12T20:57:07.645240472Z I0312 20:57:07.645169 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7c8df9b496" duration="31.939978ms" 2026-03-12T20:57:07.654565392Z I0312 20:57:07.654470 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7c8df9b496" duration="9.242597ms" 2026-03-12T20:57:07.654626193Z I0312 20:57:07.654584 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7c8df9b496" duration="68.302µs" 2026-03-12T20:57:07.674165535Z I0312 20:57:07.673744 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7c8df9b496" duration="49.501µs" 2026-03-12T20:57:08.905507700Z I0312 20:57:08.905419 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-machine-config-operator/machine-config-controller-ff46b7bdf" need=1 creating=1 2026-03-12T20:57:08.929489641Z I0312 20:57:08.929224 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-machine-config-operator/machine-config-controller" err="Operation cannot be fulfilled on deployments.apps \"machine-config-controller\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-12T20:57:08.936776371Z I0312 20:57:08.936710 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-ff46b7bdf" duration="31.335063ms" 2026-03-12T20:57:08.951090494Z I0312 20:57:08.946588 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-ff46b7bdf" duration="9.809402ms" 2026-03-12T20:57:08.951090494Z I0312 20:57:08.946680 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-ff46b7bdf" duration="42.251µs" 2026-03-12T20:57:08.970272317Z I0312 20:57:08.970199 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-ff46b7bdf" duration="50.291µs" 2026-03-12T20:57:09.613428987Z I0312 20:57:09.613334 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7c8df9b496" duration="14.302723ms" 2026-03-12T20:57:09.613487788Z I0312 20:57:09.613447 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7c8df9b496" duration="65.052µs" 2026-03-12T20:57:09.667444969Z I0312 20:57:09.667349 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-ff46b7bdf" duration="61.231µs" 2026-03-12T20:57:10.071152084Z I0312 20:57:10.071055 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress/router-default-79f8cd6fdd" duration="65.271µs" 2026-03-12T20:57:10.071335468Z I0312 20:57:10.071282 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-7c67b67d47" duration="28.251µs" 2026-03-12T20:57:10.075766728Z I0312 20:57:10.075684 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497" duration="701.498µs" 2026-03-12T20:57:10.101366739Z I0312 20:57:10.100504 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-7c67b67d47" duration="48.472µs" 2026-03-12T20:57:10.103956744Z I0312 20:57:10.103203 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497" duration="56.291µs" 2026-03-12T20:57:10.120441920Z I0312 20:57:10.120341 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress/router-default-79f8cd6fdd" duration="53.662µs" 2026-03-12T20:57:10.144261128Z I0312 20:57:10.144122 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497" duration="90.132µs" 2026-03-12T20:57:10.168112406Z I0312 20:57:10.166946 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-7c67b67d47" duration="39.251µs" 2026-03-12T20:57:10.648929272Z I0312 20:57:10.647861 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-ff46b7bdf" duration="13.716188ms" 2026-03-12T20:57:10.648929272Z I0312 20:57:10.648182 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-ff46b7bdf" duration="51.401µs" 2026-03-12T20:57:10.926346603Z I0312 20:57:10.926191 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-7c67b67d47" duration="49.311µs" 2026-03-12T20:57:11.015632125Z I0312 20:57:11.015518 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497" duration="78.372µs" 2026-03-12T20:57:11.722536927Z I0312 20:57:11.722141 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-7c67b67d47" duration="21.04973ms" 2026-03-12T20:57:11.722536927Z I0312 20:57:11.722275 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-7c67b67d47" duration="81.412µs" 2026-03-12T20:57:13.672531274Z I0312 20:57:13.672426 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497" duration="46.771µs" 2026-03-12T20:57:13.707942497Z I0312 20:57:13.707853 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress/router-default-79f8cd6fdd" duration="67.841µs" 2026-03-12T20:57:13.744793765Z I0312 20:57:13.744109 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497" duration="8.655634ms" 2026-03-12T20:57:13.748034055Z I0312 20:57:13.745089 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-8464df8497" duration="108.002µs" 2026-03-12T20:57:14.456855995Z I0312 20:57:14.456629 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-monitoring/prometheus-operator-5ff8674d55" need=1 creating=1 2026-03-12T20:57:14.470774228Z I0312 20:57:14.469748 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-monitoring/prometheus-operator" err="Operation cannot be fulfilled on deployments.apps \"prometheus-operator\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-12T20:57:14.474659413Z I0312 20:57:14.474614 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-5ff8674d55" duration="18.030305ms" 2026-03-12T20:57:14.482967178Z I0312 20:57:14.482898 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-5ff8674d55" duration="8.240673ms" 2026-03-12T20:57:14.483007879Z I0312 20:57:14.482991 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-5ff8674d55" duration="58.592µs" 2026-03-12T20:57:14.488126726Z I0312 20:57:14.488058 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-monitoring/prometheus-operator" err="Operation cannot be fulfilled on deployments.apps \"prometheus-operator\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-12T20:57:14.498922862Z I0312 20:57:14.493447 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-5ff8674d55" duration="58.592µs" 2026-03-12T20:57:14.514904006Z I0312 20:57:14.514783 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-5ff8674d55" duration="80.622µs" 2026-03-12T20:57:15.826194712Z I0312 20:57:15.826098 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-5ff8674d55" duration="147.044µs" 2026-03-12T20:57:17.764469569Z I0312 20:57:17.764360 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-5ff8674d55" duration="105.003µs" config/pod/openshift-kube-controller-manager/logs/installer-2-master-0/installer_current.log0000640000000000000000000011412515154624262031006 0ustar00000000000000002026-03-12T20:55:58.439674013Z (string) (len=10) "csr-signer" 2026-03-12T20:55:58.439674013Z }, 2026-03-12T20:55:58.439674013Z OptionalCertSecretNamePrefixes: ([]string) , 2026-03-12T20:55:58.439674013Z CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-12T20:55:58.439674013Z (string) (len=20) "aggregator-client-ca", 2026-03-12T20:55:58.439674013Z (string) (len=9) "client-ca" 2026-03-12T20:55:58.439674013Z }, 2026-03-12T20:55:58.439674013Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-12T20:55:58.439674013Z (string) (len=17) "trusted-ca-bundle" 2026-03-12T20:55:58.439674013Z }, 2026-03-12T20:55:58.439674013Z CertDir: (string) (len=66) "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs", 2026-03-12T20:55:58.439674013Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-12T20:55:58.439674013Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-12T20:55:58.439674013Z Timeout: (time.Duration) 2m0s, 2026-03-12T20:55:58.439674013Z StaticPodManifestsLockFile: (string) "", 2026-03-12T20:55:58.439674013Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-12T20:55:58.439674013Z KubeletVersion: (string) "" 2026-03-12T20:55:58.439674013Z }) 2026-03-12T20:55:58.441144699Z I0312 20:55:58.441068 1 cmd.go:413] Getting controller reference for node master-0 2026-03-12T20:55:58.634118132Z I0312 20:55:58.534878 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-12T20:55:58.634118132Z I0312 20:55:58.535008 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-12T20:55:58.634118132Z I0312 20:55:58.535036 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-12T20:55:58.634118132Z I0312 20:55:58.539200 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-03-12T20:56:28.539608239Z I0312 20:56:28.539474 1 cmd.go:524] Getting installer pods for node master-0 2026-03-12T20:56:28.545721109Z I0312 20:56:28.545660 1 cmd.go:542] Latest installer revision for node master-0 is: 2 2026-03-12T20:56:28.545721109Z I0312 20:56:28.545689 1 cmd.go:431] Querying kubelet version for node master-0 2026-03-12T20:56:28.548265882Z I0312 20:56:28.548206 1 cmd.go:444] Got kubelet version 1.31.14 on target node master-0 2026-03-12T20:56:28.548291353Z I0312 20:56:28.548274 1 cmd.go:293] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2" ... 2026-03-12T20:56:28.548587090Z I0312 20:56:28.548533 1 cmd.go:221] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2" ... 2026-03-12T20:56:28.548587090Z I0312 20:56:28.548569 1 cmd.go:229] Getting secrets ... 2026-03-12T20:56:28.551720438Z I0312 20:56:28.551684 1 copy.go:32] Got secret openshift-kube-controller-manager/localhost-recovery-client-token-2 2026-03-12T20:56:28.554753712Z I0312 20:56:28.554695 1 copy.go:32] Got secret openshift-kube-controller-manager/service-account-private-key-2 2026-03-12T20:56:28.560465753Z I0312 20:56:28.560192 1 copy.go:32] Got secret openshift-kube-controller-manager/serving-cert-2 2026-03-12T20:56:28.560465753Z I0312 20:56:28.560258 1 cmd.go:242] Getting config maps ... 2026-03-12T20:56:28.563828606Z I0312 20:56:28.563748 1 copy.go:60] Got configMap openshift-kube-controller-manager/cluster-policy-controller-config-2 2026-03-12T20:56:28.566258786Z I0312 20:56:28.566183 1 copy.go:60] Got configMap openshift-kube-controller-manager/config-2 2026-03-12T20:56:28.570029529Z I0312 20:56:28.568891 1 copy.go:60] Got configMap openshift-kube-controller-manager/controller-manager-kubeconfig-2 2026-03-12T20:56:28.571491425Z I0312 20:56:28.571409 1 copy.go:60] Got configMap openshift-kube-controller-manager/kube-controller-cert-syncer-kubeconfig-2 2026-03-12T20:56:28.575494824Z I0312 20:56:28.575420 1 copy.go:60] Got configMap openshift-kube-controller-manager/kube-controller-manager-pod-2 2026-03-12T20:56:28.743537068Z I0312 20:56:28.743451 1 copy.go:60] Got configMap openshift-kube-controller-manager/recycler-config-2 2026-03-12T20:56:28.957790471Z I0312 20:56:28.957550 1 copy.go:60] Got configMap openshift-kube-controller-manager/service-ca-2 2026-03-12T20:56:29.143137862Z I0312 20:56:29.143035 1 copy.go:60] Got configMap openshift-kube-controller-manager/serviceaccount-ca-2 2026-03-12T20:56:29.343860731Z I0312 20:56:29.343677 1 copy.go:52] Failed to get config map openshift-kube-controller-manager/cloud-config-2: configmaps "cloud-config-2" not found 2026-03-12T20:56:29.343860731Z I0312 20:56:29.343714 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/localhost-recovery-client-token" ... 2026-03-12T20:56:29.343915452Z I0312 20:56:29.343905 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/localhost-recovery-client-token/token" ... 2026-03-12T20:56:29.347837699Z I0312 20:56:29.344044 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/localhost-recovery-client-token/ca.crt" ... 2026-03-12T20:56:29.347837699Z I0312 20:56:29.344124 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/localhost-recovery-client-token/namespace" ... 2026-03-12T20:56:29.347837699Z I0312 20:56:29.344200 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/service-account-private-key" ... 2026-03-12T20:56:29.347837699Z I0312 20:56:29.344242 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/service-account-private-key/service-account.key" ... 2026-03-12T20:56:29.347837699Z I0312 20:56:29.344318 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/serving-cert" ... 2026-03-12T20:56:29.347837699Z I0312 20:56:29.344359 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/serving-cert/tls.crt" ... 2026-03-12T20:56:29.347837699Z I0312 20:56:29.344430 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/serving-cert/tls.key" ... 2026-03-12T20:56:29.347837699Z I0312 20:56:29.344502 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/cluster-policy-controller-config" ... 2026-03-12T20:56:29.347837699Z I0312 20:56:29.344580 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/cluster-policy-controller-config/config.yaml" ... 2026-03-12T20:56:29.347837699Z I0312 20:56:29.344660 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/config" ... 2026-03-12T20:56:29.347837699Z I0312 20:56:29.344702 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/config/config.yaml" ... 2026-03-12T20:56:29.347837699Z I0312 20:56:29.344782 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/controller-manager-kubeconfig" ... 2026-03-12T20:56:29.347837699Z I0312 20:56:29.344864 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/controller-manager-kubeconfig/kubeconfig" ... 2026-03-12T20:56:29.347837699Z I0312 20:56:29.344938 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-cert-syncer-kubeconfig" ... 2026-03-12T20:56:29.347837699Z I0312 20:56:29.344984 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig" ... 2026-03-12T20:56:29.347837699Z I0312 20:56:29.345110 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-manager-pod" ... 2026-03-12T20:56:29.347837699Z I0312 20:56:29.345154 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-manager-pod/forceRedeploymentReason" ... 2026-03-12T20:56:29.347837699Z I0312 20:56:29.345223 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-manager-pod/pod.yaml" ... 2026-03-12T20:56:29.347837699Z I0312 20:56:29.345306 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-manager-pod/version" ... 2026-03-12T20:56:29.347837699Z I0312 20:56:29.345383 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/recycler-config" ... 2026-03-12T20:56:29.347837699Z I0312 20:56:29.345459 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/recycler-config/recycler-pod.yaml" ... 2026-03-12T20:56:29.347837699Z I0312 20:56:29.345534 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/service-ca" ... 2026-03-12T20:56:29.347837699Z I0312 20:56:29.345582 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/service-ca/ca-bundle.crt" ... 2026-03-12T20:56:29.347837699Z I0312 20:56:29.345655 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/serviceaccount-ca" ... 2026-03-12T20:56:29.347837699Z I0312 20:56:29.345728 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/serviceaccount-ca/ca-bundle.crt" ... 2026-03-12T20:56:29.347837699Z I0312 20:56:29.345841 1 cmd.go:221] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs" ... 2026-03-12T20:56:29.347837699Z I0312 20:56:29.345904 1 cmd.go:229] Getting secrets ... 2026-03-12T20:56:29.544858148Z I0312 20:56:29.542994 1 copy.go:32] Got secret openshift-kube-controller-manager/csr-signer 2026-03-12T20:56:29.745621378Z I0312 20:56:29.745508 1 copy.go:32] Got secret openshift-kube-controller-manager/kube-controller-manager-client-cert-key 2026-03-12T20:56:29.745719261Z I0312 20:56:29.745620 1 cmd.go:242] Getting config maps ... 2026-03-12T20:56:29.944384120Z I0312 20:56:29.944268 1 copy.go:60] Got configMap openshift-kube-controller-manager/aggregator-client-ca 2026-03-12T20:56:30.247151987Z I0312 20:56:30.247096 1 copy.go:60] Got configMap openshift-kube-controller-manager/client-ca 2026-03-12T20:56:30.434149737Z I0312 20:56:30.434052 1 copy.go:60] Got configMap openshift-kube-controller-manager/trusted-ca-bundle 2026-03-12T20:56:30.434451105Z I0312 20:56:30.434407 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/csr-signer" ... 2026-03-12T20:56:30.434642609Z I0312 20:56:30.434597 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/csr-signer/tls.crt" ... 2026-03-12T20:56:30.434777433Z I0312 20:56:30.434731 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/csr-signer/tls.key" ... 2026-03-12T20:56:30.434870266Z I0312 20:56:30.434841 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/kube-controller-manager-client-cert-key" ... 2026-03-12T20:56:30.434952748Z I0312 20:56:30.434928 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/kube-controller-manager-client-cert-key/tls.key" ... 2026-03-12T20:56:30.435044650Z I0312 20:56:30.435021 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/kube-controller-manager-client-cert-key/tls.crt" ... 2026-03-12T20:56:30.435132032Z I0312 20:56:30.435107 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/aggregator-client-ca" ... 2026-03-12T20:56:30.435228314Z I0312 20:56:30.435193 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/aggregator-client-ca/ca-bundle.crt" ... 2026-03-12T20:56:30.435392358Z I0312 20:56:30.435344 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/client-ca" ... 2026-03-12T20:56:30.435408209Z I0312 20:56:30.435397 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/client-ca/ca-bundle.crt" ... 2026-03-12T20:56:30.435546612Z I0312 20:56:30.435515 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/trusted-ca-bundle" ... 2026-03-12T20:56:30.435660415Z I0312 20:56:30.435635 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/trusted-ca-bundle/ca-bundle.crt" ... 2026-03-12T20:56:30.436309381Z I0312 20:56:30.436279 1 cmd.go:335] Getting pod configmaps/kube-controller-manager-pod-2 -n openshift-kube-controller-manager 2026-03-12T20:56:30.735983651Z I0312 20:56:30.734765 1 cmd.go:351] Creating directory for static pod manifest "/etc/kubernetes/manifests" ... 2026-03-12T20:56:30.735983651Z I0312 20:56:30.734874 1 cmd.go:379] Writing a pod under "kube-controller-manager-pod.yaml" key 2026-03-12T20:56:30.735983651Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"kube-controller-manager","namespace":"openshift-kube-controller-manager","creationTimestamp":null,"labels":{"app":"kube-controller-manager","kube-controller-manager":"true","revision":"2"},"annotations":{"kubectl.kubernetes.io/default-container":"kube-controller-manager","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs"}}],"containers":[{"name":"kube-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 10257 \\))\" ]; do sleep 1; done'\n\nif [ -f /etc/kubernetes/static-pod-certs/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /etc/kubernetes/static-pod-certs/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\n\nif [ -f /etc/kubernetes/static-pod-resources/configmaps/cloud-config/ca-bundle.pem ]; then\n echo \"Setting custom CA bundle for cloud provider\"\n export AWS_CA_BUNDLE=/etc/kubernetes/static-pod-resources/configmaps/cloud-config/ca-bundle.pem\nfi\n\nexec hyperkube kube-controller-manager --openshift-config=/etc/kubernetes/static-pod-resources/configmaps/config/config.yaml \\\n --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --authentication-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --authorization-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --client-ca-file=/etc/kubernetes/static-pod-certs/configmaps/client-ca/ca-bundle.crt \\\n --requestheader-client-ca-file=/etc/kubernetes/static-pod-certs/configmaps/aggregator-client-ca/ca-bundle.crt -v=2 --tls-cert-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.crt --tls-private-key-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.key --allocate-node-cidrs=false --cert-dir=/var/run/kubernetes --cloud-provider=external --cluster-cidr=10.128.0.0/16 --cluster-name=sno-zhkxn --cluster-signing-cert-file=/etc/kubernetes/static-pod-certs/secrets/csr-signer/tls.crt --cluster-signing-duration=720h --cluster-signing-key-file=/etc/kubernetes/static-pod-certs/secrets/csr-signer/tls.key --controllers=* --controllers=-bootstrapsigner --controllers=-tokencleaner --controllers=-ttl --enable-dynamic-provisioning=true --feature-gates=AWSClusterHostedDNS=false --feature-gates=AWSEFSDriverVolumeMetrics=true --feature-gates=AdditionalRoutingCapabilities=false --feature-gates=AdminNetworkPolicy=true --feature-gates=AlibabaPlatform=true --feature-gates=AutomatedEtcdBackup=false --feature-gates=AzureWorkloadIdentity=true --feature-gates=BareMetalLoadBalancer=true --feature-gates=BootcNodeManagement=false --feature-gates=BuildCSIVolumes=true --feature-gates=CSIDriverSharedResource=false --feature-gates=ChunkSizeMiB=true --feature-gates=CloudDualStackNodeIPs=true --feature-gates=ClusterAPIInstall=false --feature-gates=ClusterAPIInstallIBMCloud=false --feature-gates=ClusterMonitoringConfig=false --feature-gates=ConsolePluginContentSecurityPolicy=false --feature-gates=DNSNameResolver=false --feature-gates=DisableKubeletCloudCredentialProviders=true --feature-gates=DynamicResourceAllocation=false --feature-gates=EtcdBackendQuota=false --feature-gates=EventedPLEG=false --feature-gates=Example=false --feature-gates=ExternalOIDC=false --feature-gates=ExternalOIDCWithUIDAndExtraClaimMappings=false --feature-gates=GCPClusterHostedDNS=false --feature-gates=GCPLabelsTags=true --feature-gates=GatewayAPI=false --feature-gates=HardwareSpeed=true --feature-gates=ImageStreamImportMode=false --feature-gates=IngressControllerDynamicConfigurationManager=false --feature-gates=IngressControllerLBSubnetsAWS=true --feature-gates=InsightsConfig=false --feature-gates=InsightsConfigAPI=false --feature-gates=InsightsOnDemandDataGather=false --feature-gates=InsightsRuntimeExtractor=false --feature-gates=KMSv1=true --feature-gates=MachineAPIMigration=false --feature-gates=MachineAPIOperatorDisableMachineHealthCheckController=false --feature-gates=MachineAPIProviderOpenStack=false --feature-gates=MachineConfigNodes=false --feature-gates=ManagedBootImages=true --feature-gates=ManagedBootImagesAWS=true --feature-gates=MaxUnavailableStatefulSet=false --feature-gates=MetricsCollectionProfiles=false --feature-gates=MinimumKubeletVersion=false --feature-gates=MixedCPUsAllocation=false --feature-gates=MultiArchInstallAWS=true --feature-gates=MultiArchInstallAzure=false --feature-gates=MultiArchInstallGCP=true --feature-gates=NetworkDiagnosticsConfig=true --feature-gates=NetworkLiveMigration=true --feature-gates=NetworkSegmentation=true --feature-gates=NewOLM=true --feature-gates=NodeDisruptionPolicy=true --feature-gates=NodeSwap=false --feature-gates=NutanixMultiSubnets=false --feature-gates=OVNObservability=false --feature-gates=OnClusterBuild=true --feature-gates=OpenShiftPodSecurityAdmission=false --feature-gates=PersistentIPsForVirtualization=true --feature-gates=PinnedImages=false --feature-gates=PlatformOperators=false --feature-gates=PrivateHostedZoneAWS=true --feature-gates=ProcMountType=false --feature-gates=RouteAdvertisements=false --feature-gates=RouteExternalCertificate=false --feature-gates=ServiceAccountTokenNodeBinding=false --feature-gates=SetEIPForNLBIngressController=true --feature-gates=SignatureStores=false --feature-gates=SigstoreImageVerification=false --feature-gates=StreamingCollectionEncodingToJSON=true --feature-gates=StreamingCollectionEncodingToProtobuf=true --feature-gates=TranslateStreamCloseWebsocketRequests=false --feature-gates=UpgradeStatus=false --feature-gates=UserNamespacesPodSecurityStandards=false --feature-gates=UserNamespacesSupport=false --feature-gates=VSphereControlPlaneMachineSet=true --feature-gates=VSphereDriverConfiguration=true --feature-gates=VSphereMultiNetworks=false --feature-gates=VSphereMultiVCenters=true --feature-gates=VSphereStaticIPs=true --feature-gates=ValidatingAdmissionPolicy=true --feature-gates=VolumeAttributesClass=false --feature-gates=VolumeGroupSnapshot=false --flex-volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec --kube-api-burst=300 --kube-api-qps=150 --leader-elect-renew-deadline=12s --leader-elect-resource-lock=leases --leader-elect-retry-period=3s --leader-elect=true --pv-recycler-pod-template-filepath-hostpath=/etc/kubernetes/static-pod-resources/configmaps/recycler-config/recycler-pod.yaml --pv-recycler-pod-template-filepath-nfs=/etc/kubernetes/static-pod-resources/configmaps/recycler-config/recycler-pod.yaml --root-ca-file=/etc/kubernetes/static-pod-resources/configmaps/serviceaccount-ca/ca-bundle.crt --secure-port=10257 --service-account-private-key-file=/etc/kubernetes/static-pod-resources/secrets/service-account-private-key/service-account.key --service-cluster-ip-range=172.30.0.0/16 --use-service-account-credentials=true --tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 --tls-min-version=VersionTLS12"],"ports":[{"containerPort":10257}],"resources":{"requests":{"cpu":"60m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10},"readinessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10},"startupProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"timeoutSeconds":3},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"cluster-policy-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 10357 \\))\" ]; do sleep 1; done'\n\nexec cluster-policy-controller start --config=/etc/kubernetes/static-pod-resources/configmaps/cluster-policy-controller-config/config.yaml \\\n --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --namespace=${POD_NAMESPACE} -v=2"],"ports":[{"containerPort":10357}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10},"readinessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10},"startupProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"timeoutSeconds":3},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-controller-manager-cert-syncer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","command":["cluster-kube-controller-manager-operator","cert-syncer"],"args":["--kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig","--namespace=$(POD_NAMESPACE)","--destination-dir=/etc/kubernetes/static-pod-certs"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-controller-manager-recovery-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 9443 \\))\" ]; do sleep 1; done'\n\nexec cluster-kube-controller-manager-operator cert-recovery-controller --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig --namespace=${POD_NAMESPACE} --listen=0.0.0.0:9443 -v=2"],"env":[{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000},"status":{}} 2026-03-12T20:56:30.839083393Z I0312 20:56:30.838971 1 cmd.go:610] Writing pod manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/kube-controller-manager-pod.yaml" ... 2026-03-12T20:56:30.839458973Z I0312 20:56:30.839397 1 cmd.go:617] Removed existing static pod manifest "/etc/kubernetes/manifests/kube-controller-manager-pod.yaml" ... 2026-03-12T20:56:30.839458973Z I0312 20:56:30.839423 1 cmd.go:621] Writing static pod manifest "/etc/kubernetes/manifests/kube-controller-manager-pod.yaml" ... 2026-03-12T20:56:30.839458973Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"kube-controller-manager","namespace":"openshift-kube-controller-manager","creationTimestamp":null,"labels":{"app":"kube-controller-manager","kube-controller-manager":"true","revision":"2"},"annotations":{"kubectl.kubernetes.io/default-container":"kube-controller-manager","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs"}}],"containers":[{"name":"kube-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 10257 \\))\" ]; do sleep 1; done'\n\nif [ -f /etc/kubernetes/static-pod-certs/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /etc/kubernetes/static-pod-certs/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\n\nif [ -f /etc/kubernetes/static-pod-resources/configmaps/cloud-config/ca-bundle.pem ]; then\n echo \"Setting custom CA bundle for cloud provider\"\n export AWS_CA_BUNDLE=/etc/kubernetes/static-pod-resources/configmaps/cloud-config/ca-bundle.pem\nfi\n\nexec hyperkube kube-controller-manager --openshift-config=/etc/kubernetes/static-pod-resources/configmaps/config/config.yaml \\\n --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --authentication-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --authorization-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --client-ca-file=/etc/kubernetes/static-pod-certs/configmaps/client-ca/ca-bundle.crt \\\n --requestheader-client-ca-file=/etc/kubernetes/static-pod-certs/configmaps/aggregator-client-ca/ca-bundle.crt -v=2 --tls-cert-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.crt --tls-private-key-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.key --allocate-node-cidrs=false --cert-dir=/var/run/kubernetes --cloud-provider=external --cluster-cidr=10.128.0.0/16 --cluster-name=sno-zhkxn --cluster-signing-cert-file=/etc/kubernetes/static-pod-certs/secrets/csr-signer/tls.crt --cluster-signing-duration=720h --cluster-signing-key-file=/etc/kubernetes/static-pod-certs/secrets/csr-signer/tls.key --controllers=* --controllers=-bootstrapsigner --controllers=-tokencleaner --controllers=-ttl --enable-dynamic-provisioning=true --feature-gates=AWSClusterHostedDNS=false --feature-gates=AWSEFSDriverVolumeMetrics=true --feature-gates=AdditionalRoutingCapabilities=false --feature-gates=AdminNetworkPolicy=true --feature-gates=AlibabaPlatform=true --feature-gates=AutomatedEtcdBackup=false --feature-gates=AzureWorkloadIdentity=true --feature-gates=BareMetalLoadBalancer=true --feature-gates=BootcNodeManagement=false --feature-gates=BuildCSIVolumes=true --feature-gates=CSIDriverSharedResource=false --feature-gates=ChunkSizeMiB=true --feature-gates=CloudDualStackNodeIPs=true --feature-gates=ClusterAPIInstall=false --feature-gates=ClusterAPIInstallIBMCloud=false --feature-gates=ClusterMonitoringConfig=false --feature-gates=ConsolePluginContentSecurityPolicy=false --feature-gates=DNSNameResolver=false --feature-gates=DisableKubeletCloudCredentialProviders=true --feature-gates=DynamicResourceAllocation=false --feature-gates=EtcdBackendQuota=false --feature-gates=EventedPLEG=false --feature-gates=Example=false --feature-gates=ExternalOIDC=false --feature-gates=ExternalOIDCWithUIDAndExtraClaimMappings=false --feature-gates=GCPClusterHostedDNS=false --feature-gates=GCPLabelsTags=true --feature-gates=GatewayAPI=false --feature-gates=HardwareSpeed=true --feature-gates=ImageStreamImportMode=false --feature-gates=IngressControllerDynamicConfigurationManager=false --feature-gates=IngressControllerLBSubnetsAWS=true --feature-gates=InsightsConfig=false --feature-gates=InsightsConfigAPI=false --feature-gates=InsightsOnDemandDataGather=false --feature-gates=InsightsRuntimeExtractor=false --feature-gates=KMSv1=true --feature-gates=MachineAPIMigration=false --feature-gates=MachineAPIOperatorDisableMachineHealthCheckController=false --feature-gates=MachineAPIProviderOpenStack=false --feature-gates=MachineConfigNodes=false --feature-gates=ManagedBootImages=true --feature-gates=ManagedBootImagesAWS=true --feature-gates=MaxUnavailableStatefulSet=false --feature-gates=MetricsCollectionProfiles=false --feature-gates=MinimumKubeletVersion=false --feature-gates=MixedCPUsAllocation=false --feature-gates=MultiArchInstallAWS=true --feature-gates=MultiArchInstallAzure=false --feature-gates=MultiArchInstallGCP=true --feature-gates=NetworkDiagnosticsConfig=true --feature-gates=NetworkLiveMigration=true --feature-gates=NetworkSegmentation=true --feature-gates=NewOLM=true --feature-gates=NodeDisruptionPolicy=true --feature-gates=NodeSwap=false --feature-gates=NutanixMultiSubnets=false --feature-gates=OVNObservability=false --feature-gates=OnClusterBuild=true --feature-gates=OpenShiftPodSecurityAdmission=false --feature-gates=PersistentIPsForVirtualization=true --feature-gates=PinnedImages=false --feature-gates=PlatformOperators=false --feature-gates=PrivateHostedZoneAWS=true --feature-gates=ProcMountType=false --feature-gates=RouteAdvertisements=false --feature-gates=RouteExternalCertificate=false --feature-gates=ServiceAccountTokenNodeBinding=false --feature-gates=SetEIPForNLBIngressController=true --feature-gates=SignatureStores=false --feature-gates=SigstoreImageVerification=false --feature-gates=StreamingCollectionEncodingToJSON=true --feature-gates=StreamingCollectionEncodingToProtobuf=true --feature-gates=TranslateStreamCloseWebsocketRequests=false --feature-gates=UpgradeStatus=false --feature-gates=UserNamespacesPodSecurityStandards=false --feature-gates=UserNamespacesSupport=false --feature-gates=VSphereControlPlaneMachineSet=true --feature-gates=VSphereDriverConfiguration=true --feature-gates=VSphereMultiNetworks=false --feature-gates=VSphereMultiVCenters=true --feature-gates=VSphereStaticIPs=true --feature-gates=ValidatingAdmissionPolicy=true --feature-gates=VolumeAttributesClass=false --feature-gates=VolumeGroupSnapshot=false --flex-volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec --kube-api-burst=300 --kube-api-qps=150 --leader-elect-renew-deadline=12s --leader-elect-resource-lock=leases --leader-elect-retry-period=3s --leader-elect=true --pv-recycler-pod-template-filepath-hostpath=/etc/kubernetes/static-pod-resources/configmaps/recycler-config/recycler-pod.yaml --pv-recycler-pod-template-filepath-nfs=/etc/kubernetes/static-pod-resources/configmaps/recycler-config/recycler-pod.yaml --root-ca-file=/etc/kubernetes/static-pod-resources/configmaps/serviceaccount-ca/ca-bundle.crt --secure-port=10257 --service-account-private-key-file=/etc/kubernetes/static-pod-resources/secrets/service-account-private-key/service-account.key --service-cluster-ip-range=172.30.0.0/16 --use-service-account-credentials=true --tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 --tls-min-version=VersionTLS12"],"ports":[{"containerPort":10257}],"resources":{"requests":{"cpu":"60m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10},"readinessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10},"startupProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"timeoutSeconds":3},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"cluster-policy-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 10357 \\))\" ]; do sleep 1; done'\n\nexec cluster-policy-controller start --config=/etc/kubernetes/static-pod-resources/configmaps/cluster-policy-controller-config/config.yaml \\\n --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --namespace=${POD_NAMESPACE} -v=2"],"ports":[{"containerPort":10357}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10},"readinessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10},"startupProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"timeoutSeconds":3},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-controller-manager-cert-syncer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","command":["cluster-kube-controller-manager-operator","cert-syncer"],"args":["--kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig","--namespace=$(POD_NAMESPACE)","--destination-dir=/etc/kubernetes/static-pod-certs"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-controller-manager-recovery-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 9443 \\))\" ]; do sleep 1; done'\n\nexec cluster-kube-controller-manager-operator cert-recovery-controller --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig --namespace=${POD_NAMESPACE} --listen=0.0.0.0:9443 -v=2"],"env":[{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000},"status":{}} config/pod/openshift-kube-apiserver/logs/installer-1-master-0/installer_current.log0000640000000000000000000002041715154624262027212 0ustar00000000000000002026-03-12T20:50:33.444450141Z I0312 20:50:33.444182 1 cmd.go:95] &{ true {false} installer true map[cert-configmaps:0xc00093e140 cert-dir:0xc00093e320 cert-secrets:0xc00093e0a0 configmaps:0xc0002c9180 namespace:0xc0002c8dc0 optional-cert-configmaps:0xc00093e280 optional-cert-secrets:0xc00093e1e0 optional-configmaps:0xc0002c9860 optional-secrets:0xc0002c9720 pod:0xc0002c8f00 pod-manifest-dir:0xc0002c9ae0 resource-dir:0xc0002c99a0 revision:0xc0002c8b40 secrets:0xc0002c9040 v:0xc00093f7c0] [0xc00093f7c0 0xc0002c8b40 0xc0002c8dc0 0xc0002c8f00 0xc0002c99a0 0xc0002c9ae0 0xc0002c9180 0xc0002c9860 0xc0002c9040 0xc0002c9720 0xc00093e320 0xc00093e140 0xc00093e280 0xc00093e0a0 0xc00093e1e0] [] map[cert-configmaps:0xc00093e140 cert-dir:0xc00093e320 cert-secrets:0xc00093e0a0 configmaps:0xc0002c9180 help:0xc00093fcc0 kubeconfig:0xc0002c8a00 log-flush-frequency:0xc00093f720 namespace:0xc0002c8dc0 optional-cert-configmaps:0xc00093e280 optional-cert-secrets:0xc00093e1e0 optional-configmaps:0xc0002c9860 optional-secrets:0xc0002c9720 pod:0xc0002c8f00 pod-manifest-dir:0xc0002c9ae0 pod-manifests-lock-file:0xc00093e000 resource-dir:0xc0002c99a0 revision:0xc0002c8b40 secrets:0xc0002c9040 timeout-duration:0xc0002c9ea0 v:0xc00093f7c0 vmodule:0xc00093f860] [0xc0002c8a00 0xc0002c8b40 0xc0002c8dc0 0xc0002c8f00 0xc0002c9040 0xc0002c9180 0xc0002c9720 0xc0002c9860 0xc0002c99a0 0xc0002c9ae0 0xc0002c9ea0 0xc00093e000 0xc00093e0a0 0xc00093e140 0xc00093e1e0 0xc00093e280 0xc00093e320 0xc00093f720 0xc00093f7c0 0xc00093f860 0xc00093fcc0] [0xc00093e140 0xc00093e320 0xc00093e0a0 0xc0002c9180 0xc00093fcc0 0xc0002c8a00 0xc00093f720 0xc0002c8dc0 0xc00093e280 0xc00093e1e0 0xc0002c9860 0xc0002c9720 0xc0002c8f00 0xc0002c9ae0 0xc00093e000 0xc0002c99a0 0xc0002c8b40 0xc0002c9040 0xc0002c9ea0 0xc00093f7c0 0xc00093f860] map[104:0xc00093fcc0 118:0xc00093f7c0] [] -1 0 0xc0003f2840 true 0xae2020 []} 2026-03-12T20:50:33.444617376Z I0312 20:50:33.444473 1 cmd.go:96] (*installerpod.InstallOptions)(0xc0007c6680)({ 2026-03-12T20:50:33.444617376Z KubeConfig: (string) "", 2026-03-12T20:50:33.444617376Z KubeClient: (kubernetes.Interface) , 2026-03-12T20:50:33.444617376Z Revision: (string) (len=1) "1", 2026-03-12T20:50:33.444617376Z NodeName: (string) "", 2026-03-12T20:50:33.444617376Z Namespace: (string) (len=24) "openshift-kube-apiserver", 2026-03-12T20:50:33.444617376Z Clock: (clock.RealClock) { 2026-03-12T20:50:33.444617376Z }, 2026-03-12T20:50:33.444617376Z PodConfigMapNamePrefix: (string) (len=18) "kube-apiserver-pod", 2026-03-12T20:50:33.444617376Z SecretNamePrefixes: ([]string) (len=3 cap=4) { 2026-03-12T20:50:33.444617376Z (string) (len=11) "etcd-client", 2026-03-12T20:50:33.444617376Z (string) (len=34) "localhost-recovery-serving-certkey", 2026-03-12T20:50:33.444617376Z (string) (len=31) "localhost-recovery-client-token" 2026-03-12T20:50:33.444617376Z }, 2026-03-12T20:50:33.444617376Z OptionalSecretNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-12T20:50:33.444617376Z (string) (len=17) "encryption-config", 2026-03-12T20:50:33.444617376Z (string) (len=21) "webhook-authenticator" 2026-03-12T20:50:33.444617376Z }, 2026-03-12T20:50:33.444617376Z ConfigMapNamePrefixes: ([]string) (len=8 cap=8) { 2026-03-12T20:50:33.444617376Z (string) (len=18) "kube-apiserver-pod", 2026-03-12T20:50:33.444617376Z (string) (len=6) "config", 2026-03-12T20:50:33.444617376Z (string) (len=37) "kube-apiserver-cert-syncer-kubeconfig", 2026-03-12T20:50:33.444617376Z (string) (len=28) "bound-sa-token-signing-certs", 2026-03-12T20:50:33.444617376Z (string) (len=15) "etcd-serving-ca", 2026-03-12T20:50:33.444617376Z (string) (len=18) "kubelet-serving-ca", 2026-03-12T20:50:33.444617376Z (string) (len=22) "sa-token-signing-certs", 2026-03-12T20:50:33.444617376Z (string) (len=29) "kube-apiserver-audit-policies" 2026-03-12T20:50:33.444617376Z }, 2026-03-12T20:50:33.444617376Z OptionalConfigMapNamePrefixes: ([]string) (len=3 cap=4) { 2026-03-12T20:50:33.444617376Z (string) (len=14) "oauth-metadata", 2026-03-12T20:50:33.444617376Z (string) (len=12) "cloud-config", 2026-03-12T20:50:33.444617376Z (string) (len=24) "kube-apiserver-server-ca" 2026-03-12T20:50:33.444617376Z }, 2026-03-12T20:50:33.444617376Z CertSecretNames: ([]string) (len=10 cap=16) { 2026-03-12T20:50:33.444617376Z (string) (len=17) "aggregator-client", 2026-03-12T20:50:33.444617376Z (string) (len=30) "localhost-serving-cert-certkey", 2026-03-12T20:50:33.444617376Z (string) (len=31) "service-network-serving-certkey", 2026-03-12T20:50:33.444617376Z (string) (len=37) "external-loadbalancer-serving-certkey", 2026-03-12T20:50:33.444617376Z (string) (len=37) "internal-loadbalancer-serving-certkey", 2026-03-12T20:50:33.444617376Z (string) (len=33) "bound-service-account-signing-key", 2026-03-12T20:50:33.444617376Z (string) (len=40) "control-plane-node-admin-client-cert-key", 2026-03-12T20:50:33.444617376Z (string) (len=31) "check-endpoints-client-cert-key", 2026-03-12T20:50:33.444617376Z (string) (len=14) "kubelet-client", 2026-03-12T20:50:33.444617376Z (string) (len=16) "node-kubeconfigs" 2026-03-12T20:50:33.444617376Z }, 2026-03-12T20:50:33.444617376Z OptionalCertSecretNamePrefixes: ([]string) (len=11 cap=16) { 2026-03-12T20:50:33.444617376Z (string) (len=17) "user-serving-cert", 2026-03-12T20:50:33.444617376Z (string) (len=21) "user-serving-cert-000", 2026-03-12T20:50:33.444617376Z (string) (len=21) "user-serving-cert-001", 2026-03-12T20:50:33.444617376Z (string) (len=21) "user-serving-cert-002", 2026-03-12T20:50:33.444617376Z (string) (len=21) "user-serving-cert-003", 2026-03-12T20:50:33.444617376Z (string) (len=21) "user-serving-cert-004", 2026-03-12T20:50:33.444617376Z (string) (len=21) "user-serving-cert-005", 2026-03-12T20:50:33.444617376Z (string) (len=21) "user-serving-cert-006", 2026-03-12T20:50:33.444617376Z (string) (len=21) "user-serving-cert-007", 2026-03-12T20:50:33.444617376Z (string) (len=21) "user-serving-cert-008", 2026-03-12T20:50:33.444617376Z (string) (len=21) "user-serving-cert-009" 2026-03-12T20:50:33.444617376Z }, 2026-03-12T20:50:33.444617376Z CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) { 2026-03-12T20:50:33.444617376Z (string) (len=20) "aggregator-client-ca", 2026-03-12T20:50:33.444617376Z (string) (len=9) "client-ca", 2026-03-12T20:50:33.444617376Z (string) (len=29) "control-plane-node-kubeconfig", 2026-03-12T20:50:33.444617376Z (string) (len=26) "check-endpoints-kubeconfig" 2026-03-12T20:50:33.444617376Z }, 2026-03-12T20:50:33.444617376Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-12T20:50:33.444617376Z (string) (len=17) "trusted-ca-bundle" 2026-03-12T20:50:33.444617376Z }, 2026-03-12T20:50:33.444617376Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-apiserver-certs", 2026-03-12T20:50:33.444617376Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-12T20:50:33.444617376Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-12T20:50:33.444617376Z Timeout: (time.Duration) 2m0s, 2026-03-12T20:50:33.444617376Z StaticPodManifestsLockFile: (string) "", 2026-03-12T20:50:33.444617376Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-12T20:50:33.444617376Z KubeletVersion: (string) "" 2026-03-12T20:50:33.444617376Z }) 2026-03-12T20:50:33.445313006Z I0312 20:50:33.445266 1 cmd.go:413] Getting controller reference for node master-0 2026-03-12T20:50:33.561003420Z I0312 20:50:33.555940 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-12T20:50:33.561003420Z I0312 20:50:33.555985 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-12T20:50:33.561003420Z I0312 20:50:33.555994 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-12T20:50:33.583161003Z I0312 20:50:33.578583 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-03-12T20:51:03.579463650Z I0312 20:51:03.579367 1 cmd.go:524] Getting installer pods for node master-0 2026-03-12T20:51:17.584141422Z F0312 20:51:17.583993 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-kube-apiserver/installer-1-master-0.json0000640000000000000000000002132115154624262022672 0ustar0000000000000000{"metadata":{"name":"installer-1-master-0","namespace":"openshift-kube-apiserver","uid":"869e3d2a-1b5c-426f-945a-ddd44a9a5033","resourceVersion":"9136","creationTimestamp":"2026-03-12T20:50:28Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.44/23\"],\"mac_address\":\"0a:58:0a:80:00:2c\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.44/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.44\"\n ],\n \"mac\": \"0a:58:0a:80:00:2c\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-1","uid":"120ba087-7021-48f2-a0b3-c95a91bef542"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","command":["cluster-kube-apiserver-operator","installer"],"args":["-v=2","--revision=1","--namespace=openshift-kube-apiserver","--pod=kube-apiserver-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-apiserver-pod","--configmaps=config","--configmaps=kube-apiserver-cert-syncer-kubeconfig","--optional-configmaps=oauth-metadata","--optional-configmaps=cloud-config","--configmaps=bound-sa-token-signing-certs","--configmaps=etcd-serving-ca","--optional-configmaps=kube-apiserver-server-ca","--configmaps=kubelet-serving-ca","--configmaps=sa-token-signing-certs","--configmaps=kube-apiserver-audit-policies","--secrets=etcd-client","--optional-secrets=encryption-config","--secrets=localhost-recovery-serving-certkey","--secrets=localhost-recovery-client-token","--optional-secrets=webhook-authenticator","--cert-dir=/etc/kubernetes/static-pod-resources/kube-apiserver-certs","--cert-configmaps=aggregator-client-ca","--cert-configmaps=client-ca","--optional-cert-configmaps=trusted-ca-bundle","--cert-configmaps=control-plane-node-kubeconfig","--cert-configmaps=check-endpoints-kubeconfig","--cert-secrets=aggregator-client","--cert-secrets=localhost-serving-cert-certkey","--cert-secrets=service-network-serving-certkey","--cert-secrets=external-loadbalancer-serving-certkey","--cert-secrets=internal-loadbalancer-serving-certkey","--cert-secrets=bound-service-account-signing-key","--cert-secrets=control-plane-node-admin-client-cert-key","--cert-secrets=check-endpoints-client-cert-key","--cert-secrets=kubelet-client","--cert-secrets=node-kubeconfigs","--optional-cert-secrets=user-serving-cert","--optional-cert-secrets=user-serving-cert-000","--optional-cert-secrets=user-serving-cert-001","--optional-cert-secrets=user-serving-cert-002","--optional-cert-secrets=user-serving-cert-003","--optional-cert-secrets=user-serving-cert-004","--optional-cert-secrets=user-serving-cert-005","--optional-cert-secrets=user-serving-cert-006","--optional-cert-secrets=user-serving-cert-007","--optional-cert-secrets=user-serving-cert-008","--optional-cert-secrets=user-serving-cert-009"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:51:19Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:50:28Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:51:18Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:51:18Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:50:28Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.44","podIPs":[{"ip":"10.128.0.44"}],"startTime":"2026-03-12T20:50:28Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"ving-cert\",\n (string) (len=21) \"user-serving-cert-000\",\n (string) (len=21) \"user-serving-cert-001\",\n (string) (len=21) \"user-serving-cert-002\",\n (string) (len=21) \"user-serving-cert-003\",\n (string) (len=21) \"user-serving-cert-004\",\n (string) (len=21) \"user-serving-cert-005\",\n (string) (len=21) \"user-serving-cert-006\",\n (string) (len=21) \"user-serving-cert-007\",\n (string) (len=21) \"user-serving-cert-008\",\n (string) (len=21) \"user-serving-cert-009\"\n },\n CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\",\n (string) (len=29) \"control-plane-node-kubeconfig\",\n (string) (len=26) \"check-endpoints-kubeconfig\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0312 20:50:33.445266 1 cmd.go:413] Getting controller reference for node master-0\nI0312 20:50:33.555940 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0312 20:50:33.555985 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0312 20:50:33.555994 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0312 20:50:33.578583 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0312 20:51:03.579367 1 cmd.go:524] Getting installer pods for node master-0\nF0312 20:51:17.583993 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","startedAt":"2026-03-12T20:50:32Z","finishedAt":"2026-03-12T20:51:17Z","containerID":"cri-o://36bfe1f3ee1124371de60181a0f2b9f61930c3b4af0a3a9413b95d937717a871"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","containerID":"cri-o://36bfe1f3ee1124371de60181a0f2b9f61930c3b4af0a3a9413b95d937717a871","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}kube-apiserver-insecure-readyz_current.log0000640000000000000000000000014615154624262035772 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-03-12T20:47:55.380109587Z I0312 20:47:55.379849 1 readyz.go:111] Listening on 0.0.0.0:6080 kube-apiserver_current.log0000640000000000000000000010637115154624262032672 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-03-12T20:57:11.075203533Z I0312 20:57:11.075147 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:11.220639150Z I0312 20:57:11.220555 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:11.273412992Z I0312 20:57:11.273348 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:11.279599464Z I0312 20:57:11.278786 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:11.422459807Z I0312 20:57:11.422396 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:11.470738308Z I0312 20:57:11.470669 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:11.475798823Z I0312 20:57:11.475767 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:11.562321386Z I0312 20:57:11.562217 1 cacher.go:1017] cacher (machineconfigs.machineconfiguration.openshift.io): 1 objects queued in incoming channel. 2026-03-12T20:57:11.619865315Z I0312 20:57:11.619174 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:11.670859963Z I0312 20:57:11.670369 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:11.675821835Z I0312 20:57:11.675448 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:11.819988630Z I0312 20:57:11.819869 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:11.863401610Z E0312 20:57:11.863321 1 remote_available_controller.go:470] "Unhandled Error" err="v1.user.openshift.io failed with: failing or missing response from https://10.128.0.37:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/user.openshift.io/v1: 401" logger="UnhandledError" 2026-03-12T20:57:11.863563305Z E0312 20:57:11.863502 1 remote_available_controller.go:470] "Unhandled Error" err="v1.oauth.openshift.io failed with: failing or missing response from https://10.128.0.37:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/oauth.openshift.io/v1: 401" logger="UnhandledError" 2026-03-12T20:57:11.871455789Z I0312 20:57:11.871381 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:11.874853914Z I0312 20:57:11.874751 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:12.023728994Z I0312 20:57:12.023652 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:12.070580749Z I0312 20:57:12.070523 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:12.075290556Z I0312 20:57:12.075249 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:12.219833060Z I0312 20:57:12.219694 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:12.270780036Z I0312 20:57:12.270660 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:12.275304989Z I0312 20:57:12.275212 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:12.419910444Z I0312 20:57:12.419746 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:12.469988649Z I0312 20:57:12.469914 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:12.475988087Z I0312 20:57:12.475936 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:12.620502340Z I0312 20:57:12.620418 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:12.670870963Z I0312 20:57:12.670786 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:12.675319052Z I0312 20:57:12.675279 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:12.819499858Z I0312 20:57:12.819432 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:12.870210578Z I0312 20:57:12.870144 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:12.875699863Z I0312 20:57:12.875653 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:13.019922780Z I0312 20:57:13.019863 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:13.070523718Z I0312 20:57:13.070451 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:13.076090326Z I0312 20:57:13.076059 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:13.220477996Z I0312 20:57:13.220384 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:13.271448903Z I0312 20:57:13.271366 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:13.275714448Z I0312 20:57:13.275670 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:13.425585984Z I0312 20:57:13.425513 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:13.472835889Z I0312 20:57:13.472721 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:13.475717790Z I0312 20:57:13.475658 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:13.621012443Z I0312 20:57:13.619979 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:13.671162330Z I0312 20:57:13.671096 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:13.677926876Z I0312 20:57:13.675714 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:13.755900229Z E0312 20:57:13.755829 1 remote_available_controller.go:470] "Unhandled Error" err="v1.authorization.openshift.io failed with: failing or missing response from https://10.128.0.34:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/authorization.openshift.io/v1: 401" logger="UnhandledError" 2026-03-12T20:57:13.792095482Z E0312 20:57:13.792030 1 remote_available_controller.go:470] "Unhandled Error" err="v1.apps.openshift.io failed with: failing or missing response from https://10.128.0.34:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/apps.openshift.io/v1: 401" logger="UnhandledError" 2026-03-12T20:57:13.819787315Z I0312 20:57:13.819708 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:13.845400766Z E0312 20:57:13.845343 1 remote_available_controller.go:470] "Unhandled Error" err="v1.build.openshift.io failed with: failing or missing response from https://10.128.0.34:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/build.openshift.io/v1: 401" logger="UnhandledError" 2026-03-12T20:57:13.870455834Z I0312 20:57:13.870379 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:13.875890108Z I0312 20:57:13.875830 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:13.988322911Z I0312 20:57:13.988211 1 apf_controller.go:493] "Update CurrentCL" plName="exempt" seatDemandHighWatermark=7 seatDemandAvg=0.11908612969570129 seatDemandStdev=0.4747640816551287 seatDemandSmoothed=20.66747702438979 fairFrac=2.32146993200311 currentCL=7 concurrencyDenominator=7 backstop=false 2026-03-12T20:57:14.020553635Z I0312 20:57:14.020477 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:14.070708422Z I0312 20:57:14.070649 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:14.077872749Z I0312 20:57:14.075411 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:14.202677456Z E0312 20:57:14.202574 1 remote_available_controller.go:470] "Unhandled Error" err="v1.quota.openshift.io failed with: failing or missing response from https://10.128.0.34:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/quota.openshift.io/v1: 401" logger="UnhandledError" 2026-03-12T20:57:14.220676520Z I0312 20:57:14.220521 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:14.271074653Z I0312 20:57:14.270945 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:14.275476072Z I0312 20:57:14.275407 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:14.421295527Z I0312 20:57:14.421214 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:14.470437299Z I0312 20:57:14.470384 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:14.475592816Z I0312 20:57:14.475561 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:14.619694670Z I0312 20:57:14.619627 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:14.675799184Z I0312 20:57:14.675719 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:14.677046224Z I0312 20:57:14.677010 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:14.820436210Z I0312 20:57:14.820342 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:14.870480234Z I0312 20:57:14.870384 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:14.875471238Z I0312 20:57:14.875408 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:14.972374957Z E0312 20:57:14.972288 1 remote_available_controller.go:470] "Unhandled Error" err="v1.image.openshift.io failed with: failing or missing response from https://10.128.0.34:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/image.openshift.io/v1: 401" logger="UnhandledError" 2026-03-12T20:57:14.992300338Z E0312 20:57:14.992238 1 remote_available_controller.go:470] "Unhandled Error" err="v1.project.openshift.io failed with: failing or missing response from https://10.128.0.34:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/project.openshift.io/v1: 401" logger="UnhandledError" 2026-03-12T20:57:15.019781686Z I0312 20:57:15.019721 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:15.073653604Z I0312 20:57:15.073563 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:15.076824932Z I0312 20:57:15.076764 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:15.219569032Z I0312 20:57:15.219482 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:15.271656088Z I0312 20:57:15.271369 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:15.275687127Z I0312 20:57:15.275616 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:15.420766794Z I0312 20:57:15.420701 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:15.470318117Z I0312 20:57:15.470244 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:15.475449683Z I0312 20:57:15.475400 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:15.620287555Z I0312 20:57:15.620205 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:15.670847932Z I0312 20:57:15.670746 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:15.675879865Z I0312 20:57:15.675738 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:15.820476651Z I0312 20:57:15.820368 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:15.870410902Z I0312 20:57:15.870219 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:15.876307367Z I0312 20:57:15.876245 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:16.019665203Z I0312 20:57:16.019547 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:16.070656310Z I0312 20:57:16.070589 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:16.075087499Z I0312 20:57:16.075042 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:16.219857110Z I0312 20:57:16.219741 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:16.270615311Z I0312 20:57:16.270525 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:16.276102387Z I0312 20:57:16.276046 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:16.420044686Z I0312 20:57:16.419978 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:16.470979432Z I0312 20:57:16.470884 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:16.475954865Z I0312 20:57:16.475897 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:16.620854188Z I0312 20:57:16.620754 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:16.670606805Z I0312 20:57:16.670526 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:16.675757802Z I0312 20:57:16.675576 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:16.819884086Z I0312 20:57:16.819789 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:16.870574487Z I0312 20:57:16.870470 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:16.875526668Z I0312 20:57:16.875480 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:17.019688703Z I0312 20:57:17.019596 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-12T20:57:17.076146565Z I0312 20:57:17.076039 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-0/setup_current.log0000640000000000000000000000007015154624262031152 0ustar00000000000000002026-03-12T20:47:51.587415787Z Fixing audit permissions.kube-apiserver-operator_current.log0000640000000000000000000001015115154624262036652 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-68bd585b-56nzk2026-03-12T20:54:44.694195388Z I0312 20:54:44.694042 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-12T20:54:44.694374672Z I0312 20:54:44.694351 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-12T20:54:44.696762961Z I0312 20:54:44.696082 1 observer_polling.go:159] Starting file observer 2026-03-12T20:55:23.331940028Z I0312 20:55:23.331855 1 builder.go:304] kube-apiserver-operator version 4.18.0-202602132343.p2.ge9bc909.assembly.stream.el9-e9bc909-e9bc90906c726823f154c78d3e568c98ff77b6a5 2026-03-12T20:55:33.558042079Z I0312 20:55:33.555362 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-12T20:55:33.558042079Z W0312 20:55:33.555386 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-12T20:55:33.558042079Z W0312 20:55:33.555390 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-12T20:55:33.558042079Z W0312 20:55:33.555394 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-12T20:55:33.558042079Z W0312 20:55:33.555397 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-12T20:55:33.558042079Z W0312 20:55:33.555400 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-12T20:55:33.558042079Z W0312 20:55:33.555403 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-12T20:55:33.574062539Z I0312 20:55:33.573839 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-12T20:55:33.574062539Z I0312 20:55:33.573880 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-12T20:55:33.574062539Z I0312 20:55:33.573926 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-12T20:55:33.574062539Z I0312 20:55:33.573944 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-12T20:55:33.574062539Z I0312 20:55:33.573956 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-12T20:55:33.574062539Z I0312 20:55:33.573961 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-12T20:55:33.574835067Z I0312 20:55:33.574505 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-12T20:55:33.574835067Z I0312 20:55:33.574565 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-12T20:55:33.574835067Z I0312 20:55:33.574515 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-12T20:55:33.674102258Z I0312 20:55:33.674002 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-12T20:55:33.674102258Z I0312 20:55:33.674040 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-12T20:55:33.674102258Z I0312 20:55:33.674017 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-12T20:55:58.810758139Z I0312 20:55:58.810708 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-12T20:55:58.811110528Z I0312 20:55:58.811091 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-apiserver-operator/kube-apiserver-operator-lock... kube-apiserver-operator_previous.log0000640000000000000000000004060515154624262037053 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-68bd585b-56nzk2026-03-12T20:51:06.999597359Z I0312 20:51:06.999500 1 base_controller.go:123] Shutting down worker of kube-apiserver-InstallerState controller ... 2026-03-12T20:51:06.999607089Z I0312 20:51:06.999526 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-03-12T20:51:06.999607089Z I0312 20:51:06.999601 1 base_controller.go:123] Shutting down worker of openshift-kube-apiserver-EncryptionPrune controller ... 2026-03-12T20:51:06.999618310Z I0312 20:51:06.999610 1 base_controller.go:113] All openshift-kube-apiserver-EncryptionPrune workers have been terminated 2026-03-12T20:51:06.999627110Z I0312 20:51:06.999610 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-12T20:51:06.999627110Z I0312 20:51:06.999619 1 base_controller.go:123] Shutting down worker of openshift-kube-apiserver-EncryptionMigration controller ... 2026-03-12T20:51:06.999627110Z I0312 20:51:06.999623 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-12T20:51:06.999636580Z I0312 20:51:06.999627 1 base_controller.go:123] Shutting down worker of openshift-kube-apiserver-EncryptionState controller ... 2026-03-12T20:51:06.999636580Z I0312 20:51:06.999632 1 base_controller.go:123] Shutting down worker of kube-apiserver controller ... 2026-03-12T20:51:06.999648741Z I0312 20:51:06.999635 1 base_controller.go:113] All openshift-kube-apiserver-EncryptionState workers have been terminated 2026-03-12T20:51:06.999648741Z I0312 20:51:06.999639 1 base_controller.go:113] All kube-apiserver workers have been terminated 2026-03-12T20:51:06.999648741Z I0312 20:51:06.999645 1 base_controller.go:123] Shutting down worker of openshift-kube-apiserver-EncryptionKey controller ... 2026-03-12T20:51:06.999658121Z I0312 20:51:06.999603 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-03-12T20:51:06.999658121Z I0312 20:51:06.999536 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-12T20:51:06.999658121Z I0312 20:51:06.999652 1 base_controller.go:113] All openshift-kube-apiserver-EncryptionKey workers have been terminated 2026-03-12T20:51:06.999668461Z I0312 20:51:06.999656 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-12T20:51:06.999668461Z I0312 20:51:06.999541 1 controller_manager.go:54] RevisionController controller terminated 2026-03-12T20:51:06.999668461Z I0312 20:51:06.999662 1 base_controller.go:123] Shutting down worker of openshift-kube-apiserver-EncryptionCondition controller ... 2026-03-12T20:51:06.999668461Z I0312 20:51:06.999553 1 base_controller.go:113] All kube-apiserver-StaticPodStateFallback workers have been terminated 2026-03-12T20:51:06.999707322Z I0312 20:51:06.999675 1 controller_manager.go:54] kube-apiserver-StaticPodStateFallback controller terminated 2026-03-12T20:51:06.999707322Z I0312 20:51:06.999681 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-03-12T20:51:06.999707322Z I0312 20:51:06.999551 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-12T20:51:06.999707322Z I0312 20:51:06.999431 1 base_controller.go:181] Shutting down kube-apiserver-StaticPodState ... 2026-03-12T20:51:06.999719002Z I0312 20:51:06.999560 1 base_controller.go:123] Shutting down worker of webhookSupportabilityController controller ... 2026-03-12T20:51:06.999727793Z I0312 20:51:06.999717 1 base_controller.go:113] All webhookSupportabilityController workers have been terminated 2026-03-12T20:51:06.999727793Z I0312 20:51:06.999721 1 base_controller.go:181] Shutting down Installer ... 2026-03-12T20:51:06.999749963Z I0312 20:51:06.999564 1 controller_manager.go:54] cluster-kube-apiserver-operator-UnsupportedConfigOverrides controller terminated 2026-03-12T20:51:06.999749963Z I0312 20:51:06.999564 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-12T20:51:06.999749963Z I0312 20:51:06.999737 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-12T20:51:06.999749963Z I0312 20:51:06.999738 1 base_controller.go:181] Shutting down auditPolicyController ... 2026-03-12T20:51:06.999749963Z I0312 20:51:06.999581 1 base_controller.go:123] Shutting down worker of highCPUUsageAlertController controller ... 2026-03-12T20:51:06.999761833Z I0312 20:51:06.999748 1 base_controller.go:181] Shutting down BoundSATokenSignerController ... 2026-03-12T20:51:06.999761833Z I0312 20:51:06.999751 1 base_controller.go:113] All highCPUUsageAlertController workers have been terminated 2026-03-12T20:51:06.999761833Z I0312 20:51:06.999526 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-03-12T20:51:06.999771414Z I0312 20:51:06.999761 1 base_controller.go:113] All GuardController workers have been terminated 2026-03-12T20:51:06.999771414Z I0312 20:51:06.999762 1 base_controller.go:113] All CertRotationTimeUpgradeableController workers have been terminated 2026-03-12T20:51:06.999771414Z I0312 20:51:06.999767 1 controller_manager.go:54] GuardController controller terminated 2026-03-12T20:51:06.999785024Z I0312 20:51:06.999526 1 base_controller.go:181] Shutting down openshift-kube-apiserver-EncryptionMigration ... 2026-03-12T20:51:06.999785024Z I0312 20:51:06.999777 1 base_controller.go:113] All openshift-kube-apiserver-EncryptionMigration workers have been terminated 2026-03-12T20:51:06.999785024Z I0312 20:51:06.999514 1 base_controller.go:181] Shutting down openshift-kube-apiserver-EncryptionCondition ... 2026-03-12T20:51:06.999794884Z I0312 20:51:06.999785 1 base_controller.go:113] All openshift-kube-apiserver-EncryptionCondition workers have been terminated 2026-03-12T20:51:06.999794884Z I0312 20:51:06.999612 1 base_controller.go:181] Shutting down KubeAPIServerStaticResources-StaticResources ... 2026-03-12T20:51:06.999836985Z I0312 20:51:06.999538 1 base_controller.go:123] Shutting down worker of kube-apiserver-StaticPodState controller ... 2026-03-12T20:51:06.999836985Z I0312 20:51:06.999455 1 base_controller.go:123] Shutting down worker of ConnectivityCheckController controller ... 2026-03-12T20:51:06.999877076Z I0312 20:51:06.999852 1 base_controller.go:113] All ConnectivityCheckController workers have been terminated 2026-03-12T20:51:06.999877076Z I0312 20:51:06.999700 1 base_controller.go:123] Shutting down worker of PodSecurityReadinessController controller ... 2026-03-12T20:51:06.999877076Z I0312 20:51:06.999871 1 base_controller.go:113] All PodSecurityReadinessController workers have been terminated 2026-03-12T20:51:06.999888247Z I0312 20:51:06.999591 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-12T20:51:06.999888247Z I0312 20:51:06.999881 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-03-12T20:51:06.999888247Z I0312 20:51:06.999755 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-03-12T20:51:06.999897707Z I0312 20:51:06.999891 1 base_controller.go:113] All Installer workers have been terminated 2026-03-12T20:51:06.999906297Z I0312 20:51:06.999896 1 controller_manager.go:54] Installer controller terminated 2026-03-12T20:51:06.999916957Z I0312 20:51:06.999909 1 base_controller.go:113] All kube-apiserver-StaticPodState workers have been terminated 2026-03-12T20:51:06.999926558Z I0312 20:51:06.999915 1 controller_manager.go:54] kube-apiserver-StaticPodState controller terminated 2026-03-12T20:51:06.999926558Z I0312 20:51:06.999917 1 base_controller.go:113] All ServiceAccountIssuerController workers have been terminated 2026-03-12T20:51:06.999935158Z I0312 20:51:06.999923 1 base_controller.go:113] All kube-apiserver-InstallerState workers have been terminated 2026-03-12T20:51:06.999935158Z I0312 20:51:06.999929 1 controller_manager.go:54] kube-apiserver-InstallerState controller terminated 2026-03-12T20:51:07.000012100Z I0312 20:51:06.999983 1 base_controller.go:123] Shutting down worker of WorkerLatencyProfile controller ... 2026-03-12T20:51:07.000012100Z I0312 20:51:06.999997 1 base_controller.go:181] Shutting down PruneController ... 2026-03-12T20:51:07.000012100Z I0312 20:51:07.000000 1 base_controller.go:113] All WorkerLatencyProfile workers have been terminated 2026-03-12T20:51:07.000012100Z I0312 20:51:07.000005 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-03-12T20:51:07.000030660Z I0312 20:51:07.000010 1 base_controller.go:113] All PruneController workers have been terminated 2026-03-12T20:51:07.000030660Z I0312 20:51:07.000015 1 controller_manager.go:54] PruneController controller terminated 2026-03-12T20:51:07.000030660Z I0312 20:51:07.000027 1 base_controller.go:181] Shutting down CertRotationController ... 2026-03-12T20:51:07.000041181Z I0312 20:51:07.000030 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-12T20:51:07.000052381Z I0312 20:51:07.000045 1 base_controller.go:181] Shutting down CertRotationController ... 2026-03-12T20:51:07.000061341Z I0312 20:51:07.000053 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-12T20:51:07.000071001Z I0312 20:51:07.000061 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-12T20:51:07.000071001Z I0312 20:51:07.000067 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-12T20:51:07.000080052Z I0312 20:51:07.000074 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-12T20:51:07.000088822Z I0312 20:51:07.000079 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-12T20:51:07.000097622Z I0312 20:51:07.000091 1 base_controller.go:181] Shutting down NodeKubeconfigController ... 2026-03-12T20:51:07.000106842Z I0312 20:51:07.000099 1 base_controller.go:123] Shutting down worker of NodeKubeconfigController controller ... 2026-03-12T20:51:07.000116082Z I0312 20:51:07.000104 1 base_controller.go:113] All NodeKubeconfigController workers have been terminated 2026-03-12T20:51:07.000156984Z I0312 20:51:07.000122 1 base_controller.go:123] Shutting down worker of BoundSATokenSignerController controller ... 2026-03-12T20:51:07.000156984Z I0312 20:51:07.000143 1 base_controller.go:113] All BoundSATokenSignerController workers have been terminated 2026-03-12T20:51:07.000528353Z E0312 20:51:07.000481 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-12T20:51:07.001689554Z E0312 20:51:07.001639 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-apiserver-AuditPolicy\": client rate limiter Wait returned an error: context canceled" 2026-03-12T20:51:07.001689554Z I0312 20:51:07.001676 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-12T20:51:07.001689554Z I0312 20:51:07.001683 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-12T20:51:07.005010632Z I0312 20:51:07.002899 1 base_controller.go:123] Shutting down worker of auditPolicyController controller ... 2026-03-12T20:51:07.005010632Z I0312 20:51:07.002914 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2026-03-12T20:51:07.005010632Z I0312 20:51:07.002950 1 base_controller.go:113] All auditPolicyController workers have been terminated 2026-03-12T20:51:07.005010632Z I0312 20:51:07.002978 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-12T20:51:07.005010632Z I0312 20:51:07.002993 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-12T20:51:07.005010632Z I0312 20:51:07.003010 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-12T20:51:07.005010632Z I0312 20:51:07.003022 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-12T20:51:07.005010632Z I0312 20:51:07.003159 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-12T20:51:07.005010632Z I0312 20:51:07.003193 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-12T20:51:07.005010632Z I0312 20:51:07.003285 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-12T20:51:07.005010632Z I0312 20:51:07.003316 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-12T20:51:07.005010632Z I0312 20:51:07.003657 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-12T20:51:07.005010632Z I0312 20:51:07.003671 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-4183370987/tls.crt::/tmp/serving-cert-4183370987/tls.key" 2026-03-12T20:51:07.005010632Z I0312 20:51:07.003675 1 builder.go:335] server exited 2026-03-12T20:51:07.006930062Z E0312 20:51:07.006886 1 base_controller.go:279] "Unhandled Error" err="KubeAPIServerStaticResources-StaticResources reconciliation failed: [\"assets/kube-apiserver/localhost-recovery-client-crb.yaml\" (string): Get \"https://172.30.0.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:operator:kube-apiserver-recovery\": context canceled, \"assets/kube-apiserver/localhost-recovery-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/apiserver.openshift.io_apirequestcount.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-flowschema.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-prioritylevelconfiguration.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-flowschema-v1beta3.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-prioritylevelconfiguration-v1beta3.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/api-usage.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/audit-errors.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/kube-apiserver-requests.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/kube-apiserver-slos-basic.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/podsecurity-violations.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/kube-apiserver-slos-extended.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"KubeAPIServerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-12T20:51:07.007963889Z I0312 20:51:07.007938 1 base_controller.go:123] Shutting down worker of KubeAPIServerStaticResources-StaticResources controller ... 2026-03-12T20:51:07.007963889Z I0312 20:51:07.007956 1 base_controller.go:113] All KubeAPIServerStaticResources-StaticResources workers have been terminated 2026-03-12T20:51:11.998987482Z I0312 20:51:11.998875 1 observer_polling.go:162] Shutting down file observer 2026-03-12T20:51:41.004352745Z E0312 20:51:41.004189 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-12T20:51:41.004352745Z W0312 20:51:41.004289 1 leaderelection.go:84] leader election lost config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-68bd585b-56nzk.json0000640000000000000000000001362015154624262027642 0ustar0000000000000000{"metadata":{"name":"kube-apiserver-operator-68bd585b-56nzk","generateName":"kube-apiserver-operator-68bd585b-","namespace":"openshift-kube-apiserver-operator","uid":"784599a3-a2ac-46ac-a4b7-9439704646cc","resourceVersion":"9155","creationTimestamp":"2026-03-12T20:48:18Z","labels":{"app":"kube-apiserver-operator","pod-template-hash":"68bd585b"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.18/23\"],\"mac_address\":\"0a:58:0a:80:00:12\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.18/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.18\"\n ],\n \"mac\": \"0a:58:0a:80:00:12\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-apiserver-operator-68bd585b","uid":"fd534b3b-d6ce-4428-8157-3d8e8f8d334f","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","command":["cluster-kube-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-apiserver-operator","serviceAccount":"kube-apiserver-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:36Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:34Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:55:15Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:55:15Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:34Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.18","podIPs":[{"ip":"10.128.0.18"}],"startTime":"2026-03-12T20:49:34Z","containerStatuses":[{"name":"kube-apiserver-operator","state":{"running":{"startedAt":"2026-03-12T20:54:44Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-12T20:49:36Z","finishedAt":"2026-03-12T20:51:41Z","containerID":"cri-o://ab706de1955bf19700e84d8f799385030b60c4a92c4860f12c06db2b3816fd99"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","containerID":"cri-o://a4633cfb7d2ad7f15514161df19eedc1d6845ebaf43de93b15155efa464819c1","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-etcd/logs/installer-1-master-0/installer_current.log0000640000000000000000000007242515154624262025213 0ustar00000000000000002026-03-12T20:50:48.050242370Z 2026-03-12T20:50:48.050242370Z cluster-etcd-operator rev \ 2026-03-12T20:50:48.050242370Z --endpoints=$(ALL_ETCD_ENDPOINTS) \ 2026-03-12T20:50:48.050242370Z --client-cert-file=$(ETCDCTL_CERT) \ 2026-03-12T20:50:48.050242370Z --client-key-file=$(ETCDCTL_KEY) \ 2026-03-12T20:50:48.050242370Z --client-cacert-file=$(ETCDCTL_CACERT) 2026-03-12T20:50:48.050242370Z securityContext: 2026-03-12T20:50:48.050242370Z privileged: true 2026-03-12T20:50:48.050242370Z resources: 2026-03-12T20:50:48.050242370Z requests: 2026-03-12T20:50:48.050242370Z memory: 50Mi 2026-03-12T20:50:48.050242370Z cpu: 10m 2026-03-12T20:50:48.050242370Z env: 2026-03-12T20:50:48.050242370Z - name: "ALL_ETCD_ENDPOINTS" 2026-03-12T20:50:48.050242370Z value: "https://192.168.32.10:2379" 2026-03-12T20:50:48.050242370Z - name: "ETCDCTL_API" 2026-03-12T20:50:48.050242370Z value: "3" 2026-03-12T20:50:48.050242370Z - name: "ETCDCTL_CACERT" 2026-03-12T20:50:48.050242370Z value: "/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt" 2026-03-12T20:50:48.050242370Z - name: "ETCDCTL_CERT" 2026-03-12T20:50:48.050242370Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt" 2026-03-12T20:50:48.050242370Z - name: "ETCDCTL_ENDPOINTS" 2026-03-12T20:50:48.050242370Z value: "https://192.168.32.10:2379" 2026-03-12T20:50:48.050242370Z - name: "ETCDCTL_KEY" 2026-03-12T20:50:48.050242370Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key" 2026-03-12T20:50:48.050242370Z - name: "ETCD_CIPHER_SUITES" 2026-03-12T20:50:48.050242370Z value: "TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256" 2026-03-12T20:50:48.050242370Z - name: "ETCD_DATA_DIR" 2026-03-12T20:50:48.050242370Z value: "/var/lib/etcd" 2026-03-12T20:50:48.050242370Z - name: "ETCD_ELECTION_TIMEOUT" 2026-03-12T20:50:48.050242370Z value: "2500" 2026-03-12T20:50:48.050242370Z - name: "ETCD_ENABLE_PPROF" 2026-03-12T20:50:48.050342953Z value: "true" 2026-03-12T20:50:48.050342953Z - name: "ETCD_EXPERIMENTAL_MAX_LEARNERS" 2026-03-12T20:50:48.050342953Z value: "1" 2026-03-12T20:50:48.050342953Z - name: "ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION" 2026-03-12T20:50:48.050342953Z value: "200ms" 2026-03-12T20:50:48.050342953Z - name: "ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL" 2026-03-12T20:50:48.050342953Z value: "5s" 2026-03-12T20:50:48.050342953Z - name: "ETCD_HEARTBEAT_INTERVAL" 2026-03-12T20:50:48.050342953Z value: "500" 2026-03-12T20:50:48.050342953Z - name: "ETCD_IMAGE" 2026-03-12T20:50:48.050342953Z value: "quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b" 2026-03-12T20:50:48.050342953Z - name: "ETCD_INITIAL_CLUSTER_STATE" 2026-03-12T20:50:48.050342953Z value: "existing" 2026-03-12T20:50:48.050342953Z - name: "ETCD_QUOTA_BACKEND_BYTES" 2026-03-12T20:50:48.050342953Z value: "8589934592" 2026-03-12T20:50:48.050342953Z - name: "ETCD_SOCKET_REUSE_ADDRESS" 2026-03-12T20:50:48.050342953Z value: "true" 2026-03-12T20:50:48.050342953Z - name: "ETCD_TLS_MIN_VERSION" 2026-03-12T20:50:48.050342953Z value: "TLS1.2" 2026-03-12T20:50:48.050342953Z - name: "NODE_master_0_ETCD_NAME" 2026-03-12T20:50:48.050342953Z value: "master-0" 2026-03-12T20:50:48.050342953Z - name: "NODE_master_0_ETCD_URL_HOST" 2026-03-12T20:50:48.050342953Z value: "192.168.32.10" 2026-03-12T20:50:48.050342953Z - name: "NODE_master_0_IP" 2026-03-12T20:50:48.050342953Z value: "192.168.32.10" 2026-03-12T20:50:48.050342953Z volumeMounts: 2026-03-12T20:50:48.050342953Z - mountPath: /var/lib/etcd 2026-03-12T20:50:48.050342953Z name: data-dir 2026-03-12T20:50:48.050342953Z - mountPath: /etc/kubernetes/static-pod-certs 2026-03-12T20:50:48.050342953Z name: cert-dir 2026-03-12T20:50:48.050342953Z hostNetwork: true 2026-03-12T20:50:48.050342953Z priority: 2000001000 2026-03-12T20:50:48.050342953Z priorityClassName: system-node-critical 2026-03-12T20:50:48.050342953Z tolerations: 2026-03-12T20:50:48.050342953Z - operator: "Exists" 2026-03-12T20:50:48.050342953Z volumes: 2026-03-12T20:50:48.050342953Z - hostPath: 2026-03-12T20:50:48.050342953Z path: /etc/kubernetes/manifests 2026-03-12T20:50:48.050342953Z name: static-pod-dir 2026-03-12T20:50:48.050342953Z - hostPath: 2026-03-12T20:50:48.050342953Z path: /etc/kubernetes/static-pod-resources/etcd-pod-1 2026-03-12T20:50:48.050342953Z name: resource-dir 2026-03-12T20:50:48.050342953Z - hostPath: 2026-03-12T20:50:48.050342953Z path: /etc/kubernetes/static-pod-resources/etcd-certs 2026-03-12T20:50:48.050342953Z name: cert-dir 2026-03-12T20:50:48.050342953Z - hostPath: 2026-03-12T20:50:48.050342953Z path: /var/lib/etcd 2026-03-12T20:50:48.050342953Z type: "" 2026-03-12T20:50:48.050342953Z name: data-dir 2026-03-12T20:50:48.050342953Z - hostPath: 2026-03-12T20:50:48.050342953Z path: /usr/local/bin 2026-03-12T20:50:48.050342953Z name: usr-local-bin 2026-03-12T20:50:48.050342953Z - hostPath: 2026-03-12T20:50:48.050342953Z path: /var/log/etcd 2026-03-12T20:50:48.050342953Z name: log-dir 2026-03-12T20:50:48.050342953Z - hostPath: 2026-03-12T20:50:48.050342953Z path: /etc/kubernetes 2026-03-12T20:50:48.050342953Z name: config-dir 2026-03-12T20:50:48.050342953Z - hostPath: 2026-03-12T20:50:48.050342953Z path: /var/lib/etcd-auto-backup 2026-03-12T20:50:48.050342953Z name: etcd-auto-backup-dir 2026-03-12T20:50:48.056158741Z I0312 20:50:48.056073 1 cmd.go:610] Writing pod manifest "/etc/kubernetes/static-pod-resources/etcd-pod-1/etcd-pod.yaml" ... 2026-03-12T20:50:48.056409048Z I0312 20:50:48.056373 1 cmd.go:617] Removed existing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2026-03-12T20:50:48.056427759Z I0312 20:50:48.056396 1 cmd.go:621] Writing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2026-03-12T20:50:48.056427759Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"etcd","namespace":"openshift-etcd","creationTimestamp":null,"labels":{"app":"etcd","etcd":"true","k8s-app":"etcd","revision":"1"},"annotations":{"kubectl.kubernetes.io/default-container":"etcd","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"static-pod-dir","hostPath":{"path":"/etc/kubernetes/manifests"}},{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-pod-1"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-certs"}},{"name":"data-dir","hostPath":{"path":"/var/lib/etcd","type":""}},{"name":"usr-local-bin","hostPath":{"path":"/usr/local/bin"}},{"name":"log-dir","hostPath":{"path":"/var/log/etcd"}},{"name":"config-dir","hostPath":{"path":"/etc/kubernetes"}},{"name":"etcd-auto-backup-dir","hostPath":{"path":"/var/lib/etcd-auto-backup"}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","command":["/bin/sh","-c","#!/bin/sh\necho -n \"Fixing etcd log permissions.\"\nmkdir -p /var/log/etcd \u0026\u0026 chmod 0600 /var/log/etcd\necho -n \"Fixing etcd auto backup permissions.\"\nmkdir -p /var/lib/etcd-auto-backup \u0026\u0026 chmod 0600 /var/lib/etcd-auto-backup\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-ensure-env-vars","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\n: \"${NODE_master_0_ETCD_URL_HOST?not set}\"\n: \"${NODE_master_0_ETCD_NAME?not set}\"\n: \"${NODE_master_0_IP?not set}\"\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_IP}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_IP}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected node IP to be ${NODE_IP} got ${NODE_master_0_IP}\" \u003e\u00262\n exit 1\nfi\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_ETCD_URL_HOST}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_ETCD_URL_HOST}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected etcd url host to be ${NODE_IP} got ${NODE_master_0_ETCD_URL_HOST}\" \u003e\u00262\n exit 1\nfi\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"NODE_IP","valueFrom":{"fieldRef":{"fieldPath":"status.podIP"}}}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-resources-copy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nrm -f $(grep -l '^### Created by cluster-etcd-operator' /usr/local/bin/*)\ncp -p /etc/kubernetes/static-pod-certs/configmaps/etcd-scripts/*.sh /usr/local/bin\n"],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"usr-local-bin","mountPath":"/usr/local/bin"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"etcdctl","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","command":["/bin/bash","-c","trap TERM INT; sleep infinity \u0026 wait"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"etcd","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\netcdctl member list || true\n\n# this has a non-zero return code if the command is non-zero. If you use an export first, it doesn't and you\n# will succeed when you should fail.\nETCD_INITIAL_CLUSTER=$(discover-etcd-initial-cluster \\\n --cacert=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --cert=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --key=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --endpoints=${ALL_ETCD_ENDPOINTS} \\\n --data-dir=/var/lib/etcd \\\n --target-peer-url-host=${NODE_master_0_ETCD_URL_HOST} \\\n --target-name=master-0)\nexport ETCD_INITIAL_CLUSTER\n\n# we cannot use the \"normal\" port conflict initcontainer because when we upgrade, the existing static pod will never yield,\n# so we do the detection in etcd container itself.\necho -n \"Waiting for ports 2379, 2380 and 9978 to be released.\"\ntime while [ -n \"$(ss -Htan '( sport = 2379 or sport = 2380 or sport = 9978 )')\" ]; do\n echo -n \".\"\n sleep 1\ndone\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\nenv | grep ETCD | grep -v NODE\n\nset -x\n# See https://etcd.io/docs/v3.4.0/tuning/ for why we use ionice\nexec nice -n -19 ionice -c2 -n0 etcd \\\n --logger=zap \\\n --log-level=info \\\n --experimental-initial-corrupt-check=true \\\n --snapshot-count=10000 \\\n --initial-advertise-peer-urls=https://${NODE_master_0_IP}:2380 \\\n --cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --client-cert-auth=true \\\n --peer-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --peer-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --peer-trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --peer-client-cert-auth=true \\\n --advertise-client-urls=https://${NODE_master_0_IP}:2379 \\\n --listen-client-urls=https://0.0.0.0:2379,unixs://${NODE_master_0_IP}:0 \\\n --listen-peer-urls=https://0.0.0.0:2380 \\\n --metrics=extensive \\\n --listen-metrics-urls=https://0.0.0.0:9978 || mv /etc/kubernetes/etcd-backup-dir/etcd-member.yaml /etc/kubernetes/manifests\n"],"ports":[{"name":"etcd","containerPort":2379,"protocol":"TCP"},{"name":"etcd-peer","containerPort":2380,"protocol":"TCP"},{"name":"etcd-metrics","containerPort":9978,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"300m","memory":"600Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"livenessProbe":{"httpGet":{"path":"healthz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"readinessProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"startupProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":18},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-metrics","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\n\nexec nice -n -18 etcd grpc-proxy start \\\n --endpoints https://${NODE_master_0_ETCD_URL_HOST}:9978 \\\n --metrics-addr https://0.0.0.0:9979 \\\n --listen-addr 127.0.0.1:9977 \\\n --advertise-client-url \"\" \\\n --key /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --key-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.key \\\n --cert /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --cert-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.crt \\\n --cacert /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --trusted-ca-file /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/metrics-ca-bundle.crt \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --tls-min-version $(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"proxy-metrics","containerPort":9979,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"40m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-readyz","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexec nice -n -18 cluster-etcd-operator readyz \\\n --target=https://localhost:2379 \\\n --listen-port=9980 \\\n --serving-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --serving-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT) \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --listen-tls-min-version=$(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"readyz","containerPort":9980,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd/"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-rev","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\ncluster-etcd-operator rev \\\n --endpoints=$(ALL_ETCD_ENDPOINTS) \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT)\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"data-dir","mountPath":"/var/lib/etcd"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000},"status":{}} config/pod/openshift-etcd/logs/etcd-master-0/etcd-rev_current.log0000640000000000000000000000015615154624262023503 0ustar00000000000000002026-03-12T20:55:08.577552786Z I0312 20:55:08.577112 1 etcdcli_pool.go:70] creating a new cached client config/pod/openshift-etcd/logs/etcd-master-0/etcd-readyz_current.log0000640000000000000000000000050215154624262024200 0ustar00000000000000002026-03-12T20:54:58.234489157Z I0312 20:54:58.234268 1 readyz.go:175] Listening on 0.0.0.0:9980 2026-03-12T20:55:21.176291761Z I0312 20:55:21.176166 1 etcdcli_pool.go:70] creating a new cached client 2026-03-12T20:55:26.189514065Z I0312 20:55:26.189364 1 etcdcli_pool.go:70] creating a new cached client config/pod/openshift-etcd/logs/etcd-master-0/etcd-metrics_current.log0000640000000000000000000004121615154624262024357 0ustar00000000000000002026-03-12T20:54:57.840052465Z {"level":"info","ts":"2026-03-12T20:54:57.839713Z","caller":"etcdmain/grpc_proxy.go:237","msg":"gRPC proxy server TLS","tls-info":"cert = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.crt, key = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.key, client-cert=, client-key=, trusted-ca = /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/metrics-ca-bundle.crt, client-cert-auth = false, crl-file = "} 2026-03-12T20:54:57.840828404Z {"level":"info","ts":"2026-03-12T20:54:57.840725Z","caller":"etcdmain/grpc_proxy.go:460","msg":"listening for gRPC proxy client requests","address":"127.0.0.1:9977"} 2026-03-12T20:54:57.841188263Z {"level":"info","ts":"2026-03-12T20:54:57.841128Z","caller":"etcdmain/grpc_proxy.go:430","msg":"gRPC proxy client TLS","tls-info":"cert = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt, key = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key, client-cert=, client-key=, trusted-ca = /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt, client-cert-auth = false, crl-file = "} 2026-03-12T20:54:57.841333556Z {"level":"info","ts":"2026-03-12T20:54:57.841258Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel created"} 2026-03-12T20:54:57.841383117Z {"level":"info","ts":"2026-03-12T20:54:57.841349Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] original dial target is: \"etcd-endpoints://0xc000244000/192.168.32.10:9978\""} 2026-03-12T20:54:57.841463249Z {"level":"info","ts":"2026-03-12T20:54:57.841425Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] parsed dial target is: {URL:{Scheme:etcd-endpoints Opaque: User: Host:0xc000244000 Path:/192.168.32.10:9978 RawPath: OmitHost:false ForceQuery:false RawQuery: Fragment: RawFragment:}}"} 2026-03-12T20:54:57.841519921Z {"level":"info","ts":"2026-03-12T20:54:57.841459Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel authority set to \"192.168.32.10:9978\""} 2026-03-12T20:54:57.842728641Z {"level":"info","ts":"2026-03-12T20:54:57.842595Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Resolver state updated: {\n \"Addresses\": [\n {\n \"Addr\": \"192.168.32.10:9978\",\n \"ServerName\": \"192.168.32.10:9978\",\n \"Attributes\": null,\n \"BalancerAttributes\": null,\n \"Metadata\": null\n }\n ],\n \"Endpoints\": [\n {\n \"Addresses\": [\n {\n \"Addr\": \"192.168.32.10:9978\",\n \"ServerName\": \"192.168.32.10:9978\",\n \"Attributes\": null,\n \"BalancerAttributes\": null,\n \"Metadata\": null\n }\n ],\n \"Attributes\": null\n }\n ],\n \"ServiceConfig\": {\n \"Config\": {\n \"Config\": null,\n \"LB\": \"round_robin\",\n \"Methods\": {}\n },\n \"Err\": null\n },\n \"Attributes\": null\n} (service config updated; resolver returned new addresses)"} 2026-03-12T20:54:57.842864294Z {"level":"info","ts":"2026-03-12T20:54:57.842760Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel switches to new LB policy \"round_robin\""} 2026-03-12T20:54:57.843152461Z {"level":"info","ts":"2026-03-12T20:54:57.843061Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: got new ClientConn state: {{[{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }] [{[{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }] }] 0xc000004b00 } }"} 2026-03-12T20:54:57.843378096Z {"level":"info","ts":"2026-03-12T20:54:57.843183Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel created"} 2026-03-12T20:54:57.843439989Z {"level":"info","ts":"2026-03-12T20:54:57.843396Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[roundrobin] roundrobinPicker: Build called with info: {map[]}"} 2026-03-12T20:54:57.843474139Z {"level":"info","ts":"2026-03-12T20:54:57.843434Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to CONNECTING"} 2026-03-12T20:54:57.843692905Z {"level":"info","ts":"2026-03-12T20:54:57.843620Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-12T20:54:57.843752086Z {"level":"info","ts":"2026-03-12T20:54:57.843702Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-12T20:54:57.844873584Z {"level":"info","ts":"2026-03-12T20:54:57.843907Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000035a10, CONNECTING"} 2026-03-12T20:54:57.845183341Z {"level":"info","ts":"2026-03-12T20:54:57.845081Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-12T20:54:57.845263353Z {"level":"warn","ts":"2026-03-12T20:54:57.845183Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-12T20:54:57.845376186Z {"level":"info","ts":"2026-03-12T20:54:57.845291Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-12T20:54:57.845488689Z {"level":"info","ts":"2026-03-12T20:54:57.845438Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000035a10, TRANSIENT_FAILURE"} 2026-03-12T20:54:57.845502309Z {"level":"info","ts":"2026-03-12T20:54:57.845487Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to TRANSIENT_FAILURE"} 2026-03-12T20:54:57.846321829Z {"level":"info","ts":"2026-03-12T20:54:57.846258Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Server #3] Server created"} 2026-03-12T20:54:57.846422682Z {"level":"info","ts":"2026-03-12T20:54:57.846383Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Server #3 ListenSocket #4] ListenSocket created"} 2026-03-12T20:54:57.846881473Z {"level":"info","ts":"2026-03-12T20:54:57.846791Z","caller":"etcdmain/grpc_proxy.go:614","msg":"gRPC proxy listening for metrics","address":"https://0.0.0.0:9979"} 2026-03-12T20:54:57.846896463Z {"level":"info","ts":"2026-03-12T20:54:57.846865Z","caller":"etcdmain/grpc_proxy.go:287","msg":"started gRPC proxy","address":"127.0.0.1:9977"} 2026-03-12T20:54:57.846896463Z {"level":"info","ts":"2026-03-12T20:54:57.846883Z","caller":"etcdmain/main.go:44","msg":"notifying init daemon"} 2026-03-12T20:54:57.846921034Z {"level":"info","ts":"2026-03-12T20:54:57.846895Z","caller":"etcdmain/main.go:50","msg":"successfully notified init daemon"} 2026-03-12T20:54:57.847153959Z {"level":"info","ts":"2026-03-12T20:54:57.847106Z","caller":"etcdmain/grpc_proxy.go:277","msg":"gRPC proxy server metrics URL serving"} 2026-03-12T20:54:58.845863655Z {"level":"info","ts":"2026-03-12T20:54:58.845664Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-12T20:54:58.845863655Z {"level":"info","ts":"2026-03-12T20:54:58.845754Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000035a10, IDLE"} 2026-03-12T20:54:58.845967059Z {"level":"info","ts":"2026-03-12T20:54:58.845842Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-12T20:54:58.845967059Z {"level":"info","ts":"2026-03-12T20:54:58.845895Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-12T20:54:58.846185134Z {"level":"info","ts":"2026-03-12T20:54:58.846064Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000035a10, CONNECTING"} 2026-03-12T20:54:58.846332237Z {"level":"info","ts":"2026-03-12T20:54:58.846256Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-12T20:54:58.846332237Z {"level":"warn","ts":"2026-03-12T20:54:58.846313Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-12T20:54:58.846396959Z {"level":"info","ts":"2026-03-12T20:54:58.846354Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-12T20:54:58.846413449Z {"level":"info","ts":"2026-03-12T20:54:58.846389Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000035a10, TRANSIENT_FAILURE"} 2026-03-12T20:55:00.187932948Z {"level":"info","ts":"2026-03-12T20:55:00.187790Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-12T20:55:00.187932948Z {"level":"info","ts":"2026-03-12T20:55:00.187875Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000035a10, IDLE"} 2026-03-12T20:55:00.188012510Z {"level":"info","ts":"2026-03-12T20:55:00.187907Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-12T20:55:00.188012510Z {"level":"info","ts":"2026-03-12T20:55:00.187939Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-12T20:55:00.188153953Z {"level":"info","ts":"2026-03-12T20:55:00.188067Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000035a10, CONNECTING"} 2026-03-12T20:55:00.188452740Z {"level":"info","ts":"2026-03-12T20:55:00.188363Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-12T20:55:00.188452740Z {"level":"warn","ts":"2026-03-12T20:55:00.188421Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-12T20:55:00.188498341Z {"level":"info","ts":"2026-03-12T20:55:00.188461Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-12T20:55:00.188518562Z {"level":"info","ts":"2026-03-12T20:55:00.188501Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000035a10, TRANSIENT_FAILURE"} 2026-03-12T20:55:02.378093140Z {"level":"info","ts":"2026-03-12T20:55:02.377927Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-12T20:55:02.378093140Z {"level":"info","ts":"2026-03-12T20:55:02.378029Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000035a10, IDLE"} 2026-03-12T20:55:02.378181843Z {"level":"info","ts":"2026-03-12T20:55:02.378094Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-12T20:55:02.378181843Z {"level":"info","ts":"2026-03-12T20:55:02.378161Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-12T20:55:02.378457300Z {"level":"info","ts":"2026-03-12T20:55:02.378322Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000035a10, CONNECTING"} 2026-03-12T20:55:02.378693786Z {"level":"info","ts":"2026-03-12T20:55:02.378609Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-12T20:55:02.378716266Z {"level":"warn","ts":"2026-03-12T20:55:02.378674Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-12T20:55:02.378772778Z {"level":"info","ts":"2026-03-12T20:55:02.378727Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-12T20:55:02.378797608Z {"level":"info","ts":"2026-03-12T20:55:02.378778Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000035a10, TRANSIENT_FAILURE"} 2026-03-12T20:55:06.148109576Z {"level":"info","ts":"2026-03-12T20:55:06.147728Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-12T20:55:06.148109576Z {"level":"info","ts":"2026-03-12T20:55:06.147869Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000035a10, IDLE"} 2026-03-12T20:55:06.148109576Z {"level":"info","ts":"2026-03-12T20:55:06.147929Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-12T20:55:06.148109576Z {"level":"info","ts":"2026-03-12T20:55:06.147983Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-12T20:55:06.148281230Z {"level":"info","ts":"2026-03-12T20:55:06.148142Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000035a10, CONNECTING"} 2026-03-12T20:55:06.156472481Z {"level":"info","ts":"2026-03-12T20:55:06.156317Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to READY"} 2026-03-12T20:55:06.156472481Z {"level":"info","ts":"2026-03-12T20:55:06.156434Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc000035a10, READY"} 2026-03-12T20:55:06.156515893Z {"level":"info","ts":"2026-03-12T20:55:06.156489Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[roundrobin] roundrobinPicker: Build called with info: {map[SubConn(id:2):{{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }}]}"} 2026-03-12T20:55:06.156533373Z {"level":"info","ts":"2026-03-12T20:55:06.156516Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to READY"} config/pod/openshift-etcd/logs/etcd-master-0/etcd_current.log0000640000000000000000000013627415154624262022724 0ustar00000000000000002026-03-12T20:57:06.933704186Z {"level":"info","ts":"2026-03-12T20:57:06.931158Z","caller":"traceutil/trace.go:171","msg":"trace[1139762034] transaction","detail":"{read_only:false; response_revision:10509; number_of_response:1; }","duration":"344.834904ms","start":"2026-03-12T20:57:06.586301Z","end":"2026-03-12T20:57:06.931136Z","steps":["trace[1139762034] 'process raft request' (duration: 344.32227ms)"],"step_count":1} 2026-03-12T20:57:06.933704186Z {"level":"warn","ts":"2026-03-12T20:57:06.931227Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"344.855934ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/events/openshift-authentication/\" range_end:\"/kubernetes.io/events/openshift-authentication0\" ","response":"range_response_count:0 size:5"} 2026-03-12T20:57:06.933704186Z {"level":"warn","ts":"2026-03-12T20:57:06.931270Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-12T20:57:06.586286Z","time spent":"344.923887ms","remote":"[::1]:35578","response type":"/etcdserverpb.KV/Txn","request count":1,"request size":946,"response count":0,"response size":40,"request content":"compare: success:> failure:<>"} 2026-03-12T20:57:06.933704186Z {"level":"info","ts":"2026-03-12T20:57:06.931327Z","caller":"traceutil/trace.go:171","msg":"trace[1006610166] transaction","detail":"{read_only:false; number_of_response:1; response_revision:10509; }","duration":"342.160578ms","start":"2026-03-12T20:57:06.589155Z","end":"2026-03-12T20:57:06.931316Z","steps":["trace[1006610166] 'process raft request' (duration: 341.528182ms)"],"step_count":1} 2026-03-12T20:57:06.933704186Z {"level":"info","ts":"2026-03-12T20:57:06.931329Z","caller":"traceutil/trace.go:171","msg":"trace[799113871] range","detail":"{range_begin:/kubernetes.io/events/openshift-authentication/; range_end:/kubernetes.io/events/openshift-authentication0; response_count:0; response_revision:10509; }","duration":"344.956407ms","start":"2026-03-12T20:57:06.586345Z","end":"2026-03-12T20:57:06.931301Z","steps":["trace[799113871] 'agreement among raft nodes before linearized reading' (duration: 344.818593ms)"],"step_count":1} 2026-03-12T20:57:06.933704186Z {"level":"warn","ts":"2026-03-12T20:57:06.931364Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"345.127881ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/rolebindings/openshift-machine-config-operator/mcc-prometheus-k8s\" ","response":"range_response_count:0 size:5"} 2026-03-12T20:57:06.933704186Z {"level":"warn","ts":"2026-03-12T20:57:06.931381Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-12T20:57:06.586292Z","time spent":"345.08051ms","remote":"[::1]:35578","response type":"/etcdserverpb.KV/Range","request count":0,"request size":98,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/events/openshift-authentication/\" range_end:\"/kubernetes.io/events/openshift-authentication0\" "} 2026-03-12T20:57:06.933704186Z {"level":"warn","ts":"2026-03-12T20:57:06.931397Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-12T20:57:06.589136Z","time spent":"342.218669ms","remote":"[::1]:35612","response type":"/etcdserverpb.KV/Txn","request count":1,"request size":57,"response count":0,"response size":5470,"request content":"compare: success:> failure: >"} 2026-03-12T20:57:06.933704186Z {"level":"info","ts":"2026-03-12T20:57:06.931410Z","caller":"traceutil/trace.go:171","msg":"trace[1018851286] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-machine-config-operator/mcc-prometheus-k8s; range_end:; response_count:0; response_revision:10509; }","duration":"345.211863ms","start":"2026-03-12T20:57:06.586186Z","end":"2026-03-12T20:57:06.931397Z","steps":["trace[1018851286] 'agreement among raft nodes before linearized reading' (duration: 345.136501ms)"],"step_count":1} 2026-03-12T20:57:06.933704186Z {"level":"warn","ts":"2026-03-12T20:57:06.931445Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-12T20:57:06.586164Z","time spent":"345.274025ms","remote":"[::1]:50008","response type":"/etcdserverpb.KV/Range","request count":0,"request size":82,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/rolebindings/openshift-machine-config-operator/mcc-prometheus-k8s\" "} 2026-03-12T20:57:06.933704186Z {"level":"warn","ts":"2026-03-12T20:57:06.931475Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"332.435488ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/bmceventsubscriptions.metal3.io\" ","response":"range_response_count:1 size:4888"} 2026-03-12T20:57:06.933704186Z {"level":"info","ts":"2026-03-12T20:57:06.931530Z","caller":"traceutil/trace.go:171","msg":"trace[398902264] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/bmceventsubscriptions.metal3.io; range_end:; response_count:1; response_revision:10509; }","duration":"332.512929ms","start":"2026-03-12T20:57:06.598999Z","end":"2026-03-12T20:57:06.931512Z","steps":["trace[398902264] 'agreement among raft nodes before linearized reading' (duration: 332.388806ms)"],"step_count":1} 2026-03-12T20:57:06.933704186Z {"level":"warn","ts":"2026-03-12T20:57:06.931574Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-12T20:57:06.598988Z","time spent":"332.575142ms","remote":"[::1]:53796","response type":"/etcdserverpb.KV/Range","request count":0,"request size":95,"response count":1,"response size":4912,"request content":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/bmceventsubscriptions.metal3.io\" "} 2026-03-12T20:57:06.933704186Z {"level":"warn","ts":"2026-03-12T20:57:06.931736Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"284.27529ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/namespaces/openshift-marketplace\" ","response":"range_response_count:1 size:2512"} 2026-03-12T20:57:06.933704186Z {"level":"info","ts":"2026-03-12T20:57:06.931770Z","caller":"traceutil/trace.go:171","msg":"trace[1499902504] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-marketplace; range_end:; response_count:1; response_revision:10509; }","duration":"285.09551ms","start":"2026-03-12T20:57:06.646664Z","end":"2026-03-12T20:57:06.931759Z","steps":["trace[1499902504] 'agreement among raft nodes before linearized reading' (duration: 284.126695ms)"],"step_count":1} 2026-03-12T20:57:07.248917389Z {"level":"warn","ts":"2026-03-12T20:57:07.248345Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"217.960464ms","expected-duration":"200ms","prefix":"","request":"header: txn: success:> failure: >>","response":"size:16"} 2026-03-12T20:57:07.248917389Z {"level":"info","ts":"2026-03-12T20:57:07.248796Z","caller":"traceutil/trace.go:171","msg":"trace[315699312] linearizableReadLoop","detail":"{readStateIndex:10989; appliedIndex:10987; }","duration":"317.887699ms","start":"2026-03-12T20:57:06.930887Z","end":"2026-03-12T20:57:07.248775Z","steps":["trace[315699312] 'read index received' (duration: 99.423541ms)","trace[315699312] 'applied index is now lower than readState.Index' (duration: 218.463058ms)"],"step_count":2} 2026-03-12T20:57:07.248917389Z {"level":"info","ts":"2026-03-12T20:57:07.248795Z","caller":"traceutil/trace.go:171","msg":"trace[1760006296] transaction","detail":"{read_only:false; response_revision:10511; number_of_response:1; }","duration":"380.886042ms","start":"2026-03-12T20:57:06.867876Z","end":"2026-03-12T20:57:07.248762Z","steps":["trace[1760006296] 'process raft request' (duration: 380.623695ms)"],"step_count":1} 2026-03-12T20:57:07.249089863Z {"level":"warn","ts":"2026-03-12T20:57:07.249022Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-12T20:57:06.867850Z","time spent":"381.064737ms","remote":"[::1]:50054","response type":"/etcdserverpb.KV/Txn","request count":1,"request size":468,"response count":0,"response size":40,"request content":"compare: success:> failure: >"} 2026-03-12T20:57:07.249143155Z {"level":"warn","ts":"2026-03-12T20:57:07.249089Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"352.878112ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-operator-lifecycle-manager/olm-operator\" ","response":"range_response_count:1 size:2075"} 2026-03-12T20:57:07.249164295Z {"level":"info","ts":"2026-03-12T20:57:07.249139Z","caller":"traceutil/trace.go:171","msg":"trace[1405218106] range","detail":"{range_begin:/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-operator-lifecycle-manager/olm-operator; range_end:; response_count:1; response_revision:10513; }","duration":"352.917683ms","start":"2026-03-12T20:57:06.896202Z","end":"2026-03-12T20:57:07.249119Z","steps":["trace[1405218106] 'agreement among raft nodes before linearized reading' (duration: 352.854671ms)"],"step_count":1} 2026-03-12T20:57:07.249226757Z {"level":"warn","ts":"2026-03-12T20:57:07.249169Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-12T20:57:06.896161Z","time spent":"353.003325ms","remote":"[::1]:53082","response type":"/etcdserverpb.KV/Range","request count":0,"request size":104,"response count":1,"response size":2099,"request content":"key:\"/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-operator-lifecycle-manager/olm-operator\" "} 2026-03-12T20:57:07.249321009Z {"level":"warn","ts":"2026-03-12T20:57:07.249171Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"327.569758ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/namespaces/openshift-image-registry\" ","response":"range_response_count:1 size:2255"} 2026-03-12T20:57:07.249321009Z {"level":"warn","ts":"2026-03-12T20:57:07.249018Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"451.123274ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-machine-config-operator/machine-config-daemon\" ","response":"range_response_count:1 size:1953"} 2026-03-12T20:57:07.249371340Z {"level":"info","ts":"2026-03-12T20:57:07.249314Z","caller":"traceutil/trace.go:171","msg":"trace[1255175533] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-image-registry; range_end:; response_count:1; response_revision:10513; }","duration":"327.769902ms","start":"2026-03-12T20:57:06.921522Z","end":"2026-03-12T20:57:07.249291Z","steps":["trace[1255175533] 'agreement among raft nodes before linearized reading' (duration: 327.460325ms)"],"step_count":1} 2026-03-12T20:57:07.249371340Z {"level":"info","ts":"2026-03-12T20:57:07.249332Z","caller":"traceutil/trace.go:171","msg":"trace[1487467361] range","detail":"{range_begin:/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-machine-config-operator/machine-config-daemon; range_end:; response_count:1; response_revision:10513; }","duration":"451.476473ms","start":"2026-03-12T20:57:06.797839Z","end":"2026-03-12T20:57:07.249316Z","steps":["trace[1487467361] 'agreement among raft nodes before linearized reading' (duration: 451.050642ms)"],"step_count":1} 2026-03-12T20:57:07.249397211Z {"level":"warn","ts":"2026-03-12T20:57:07.249370Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"377.207522ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-cluster-version/cluster-version-operator\" ","response":"range_response_count:1 size:1888"} 2026-03-12T20:57:07.249397211Z {"level":"warn","ts":"2026-03-12T20:57:07.249363Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"477.858304ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/alertmanagerconfigs.monitoring.coreos.com\" ","response":"range_response_count:1 size:544320"} 2026-03-12T20:57:07.249414191Z {"level":"info","ts":"2026-03-12T20:57:07.249391Z","caller":"traceutil/trace.go:171","msg":"trace[1305755160] range","detail":"{range_begin:/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-cluster-version/cluster-version-operator; range_end:; response_count:1; response_revision:10513; }","duration":"377.257622ms","start":"2026-03-12T20:57:06.872127Z","end":"2026-03-12T20:57:07.249385Z","steps":["trace[1305755160] 'agreement among raft nodes before linearized reading' (duration: 377.214281ms)"],"step_count":1} 2026-03-12T20:57:07.249414191Z {"level":"warn","ts":"2026-03-12T20:57:07.249379Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-12T20:57:06.921508Z","time spent":"327.857055ms","remote":"[::1]:50090","response type":"/etcdserverpb.KV/Range","request count":0,"request size":52,"response count":1,"response size":2279,"request content":"key:\"/kubernetes.io/namespaces/openshift-image-registry\" "} 2026-03-12T20:57:07.249431341Z {"level":"warn","ts":"2026-03-12T20:57:07.249413Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-12T20:57:06.872115Z","time spent":"377.293944ms","remote":"[::1]:53082","response type":"/etcdserverpb.KV/Range","request count":0,"request size":105,"response count":1,"response size":1912,"request content":"key:\"/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-cluster-version/cluster-version-operator\" "} 2026-03-12T20:57:07.249431341Z {"level":"info","ts":"2026-03-12T20:57:07.249405Z","caller":"traceutil/trace.go:171","msg":"trace[306671268] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/alertmanagerconfigs.monitoring.coreos.com; range_end:; response_count:1; response_revision:10513; }","duration":"477.950905ms","start":"2026-03-12T20:57:06.771441Z","end":"2026-03-12T20:57:07.249392Z","steps":["trace[306671268] 'agreement among raft nodes before linearized reading' (duration: 477.488514ms)"],"step_count":1} 2026-03-12T20:57:07.249509713Z {"level":"warn","ts":"2026-03-12T20:57:07.249450Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-12T20:57:06.771414Z","time spent":"478.027958ms","remote":"[::1]:53796","response type":"/etcdserverpb.KV/Range","request count":0,"request size":105,"response count":1,"response size":544344,"request content":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/alertmanagerconfigs.monitoring.coreos.com\" "} 2026-03-12T20:57:07.249556614Z {"level":"warn","ts":"2026-03-12T20:57:07.249526Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"403.095881ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/cloudcredential.openshift.io/credentialsrequests/openshift-cloud-credential-operator/openshift-cloud-network-config-controller-aws\" ","response":"range_response_count:1 size:2687"} 2026-03-12T20:57:07.249572785Z {"level":"info","ts":"2026-03-12T20:57:07.249548Z","caller":"traceutil/trace.go:171","msg":"trace[577889495] range","detail":"{range_begin:/kubernetes.io/cloudcredential.openshift.io/credentialsrequests/openshift-cloud-credential-operator/openshift-cloud-network-config-controller-aws; range_end:; response_count:1; response_revision:10513; }","duration":"403.128541ms","start":"2026-03-12T20:57:06.846410Z","end":"2026-03-12T20:57:07.249539Z","steps":["trace[577889495] 'agreement among raft nodes before linearized reading' (duration: 403.07788ms)"],"step_count":1} 2026-03-12T20:57:07.249588735Z {"level":"warn","ts":"2026-03-12T20:57:07.249566Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-12T20:57:06.846402Z","time spent":"403.160182ms","remote":"[::1]:35446","response type":"/etcdserverpb.KV/Range","request count":0,"request size":148,"response count":1,"response size":2711,"request content":"key:\"/kubernetes.io/cloudcredential.openshift.io/credentialsrequests/openshift-cloud-credential-operator/openshift-cloud-network-config-controller-aws\" "} 2026-03-12T20:57:07.249743339Z {"level":"warn","ts":"2026-03-12T20:57:07.249682Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"427.595124ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/configmaps/openshift-controller-manager-operator/openshift-controller-manager-operator-config\" ","response":"range_response_count:1 size:1171"} 2026-03-12T20:57:07.249743339Z {"level":"info","ts":"2026-03-12T20:57:07.249680Z","caller":"traceutil/trace.go:171","msg":"trace[154068824] transaction","detail":"{read_only:false; response_revision:10513; number_of_response:1; }","duration":"308.972429ms","start":"2026-03-12T20:57:06.940689Z","end":"2026-03-12T20:57:07.249661Z","steps":["trace[154068824] 'process raft request' (duration: 308.017386ms)"],"step_count":1} 2026-03-12T20:57:07.249743339Z {"level":"info","ts":"2026-03-12T20:57:07.249710Z","caller":"traceutil/trace.go:171","msg":"trace[486594564] range","detail":"{range_begin:/kubernetes.io/configmaps/openshift-controller-manager-operator/openshift-controller-manager-operator-config; range_end:; response_count:1; response_revision:10513; }","duration":"427.651775ms","start":"2026-03-12T20:57:06.822050Z","end":"2026-03-12T20:57:07.249702Z","steps":["trace[486594564] 'agreement among raft nodes before linearized reading' (duration: 427.608364ms)"],"step_count":1} 2026-03-12T20:57:07.249743339Z {"level":"warn","ts":"2026-03-12T20:57:07.249727Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-12T20:57:06.822032Z","time spent":"427.691376ms","remote":"[::1]:50368","response type":"/etcdserverpb.KV/Range","request count":0,"request size":110,"response count":1,"response size":1195,"request content":"key:\"/kubernetes.io/configmaps/openshift-controller-manager-operator/openshift-controller-manager-operator-config\" "} 2026-03-12T20:57:07.250016825Z {"level":"warn","ts":"2026-03-12T20:57:07.249384Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-12T20:57:06.797821Z","time spent":"451.548345ms","remote":"[::1]:53082","response type":"/etcdserverpb.KV/Range","request count":0,"request size":110,"response count":1,"response size":1977,"request content":"key:\"/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-machine-config-operator/machine-config-daemon\" "} 2026-03-12T20:57:07.250016825Z {"level":"warn","ts":"2026-03-12T20:57:07.249853Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-12T20:57:06.940665Z","time spent":"309.0605ms","remote":"[::1]:35612","response type":"/etcdserverpb.KV/Txn","request count":1,"request size":5420,"response count":0,"response size":40,"request content":"compare: success:> failure: >"} 2026-03-12T20:57:07.250016825Z {"level":"info","ts":"2026-03-12T20:57:07.249870Z","caller":"traceutil/trace.go:171","msg":"trace[1061218670] transaction","detail":"{read_only:false; response_revision:10512; number_of_response:1; }","duration":"311.713906ms","start":"2026-03-12T20:57:06.938141Z","end":"2026-03-12T20:57:07.249855Z","steps":["trace[1061218670] 'process raft request' (duration: 310.494815ms)"],"step_count":1} 2026-03-12T20:57:07.250016825Z {"level":"warn","ts":"2026-03-12T20:57:07.249951Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-12T20:57:06.938123Z","time spent":"311.789688ms","remote":"[::1]:35578","response type":"/etcdserverpb.KV/Txn","request count":1,"request size":962,"response count":0,"response size":40,"request content":"compare: success:> failure:<>"} 2026-03-12T20:57:07.250399826Z {"level":"warn","ts":"2026-03-12T20:57:07.250347Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"574.475637ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/monitoring.coreos.com/prometheusrules/openshift-machine-api/machine-api-operator-prometheus-rules\" ","response":"range_response_count:1 size:4576"} 2026-03-12T20:57:07.250399826Z {"level":"info","ts":"2026-03-12T20:57:07.250377Z","caller":"traceutil/trace.go:171","msg":"trace[1998250787] range","detail":"{range_begin:/kubernetes.io/monitoring.coreos.com/prometheusrules/openshift-machine-api/machine-api-operator-prometheus-rules; range_end:; response_count:1; response_revision:10513; }","duration":"574.505738ms","start":"2026-03-12T20:57:06.675865Z","end":"2026-03-12T20:57:07.250370Z","steps":["trace[1998250787] 'agreement among raft nodes before linearized reading' (duration: 574.453747ms)"],"step_count":1} 2026-03-12T20:57:07.250423626Z {"level":"warn","ts":"2026-03-12T20:57:07.250344Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"558.40221ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/config.openshift.io/clusteroperators/machine-api\" ","response":"range_response_count:1 size:3080"} 2026-03-12T20:57:07.250443497Z {"level":"warn","ts":"2026-03-12T20:57:07.250427Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"563.331002ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/serviceaccounts\" limit:1 ","response":"range_response_count:0 size:5"} 2026-03-12T20:57:07.250460237Z {"level":"info","ts":"2026-03-12T20:57:07.250425Z","caller":"traceutil/trace.go:171","msg":"trace[1008933804] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/clusteroperators/machine-api; range_end:; response_count:1; response_revision:10513; }","duration":"558.496923ms","start":"2026-03-12T20:57:06.691911Z","end":"2026-03-12T20:57:07.250408Z","steps":["trace[1008933804] 'agreement among raft nodes before linearized reading' (duration: 558.3646ms)"],"step_count":1} 2026-03-12T20:57:07.250484178Z {"level":"info","ts":"2026-03-12T20:57:07.250444Z","caller":"traceutil/trace.go:171","msg":"trace[792048214] range","detail":"{range_begin:/kubernetes.io/serviceaccounts; range_end:; response_count:0; response_revision:10513; }","duration":"563.391334ms","start":"2026-03-12T20:57:06.687048Z","end":"2026-03-12T20:57:07.250439Z","steps":["trace[792048214] 'agreement among raft nodes before linearized reading' (duration: 563.357253ms)"],"step_count":1} 2026-03-12T20:57:07.250484178Z {"level":"warn","ts":"2026-03-12T20:57:07.250437Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"558.945663ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/config.openshift.io/clusteroperators/cluster-autoscaler\" ","response":"range_response_count:1 size:2554"} 2026-03-12T20:57:07.250484178Z {"level":"warn","ts":"2026-03-12T20:57:07.250469Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-12T20:57:06.687023Z","time spent":"563.442405ms","remote":"[::1]:57278","response type":"/etcdserverpb.KV/Range","request count":0,"request size":34,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/serviceaccounts\" limit:1 "} 2026-03-12T20:57:07.250504048Z {"level":"warn","ts":"2026-03-12T20:57:07.250460Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"315.09665ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/operators.coreos.com/installplans\" limit:1 ","response":"range_response_count:0 size:5"} 2026-03-12T20:57:07.250504048Z {"level":"info","ts":"2026-03-12T20:57:07.250481Z","caller":"traceutil/trace.go:171","msg":"trace[1818413551] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/clusteroperators/cluster-autoscaler; range_end:; response_count:1; response_revision:10513; }","duration":"559.029615ms","start":"2026-03-12T20:57:06.691440Z","end":"2026-03-12T20:57:07.250469Z","steps":["trace[1818413551] 'agreement among raft nodes before linearized reading' (duration: 558.952363ms)"],"step_count":1} 2026-03-12T20:57:07.250563729Z {"level":"warn","ts":"2026-03-12T20:57:07.250505Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-12T20:57:06.691903Z","time spent":"558.592205ms","remote":"[::1]:53104","response type":"/etcdserverpb.KV/Range","request count":0,"request size":65,"response count":1,"response size":3104,"request content":"key:\"/kubernetes.io/config.openshift.io/clusteroperators/machine-api\" "} 2026-03-12T20:57:07.250563729Z {"level":"warn","ts":"2026-03-12T20:57:07.250520Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-12T20:57:06.691417Z","time spent":"559.092626ms","remote":"[::1]:53104","response type":"/etcdserverpb.KV/Range","request count":0,"request size":72,"response count":1,"response size":2578,"request content":"key:\"/kubernetes.io/config.openshift.io/clusteroperators/cluster-autoscaler\" "} 2026-03-12T20:57:07.250939118Z {"level":"info","ts":"2026-03-12T20:57:07.250516Z","caller":"traceutil/trace.go:171","msg":"trace[1164743146] range","detail":"{range_begin:/kubernetes.io/operators.coreos.com/installplans; range_end:; response_count:0; response_revision:10513; }","duration":"315.193602ms","start":"2026-03-12T20:57:06.935306Z","end":"2026-03-12T20:57:07.250500Z","steps":["trace[1164743146] 'agreement among raft nodes before linearized reading' (duration: 315.10957ms)"],"step_count":1} 2026-03-12T20:57:07.250939118Z {"level":"warn","ts":"2026-03-12T20:57:07.250644Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-12T20:57:06.935286Z","time spent":"315.346906ms","remote":"[::1]:35676","response type":"/etcdserverpb.KV/Range","request count":0,"request size":52,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/operators.coreos.com/installplans\" limit:1 "} 2026-03-12T20:57:07.250939118Z {"level":"warn","ts":"2026-03-12T20:57:07.250698Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"228.244898ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/rolebindings/kube-system/insights-operator-auth\" ","response":"range_response_count:1 size:1249"} 2026-03-12T20:57:07.250939118Z {"level":"info","ts":"2026-03-12T20:57:07.250751Z","caller":"traceutil/trace.go:171","msg":"trace[1690107237] range","detail":"{range_begin:/kubernetes.io/rolebindings/kube-system/insights-operator-auth; range_end:; response_count:1; response_revision:10513; }","duration":"228.29855ms","start":"2026-03-12T20:57:07.022439Z","end":"2026-03-12T20:57:07.250737Z","steps":["trace[1690107237] 'agreement among raft nodes before linearized reading' (duration: 228.200127ms)"],"step_count":1} 2026-03-12T20:57:07.250939118Z {"level":"warn","ts":"2026-03-12T20:57:07.250747Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"486.513267ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/operator.openshift.io/olms/cluster\" ","response":"range_response_count:1 size:13107"} 2026-03-12T20:57:07.250939118Z {"level":"info","ts":"2026-03-12T20:57:07.250840Z","caller":"traceutil/trace.go:171","msg":"trace[1606276581] range","detail":"{range_begin:/kubernetes.io/operator.openshift.io/olms/cluster; range_end:; response_count:1; response_revision:10513; }","duration":"486.60536ms","start":"2026-03-12T20:57:06.764188Z","end":"2026-03-12T20:57:07.250793Z","steps":["trace[1606276581] 'agreement among raft nodes before linearized reading' (duration: 486.505688ms)"],"step_count":1} 2026-03-12T20:57:07.250939118Z {"level":"warn","ts":"2026-03-12T20:57:07.250892Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-12T20:57:06.764165Z","time spent":"486.714792ms","remote":"[::1]:53052","response type":"/etcdserverpb.KV/Range","request count":0,"request size":51,"response count":1,"response size":13131,"request content":"key:\"/kubernetes.io/operator.openshift.io/olms/cluster\" "} 2026-03-12T20:57:07.251106412Z {"level":"info","ts":"2026-03-12T20:57:07.251056Z","caller":"traceutil/trace.go:171","msg":"trace[1359591085] range","detail":"{range_begin:/kubernetes.io/serviceaccounts/openshift-cluster-machine-approver/machine-approver-sa; range_end:; response_count:1; response_revision:10513; }","duration":"104.729733ms","start":"2026-03-12T20:57:07.146319Z","end":"2026-03-12T20:57:07.251049Z","steps":["trace[1359591085] 'agreement among raft nodes before linearized reading' (duration: 104.694582ms)"],"step_count":1} 2026-03-12T20:57:07.251190074Z {"level":"warn","ts":"2026-03-12T20:57:07.251125Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"254.26876ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/operator.openshift.io/csisnapshotcontrollers/cluster\" ","response":"range_response_count:1 size:5653"} 2026-03-12T20:57:07.251190074Z {"level":"info","ts":"2026-03-12T20:57:07.251169Z","caller":"traceutil/trace.go:171","msg":"trace[1835518010] range","detail":"{range_begin:/kubernetes.io/cloudcredential.openshift.io/credentialsrequests/openshift-cloud-credential-operator/azure-disk-csi-driver-operator; range_end:; response_count:1; response_revision:10513; }","duration":"128.97263ms","start":"2026-03-12T20:57:07.122189Z","end":"2026-03-12T20:57:07.251162Z","steps":["trace[1835518010] 'agreement among raft nodes before linearized reading' (duration: 128.954319ms)"],"step_count":1} 2026-03-12T20:57:07.251232615Z {"level":"info","ts":"2026-03-12T20:57:07.251192Z","caller":"traceutil/trace.go:171","msg":"trace[1626249249] range","detail":"{range_begin:/kubernetes.io/operator.openshift.io/csisnapshotcontrollers/cluster; range_end:; response_count:1; response_revision:10513; }","duration":"254.400303ms","start":"2026-03-12T20:57:06.996776Z","end":"2026-03-12T20:57:07.251177Z","steps":["trace[1626249249] 'agreement among raft nodes before linearized reading' (duration: 254.27842ms)"],"step_count":1} 2026-03-12T20:57:07.251316557Z {"level":"info","ts":"2026-03-12T20:57:07.251269Z","caller":"traceutil/trace.go:171","msg":"trace[376554668] range","detail":"{range_begin:/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-ingress-operator/ingress-operator; range_end:; response_count:1; response_revision:10513; }","duration":"154.907219ms","start":"2026-03-12T20:57:07.096356Z","end":"2026-03-12T20:57:07.251263Z","steps":["trace[376554668] 'agreement among raft nodes before linearized reading' (duration: 154.890389ms)"],"step_count":1} 2026-03-12T20:57:07.254885136Z {"level":"info","ts":"2026-03-12T20:57:07.251378Z","caller":"traceutil/trace.go:171","msg":"trace[1209151499] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-authentication-operator/prometheus-k8s; range_end:; response_count:1; response_revision:10513; }","duration":"179.67224ms","start":"2026-03-12T20:57:07.071701Z","end":"2026-03-12T20:57:07.251373Z","steps":["trace[1209151499] 'agreement among raft nodes before linearized reading' (duration: 179.654029ms)"],"step_count":1} 2026-03-12T20:57:07.254885136Z {"level":"warn","ts":"2026-03-12T20:57:07.251580Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"272.859368ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/monitoring.coreos.com/probes/\" range_end:\"/kubernetes.io/monitoring.coreos.com/probes0\" count_only:true ","response":"range_response_count:0 size:5"} 2026-03-12T20:57:07.254885136Z {"level":"info","ts":"2026-03-12T20:57:07.251627Z","caller":"traceutil/trace.go:171","msg":"trace[1629096317] range","detail":"{range_begin:/kubernetes.io/monitoring.coreos.com/probes/; range_end:/kubernetes.io/monitoring.coreos.com/probes0; response_count:0; response_revision:10513; }","duration":"272.90506ms","start":"2026-03-12T20:57:06.978705Z","end":"2026-03-12T20:57:07.251610Z","steps":["trace[1629096317] 'agreement among raft nodes before linearized reading' (duration: 272.823648ms)"],"step_count":1} 2026-03-12T20:57:07.254885136Z {"level":"warn","ts":"2026-03-12T20:57:07.251875Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"280.538759ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/consolelinks.console.openshift.io\" ","response":"range_response_count:1 size:7739"} 2026-03-12T20:57:07.254885136Z {"level":"info","ts":"2026-03-12T20:57:07.251908Z","caller":"traceutil/trace.go:171","msg":"trace[801336602] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/consolelinks.console.openshift.io; range_end:; response_count:1; response_revision:10513; }","duration":"280.61389ms","start":"2026-03-12T20:57:06.971285Z","end":"2026-03-12T20:57:07.251899Z","steps":["trace[801336602] 'agreement among raft nodes before linearized reading' (duration: 280.510448ms)"],"step_count":1} 2026-03-12T20:57:07.254885136Z {"level":"warn","ts":"2026-03-12T20:57:07.250395Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-12T20:57:06.675799Z","time spent":"574.591809ms","remote":"[::1]:57324","response type":"/etcdserverpb.KV/Range","request count":0,"request size":114,"response count":1,"response size":4600,"request content":"key:\"/kubernetes.io/monitoring.coreos.com/prometheusrules/openshift-machine-api/machine-api-operator-prometheus-rules\" "} 2026-03-12T20:57:07.254885136Z {"level":"warn","ts":"2026-03-12T20:57:07.252082Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"305.237077ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/monitoring.coreos.com/prometheusrules/openshift-kube-scheduler-operator/kube-scheduler-operator\" ","response":"range_response_count:1 size:2386"} 2026-03-12T20:57:07.254885136Z {"level":"info","ts":"2026-03-12T20:57:07.252114Z","caller":"traceutil/trace.go:171","msg":"trace[2021805477] range","detail":"{range_begin:/kubernetes.io/monitoring.coreos.com/prometheusrules/openshift-kube-scheduler-operator/kube-scheduler-operator; range_end:; response_count:1; response_revision:10513; }","duration":"305.318428ms","start":"2026-03-12T20:57:06.946786Z","end":"2026-03-12T20:57:07.252104Z","steps":["trace[2021805477] 'agreement among raft nodes before linearized reading' (duration: 305.256087ms)"],"step_count":1} 2026-03-12T20:57:07.254885136Z {"level":"warn","ts":"2026-03-12T20:57:07.252144Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-12T20:57:06.946771Z","time spent":"305.36486ms","remote":"[::1]:57324","response type":"/etcdserverpb.KV/Range","request count":0,"request size":112,"response count":1,"response size":2410,"request content":"key:\"/kubernetes.io/monitoring.coreos.com/prometheusrules/openshift-kube-scheduler-operator/kube-scheduler-operator\" "} 2026-03-12T20:57:07.254885136Z {"level":"warn","ts":"2026-03-12T20:57:07.252198Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"530.530642ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/cloudcredential.openshift.io/credentialsrequests/openshift-cloud-credential-operator/openshift-machine-api-openstack\" ","response":"range_response_count:1 size:2230"} 2026-03-12T20:57:07.254885136Z {"level":"info","ts":"2026-03-12T20:57:07.252226Z","caller":"traceutil/trace.go:171","msg":"trace[1768536928] range","detail":"{range_begin:/kubernetes.io/cloudcredential.openshift.io/credentialsrequests/openshift-cloud-credential-operator/openshift-machine-api-openstack; range_end:; response_count:1; response_revision:10513; }","duration":"530.589614ms","start":"2026-03-12T20:57:06.721629Z","end":"2026-03-12T20:57:07.252218Z","steps":["trace[1768536928] 'agreement among raft nodes before linearized reading' (duration: 530.529173ms)"],"step_count":1} 2026-03-12T20:57:07.254885136Z {"level":"warn","ts":"2026-03-12T20:57:07.252247Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-12T20:57:06.721612Z","time spent":"530.630385ms","remote":"[::1]:35446","response type":"/etcdserverpb.KV/Range","request count":0,"request size":134,"response count":1,"response size":2254,"request content":"key:\"/kubernetes.io/cloudcredential.openshift.io/credentialsrequests/openshift-cloud-credential-operator/openshift-machine-api-openstack\" "} 2026-03-12T20:57:07.254885136Z {"level":"warn","ts":"2026-03-12T20:57:07.252358Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"556.218495ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/namespaces/openshift-kube-controller-manager-operator\" ","response":"range_response_count:1 size:2087"} 2026-03-12T20:57:07.254885136Z {"level":"info","ts":"2026-03-12T20:57:07.252377Z","caller":"traceutil/trace.go:171","msg":"trace[823581176] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-kube-controller-manager-operator; range_end:; response_count:1; response_revision:10513; }","duration":"556.278417ms","start":"2026-03-12T20:57:06.696092Z","end":"2026-03-12T20:57:07.252371Z","steps":["trace[823581176] 'agreement among raft nodes before linearized reading' (duration: 556.240316ms)"],"step_count":1} 2026-03-12T20:57:07.254885136Z {"level":"warn","ts":"2026-03-12T20:57:07.252369Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"314.31697ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/authorization.openshift.io/rolebindingrestrictions\" limit:1 ","response":"range_response_count:0 size:5"} 2026-03-12T20:57:07.254885136Z {"level":"info","ts":"2026-03-12T20:57:07.252411Z","caller":"traceutil/trace.go:171","msg":"trace[418406463] range","detail":"{range_begin:/kubernetes.io/authorization.openshift.io/rolebindingrestrictions; range_end:; response_count:0; response_revision:10513; }","duration":"314.372331ms","start":"2026-03-12T20:57:06.938027Z","end":"2026-03-12T20:57:07.252399Z","steps":["trace[418406463] 'agreement among raft nodes before linearized reading' (duration: 314.29956ms)"],"step_count":1} 2026-03-12T20:57:07.254885136Z {"level":"warn","ts":"2026-03-12T20:57:07.252450Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-12T20:57:06.938021Z","time spent":"314.418412ms","remote":"[::1]:35522","response type":"/etcdserverpb.KV/Range","request count":0,"request size":69,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/authorization.openshift.io/rolebindingrestrictions\" limit:1 "} 2026-03-12T20:57:07.254885136Z {"level":"warn","ts":"2026-03-12T20:57:07.252684Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"314.72838ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/pods\" limit:1 ","response":"range_response_count:0 size:5"} 2026-03-12T20:57:07.254885136Z {"level":"info","ts":"2026-03-12T20:57:07.252716Z","caller":"traceutil/trace.go:171","msg":"trace[1911676117] range","detail":"{range_begin:/kubernetes.io/pods; range_end:; response_count:0; response_revision:10513; }","duration":"314.798112ms","start":"2026-03-12T20:57:06.937910Z","end":"2026-03-12T20:57:07.252708Z","steps":["trace[1911676117] 'agreement among raft nodes before linearized reading' (duration: 314.73903ms)"],"step_count":1} 2026-03-12T20:57:07.254964418Z {"level":"warn","ts":"2026-03-12T20:57:07.252744Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-12T20:57:06.937891Z","time spent":"314.847134ms","remote":"[::1]:53760","response type":"/etcdserverpb.KV/Range","request count":0,"request size":23,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/pods\" limit:1 "} 2026-03-12T20:57:07.256109496Z {"level":"warn","ts":"2026-03-12T20:57:07.256048Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"563.574478ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/deployments/openshift-catalogd/catalogd-controller-manager\" ","response":"range_response_count:1 size:7162"} 2026-03-12T20:57:07.256109496Z {"level":"info","ts":"2026-03-12T20:57:07.256089Z","caller":"traceutil/trace.go:171","msg":"trace[1948996320] range","detail":"{range_begin:/kubernetes.io/deployments/openshift-catalogd/catalogd-controller-manager; range_end:; response_count:1; response_revision:10513; }","duration":"563.668681ms","start":"2026-03-12T20:57:06.692410Z","end":"2026-03-12T20:57:07.256078Z","steps":["trace[1948996320] 'agreement among raft nodes before linearized reading' (duration: 563.577038ms)"],"step_count":1} 2026-03-12T20:57:07.256149797Z {"level":"warn","ts":"2026-03-12T20:57:07.256126Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-12T20:57:06.692401Z","time spent":"563.713841ms","remote":"[::1]:57376","response type":"/etcdserverpb.KV/Range","request count":0,"request size":75,"response count":1,"response size":7186,"request content":"key:\"/kubernetes.io/deployments/openshift-catalogd/catalogd-controller-manager\" "} 2026-03-12T20:57:07.259863699Z {"level":"warn","ts":"2026-03-12T20:57:07.250650Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"204.467192ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/monitoring.coreos.com/prometheusrules/openshift-cloud-credential-operator/cloud-credential-operator-alerts\" ","response":"range_response_count:1 size:5655"} 2026-03-12T20:57:07.259863699Z {"level":"info","ts":"2026-03-12T20:57:07.256548Z","caller":"traceutil/trace.go:171","msg":"trace[768254485] range","detail":"{range_begin:/kubernetes.io/monitoring.coreos.com/prometheusrules/openshift-cloud-credential-operator/cloud-credential-operator-alerts; range_end:; response_count:1; response_revision:10513; }","duration":"210.392659ms","start":"2026-03-12T20:57:07.046142Z","end":"2026-03-12T20:57:07.256535Z","steps":["trace[768254485] 'agreement among raft nodes before linearized reading' (duration: 204.474913ms)"],"step_count":1} 2026-03-12T20:57:07.259863699Z {"level":"warn","ts":"2026-03-12T20:57:07.251228Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"504.124901ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/catalogsources.operators.coreos.com\" ","response":"range_response_count:1 size:50984"} 2026-03-12T20:57:07.259863699Z {"level":"info","ts":"2026-03-12T20:57:07.257836Z","caller":"traceutil/trace.go:171","msg":"trace[658956678] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/catalogsources.operators.coreos.com; range_end:; response_count:1; response_revision:10513; }","duration":"510.762126ms","start":"2026-03-12T20:57:06.747031Z","end":"2026-03-12T20:57:07.257793Z","steps":["trace[658956678] 'agreement among raft nodes before linearized reading' (duration: 504.088221ms)"],"step_count":1} 2026-03-12T20:57:07.259863699Z {"level":"warn","ts":"2026-03-12T20:57:07.257907Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-12T20:57:06.747014Z","time spent":"510.867808ms","remote":"[::1]:53796","response type":"/etcdserverpb.KV/Range","request count":0,"request size":99,"response count":1,"response size":51008,"request content":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/catalogsources.operators.coreos.com\" "} 2026-03-12T20:57:07.265332273Z {"level":"warn","ts":"2026-03-12T20:57:07.252396Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-12T20:57:06.696070Z","time spent":"556.321048ms","remote":"[::1]:50090","response type":"/etcdserverpb.KV/Range","request count":0,"request size":70,"response count":1,"response size":2111,"request content":"key:\"/kubernetes.io/namespaces/openshift-kube-controller-manager-operator\" "} 2026-03-12T20:57:07.265754904Z {"level":"info","ts":"2026-03-12T20:57:07.265575Z","caller":"traceutil/trace.go:171","msg":"trace[1940960116] transaction","detail":"{read_only:false; response_revision:10510; number_of_response:1; }","duration":"567.256239ms","start":"2026-03-12T20:57:06.698283Z","end":"2026-03-12T20:57:07.265539Z","steps":["trace[1940960116] 'process raft request' (duration: 331.977737ms)","trace[1940960116] 'get key's previous created_revision and leaseID' {req_type:put; key:/kubernetes.io/pods/openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-559568b945-ml8vb; req_size:10448; } (duration: 217.477703ms)"],"step_count":2} 2026-03-12T20:57:07.265754904Z {"level":"warn","ts":"2026-03-12T20:57:07.265730Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2026-03-12T20:57:06.698264Z","time spent":"567.366081ms","remote":"[::1]:53760","response type":"/etcdserverpb.KV/Txn","request count":1,"request size":10451,"response count":0,"response size":40,"request content":"compare: success:> failure: >"} config/pod/openshift-etcd/logs/etcd-master-0/setup_current.log0000640000000000000000000000013715154624262023131 0ustar00000000000000002026-03-12T20:51:01.791787184Z Fixing etcd log permissions.Fixing etcd auto backup permissions.config/pod/openshift-oauth-apiserver/logs/apiserver-7946996f87-nzb7c/oauth-apiserver_current.log0000640000000000000000000011450315154624262031171 0ustar00000000000000002026-03-12T20:55:11.804956482Z E0312 20:55:11.804930 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:11.805201838Z E0312 20:55:11.805164 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:11.816137977Z E0312 20:55:11.816069 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:11.816219539Z E0312 20:55:11.816193 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:11.816291131Z E0312 20:55:11.816244 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:11.816554447Z E0312 20:55:11.816516 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:11.816787863Z E0312 20:55:11.816734 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:23.891897926Z E0312 20:55:23.889162 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:23.891897926Z E0312 20:55:23.889222 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:23.891897926Z E0312 20:55:23.889246 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:23.891897926Z E0312 20:55:23.889362 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:23.891897926Z E0312 20:55:23.889484 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:23.912131529Z E0312 20:55:23.912033 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:23.912131529Z E0312 20:55:23.912100 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:23.912131529Z E0312 20:55:23.912109 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:23.912259652Z E0312 20:55:23.912208 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:23.912282592Z E0312 20:55:23.912252 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:41.819995272Z E0312 20:55:41.817860 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:41.819995272Z E0312 20:55:41.817934 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:41.819995272Z E0312 20:55:41.818049 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:41.819995272Z E0312 20:55:41.818110 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:41.819995272Z E0312 20:55:41.818382 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:41.819995272Z E0312 20:55:41.819683 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:41.819995272Z E0312 20:55:41.819790 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:41.820309440Z E0312 20:55:41.820229 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:41.820511646Z E0312 20:55:41.820414 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:41.820511646Z E0312 20:55:41.820428 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:53.904787437Z E0312 20:55:53.904663 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:53.905133416Z E0312 20:55:53.905100 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:53.905343851Z E0312 20:55:53.905298 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:53.905604977Z E0312 20:55:53.905565 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:53.905864234Z E0312 20:55:53.905802 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:53.925131493Z E0312 20:55:53.925093 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:53.925258096Z E0312 20:55:53.925208 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:53.925258096Z E0312 20:55:53.925237 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:53.927956704Z E0312 20:55:53.927747 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:53.928007155Z E0312 20:55:53.927944 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:53.982030779Z E0312 20:55:53.981731 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:53.991922026Z E0312 20:55:53.991805 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:54.039355856Z E0312 20:55:54.039260 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:55:54.049990571Z E0312 20:55:54.049926 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:11.833906892Z E0312 20:56:11.833768 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:11.837384678Z E0312 20:56:11.837311 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:11.838213739Z E0312 20:56:11.838137 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:11.838633839Z E0312 20:56:11.838593 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:11.838656669Z E0312 20:56:11.838637 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:11.838837714Z E0312 20:56:11.838762 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:11.839208853Z E0312 20:56:11.839161 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:11.839369957Z E0312 20:56:11.839330 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:11.839487860Z E0312 20:56:11.839453 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:11.840900116Z E0312 20:56:11.839707 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:23.925366602Z E0312 20:56:23.925288 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:23.925803014Z E0312 20:56:23.925770 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:23.926144572Z E0312 20:56:23.926094 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:23.926254965Z E0312 20:56:23.926211 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:23.926254965Z E0312 20:56:23.926244 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:23.926531271Z E0312 20:56:23.926488 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:23.926554732Z E0312 20:56:23.926527 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:23.926728706Z E0312 20:56:23.926702 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:23.926859269Z E0312 20:56:23.926776 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:23.927063115Z E0312 20:56:23.927017 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:41.843838567Z E0312 20:56:41.843674 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:41.843838567Z E0312 20:56:41.843733 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:41.843916939Z E0312 20:56:41.843816 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:41.844011351Z E0312 20:56:41.843674 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:41.844011351Z E0312 20:56:41.843983 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:41.844258197Z E0312 20:56:41.844179 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:41.844258197Z E0312 20:56:41.844214 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:41.844258197Z E0312 20:56:41.844247 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:41.844442502Z E0312 20:56:41.843983 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:41.844538625Z E0312 20:56:41.844373 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.890119665Z E0312 20:56:53.890058 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.890431653Z E0312 20:56:53.890407 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.890588737Z E0312 20:56:53.890564 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.890654988Z E0312 20:56:53.890642 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.890844043Z E0312 20:56:53.890829 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.904204293Z E0312 20:56:53.904137 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.904564421Z E0312 20:56:53.904537 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.912290541Z E0312 20:56:53.912254 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.912788234Z E0312 20:56:53.912771 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.913054350Z E0312 20:56:53.913035 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.980492883Z E0312 20:56:53.980444 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:53.986606125Z E0312 20:56:53.986537 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:54.075799673Z E0312 20:56:54.075739 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:54.081135485Z E0312 20:56:54.081101 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:56:57.747891217Z I0312 20:56:57.747782 1 policy_source.go:224] refreshing policies 2026-03-12T20:57:07.760882603Z I0312 20:57:07.760828 1 policy_source.go:224] refreshing policies 2026-03-12T20:57:08.763901378Z I0312 20:57:08.761111 1 policy_source.go:224] refreshing policies 2026-03-12T20:57:08.776717814Z I0312 20:57:08.776655 1 policy_source.go:419] informer started for config.openshift.io/v1, Kind=Infrastructure 2026-03-12T20:57:08.778540449Z I0312 20:57:08.778493 1 reflector.go:368] Caches populated for config.openshift.io/v1, Resource=infrastructures from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-12T20:57:11.857790772Z E0312 20:57:11.855702 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:11.857790772Z E0312 20:57:11.856322 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:11.857790772Z E0312 20:57:11.856635 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:11.858997232Z E0312 20:57:11.858941 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:11.859398862Z E0312 20:57:11.859349 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:11.859708880Z E0312 20:57:11.859658 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:11.860058978Z E0312 20:57:11.860008 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:11.860441337Z E0312 20:57:11.860384 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:11.860737756Z E0312 20:57:11.860690 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" 2026-03-12T20:57:11.861098374Z E0312 20:57:11.861046 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1949691624699927047, SKID=65:2D:D4:62:E9:C1:49:C2:D9:24:80:32:A7:A8:54:EE:C8:44:81:FA, AKID=A5:8F:01:27:C7:20:29:98:23:7D:76:75:85:1C:6E:CC:AA:35:91:59 failed: x509: certificate signed by unknown authority]" config/pod/openshift-ingress/logs/router-default-79f8cd6fdd-hsv57/router_current.log0000640000000000000000000000404715154624262027165 0ustar00000000000000002026-03-12T20:57:13.527037546Z I0312 20:57:13.526615 1 template.go:560] "msg"="starting router" "logger"="router" "version"="majorFromGit: \nminorFromGit: \ncommitFromGit: ccd9551702a89cac27e38ebb63801ddb6823d101\nversionFromGit: 4.0.0-565-gccd95517\ngitTreeState: clean\nbuildDate: 2026-02-14T00:34:53Z\n" 2026-03-12T20:57:13.530498241Z I0312 20:57:13.530451 1 metrics.go:156] "msg"="router health and metrics port listening on HTTP and HTTPS" "address"="0.0.0.0:1936" "logger"="metrics" 2026-03-12T20:57:13.535984836Z I0312 20:57:13.535947 1 router.go:217] "msg"="creating a new template router" "logger"="template" "writeDir"="/var/lib/haproxy" 2026-03-12T20:57:13.536304474Z I0312 20:57:13.536063 1 router.go:302] "msg"="router will coalesce reloads within an interval of each other" "interval"="5s" "logger"="template" 2026-03-12T20:57:13.537049823Z I0312 20:57:13.537012 1 router.go:372] "msg"="watching for changes" "logger"="template" "path"="/etc/pki/tls/private" 2026-03-12T20:57:13.537334259Z I0312 20:57:13.537292 1 router.go:283] "msg"="router is including routes in all namespaces" "logger"="router" 2026-03-12T20:57:13.546790743Z W0312 20:57:13.545877 1 reflector.go:547] github.com/openshift/router/pkg/router/controller/factory/factory.go:124: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-12T20:57:13.546790743Z E0312 20:57:13.545937 1 reflector.go:150] github.com/openshift/router/pkg/router/controller/factory/factory.go:124: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-03-12T20:57:13.560711956Z I0312 20:57:13.560621 1 reflector.go:359] Caches populated for *v1.EndpointSlice from github.com/openshift/router/pkg/router/controller/factory/factory.go:124 2026-03-12T20:57:13.562137831Z I0312 20:57:13.562075 1 reflector.go:359] Caches populated for *v1.Service from github.com/openshift/router/pkg/router/template/service_lookup.go:33 config/pod/openshift-ingress/router-default-79f8cd6fdd-hsv57.json0000640000000000000000000001533715154624262023333 0ustar0000000000000000{"metadata":{"name":"router-default-79f8cd6fdd-hsv57","generateName":"router-default-79f8cd6fdd-","namespace":"openshift-ingress","uid":"a3828a1d-8180-4c7b-b423-4488f7fc0b76","resourceVersion":"6449","creationTimestamp":"2026-03-12T20:50:17Z","labels":{"ingresscontroller.operator.openshift.io/deployment-ingresscontroller":"default","ingresscontroller.operator.openshift.io/hash":"9cb46c8fc","pod-template-hash":"79f8cd6fdd"},"annotations":{"openshift.io/required-scc":"hostnetwork","openshift.io/scc":"hostnetwork"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"router-default-79f8cd6fdd","uid":"cc6bb715-2484-420f-a7ca-8ca9224ac979","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"default-certificate","secret":{"secretName":"router-certs-default","defaultMode":420}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"defaultMode":420,"optional":false}},{"name":"stats-auth","secret":{"secretName":"router-stats-default","defaultMode":420}},{"name":"metrics-certs","secret":{"secretName":"router-metrics-certs-default","defaultMode":420}},{"name":"kube-api-access-lf28c","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"router","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9b2e765b795c30c910c331c85226e5db0d56463b6c81d79ded739cba76e2b032","ports":[{"name":"http","hostPort":80,"containerPort":80,"protocol":"TCP"},{"name":"https","hostPort":443,"containerPort":443,"protocol":"TCP"},{"name":"metrics","hostPort":1936,"containerPort":1936,"protocol":"TCP"}],"env":[{"name":"DEFAULT_CERTIFICATE_DIR","value":"/etc/pki/tls/private"},{"name":"DEFAULT_DESTINATION_CA_PATH","value":"/var/run/configmaps/service-ca/service-ca.crt"},{"name":"RELOAD_INTERVAL","value":"5s"},{"name":"ROUTER_ALLOW_WILDCARD_ROUTES","value":"false"},{"name":"ROUTER_CANONICAL_HOSTNAME","value":"router-default.apps.sno.openstack.lab"},{"name":"ROUTER_CIPHERS","value":"ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384"},{"name":"ROUTER_CIPHERSUITES","value":"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256"},{"name":"ROUTER_DISABLE_HTTP2","value":"true"},{"name":"ROUTER_DISABLE_NAMESPACE_OWNERSHIP_CHECK","value":"false"},{"name":"ROUTER_DOMAIN","value":"apps.sno.openstack.lab"},{"name":"ROUTER_IDLE_CLOSE_ON_RESPONSE","value":"true"},{"name":"ROUTER_LOAD_BALANCE_ALGORITHM","value":"random"},{"name":"ROUTER_METRICS_TLS_CERT_FILE","value":"/etc/pki/tls/metrics-certs/tls.crt"},{"name":"ROUTER_METRICS_TLS_KEY_FILE","value":"/etc/pki/tls/metrics-certs/tls.key"},{"name":"ROUTER_METRICS_TYPE","value":"haproxy"},{"name":"ROUTER_SERVICE_HTTPS_PORT","value":"443"},{"name":"ROUTER_SERVICE_HTTP_PORT","value":"80"},{"name":"ROUTER_SERVICE_NAME","value":"default"},{"name":"ROUTER_SERVICE_NAMESPACE","value":"openshift-ingress"},{"name":"ROUTER_SET_FORWARDED_HEADERS","value":"append"},{"name":"ROUTER_TCP_BALANCE_SCHEME","value":"source"},{"name":"ROUTER_THREADS","value":"4"},{"name":"SSL_MIN_VERSION","value":"TLSv1.2"},{"name":"STATS_PASSWORD_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsPassword"},{"name":"STATS_PORT","value":"1936"},{"name":"STATS_USERNAME_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsUsername"}],"resources":{"requests":{"cpu":"100m","memory":"256Mi"}},"volumeMounts":[{"name":"default-certificate","readOnly":true,"mountPath":"/etc/pki/tls/private"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca"},{"name":"stats-auth","readOnly":true,"mountPath":"/var/lib/haproxy/conf/metrics-auth"},{"name":"metrics-certs","readOnly":true,"mountPath":"/etc/pki/tls/metrics-certs"},{"name":"kube-api-access-lf28c","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3,"terminationGracePeriodSeconds":10},"readinessProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":1,"successThreshold":1,"failureThreshold":120},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000660000,"runAsNonRoot":true,"readOnlyRootFilesystem":false,"allowPrivilegeEscalation":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":3600,"dnsPolicy":"ClusterFirstWithHostNet","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"router","serviceAccount":"router","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c26,c5"},"supplementalGroups":[1000660000],"fsGroup":1000660000},"schedulerName":"default-scheduler","tolerations":[{"key":"kubernetes.io/e2e-evict-taint-key","operator":"Equal","value":"evictTaintVal","effect":"NoExecute"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority","topologySpreadConstraints":[{"maxSkew":1,"topologyKey":"topology.kubernetes.io/zone","whenUnsatisfiable":"ScheduleAnyway","labelSelector":{"matchExpressions":[{"key":"ingresscontroller.operator.openshift.io/hash","operator":"In","values":["9cb46c8fc"]}]}}]},"status":{"phase":"Pending","conditions":[{"type":"PodScheduled","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:50:17Z","reason":"Unschedulable","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling."}],"qosClass":"Burstable"}}authentication-operator_current.log0000640000000000000000000003062615154624262037335 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-7c6989d6c4-9j7rx2026-03-12T20:54:44.488845546Z Copying system trust bundle 2026-03-12T20:54:44.629201079Z W0312 20:54:44.629136 1 cmd.go:167] Unable to read initial content of "/tmp/terminate": open /tmp/terminate: no such file or directory 2026-03-12T20:54:44.630052100Z I0312 20:54:44.630034 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-12T20:54:44.632879059Z I0312 20:54:44.631331 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-12T20:54:44.632879059Z I0312 20:54:44.631232 1 observer_polling.go:159] Starting file observer 2026-03-12T20:54:44.633080265Z I0312 20:54:44.633054 1 observer_polling.go:159] Starting file observer 2026-03-12T20:55:23.332894831Z I0312 20:55:23.331881 1 builder.go:304] cluster-authentication-operator version - 2026-03-12T20:55:23.333156518Z I0312 20:55:23.333103 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-12T20:55:33.532329060Z I0312 20:55:33.532232 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-03-12T20:55:33.548158064Z I0312 20:55:33.547919 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-03-12T20:55:33.548158064Z I0312 20:55:33.547950 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-03-12T20:55:33.548158064Z I0312 20:55:33.547990 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-03-12T20:55:33.548158064Z I0312 20:55:33.547998 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-03-12T20:55:33.553943707Z I0312 20:55:33.553874 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-12T20:55:33.553943707Z W0312 20:55:33.553896 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-12T20:55:33.553943707Z W0312 20:55:33.553901 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-12T20:55:33.553943707Z W0312 20:55:33.553906 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-12T20:55:33.553943707Z W0312 20:55:33.553910 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-12T20:55:33.553943707Z W0312 20:55:33.553914 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-12T20:55:33.553943707Z W0312 20:55:33.553922 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-12T20:55:33.554215865Z I0312 20:55:33.554153 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-03-12T20:55:33.569567117Z I0312 20:55:33.569497 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-12T20:55:33.569613838Z I0312 20:55:33.569578 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-12T20:55:33.569613838Z I0312 20:55:33.569567 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-12T20:55:33.569636639Z I0312 20:55:33.569620 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-12T20:55:33.569656709Z I0312 20:55:33.569626 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-12T20:55:33.569656709Z I0312 20:55:33.569643 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-12T20:55:33.569895555Z I0312 20:55:33.569818 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-12T20:55:33.569895555Z I0312 20:55:33.569830 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-12T20:55:33.572363677Z I0312 20:55:33.572291 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773348592\" (2026-03-12 20:49:56 +0000 UTC to 2028-03-11 20:49:57 +0000 UTC (now=2026-03-12 20:55:33.572232624 +0000 UTC))" 2026-03-12T20:55:33.572569612Z I0312 20:55:33.572486 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773348923\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773348923\" (2026-03-12 19:55:23 +0000 UTC to 2027-03-12 19:55:23 +0000 UTC (now=2026-03-12 20:55:33.572462599 +0000 UTC))" 2026-03-12T20:55:33.572569612Z I0312 20:55:33.572514 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-12T20:55:33.572569612Z I0312 20:55:33.572540 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-03-12T20:55:33.572592152Z I0312 20:55:33.572567 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-12T20:55:33.572795977Z I0312 20:55:33.572705 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-12T20:55:33.577020932Z I0312 20:55:33.575783 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/authentication/request/headerrequest/requestheader_controller.go:175 2026-03-12T20:55:33.580216092Z I0312 20:55:33.580147 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2026-03-12T20:55:33.584721774Z I0312 20:55:33.584580 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2026-03-12T20:55:33.670510880Z I0312 20:55:33.670405 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-12T20:55:33.670564361Z I0312 20:55:33.670493 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-12T20:55:33.670564361Z I0312 20:55:33.670519 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-12T20:55:33.670703644Z I0312 20:55:33.670645 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-12 20:39:59 +0000 UTC to 2026-03-13 20:39:59 +0000 UTC (now=2026-03-12 20:55:33.670611302 +0000 UTC))" 2026-03-12T20:55:33.670943110Z I0312 20:55:33.670894 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773348592\" (2026-03-12 20:49:56 +0000 UTC to 2028-03-11 20:49:57 +0000 UTC (now=2026-03-12 20:55:33.670867978 +0000 UTC))" 2026-03-12T20:55:33.671096374Z I0312 20:55:33.671049 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773348923\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773348923\" (2026-03-12 19:55:23 +0000 UTC to 2027-03-12 19:55:23 +0000 UTC (now=2026-03-12 20:55:33.671032442 +0000 UTC))" 2026-03-12T20:55:33.671212357Z I0312 20:55:33.671174 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-12 20:33:19 +0000 UTC to 2036-03-09 20:33:19 +0000 UTC (now=2026-03-12 20:55:33.671159685 +0000 UTC))" 2026-03-12T20:55:33.671212357Z I0312 20:55:33.671201 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-12 20:40:02 +0000 UTC to 2026-03-13 20:40:02 +0000 UTC (now=2026-03-12 20:55:33.671189086 +0000 UTC))" 2026-03-12T20:55:33.671229847Z I0312 20:55:33.671218 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-12 20:40:02 +0000 UTC to 2027-03-12 20:40:02 +0000 UTC (now=2026-03-12 20:55:33.671206546 +0000 UTC))" 2026-03-12T20:55:33.671245527Z I0312 20:55:33.671235 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-12 20:40:02 +0000 UTC to 2027-03-12 20:40:02 +0000 UTC (now=2026-03-12 20:55:33.671224237 +0000 UTC))" 2026-03-12T20:55:33.671261008Z I0312 20:55:33.671251 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-12 20:39:59 +0000 UTC to 2036-03-09 20:39:59 +0000 UTC (now=2026-03-12 20:55:33.671241167 +0000 UTC))" 2026-03-12T20:55:33.671276468Z I0312 20:55:33.671266 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-12 20:39:59 +0000 UTC to 2026-03-13 20:39:59 +0000 UTC (now=2026-03-12 20:55:33.671257468 +0000 UTC))" 2026-03-12T20:55:33.672055538Z I0312 20:55:33.671994 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773348592\" (2026-03-12 20:49:56 +0000 UTC to 2028-03-11 20:49:57 +0000 UTC (now=2026-03-12 20:55:33.671397211 +0000 UTC))" 2026-03-12T20:55:33.672168691Z I0312 20:55:33.672123 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773348923\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773348923\" (2026-03-12 19:55:23 +0000 UTC to 2027-03-12 19:55:23 +0000 UTC (now=2026-03-12 20:55:33.672109609 +0000 UTC))" 2026-03-12T20:55:58.816448551Z I0312 20:55:58.815783 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-12T20:55:58.819992639Z I0312 20:55:58.817671 1 leaderelection.go:254] attempting to acquire leader lease openshift-authentication-operator/cluster-authentication-operator-lock... authentication-operator_previous.log0000640000000000000000000000336315154624262037525 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-7c6989d6c4-9j7rx2026-03-12T20:51:54.092468172Z Copying system trust bundle 2026-03-12T20:51:54.161262471Z W0312 20:51:54.161149 1 cmd.go:167] Unable to read initial content of "/tmp/terminate": open /tmp/terminate: no such file or directory 2026-03-12T20:51:54.161897499Z I0312 20:51:54.161872 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-12T20:51:54.161967680Z I0312 20:51:54.161908 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-12T20:51:54.162473113Z I0312 20:51:54.162210 1 observer_polling.go:159] Starting file observer 2026-03-12T20:51:54.162521164Z I0312 20:51:54.162443 1 observer_polling.go:159] Starting file observer 2026-03-12T20:52:54.175942338Z W0312 20:52:54.172799 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods authentication-operator-7c6989d6c4-9j7rx) 2026-03-12T20:52:54.175942338Z I0312 20:52:54.174032 1 builder.go:304] cluster-authentication-operator version - 2026-03-12T20:52:54.176164814Z I0312 20:52:54.176025 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-12T20:53:24.495345364Z F0312 20:53:24.495273 1 cmd.go:182] failed checking apiserver connectivity: Get "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-authentication-operator/leases/cluster-authentication-operator-lock": context deadline exceeded config/pod/openshift-authentication-operator/authentication-operator-7c6989d6c4-9j7rx.json0000640000000000000000000002103515154624262030220 0ustar0000000000000000{"metadata":{"name":"authentication-operator-7c6989d6c4-9j7rx","generateName":"authentication-operator-7c6989d6c4-","namespace":"openshift-authentication-operator","uid":"a3bebf49-1d92-4353-b84c-91ed86b7bb94","resourceVersion":"9159","creationTimestamp":"2026-03-12T20:48:17Z","labels":{"app":"authentication-operator","pod-template-hash":"7c6989d6c4"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.13/23\"],\"mac_address\":\"0a:58:0a:80:00:0d\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.13/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.13\"\n ],\n \"mac\": \"0a:58:0a:80:00:0d\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"authentication-operator-7c6989d6c4","uid":"d6f61a89-39e9-4ad4-9255-2beb5f54fe11","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config","configMap":{"name":"authentication-operator-config","defaultMode":440}},{"name":"trusted-ca-bundle","configMap":{"name":"trusted-ca-bundle","defaultMode":420,"optional":true}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","defaultMode":420,"optional":true}},{"name":"kube-api-access-2w68c","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"authentication-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953","command":["/bin/bash","-ec"],"args":["if [ -s /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\nexec authentication-operator operator --config=/var/run/configmaps/config/operator-config.yaml --v=2 --terminate-on-files=/var/run/configmaps/trusted-ca-bundle/ca-bundle.crt --terminate-on-files=/tmp/terminate\n"],"env":[{"name":"IMAGE_OAUTH_SERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3d3571ade02a7c61123d62c53fda6a57031a52c058c0571759dc09f96b23978f"},{"name":"IMAGE_OAUTH_APISERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"OPERAND_OAUTH_SERVER_IMAGE_VERSION","value":"4.18.34_openshift"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"20m","memory":"200Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/trusted-ca-bundle"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca-bundle"},{"name":"kube-api-access-2w68c","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]},"runAsUser":0,"readOnlyRootFilesystem":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"authentication-operator","serviceAccount":"authentication-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c15,c5"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:48Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:34Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:55:15Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:55:15Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:34Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.13","podIPs":[{"ip":"10.128.0.13"}],"startTime":"2026-03-12T20:49:34Z","containerStatuses":[{"name":"authentication-operator","state":{"running":{"startedAt":"2026-03-12T20:54:44Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"Copying system trust bundle\nW0312 20:51:54.161149 1 cmd.go:167] Unable to read initial content of \"/tmp/terminate\": open /tmp/terminate: no such file or directory\nI0312 20:51:54.161872 1 cmd.go:253] Using service-serving-cert provided certificates\nI0312 20:51:54.161908 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0312 20:51:54.162210 1 observer_polling.go:159] Starting file observer\nI0312 20:51:54.162443 1 observer_polling.go:159] Starting file observer\nW0312 20:52:54.172799 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods authentication-operator-7c6989d6c4-9j7rx)\nI0312 20:52:54.174032 1 builder.go:304] cluster-authentication-operator version -\nI0312 20:52:54.176025 1 dynamic_serving_content.go:116] \"Loaded a new cert/key pair\" name=\"serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key\"\nF0312 20:53:24.495273 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-authentication-operator/leases/cluster-authentication-operator-lock\": context deadline exceeded\n","startedAt":"2026-03-12T20:51:54Z","finishedAt":"2026-03-12T20:53:24Z","containerID":"cri-o://65753e4931b3081b10e537c0401b4155fdbc512202e120631ec6b784c53ee11c"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953","containerID":"cri-o://756d13f35765c4b9f3b369f1d336b59d4b4e9cf7121b9f568dcb3f14475a2f8f","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","mountPath":"/var/run/configmaps/trusted-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca-bundle","mountPath":"/var/run/configmaps/service-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-2w68c","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}events/openshift-operator-lifecycle-manager.json0000640000000000000000000003204115154624262020643 0ustar0000000000000000{"items":[{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:44:39Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:44:50Z","reason":"ScalingReplicaSet","message":"Scaled up replica set package-server-manager-854648ff6d to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:44:52Z","reason":"ScalingReplicaSet","message":"Scaled up replica set olm-operator-d64cfc9db to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:44:53Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-854648ff6d-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:44:53Z","reason":"ScalingReplicaSet","message":"Scaled up replica set catalog-operator-7d9c49f57b to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:44:54Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-d64cfc9db-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:44:54Z","reason":"FailedCreate","message":"Error creating: pods \"catalog-operator-7d9c49f57b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:48:13Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:48:14Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-854648ff6d-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:48:14Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-d64cfc9db-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:48:14Z","reason":"FailedCreate","message":"Error creating: pods \"catalog-operator-7d9c49f57b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:48:16Z","reason":"SuccessfulCreate","message":"Created pod: catalog-operator-7d9c49f57b-tpvl4","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:48:16Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:48:17Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:48:17Z","reason":"SuccessfulCreate","message":"Created pod: package-server-manager-854648ff6d-cdcc8","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:48:17Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:48:17Z","reason":"SuccessfulCreate","message":"Created pod: olm-operator-d64cfc9db-q9hnk","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:49:34Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/olm-operator-d64cfc9db-q9hnk to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:49:34Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/package-server-manager-854648ff6d-cdcc8 to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:49:34Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/catalog-operator-7d9c49f57b-tpvl4 to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:49:42Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:49:42Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:49:42Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"catalog-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:50:04Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:50:04Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:50:04Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"catalog-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:50:24Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:50:24Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.8/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:50:24Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.5/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:50:24Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.10/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:50:24Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:50:24Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:50:24Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:50:24Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:50:24Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:50:41Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\" in 17.383s (17.383s including waiting). Image size: 862633255 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:50:41Z","reason":"Created","message":"Created container: olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:50:42Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\" in 17.867s (17.867s including waiting). Image size: 862633255 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:50:42Z","reason":"Started","message":"Started container olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:50:42Z","reason":"Created","message":"Created container: catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:50:43Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\" in 19.036s (19.036s including waiting). Image size: 862633255 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:50:43Z","reason":"Created","message":"Created container: package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:50:43Z","reason":"Started","message":"Started container package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:50:43Z","reason":"Started","message":"Started container catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:50:44Z","reason":"LeaderElection","message":"package-server-manager-854648ff6d-cdcc8_077afe5b-0492-42eb-9246-7b3d88fb5e19 became leader","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:50:45Z","reason":"SuccessfulCreate","message":"Created pod: packageserver-659d778978-djtms","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:50:45Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/packageserver-659d778978-djtms to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:50:45Z","reason":"RequirementsUnknown","message":"requirements not yet checked","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:50:45Z","reason":"AllRequirementsMet","message":"all requirements found, attempting install","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:50:45Z","reason":"ScalingReplicaSet","message":"Scaled up replica set packageserver-659d778978 to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:50:45Z","reason":"InstallSucceeded","message":"waiting for install components to report healthy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:50:46Z","reason":"Created","message":"Created container: packageserver","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:50:46Z","reason":"Started","message":"Started container packageserver","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:50:46Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:50:46Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.52/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:50:46Z","reason":"InstallWaiting","message":"apiServices not installed","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-12T20:57:01Z","reason":"InstallCheckFailed","message":"install timeout","type":"Warning"}]}events/openshift-apiserver.json0000640000000000000000000001254715154624262015454 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T20:50:01Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver/apiserver-75bc5477df-fvl5w to master-0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T20:50:01Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-75bc5477df to 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T20:50:01Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-75bc5477df-fvl5w","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T20:50:05Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-84fb785f4 to 1 from 0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T20:50:05Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T20:50:05Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-84fb785f4-kl52q","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T20:50:05Z","reason":"SuccessfulDelete","message":"Deleted pod: apiserver-75bc5477df-fvl5w","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T20:50:05Z","reason":"ScalingReplicaSet","message":"Scaled down replica set apiserver-75bc5477df to 0 from 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T20:50:05Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"audit\" : configmap \"audit-0\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T20:50:07Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver/apiserver-84fb785f4-kl52q to master-0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T20:50:15Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.34/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T20:50:15Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b\"","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T20:50:22Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b\" in 7.267s (7.267s including waiting). Image size: 589379637 bytes.","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T20:50:24Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T20:50:24Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T20:50:24Z","reason":"Created","message":"Created container: openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T20:50:24Z","reason":"Started","message":"Started container openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T20:50:24Z","reason":"Started","message":"Started container openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T20:50:24Z","reason":"Created","message":"Created container: openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T20:50:24Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T20:50:24Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T20:50:27Z","reason":"ProbeError","message":"Startup probe error: HTTP probe failed with statuscode: 500\nbody: [+]ping ok\n[+]log ok\n[+]etcd ok\n[+]poststarthook/start-apiserver-admission-initializer ok\n[+]poststarthook/generic-apiserver-start-informers ok\n[+]poststarthook/max-in-flight-filter ok\n[+]poststarthook/storage-object-count-tracker-hook ok\n[+]poststarthook/image.openshift.io-apiserver-caches ok\n[-]poststarthook/authorization.openshift.io-bootstrapclusterroles failed: reason withheld\n[+]poststarthook/authorization.openshift.io-ensurenodebootstrap-sa ok\n[+]poststarthook/project.openshift.io-projectcache ok\n[+]poststarthook/project.openshift.io-projectauthorizationcache ok\n[+]poststarthook/openshift.io-startinformers ok\n[+]poststarthook/openshift.io-restmapperupdater ok\n[+]poststarthook/quota.openshift.io-clusterquotamapping ok\nlivez check failed\n\n","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-12T20:50:27Z","reason":"Unhealthy","message":"Startup probe failed: HTTP probe failed with statuscode: 500","type":"Warning"}]}events/openshift-apiserver-operator.json0000640000000000000000000011135115154624262017276 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:44:38Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-apiserver-operator-799b6db4d7 to 1","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:44:48Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-799b6db4d7-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:48:15Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-799b6db4d7-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:48:17Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:48:17Z","reason":"SuccessfulCreate","message":"Created pod: openshift-apiserver-operator-799b6db4d7-jwthf","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:49:34Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver-operator/openshift-apiserver-operator-799b6db4d7-jwthf to master-0","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:49:35Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.7/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:49:35Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:49:49Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:49:49Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab\" in 279ms (279ms including waiting). Image size: 512273539 bytes.","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:49:50Z","reason":"LeaderElection","message":"openshift-apiserver-operator-799b6db4d7-jwthf_153ef344-f7ca-4680-a11c-79c9700cb6e0 became leader","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:49:50Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:49:50Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"operator\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:49:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [] to [{\"operator.openshift.io\" \"openshiftapiservers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver\"} {\"\" \"namespaces\" \"\" \"openshift-etcd-operator\"} {\"\" \"endpoints\" \"openshift-etcd\" \"host-etcd-2\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-apiserver\" \"\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.apps.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.authorization.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.build.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.image.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.project.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.quota.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.route.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.security.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.template.openshift.io\"}],status.versions changed from [] to [{\"operator\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:49:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:49:51Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:49:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded changed from Unknown to False (\"All is well\"),Available changed from Unknown to False (\"APIServicesAvailable: endpoints \\\"api\\\" not found\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:49:53Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:49:53Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:49:53Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:49:53Z","reason":"RoutingConfigSubdomainChanged","message":"Domain changed from \"\" to \"apps.sno.openstack.lab\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:49:53Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:49:53Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t},\n+ \t\"projectConfig\": map[string]any{\"projectRequestMessage\": string(\"\")},\n+ \t\"routingConfig\": map[string]any{\"subdomain\": string(\"apps.sno.openstack.lab\")},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n+ \t\"storageConfig\": map[string]any{\"urls\": []any{string(\"https://192.168.32.10:2379\")}},\n }\n","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:49:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:49:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"All is well\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:49:53Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:49:54Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/etcd-serving-ca -n openshift-apiserver: namespaces \"openshift-apiserver\" not found","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:49:54Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:49:54Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:49:54Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:49:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:49:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:49:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nResourceSyncControllerDegraded: namespaces \\\"openshift-apiserver\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:49:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:49:56Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:49:56Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:49:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:49:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nResourceSyncControllerDegraded: namespaces \\\"openshift-apiserver\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:49:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/image-import-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:49:58Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-apiserver-sa -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:49:58Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:49:58Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"All is well\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:49:59Z","reason":"ConfigMapCreated","message":"Created ConfigMap/trusted-ca-bundle -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:50:00Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:50:01Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:50:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from False to True (\"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:50:02Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\",Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:50:05Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-apiserver because it changed","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:50:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:50:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:50:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:50:32Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.apps.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:50:32Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.authorization.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:50:32Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.build.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:50:32Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.image.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:50:32Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.project.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:50:32Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.quota.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:50:33Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.route.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:50:33Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.security.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:50:34Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.template.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:50:34Z","reason":"OpenShiftAPICheckFailed","message":"\"apps.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:50:34Z","reason":"OpenShiftAPICheckFailed","message":"\"authorization.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:50:34Z","reason":"OpenShiftAPICheckFailed","message":"\"build.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:50:34Z","reason":"OpenShiftAPICheckFailed","message":"\"image.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:50:34Z","reason":"OpenShiftAPICheckFailed","message":"\"project.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:50:34Z","reason":"OpenShiftAPICheckFailed","message":"\"quota.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:50:34Z","reason":"OpenShiftAPICheckFailed","message":"\"route.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:50:34Z","reason":"OpenShiftAPICheckFailed","message":"\"security.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:50:34Z","reason":"OpenShiftAPICheckFailed","message":"\"template.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:50:34Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\" to \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:50:34Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"openshift-apiserver\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:50:34Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: status.versions changed from [{\"operator\" \"4.18.34\"}] to [{\"operator\" \"4.18.34\"} {\"openshift-apiserver\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:50:34Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from True to False (\"All is well\"),Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\" to \"APIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:50:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/apps.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/authorization.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/build.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/image.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/project.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/quota.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/route.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/security.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/template.openshift.io/v1: 401\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:54:43Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:54:44Z","reason":"Created","message":"Created container: openshift-apiserver-operator","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-12T20:54:44Z","reason":"Started","message":"Started container openshift-apiserver-operator","type":"Normal"}]}events/openshift-kube-scheduler-operator.json0000640000000000000000000007754615154624262020221 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:44:36Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-kube-scheduler-operator-5c74bfc494 to 1","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:44:46Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-5c74bfc494-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:48:16Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-5c74bfc494-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:48:18Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:48:18Z","reason":"SuccessfulCreate","message":"Created pod: openshift-kube-scheduler-operator-5c74bfc494-269gt","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:49:34Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-5c74bfc494-269gt to master-0","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:49:35Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.17/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:49:35Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:49:48Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:49:49Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" in 591ms (591ms including waiting). Image size: 506394574 bytes.","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:49:51Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:49:51Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:49:51Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-scheduler version \"raw-internal\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:49:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-scheduler\" \"\"}] to [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:49:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded changed from Unknown to False (\"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:49:51Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:49:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:49:51Z","reason":"LeaderElection","message":"openshift-kube-scheduler-operator-5c74bfc494-269gt_25167c5e-28a9-41b8-8ae6-558c7493cfb7 became leader","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:49:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\" to \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\",Progressing changed from Unknown to False (\"NodeInstallerProgressing: 1 node is at revision 0\"),Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:49:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:49:52Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:49:52Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:49:52Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:49:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:49:54Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:49:54Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-scheduler-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:49:54Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-scheduler because it changed","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:49:55Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:49:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:49:55Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-scheduler -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:49:55Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler:public-2 because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:49:55Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:49:55Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:49:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:49:56Z","reason":"ServiceCreated","message":"Created Service/scheduler -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:49:57Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-kube-scheduler-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:49:57Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:49:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:49:58Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:49:59Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:49:59Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:49:59Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:49:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\" to \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:04Z","reason":"SecretCreated","message":"Created Secret/serving-cert-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:05Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:05Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:05Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler:\ncause by changes in data.pod.yaml","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:06Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:06Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:07Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:08Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:10Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:10Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:10Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:11Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:12Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:13Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:14Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:15Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:15Z","reason":"StartingNewRevision","message":"new revision 3 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:20Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:21Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:22Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:23Z","reason":"SecretCreated","message":"Created Secret/serving-cert-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:24Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:25Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-scheduler:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:26Z","reason":"RevisionTriggered","message":"new revision 3 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:26Z","reason":"StartingNewRevision","message":"new revision 4 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:29Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:29Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:32Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:32Z","reason":"PodCreated","message":"Created Pod/installer-3-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:33Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:34Z","reason":"SecretCreated","message":"Created Secret/serving-cert-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:36Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:37Z","reason":"RevisionTriggered","message":"new revision 4 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 4\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 4\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:50:43Z","reason":"PodCreated","message":"Created Pod/installer-4-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:54:43Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:54:44Z","reason":"Created","message":"Created container: kube-scheduler-operator-container","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-12T20:54:44Z","reason":"Started","message":"Started container kube-scheduler-operator-container","type":"Normal"}]}events/openshift-kube-scheduler.json0000640000000000000000000000703315154624262016350 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-12T20:50:15Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.35/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-12T20:50:15Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-12T20:50:16Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-12T20:50:16Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-12T20:50:19Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-12T20:50:24Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.43/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-12T20:50:24Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-12T20:50:24Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-12T20:50:24Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-12T20:50:30Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-12T20:50:33Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.46/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-12T20:50:33Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-12T20:50:34Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-12T20:50:34Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-12T20:50:39Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-12T20:50:44Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.49/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-12T20:50:44Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-12T20:50:45Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-12T20:50:45Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-controller-manager-operator.json0000640000000000000000000012527115154624262022023 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:44:37Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-controller-manager-operator-86d7cdfdfb to 1","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:44:47Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-86d7cdfdfb-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:48:16Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-86d7cdfdfb-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:48:18Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:48:18Z","reason":"SuccessfulCreate","message":"Created pod: kube-controller-manager-operator-86d7cdfdfb-f2kg4","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:49:34Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-controller-manager-operator/kube-controller-manager-operator-86d7cdfdfb-f2kg4 to master-0","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:49:35Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.25/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:49:35Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:49:49Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:49:49Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\" in 289ms (289ms including waiting). Image size: 508888174 bytes.","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:49:51Z","reason":"LeaderElection","message":"kube-controller-manager-operator-86d7cdfdfb-f2kg4_67fd2272-4358-49c6-b40d-92b4393e9e7a became leader","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:49:51Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:49:51Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-controller-manager version \"raw-internal\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:49:51Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:49:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"\" \"nodes\" \"\" \"\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"} {\"\" \"nodes\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:49:51Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:49:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded changed from Unknown to False (\"NodeControllerDegraded: All master nodes are ready\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:49:52Z","reason":"CABundleUpdateRequired","message":"\"csr-controller-signer-ca\" in \"openshift-kube-controller-manager-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:49:52Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated extendedArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:49:52Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated featureGates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:49:52Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:49:52Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:49:52Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"extendedArguments\": map[string]any{\n+ \t\t\"cluster-cidr\": []any{string(\"10.128.0.0/16\")},\n+ \t\t\"cluster-name\": []any{string(\"sno-zhkxn\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")},\n+ \t},\n+ \t\"featureGates\": []any{\n+ \t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"),\n+ \t\tstring(\"DisableKubeletCloudCredentialProviders=true\"),\n+ \t\tstring(\"GCPLabelsTags=true\"), string(\"HardwareSpeed=true\"),\n+ \t\tstring(\"IngressControllerLBSubnetsAWS=true\"), string(\"KMSv1=true\"),\n+ \t\tstring(\"ManagedBootImages=true\"), string(\"ManagedBootImagesAWS=true\"),\n+ \t\tstring(\"MultiArchInstallAWS=true\"), ...,\n+ \t},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:49:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:49:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:49:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\",Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:49:53Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:49:53Z","reason":"TargetUpdateRequired","message":"\"csr-signer\" in \"openshift-kube-controller-manager-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:49:54Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/csr-controller-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:49:55Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:49:55Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:49:55Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-controller-manager-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:49:56Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:49:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:49:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:49:56Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-controller-manager because it changed","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:49:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:49:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:49:57Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-controller-manager -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:49:57Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:49:58Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:49:58Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:49:59Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n  \t\"extendedArguments\": map[string]any{\"cluster-cidr\": []any{string(\"10.128.0.0/16\")}, \"cluster-name\": []any{string(\"sno-zhkxn\")}, \"feature-gates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...}, \"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")}},\n  \t\"featureGates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...},\n+ \t\"serviceServingCert\": map[string]any{\n+ \t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resources/configmaps/service-ca/ca-bundle.crt\"),\n+ \t},\n  \t\"servingInfo\": map[string]any{\"cipherSuites\": []any{string(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"), string(\"TLS_CHACHA20_POLY1305_SHA256\"), string(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"), ...}, \"minTLSVersion\": string(\"VersionTLS12\")},\n  }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:49:59Z","reason":"ObserveServiceCAConfigMap","message":"observed change in config","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:49:59Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:01Z","reason":"ServiceCreated","message":"Created Service/kube-controller-manager -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:02Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/kube-controller-manager-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:04Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-controller-manager-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:04Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/pv-recycler-controller -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:05Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:06Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:06Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:06Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:07Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:09Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:10Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:11Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:14Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:18Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:19Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/client-ca -n openshift-kube-controller-manager:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:20Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:20Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:21Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:22Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:23Z","reason":"SecretCreated","message":"Created Secret/serving-cert-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:24Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:25Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:25Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:25Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/config has changed,required configmap/cluster-policy-controller-config has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:25Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:26Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:26Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:26Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:28Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:29Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:29Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:32Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"GarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.25:43977-\u003e172.30.0.10:53: read: connection refused\\nNodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:32Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"GarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.25:51862-\u003e172.30.0.10:53: read: connection refused\\nNodeControllerDegraded: All master nodes are ready\" to \"GarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.25:43977-\u003e172.30.0.10:53: read: connection refused\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:32Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"GarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.25:51862-\u003e172.30.0.10:53: read: connection refused\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:32Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:33Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:39Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:40Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:41Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:41Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"required configmap/config has changed,required configmap/cluster-policy-controller-config has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:45Z","reason":"SATokenSignerControllerStuck","message":"unexpected addresses: 192.168.32.10","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:50:48Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:54:43Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:54:44Z","reason":"Created","message":"Created container: kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-12T20:54:44Z","reason":"Started","message":"Started container kube-controller-manager-operator","type":"Normal"}]}events/openshift-kube-controller-manager.json0000640000000000000000000001302115154624262020157 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T20:50:32Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.45/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T20:50:32Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T20:50:32Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T20:50:32Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T20:50:45Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T20:55:18Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access\" : failed to fetch token: Timeout: request did not complete within requested timeout - context deadline exceeded","type":"Warning"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T20:55:57Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.55/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T20:55:57Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T20:55:57Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T20:55:57Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T20:56:30Z","reason":"StaticPodInstallerCompleted","message":"Successfully installed revision 2","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T20:56:31Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T20:56:32Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T20:56:32Z","reason":"Created","message":"Created container: kube-controller-manager","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T20:56:32Z","reason":"Started","message":"Started container kube-controller-manager","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T20:56:32Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T20:56:32Z","reason":"Created","message":"Created container: cluster-policy-controller","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T20:56:32Z","reason":"Started","message":"Started container cluster-policy-controller","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T20:56:32Z","reason":"Created","message":"Created container: kube-controller-manager-cert-syncer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T20:56:32Z","reason":"Started","message":"Started container kube-controller-manager-cert-syncer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T20:56:32Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T20:56:33Z","reason":"LeaderElection","message":"master-0_a7c75225-4f66-4daf-bdb9-5b574c474dd2 became leader","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T20:56:33Z","reason":"ControlPlaneTopology","message":"unable to get control plane topology, using HA cluster values for leader election: infrastructures.config.openshift.io \"cluster\" is forbidden: User \"system:kube-controller-manager\" cannot get resource \"infrastructures\" in API group \"config.openshift.io\" at the cluster scope","type":"Warning"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T20:56:33Z","reason":"Created","message":"Created container: kube-controller-manager-recovery-controller","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-12T20:56:33Z","reason":"Started","message":"Started container kube-controller-manager-recovery-controller","type":"Normal"}]}events/openshift-kube-apiserver.json0000640000000000000000000000143215154624262016367 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-12T20:50:32Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.44/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-12T20:50:32Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-12T20:50:32Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-12T20:50:32Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-apiserver-operator.json0000640000000000000000000016130215154624262020223 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:44:53Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-apiserver-operator-68bd585b to 1","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:44:54Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-68bd585b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:48:16Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-68bd585b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:48:18Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:48:18Z","reason":"SuccessfulCreate","message":"Created pod: kube-apiserver-operator-68bd585b-56nzk","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:34Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-apiserver-operator/kube-apiserver-operator-68bd585b-56nzk to master-0","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:35Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.18/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:35Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:36Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:36Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:37Z","reason":"LeaderElection","message":"kube-apiserver-operator-68bd585b-56nzk_49498607-c4d3-4da1-8336-ef75fc8b1158 became leader","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:37Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:37Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-apiserver version \"raw-internal\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:37Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:37Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:37Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/cpu-utilization -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:37Z","reason":"ServiceAccountIssuer","message":"Issuer set to default value \"https://kubernetes.default.svc\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded changed from Unknown to False (\"NodeControllerDegraded: All master nodes are ready\"),Upgradeable changed from Unknown to True (\"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced.\"),EvaluationConditionsDetected changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:39Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\",Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:39Z","reason":"SignerUpdateRequired","message":"\"localhost-recovery-serving-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:39Z","reason":"SignerUpdateRequired","message":"\"node-system-admin-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:39Z","reason":"CABundleUpdateRequired","message":"\"loadbalancer-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:39Z","reason":"CABundleUpdateRequired","message":"\"service-network-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:39Z","reason":"CABundleUpdateRequired","message":"\"localhost-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:41Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:42Z","reason":"SecretUpdated","message":"Updated Secret/kube-control-plane-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/loadbalancer-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:42Z","reason":"TargetUpdateRequired","message":"\"external-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:42Z","reason":"SecretUpdated","message":"Updated Secret/kube-apiserver-to-kubelet-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:42Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-to-kubelet-client-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-network-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:43Z","reason":"TargetUpdateRequired","message":"\"service-network-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:43Z","reason":"SecretUpdated","message":"Updated Secret/aggregator-client-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:43Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-aggregator-client-ca\" in \"openshift-config-managed\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:43Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/: configmaps \"loadbalancer-serving-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:43Z","reason":"TargetUpdateRequired","message":"\"localhost-serving-cert-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:43Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:43Z","reason":"CABundleUpdateRequired","message":"\"localhost-recovery-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:43Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:43Z","reason":"CABundleUpdateRequired","message":"\"node-system-admin-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:44Z","reason":"CABundleUpdateRequired","message":"\"kube-control-plane-signer-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:44Z","reason":"RotationError","message":"configmaps \"loadbalancer-serving-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:44Z","reason":"TargetUpdateRequired","message":"\"internal-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:44Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:44Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-apiserver-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:44Z","reason":"SecretCreated","message":"Created Secret/bound-service-account-signing-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-control-plane-signer-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:45Z","reason":"TargetUpdateRequired","message":"\"control-plane-node-admin-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:45Z","reason":"TargetUpdateRequired","message":"\"check-endpoints-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-to-kubelet-client-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:45Z","reason":"TargetUpdateRequired","message":"\"kubelet-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:45Z","reason":"SecretCreated","message":"Created Secret/external-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-aggregator-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:46Z","reason":"TargetUpdateRequired","message":"\"aggregator-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-recovery-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:46Z","reason":"TargetUpdateRequired","message":"\"localhost-recovery-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:46Z","reason":"SecretCreated","message":"Created Secret/service-network-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:46Z","reason":"SecretCreated","message":"Created Secret/localhost-serving-cert-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/node-system-admin-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:46Z","reason":"TargetUpdateRequired","message":"\"node-system-admin-client\" in \"openshift-kube-apiserver-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:47Z","reason":"ServiceCreated","message":"Created Service/apiserver -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:47Z","reason":"TargetUpdateRequired","message":"\"kube-controller-manager-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:47Z","reason":"SecretCreated","message":"Created Secret/internal-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:47Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/: configmaps \"kube-control-plane-signer-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:48Z","reason":"SecretCreated","message":"Created Secret/check-endpoints-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:48Z","reason":"SecretCreated","message":"Created Secret/control-plane-node-admin-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:48Z","reason":"SecretCreated","message":"Created Secret/kubelet-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:49Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-client -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:49Z","reason":"SecretCreated","message":"Created Secret/aggregator-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:49Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:49Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:49Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:50Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:50Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:50Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-auth-delegator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:50Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:50Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:51Z","reason":"ConfigMapCreated","message":"Created ConfigMap/check-endpoints-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:52Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:52Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:52Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:52Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:53Z","reason":"ConfigMapCreated","message":"Created ConfigMap/control-plane-node-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:53Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/authentication-reader-for-authenticated-users -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:53Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-apiserver-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:53Z","reason":"TargetUpdateRequired","message":"\"kube-scheduler-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:54Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:55Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:56Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-requests -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:56Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-slos-basic -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:56Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/audit-errors -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:56Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:56Z","reason":"CustomResourceDefinitionUpdated","message":"Updated CustomResourceDefinition.apiextensions.k8s.io/apirequestcounts.apiserver.openshift.io because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:56Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:56Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:56Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:56Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:56Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/api-usage -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:57Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-kube-apiserver/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:57Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:57Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/podsecurity -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:59Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:59Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379,https://localhost:2379","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:49:59Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"admission\": map[string]any{\n+ \t\t\"pluginConfig\": map[string]any{\n+ \t\t\t\"PodSecurity\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/ExternalIPRanger\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/RestrictedEndpointsAdmission\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t},\n+ \t},\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"api-audiences\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"etcd-servers\": []any{string(\"https://192.168.32.10:2379\"), string(\"https://localhost:2379\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"goaway-chance\": []any{string(\"0\")},\n+ \t\t\"runtime-config\": []any{string(\"admissionregistration.k8s.io/v1beta1=true\")},\n+ \t\t\"send-retry-after-while-not-ready-once\": []any{string(\"true\")},\n+ \t\t\"service-account-issuer\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"service-account-jwks-uri\": []any{string(\"https://api.sno.openstack.lab:6443/openid/v1/jwks\")},\n+ \t\t\"shutdown-delay-duration\": []any{string(\"0s\")},\n+ \t},\n+ \t\"corsAllowedOrigins\": []any{string(`//127\\.0\\.0\\.1(:|$)`), string(\"//localhost(:|$)\")},\n+ \t\"gracefulTerminationDuration\": string(\"15\"),\n+ \t\"servicesSubnet\": string(\"172.30.0.0/16\"),\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"bindAddress\": string(\"0.0.0.0:6443\"),\n+ \t\t\"bindNetwork\": string(\"tcp4\"),\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t\t\"namedCertificates\": []any{\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t},\n+ \t\t},\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:50:00Z","reason":"ConfigMissing","message":"no observedConfig","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:50:01Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:50:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:50:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:50:04Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:50:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:50:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:50:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:50:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:50:08Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:50:08Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:50:08Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:50:09Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:50:10Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:50:11Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:50:11Z","reason":"SecretCreated","message":"Created Secret/node-kubeconfigs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:50:11Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:50:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:50:12Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:50:13Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:50:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:50:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:50:17Z","reason":"SecretCreated","message":"Created Secret/etcd-client-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:50:17Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/client-ca -n openshift-kube-apiserver:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:50:18Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-apiserver-client-ca -n openshift-config-managed:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:50:19Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:50:20Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:50:22Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:50:22Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:50:22Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:50:24Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:50:25Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:50:28Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:54:43Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:54:44Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-12T20:54:44Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"}]}events/openshift-etcd.json0000640000000000000000000001306115154624262014363 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T20:50:16Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.38/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T20:50:16Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T20:50:17Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T20:50:17Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T20:50:48Z","reason":"StaticPodInstallerCompleted","message":"Successfully installed revision 1","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T20:50:48Z","reason":"Killing","message":"Stopping container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T20:51:01Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T20:51:01Z","reason":"Created","message":"Created container: setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T20:51:01Z","reason":"Started","message":"Started container setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T20:51:28Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T20:51:29Z","reason":"Started","message":"Started container etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T20:51:29Z","reason":"Created","message":"Created container: etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T20:52:06Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T20:52:07Z","reason":"Started","message":"Started container etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T20:52:07Z","reason":"Created","message":"Created container: etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T20:54:56Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T20:54:57Z","reason":"Created","message":"Created container: etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T20:54:57Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T20:54:57Z","reason":"Started","message":"Started container etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T20:54:57Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T20:54:57Z","reason":"Created","message":"Created container: etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T20:54:57Z","reason":"Created","message":"Created container: etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T20:54:57Z","reason":"Started","message":"Started container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T20:54:57Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T20:54:57Z","reason":"Started","message":"Started container etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T20:54:58Z","reason":"Created","message":"Created container: etcd-readyz","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T20:54:58Z","reason":"Started","message":"Started container etcd-rev","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T20:54:58Z","reason":"Created","message":"Created container: etcd-rev","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T20:54:58Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-12T20:54:58Z","reason":"Started","message":"Started container etcd-readyz","type":"Normal"}]}events/openshift-etcd-operator.json0000640000000000000000000003756015154624262016226 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:44:38Z","reason":"ScalingReplicaSet","message":"Scaled up replica set etcd-operator-5884b9cd56 to 1","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:44:48Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-5884b9cd56-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:48:16Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-5884b9cd56-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:48:18Z","reason":"SuccessfulCreate","message":"Created pod: etcd-operator-5884b9cd56-xh6r9","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:48:18Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:49:34Z","reason":"Scheduled","message":"Successfully assigned openshift-etcd-operator/etcd-operator-5884b9cd56-xh6r9 to master-0","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:49:35Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.16/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:49:35Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:49:49Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:49:49Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\" in 447ms (447ms including waiting). Image size: 518384455 bytes.","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:49:50Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:49:50Z","reason":"LeaderElection","message":"etcd-operator-5884b9cd56-xh6r9_b93e263e-fdbf-4b68-bb46-0b22d45bc1a3 became leader","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:49:51Z","reason":"OperatorVersionChanged","message":"clusteroperator/etcd version \"raw-internal\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:49:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded set to False (\"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"raw-internal\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:49:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:49:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\" to \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nClusterMemberControllerDegraded: could not get list of unhealthy members: getting cache client could not retrieve endpoints: node lister not synced\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:49:52Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"controlPlane\": map[string]any{\"replicas\": float64(1)},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:49:52Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:49:53Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:49:53Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-etcd-installer because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:49:53Z","reason":"ScriptControllerErrorUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:49:53Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:49:53Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:49:54Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:49:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-metric-serving-ca -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:49:54Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:49:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-config-v1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:49:55Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/etcd-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:49:55Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/etcd-ca-bundle -n openshift-etcd-operator:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:49:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-ca-bundle -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:49:56Z","reason":"EnvVarControllerUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:49:57Z","reason":"ServiceUpdated","message":"Updated Service/etcd -n openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:49:57Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: etcd-all-bundles-0,etcd-endpoints-0,etcd-pod-0, secrets: etcd-all-certs-0","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:49:57Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:49:57Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd-minimal -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:49:57Z","reason":"ObservedConfigWriteError","message":"Failed to write observed config: Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:49:58Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:50:01Z","reason":"ReportEtcdMembersErrorUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:50:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-scripts -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:50:05Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"etcd-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:50:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:50:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/restore-etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:50:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:50:08Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-endpoints-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:50:10Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-all-bundles-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:50:11Z","reason":"SecretCreated","message":"Created Secret/etcd-all-certs-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:53:13Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.16:8443/healthz\": dial tcp 10.128.0.16:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:53:13Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.16:8443/healthz\": dial tcp 10.128.0.16:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:54:09Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:54:10Z","reason":"Started","message":"Started container etcd-operator","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:54:10Z","reason":"Created","message":"Created container: etcd-operator","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:55:23Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.16:8443/healthz\": net/http: TLS handshake timeout\nbody: \n","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-12T20:55:23Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.16:8443/healthz\": net/http: TLS handshake timeout","type":"Warning"}]}events/openshift-oauth-apiserver.json0000640000000000000000000000443715154624262016571 0ustar0000000000000000{"items":[{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-12T20:50:14Z","reason":"Scheduled","message":"Successfully assigned openshift-oauth-apiserver/apiserver-7946996f87-nzb7c to master-0","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-12T20:50:14Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-7946996f87-nzb7c","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-12T20:50:14Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-7946996f87 to 1","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-12T20:50:15Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.37/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-12T20:50:15Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9\"","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-12T20:50:22Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9\" in 7.194s (7.194s including waiting). Image size: 505344964 bytes.","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-12T20:50:24Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-12T20:50:24Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-12T20:50:24Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9\" already present on machine","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-12T20:50:24Z","reason":"Created","message":"Created container: oauth-apiserver","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-12T20:50:24Z","reason":"Started","message":"Started container oauth-apiserver","type":"Normal"}]}events/openshift-ingress.json0000640000000000000000000000124015154624262015112 0ustar0000000000000000{"items":[{"namespace":"openshift-ingress","lastTimestamp":"2026-03-12T20:50:17Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-12T20:50:17Z","reason":"SuccessfulCreate","message":"Created pod: router-default-79f8cd6fdd-hsv57","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-12T20:50:17Z","reason":"ScalingReplicaSet","message":"Scaled up replica set router-default-79f8cd6fdd to 1","type":"Normal"}]}events/openshift-authentication-operator.json0000640000000000000000000022435315154624262020324 0ustar0000000000000000{"items":[{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:44:39Z","reason":"ScalingReplicaSet","message":"Scaled up replica set authentication-operator-7c6989d6c4 to 1","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:44:50Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-7c6989d6c4-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:48:15Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-7c6989d6c4-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:48:17Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:48:17Z","reason":"SuccessfulCreate","message":"Created pod: authentication-operator-7c6989d6c4-9j7rx","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:49:34Z","reason":"Scheduled","message":"Successfully assigned openshift-authentication-operator/authentication-operator-7c6989d6c4-9j7rx to master-0","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:49:35Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.13/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:49:35Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:49:48Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:49:49Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953\" in 625ms (625ms including waiting). Image size: 513220825 bytes.","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:49:50Z","reason":"LeaderElection","message":"authentication-operator-7c6989d6c4-9j7rx_e371b953-b49c-4819-85e9-c8136109bd3c became leader","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:49:51Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:49:51Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"operator\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:49:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded set to False (\"All is well\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to True (\"All is well\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"operator\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:49:51Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:49:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"All is well\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\",Available changed from Unknown to False (\"APIServicesAvailable: endpoints \\\"api\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:49:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:49:54Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:49:54Z","reason":"ObserveTokenConfig","message":"accessTokenMaxAgeSeconds changed from %!d(float64=0) to %!d(float64=86400)","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:49:54Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \",Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:49:54Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:49:54Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:49:54Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \" map[string]any(\\n- \\tnil,\\n+ \\t{\\n+ \\t\\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+ \\t\\t\\\"oauthConfig\\\": map[string]any{\\n+ \\t\\t\\t\\\"assetPublicURL\\\": string(\\\"\\\"),\\n+ \\t\\t\\t\\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"),\\n+ \\t\\t\\t\\\"templates\\\": map[string]any{\\n+ \\t\\t\\t\\t\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t\\t\\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t\\t\\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"tokenConfig\\\": map[string]any{\\n+ \\t\\t\\t\\t\\\"accessTokenMaxAgeSeconds\\\": float64(86400),\\n+ \\t\\t\\t\\t\\\"authorizeTokenMaxAgeSeconds\\\": float64(300),\\n+ \\t\\t\\t},\\n+ \\t\\t},\\n+ \\t\\t\\\"serverArguments\\\": map[string]any{\\n+ \\t\\t\\t\\\"audit-log-format\\\": []any{string(\\\"json\\\")},\\n+ \\t\\t\\t\\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")},\\n+ \\t\\t\\t\\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")},\\n+ \\t\\t\\t\\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")},\\n+ \\t\\t\\t\\\"audit-policy-file\\\": []any{string(\\\"/var/run/configmaps/audit/audit.\\\"...)},\\n+ \\t\\t},\\n+ \\t\\t\\\"servingInfo\\\": map[string]any{\\n+ \\t\\t\\t\\\"cipherSuites\\\": []any{\\n+ \\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t},\\n+ \\t\\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n+ \\t},\\n )\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:49:54Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:49:54Z","reason":"ObserveAuditProfile","message":"AuditProfile changed from '%!s(\u003cnil\u003e)' to 'map[audit-log-format:[json] audit-log-maxbackup:[10] audit-log-maxsize:[100] audit-log-path:[/var/log/oauth-server/audit.log] audit-policy-file:[/var/run/configmaps/audit/audit.yaml]]'","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:49:54Z","reason":"ObserveTemplates","message":"templates changed to map[\"error\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/errors.html\" \"login\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/login.html\" \"providerSelection\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/providers.html\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:49:54Z","reason":"ObserveAPIServerURL","message":"loginURL changed from to https://api.sno.openstack.lab:6443","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:49:55Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:49:55Z","reason":"CSRApproval","message":"The CSR \"system:openshift:openshift-authenticator-xsfnb\" has been approved","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:49:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:49:55Z","reason":"CSRCreated","message":"A csr \"system:openshift:openshift-authenticator-xsfnb\" is created for OpenShiftAuthenticatorCertRequester","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:49:55Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:49:55Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:49:55Z","reason":"ObserveAPIAudiences","message":"service account issuer changed from to https://kubernetes.default.svc","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:49:55Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthAPIServer\") of observed config: \" map[string]any(\\n- \\tnil,\\n+ \\t{\\n+ \\t\\t\\\"apiServerArguments\\\": map[string]any{\\n+ \\t\\t\\t\\\"api-audiences\\\": []any{string(\\\"https://kubernetes.default.svc\\\")},\\n+ \\t\\t\\t\\\"cors-allowed-origins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+ \\t\\t\\t\\\"etcd-servers\\\": []any{string(\\\"https://192.168.32.10:2379\\\")},\\n+ \\t\\t\\t\\\"tls-cipher-suites\\\": []any{\\n+ \\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"tls-min-version\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t},\\n+ \\t},\\n )\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:49:55Z","reason":"NoValidCertificateFound","message":"No valid client certificate for OpenShiftAuthenticatorCertRequester is found: unable to parse certificate: data does not contain any valid RSA or ECDSA certificates","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:49:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:49:57Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:49:57Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:49:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:49:58Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/audit -n openshift-authentication: namespaces \"openshift-authentication\" not found","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:49:59Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:49:59Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:49:59Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:01Z","reason":"ClientCertificateCreated","message":"A new client certificate for OpenShiftAuthenticatorCertRequester is available","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:03Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:03Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:03Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"All is well\" to \"AuthenticatorCertKeyProgressing: All is well\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:03Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:03Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:03Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:03Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/v4-0-config-system-trusted-ca-bundle -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:07Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-apiserver-sa -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:07Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:07Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:08Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-ocp-branding-template -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:09Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:12Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:14Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\",Progressing changed from False to True (\"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\"),Available message changed from \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:15Z","reason":"ServiceCreated","message":"Created Service/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:15Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:15Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:17Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.227.118:443/healthz\\\": dial tcp 172.30.227.118:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.227.118:443/healthz\\\": dial tcp 172.30.227.118:443: connect: connection refused\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:19Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-oauth-apiserver because it changed","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.227.118:443/healthz\\\": dial tcp 172.30.227.118:443: connect: connection refused\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.227.118:443/healthz\\\": dial tcp 172.30.227.118:443: connect: connection refused\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:22Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.227.118:443/healthz\\\": dial tcp 172.30.227.118:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.227.118:443/healthz\\\": dial tcp 172.30.227.118:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:22Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-router-certs -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:22Z","reason":"ObserveRouterSecret","message":"namedCertificates changed to []interface {}{map[string]interface {}{\"certFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"keyFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"names\":[]interface {}{\"*.apps.sno.openstack.lab\"}}}","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:22Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \" map[string]any{\\n \\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n \\t\\\"oauthConfig\\\": map[string]any{\\\"assetPublicURL\\\": string(\\\"\\\"), \\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"), \\\"templates\\\": map[string]any{\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...)}, \\\"tokenConfig\\\": map[string]any{\\\"accessTokenMaxAgeSeconds\\\": float64(86400), \\\"authorizeTokenMaxAgeSeconds\\\": float64(300)}},\\n \\t\\\"serverArguments\\\": map[string]any{\\\"audit-log-format\\\": []any{string(\\\"json\\\")}, \\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")}, \\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")}, \\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")}, ...},\\n \\t\\\"servingInfo\\\": map[string]any{\\n \\t\\t\\\"cipherSuites\\\": []any{string(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"), string(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"), string(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\\\"), ...},\\n \\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t\\\"namedCertificates\\\": []any{\\n+ \\t\\t\\tmap[string]any{\\n+ \\t\\t\\t\\t\\\"certFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+ \\t\\t\\t\\t\\\"keyFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+ \\t\\t\\t\\t\\\"names\\\": []any{string(\\\"*.apps.sno.openstack.lab\\\")},\\n+ \\t\\t\\t},\\n+ \\t\\t},\\n \\t},\\n \\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n }\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:22Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.227.118:443/healthz\\\": dial tcp 172.30.227.118:443: connect: connection refused\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.227.118:443/healthz\\\": dial tcp 172.30.227.118:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.227.118:443/healthz\\\": dial tcp 172.30.227.118:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.227.118:443/healthz\\\": dial tcp 172.30.227.118:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/oauth-serving-cert -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.227.118:443/healthz\\\": dial tcp 172.30.227.118:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.227.118:443/healthz\\\": dial tcp 172.30.227.118:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.227.118:443/healthz\\\": dial tcp 172.30.227.118:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.227.118:443/healthz\\\": dial tcp 172.30.227.118:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:30Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.oauth.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:30Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.user.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:30Z","reason":"OpenShiftAPICheckFailed","message":"\"oauth.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:30Z","reason":"OpenShiftAPICheckFailed","message":"\"user.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:34Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: status.versions changed from [{\"operator\" \"4.18.34\"}] to [{\"operator\" \"4.18.34\"} {\"oauth-apiserver\" \"4.18.34\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:34Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"oauth-apiserver\" changed from \"\" to \"4.18.34\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:50:34Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing changed from True to False (\"AuthenticatorCertKeyProgressing: All is well\"),Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.227.118:443/healthz\\\": dial tcp 172.30.227.118:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.227.118:443/healthz\\\": dial tcp 172.30.227.118:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:54:43Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953\" already present on machine","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:54:44Z","reason":"Created","message":"Created container: authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:54:44Z","reason":"Started","message":"Started container authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:55:21Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.13:8443/healthz\": dial tcp 10.128.0.13:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:55:21Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.13:8443/healthz\": dial tcp 10.128.0.13:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:55:32Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.13:8443/healthz\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)\nbody: \n","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-12T20:55:32Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.13:8443/healthz\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)","type":"Warning"}]}events/openshift-config-managed.json0000640000000000000000000000061015154624262016277 0ustar0000000000000000{"items":[{"namespace":"openshift-config-managed","lastTimestamp":"2026-03-12T20:50:18Z","reason":"PublishedRouterCA","message":"Published \"default-ingress-cert\" in \"openshift-config-managed\"","type":"Normal"},{"namespace":"openshift-config-managed","lastTimestamp":"2026-03-12T20:50:18Z","reason":"PublishedRouterCertificates","message":"Published router certificates","type":"Normal"}]}config/serviceaccounts.json0000640000000000000000000003505115154624255014615 0ustar0000000000000000{"serviceAccounts":{"TOTAL_COUNT":339,"namespaces":{"default":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-public":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-system":[{"name":"attachdetach-controller","secrets":1},{"name":"builder","secrets":1},{"name":"certificate-controller","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"clusterrole-aggregation-controller","secrets":1},{"name":"cronjob-controller","secrets":1},{"name":"daemon-set-controller","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"deployment-controller","secrets":1},{"name":"disruption-controller","secrets":1},{"name":"endpoint-controller","secrets":1},{"name":"endpointslice-controller","secrets":1},{"name":"endpointslicemirroring-controller","secrets":1},{"name":"ephemeral-volume-controller","secrets":1},{"name":"expand-controller","secrets":1},{"name":"generic-garbage-collector","secrets":1},{"name":"horizontal-pod-autoscaler","secrets":1},{"name":"job-controller","secrets":1},{"name":"legacy-service-account-token-cleaner","secrets":1},{"name":"namespace-controller","secrets":1},{"name":"node-controller","secrets":1},{"name":"persistent-volume-binder","secrets":1},{"name":"pod-garbage-collector","secrets":1},{"name":"pv-protection-controller","secrets":1},{"name":"pvc-protection-controller","secrets":1},{"name":"replicaset-controller","secrets":1},{"name":"replication-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"root-ca-cert-publisher","secrets":1},{"name":"service-account-controller","secrets":1},{"name":"service-ca-cert-publisher","secrets":1},{"name":"statefulset-controller","secrets":1},{"name":"ttl-after-finished-controller","secrets":1},{"name":"validatingadmissionpolicy-status-controller","secrets":1}],"openshift":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-sa","secrets":1}],"openshift-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-operator","secrets":1}],"openshift-authentication":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-openshift","secrets":1}],"openshift-authentication-operator":[{"name":"authentication-operator","secrets":1},{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-catalogd":[{"name":"builder","secrets":1},{"name":"catalogd-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager":[{"name":"builder","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"cloud-node-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"cluster-cloud-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-credential-operator":[{"name":"builder","secrets":1},{"name":"cloud-credential-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-network-config-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-platform-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-csi-drivers":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-machine-approver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-approver-sa","secrets":1}],"openshift-cluster-node-tuning-operator":[{"name":"builder","secrets":1},{"name":"cluster-node-tuning-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"tuned","secrets":1}],"openshift-cluster-olm-operator":[{"name":"builder","secrets":1},{"name":"cluster-olm-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-samples-operator":[{"name":"builder","secrets":1},{"name":"cluster-samples-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-storage-operator":[{"name":"builder","secrets":1},{"name":"cluster-storage-operator","secrets":1},{"name":"csi-snapshot-controller","secrets":1},{"name":"csi-snapshot-controller-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-version":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-managed":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-config-operator","secrets":1}],"openshift-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-sa","secrets":1}],"openshift-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-operator","secrets":1}],"openshift-dns":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns","secrets":1},{"name":"node-resolver","secrets":1}],"openshift-dns-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns-operator","secrets":1}],"openshift-etcd":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-backup-sa","secrets":1},{"name":"etcd-sa","secrets":1},{"name":"installer-sa","secrets":1}],"openshift-etcd-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-operator","secrets":1}],"openshift-host-network":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-image-registry":[{"name":"builder","secrets":1},{"name":"cluster-image-registry-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"node-ca","secrets":1},{"name":"pruner","secrets":1}],"openshift-infra":[{"name":"build-config-change-controller","secrets":1},{"name":"build-controller","secrets":1},{"name":"builder","secrets":1},{"name":"cluster-csr-approver-controller","secrets":1},{"name":"cluster-quota-reconciliation-controller","secrets":1},{"name":"default","secrets":1},{"name":"default-rolebindings-controller","secrets":1},{"name":"deployer","secrets":1},{"name":"deployer-controller","secrets":1},{"name":"deploymentconfig-controller","secrets":1},{"name":"image-import-controller","secrets":1},{"name":"image-trigger-controller","secrets":1},{"name":"ingress-to-route-controller","secrets":1},{"name":"namespace-security-allocation-controller","secrets":1},{"name":"node-bootstrapper","secrets":1},{"name":"origin-namespace-controller","secrets":1},{"name":"podsecurity-admission-label-syncer-controller","secrets":1},{"name":"privileged-namespaces-psa-label-syncer","secrets":1},{"name":"pv-recycler-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"serviceaccount-controller","secrets":1},{"name":"serviceaccount-pull-secrets-controller","secrets":1},{"name":"template-instance-controller","secrets":1},{"name":"template-instance-finalizer-controller","secrets":1},{"name":"unidling-controller","secrets":1}],"openshift-ingress":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"router","secrets":1}],"openshift-ingress-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ingress-operator","secrets":1}],"openshift-insights":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"gather","secrets":1},{"name":"operator","secrets":1}],"openshift-kni-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-kube-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-apiserver-operator","secrets":1}],"openshift-kube-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"kube-controller-manager-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-controller-manager-operator","secrets":1}],"openshift-kube-scheduler":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1},{"name":"openshift-kube-scheduler-sa","secrets":1}],"openshift-kube-scheduler-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-kube-scheduler-operator","secrets":1}],"openshift-kube-storage-version-migrator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-sa","secrets":1}],"openshift-kube-storage-version-migrator-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-operator","secrets":1}],"openshift-machine-api":[{"name":"builder","secrets":1},{"name":"cluster-autoscaler","secrets":1},{"name":"cluster-autoscaler-operator","secrets":1},{"name":"cluster-baremetal-operator","secrets":1},{"name":"control-plane-machine-set-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-api-controllers","secrets":1},{"name":"machine-api-operator","secrets":1},{"name":"machine-api-termination-handler","secrets":1}],"openshift-machine-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-config-controller","secrets":1},{"name":"machine-config-daemon","secrets":1},{"name":"machine-config-operator","secrets":1},{"name":"machine-config-server","secrets":1},{"name":"machine-os-puller","secrets":1},{"name":"node-bootstrapper","secrets":1}],"openshift-marketplace":[{"name":"builder","secrets":1},{"name":"certified-operators","secrets":1},{"name":"community-operators","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"marketplace-operator","secrets":1},{"name":"redhat-marketplace","secrets":1},{"name":"redhat-operators","secrets":1}],"openshift-monitoring":[{"name":"builder","secrets":1},{"name":"cluster-monitoring-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"prometheus-operator","secrets":1},{"name":"prometheus-operator-admission-webhook","secrets":1}],"openshift-multus":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"metrics-daemon-sa","secrets":1},{"name":"multus","secrets":1},{"name":"multus-ac","secrets":1},{"name":"multus-ancillary-tools","secrets":1}],"openshift-network-diagnostics":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-diagnostics","secrets":1}],"openshift-network-node-identity":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-node-identity","secrets":1}],"openshift-network-operator":[{"name":"builder","secrets":1},{"name":"cluster-network-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"iptables-alerter","secrets":1}],"openshift-node":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-nutanix-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-oauth-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-apiserver-sa","secrets":1}],"openshift-openstack-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-operator-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"operator-controller-controller-manager","secrets":1}],"openshift-operator-lifecycle-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"olm-operator-serviceaccount","secrets":1}],"openshift-operators":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovirt-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovn-kubernetes":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ovn-kubernetes-control-plane","secrets":1},{"name":"ovn-kubernetes-node","secrets":1}],"openshift-route-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"route-controller-manager-sa","secrets":1}],"openshift-service-ca":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca","secrets":1}],"openshift-service-ca-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca-operator","secrets":1}],"openshift-user-workload-monitoring":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-vsphere-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}]}}}config/installplans.json0000640000000000000000000000010015154624255014104 0ustar0000000000000000{"items":null,"stats":{"TOTAL_COUNT":0,"TOTAL_NONUNIQ_COUNT":0}}config/node/logs/master-0.log0000640000000000000000000006724415154624242014553 0ustar0000000000000000Mar 12 20:55:15.632396 master-0 kubenswrapper[7484]: E0312 20:55:15.632354 7484 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"02ac5a41fa86c8da3e61fb0bb8e9e0588bab913b801b90fc424e7e3abaf59e02\": container with ID starting with 02ac5a41fa86c8da3e61fb0bb8e9e0588bab913b801b90fc424e7e3abaf59e02 not found: ID does not exist" containerID="02ac5a41fa86c8da3e61fb0bb8e9e0588bab913b801b90fc424e7e3abaf59e02" Mar 12 20:55:15.637947 master-0 kubenswrapper[7484]: E0312 20:55:15.637347 7484 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"803468c92847be9ff6518c968fe3dd17c7c93344e029130c1bfa6744bc5862bf\": container with ID starting with 803468c92847be9ff6518c968fe3dd17c7c93344e029130c1bfa6744bc5862bf not found: ID does not exist" containerID="803468c92847be9ff6518c968fe3dd17c7c93344e029130c1bfa6744bc5862bf" Mar 12 20:55:15.694158 master-0 kubenswrapper[7484]: E0312 20:55:15.694109 7484 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"4f12cf8d8d8d0087f11b9de5f5568886404da4081c2e2727f07a95ca8191d1c6\": container with ID starting with 4f12cf8d8d8d0087f11b9de5f5568886404da4081c2e2727f07a95ca8191d1c6 not found: ID does not exist" containerID="4f12cf8d8d8d0087f11b9de5f5568886404da4081c2e2727f07a95ca8191d1c6" Mar 12 20:55:15.725977 master-0 kubenswrapper[7484]: E0312 20:55:15.725952 7484 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"e29fe78e5f8c5908626647267abeb52f63244162e122261e67a929d3a95210d9\": container with ID starting with e29fe78e5f8c5908626647267abeb52f63244162e122261e67a929d3a95210d9 not found: ID does not exist" containerID="e29fe78e5f8c5908626647267abeb52f63244162e122261e67a929d3a95210d9" Mar 12 20:55:18.146145 master-0 kubenswrapper[7484]: E0312 20:55:18.146013 7484 projected.go:194] Error preparing data for projected volume kube-api-access for pod openshift-kube-controller-manager/installer-2-master-0: failed to fetch token: Timeout: request did not complete within requested timeout - context deadline exceeded Mar 12 20:55:18.146145 master-0 kubenswrapper[7484]: E0312 20:55:18.146134 7484 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/367123ca-5a21-415c-8ac2-6d875696536b-kube-api-access podName:367123ca-5a21-415c-8ac2-6d875696536b nodeName:}" failed. No retries permitted until 2026-03-12 20:55:50.146112409 +0000 UTC m=+362.631381231 (durationBeforeRetry 32s). Error: MountVolume.SetUp failed for volume "kube-api-access" (UniqueName: "kubernetes.io/projected/367123ca-5a21-415c-8ac2-6d875696536b-kube-api-access") pod "installer-2-master-0" (UID: "367123ca-5a21-415c-8ac2-6d875696536b") : failed to fetch token: Timeout: request did not complete within requested timeout - context deadline exceeded Mar 12 20:55:18.246635 master-0 kubenswrapper[7484]: E0312 20:55:18.246558 7484 projected.go:194] Error preparing data for projected volume kube-api-access-4rthf for pod openshift-marketplace/redhat-operators-lbgrl: failed to fetch token: Timeout: request did not complete within requested timeout - context deadline exceeded Mar 12 20:55:18.246971 master-0 kubenswrapper[7484]: E0312 20:55:18.246675 7484 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/2d2b27ae-7c79-4e3a-beef-1c6d8b62b1c0-kube-api-access-4rthf podName:2d2b27ae-7c79-4e3a-beef-1c6d8b62b1c0 nodeName:}" failed. No retries permitted until 2026-03-12 20:55:50.246649242 +0000 UTC m=+362.731918054 (durationBeforeRetry 32s). Error: MountVolume.SetUp failed for volume "kube-api-access-4rthf" (UniqueName: "kubernetes.io/projected/2d2b27ae-7c79-4e3a-beef-1c6d8b62b1c0-kube-api-access-4rthf") pod "redhat-operators-lbgrl" (UID: "2d2b27ae-7c79-4e3a-beef-1c6d8b62b1c0") : failed to fetch token: Timeout: request did not complete within requested timeout - context deadline exceeded Mar 12 20:55:18.696094 master-0 kubenswrapper[7484]: E0312 20:55:18.695988 7484 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" interval="7s" Mar 12 20:55:20.458152 master-0 kubenswrapper[7484]: E0312 20:55:20.456951 7484 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{redhat-marketplace-66qvj.189c33360d1c0398 openshift-marketplace 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:openshift-marketplace,Name:redhat-marketplace-66qvj,UID:d6eace9f-a52d-4570-a932-959538e1f2bc,APIVersion:v1,ResourceVersion:9033,FieldPath:spec.initContainers{extract-content},},Reason:Pulled,Message:Successfully pulled image \"registry.redhat.io/redhat/redhat-marketplace-index:v4.18\" in 12.438s (12.438s including waiting). Image size: 1231028434 bytes.,Source:EventSource{Component:kubelet,Host:master-0,},FirstTimestamp:2026-03-12 20:51:00.518323096 +0000 UTC m=+73.003591938,LastTimestamp:2026-03-12 20:51:00.518323096 +0000 UTC m=+73.003591938,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:master-0,}" Mar 12 20:55:21.120283 master-0 kubenswrapper[7484]: I0312 20:55:21.120194 7484 patch_prober.go:28] interesting pod/authentication-operator-7c6989d6c4-9j7rx container/authentication-operator namespace/openshift-authentication-operator: Liveness probe status=failure output="Get \"https://10.128.0.13:8443/healthz\": dial tcp 10.128.0.13:8443: connect: connection refused" start-of-body= Mar 12 20:55:21.120283 master-0 kubenswrapper[7484]: I0312 20:55:21.120285 7484 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-authentication-operator/authentication-operator-7c6989d6c4-9j7rx" podUID="a3bebf49-1d92-4353-b84c-91ed86b7bb94" containerName="authentication-operator" probeResult="failure" output="Get \"https://10.128.0.13:8443/healthz\": dial tcp 10.128.0.13:8443: connect: connection refused" Mar 12 20:55:21.354519 master-0 kubenswrapper[7484]: E0312 20:55:21.354189 7484 kubelet_node_status.go:585] "Error updating node status, will retry" err="failed to patch status \"{\\\"status\\\":{\\\"$setElementOrder/conditions\\\":[{\\\"type\\\":\\\"MemoryPressure\\\"},{\\\"type\\\":\\\"DiskPressure\\\"},{\\\"type\\\":\\\"PIDPressure\\\"},{\\\"type\\\":\\\"Ready\\\"}],\\\"conditions\\\":[{\\\"lastHeartbeatTime\\\":\\\"2026-03-12T20:55:11Z\\\",\\\"type\\\":\\\"MemoryPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2026-03-12T20:55:11Z\\\",\\\"type\\\":\\\"DiskPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2026-03-12T20:55:11Z\\\",\\\"type\\\":\\\"PIDPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2026-03-12T20:55:11Z\\\",\\\"type\\\":\\\"Ready\\\"}],\\\"images\\\":[{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0\\\"],\\\"sizeBytes\\\":1637445817},{\\\"names\\\":[\\\"registry.redhat.io/redhat/certified-operator-index@sha256:1fce8b5c6b0206ecb4ddc7de47062bed853b88d4e34415e9e5a2a6bc99cf6aad\\\",\\\"registry.redhat.io/redhat/certified-operator-index@sha256:8bd0ffcb6caac4a5d03346b5f7cdfaf2f6f9f9d0a30deff8f216e6cb63b0ee75\\\",\\\"registry.redhat.io/redhat/certified-operator-index:v4.18\\\"],\\\"sizeBytes\\\":1282704097},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:381e96959e3c3b08a3e2715e6024697ae14af31bd0378b49f583e984b3b9a192\\\"],\\\"sizeBytes\\\":1238047254},{\\\"names\\\":[\\\"registry.redhat.io/redhat/redhat-marketplace-index@sha256:898c67bf7fc973e99114f3148976a6c21ae0dbe413051415588fa9b995f5b331\\\",\\\"registry.redhat.io/redhat/redhat-marketplace-index@sha256:a641939d2096609a4cf6eec872a1476b7c671bfd81cffc2edeb6e9f13c9deeba\\\",\\\"registry.redhat.io/redhat/redhat-marketplace-index:v4.18\\\"],\\\"sizeBytes\\\":1231028434},{\\\"names\\\":[\\\"registry.redhat.io/redhat/community-operator-index@sha256:08bf2da4079dafb9d9fc0718c48ed509adab6b030e9c85e3bbd21d2702ab894e\\\",\\\"registry.redhat.io/redhat/community-operator-index@sha256:cf0470f46da209c10a63329feddb7afca3d04a9084fbf1a0755a3302e5c102ca\\\",\\\"registry.redhat.io/redhat/community-operator-index:v4.18\\\"],\\\"sizeBytes\\\":1221753567},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c\\\"],\\\"sizeBytes\\\":992610645},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4\\\"],\\\"sizeBytes\\\":943837171},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ff40e33e63d6c1f4e4393d5506e38def25ba20582d980fec8b81f81c867ceeec\\\"],\\\"sizeBytes\\\":918278686},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e207c762b7802ee0e54507d21ed1f25b19eddc511a4b824934c16c163193be6a\\\"],\\\"sizeBytes\\\":876146500},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8\\\"],\\\"sizeBytes\\\":862633255},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bfcd8017eede3fb66fa3f5b47c27508b787d38455689154461f0e6a5dc303ff\\\"],\\\"sizeBytes\\\":772939850},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9c946fdc5a4cd16ff998c17844780e7efc38f7f38b97a8a40d75cd77b318ddef\\\"],\\\"sizeBytes\\\":687947017},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c03cb25dc6f6a865529ebc979e8d7d08492b28fd3fb93beddf30e1cb06f1245\\\"],\\\"sizeBytes\\\":683169303},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3f34dc492c80a3dee4643cc2291044750ac51e6e919b973de8723fa8b70bde70\\\"],\\\"sizeBytes\\\":677929075},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3\\\"],\\\"sizeBytes\\\":621647686},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b\\\"],\\\"sizeBytes\\\":589379637},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460\\\"],\\\"sizeBytes\\\":582153879},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:eb82e437a701ce83b70e56be8477d987da67578714dda3d9fa6628804b1b56f5\\\"],\\\"sizeBytes\\\":558210153},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:28f33d62fd0b94c5ea0ebcd7a4216848c8dd671a38d901ce98f4c399b700e1c7\\\"],\\\"sizeBytes\\\":548751793},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b\\\"],\\\"sizeBytes\\\":529324693},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ac6f0695d3386e6d601f4ae507940981352fa3ad884b0fed6fb25698c5e6f916\\\"],\\\"sizeBytes\\\":528946249},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3\\\"],\\\"sizeBytes\\\":518384455},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b\\\"],\\\"sizeBytes\\\":517997625},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898\\\"],\\\"sizeBytes\\\":514980169},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9bd818e37e1f9dbe5393c557b89e81010d68171408e0e4157a3d92ae0ca1c953\\\"],\\\"sizeBytes\\\":513220825},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d601c8437b4d8bbe2da0f3b08f1bd8693f5a4ef6d835377ec029c79d9dca5dab\\\"],\\\"sizeBytes\\\":512273539},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0\\\"],\\\"sizeBytes\\\":511226810},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:834063dd26fb3d2489e193489198a0d5fbe9c775a0e30173e5fcef6994fbf0f6\\\"],\\\"sizeBytes\\\":511164376},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56\\\"],\\\"sizeBytes\\\":508888174},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7220d16ea511c0f0410cf45db45aaafcc64847c9cb5732ad1eff39ceb482cdba\\\"],\\\"sizeBytes\\\":508544235},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:526c5c02a8fa86a2fa83a7087d4a5c4b1c4072c0f3906163494cc3b3c1295e9b\\\"],\\\"sizeBytes\\\":507967997},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4010a8f9d932615336227e2fd43325d4fa9025dca4bebe032106efea733fcfc3\\\"],\\\"sizeBytes\\\":506479655},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282\\\"],\\\"sizeBytes\\\":506394574},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9\\\"],\\\"sizeBytes\\\":505344964},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609\\\"],\\\"sizeBytes\\\":505242594},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d11f13e867f4df046ca6789bb7273da5d0c08895b3dea00949c8a5458f9e22f9\\\"],\\\"sizeBytes\\\":504623546},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:76bdc35338c4d0f5e5b9448fb73e3578656f908a962286692e12a0372ec721d5\\\"],\\\"sizeBytes\\\":495994161},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc\\\"],\\\"sizeBytes\\\":495064829},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2fe5144b1f72bdcf5d5a52130f02ed86fbec3875cc4ac108ead00eaac1659e06\\\"],\\\"sizeBytes\\\":487090672},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4a4c3e6ca0cd26f7eb5270cfafbcf423cf2986d152bf5b9fc6469d40599e104e\\\"],\\\"sizeBytes\\\":484450382},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c54c3f7cffe057ae0bdf26163d5e46744685083ae16fc97112e32beacd2d8955\\\"],\\\"sizeBytes\\\":484175664},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e9ee63a30a9b95b5801afa36e09fc583ec2cda3c5cb3c8676e478fea016abfa1\\\"],\\\"sizeBytes\\\":470680779},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b9b8bc43bac294be3c7669cde049e388ad9d8751242051ba40f83e1c401eceda\\\"],\\\"sizeBytes\\\":468263999},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501\\\"],\\\"sizeBytes\\\":465086330},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a85dab5856916220df6f05ce9d6aa10cd4fa0234093b55355246690bba05ad1\\\"],\\\"sizeBytes\\\":463700811},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b714a7ada1e295b599b432f32e1fd5b74c8cdbe6fe51e95306322b25cb873914\\\"],\\\"sizeBytes\\\":458126424},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5230462066ab36e3025524e948dd33fa6f51ee29a4f91fa469bfc268568b5fd9\\\"],\\\"sizeBytes\\\":456575686},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:89cb093f319eaa04acfe9431b8697bffbc71ab670546f7ed257daa332165c626\\\"],\\\"sizeBytes\\\":448828105},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783\\\"],\\\"sizeBytes\\\":448041621},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf9670d0f269f8d49fd9ef4981999be195f6624a4146aa93d9201eb8acc81053\\\"],\\\"sizeBytes\\\":443271011}]}}\" for node \"master-0\": Patch \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0/status?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Mar 12 20:55:28.496023 master-0 kubenswrapper[7484]: E0312 20:55:28.495798 7484 kubelet.go:1929] "Failed creating a mirror pod for" err="Internal error occurred: admission plugin \"LimitRanger\" failed to complete mutation in 13s" pod="openshift-etcd/etcd-master-0" Mar 12 20:55:29.155823 master-0 kubenswrapper[7484]: I0312 20:55:29.155667 7484 prober.go:107] "Probe failed" probeType="Readiness" pod="kube-system/bootstrap-kube-controller-manager-master-0" podUID="f78c05e1499b533b83f091333d61f045" containerName="cluster-policy-controller" probeResult="failure" output="Get \"https://localhost:10357/healthz\": dial tcp [::1]:10357: connect: connection refused" Mar 12 20:55:29.323717 master-0 kubenswrapper[7484]: I0312 20:55:29.323588 7484 patch_prober.go:28] interesting pod/openshift-config-operator-64488f9d78-zsd76 container/openshift-config-operator namespace/openshift-config-operator: Liveness probe status=failure output="Get \"https://10.128.0.15:8443/healthz\": dial tcp 10.128.0.15:8443: connect: connection refused" start-of-body= Mar 12 20:55:29.324111 master-0 kubenswrapper[7484]: I0312 20:55:29.323715 7484 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-config-operator/openshift-config-operator-64488f9d78-zsd76" podUID="980191fe-c62c-4b9e-879c-38fa8ce0a58b" containerName="openshift-config-operator" probeResult="failure" output="Get \"https://10.128.0.15:8443/healthz\": dial tcp 10.128.0.15:8443: connect: connection refused" Mar 12 20:55:29.542565 master-0 kubenswrapper[7484]: E0312 20:55:29.542510 7484 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"openshift-config-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=openshift-config-operator pod=openshift-config-operator-64488f9d78-zsd76_openshift-config-operator(980191fe-c62c-4b9e-879c-38fa8ce0a58b)\"" pod="openshift-config-operator/openshift-config-operator-64488f9d78-zsd76" podUID="980191fe-c62c-4b9e-879c-38fa8ce0a58b" Mar 12 20:55:29.578410 master-0 kubenswrapper[7484]: E0312 20:55:29.578358 7484 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"cluster-olm-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=cluster-olm-operator pod=cluster-olm-operator-77899cf6d-kbwlh_openshift-cluster-olm-operator(226cb3a1-984f-4410-96e6-c007131dc074)\"" pod="openshift-cluster-olm-operator/cluster-olm-operator-77899cf6d-kbwlh" podUID="226cb3a1-984f-4410-96e6-c007131dc074" Mar 12 20:55:30.617553 master-0 kubenswrapper[7484]: E0312 20:55:30.617519 7484 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"openshift-config-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=openshift-config-operator pod=openshift-config-operator-64488f9d78-zsd76_openshift-config-operator(980191fe-c62c-4b9e-879c-38fa8ce0a58b)\"" pod="openshift-config-operator/openshift-config-operator-64488f9d78-zsd76" podUID="980191fe-c62c-4b9e-879c-38fa8ce0a58b" Mar 12 20:55:31.355482 master-0 kubenswrapper[7484]: E0312 20:55:31.355345 7484 kubelet_node_status.go:585] "Error updating node status, will retry" err="error getting node \"master-0\": Get \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Mar 12 20:55:32.324135 master-0 kubenswrapper[7484]: E0312 20:55:32.324055 7484 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"openshift-config-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=openshift-config-operator pod=openshift-config-operator-64488f9d78-zsd76_openshift-config-operator(980191fe-c62c-4b9e-879c-38fa8ce0a58b)\"" pod="openshift-config-operator/openshift-config-operator-64488f9d78-zsd76" podUID="980191fe-c62c-4b9e-879c-38fa8ce0a58b" Mar 12 20:55:41.356242 master-0 kubenswrapper[7484]: E0312 20:55:41.356101 7484 kubelet_node_status.go:585] "Error updating node status, will retry" err="error getting node \"master-0\": Get \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Mar 12 20:55:41.530514 master-0 kubenswrapper[7484]: E0312 20:55:41.530428 7484 kubelet.go:1929] "Failed creating a mirror pod for" err="Internal error occurred: admission plugin \"LimitRanger\" failed to complete mutation in 13s" pod="openshift-etcd/etcd-master-0" Mar 12 20:55:51.357563 master-0 kubenswrapper[7484]: E0312 20:55:51.357438 7484 kubelet_node_status.go:585] "Error updating node status, will retry" err="error getting node \"master-0\": Get \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Mar 12 20:56:15.991784 master-0 kubenswrapper[7484]: E0312 20:56:15.990797 7484 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="2d2b27ae-7c79-4e3a-beef-1c6d8b62b1c0" containerName="extract-utilities" Mar 12 20:56:15.991784 master-0 kubenswrapper[7484]: E0312 20:56:15.990890 7484 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="2d2b27ae-7c79-4e3a-beef-1c6d8b62b1c0" containerName="extract-content" Mar 12 20:56:15.991784 master-0 kubenswrapper[7484]: E0312 20:56:15.990936 7484 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="869e3d2a-1b5c-426f-945a-ddd44a9a5033" containerName="installer" Mar 12 20:56:15.991784 master-0 kubenswrapper[7484]: E0312 20:56:15.990977 7484 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="5bec49ae-0c52-451f-8d8d-6e822cd335cc" containerName="installer" Mar 12 20:56:15.991784 master-0 kubenswrapper[7484]: E0312 20:56:15.991016 7484 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="4d69687f-b8a5-4643-8268-ce30df5db3bc" containerName="installer" Mar 12 20:56:15.991784 master-0 kubenswrapper[7484]: E0312 20:56:15.991059 7484 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="954fe7f9-e138-49ab-ab8e-504b75914100" containerName="installer" Mar 12 20:56:17.718467 master-0 kubenswrapper[7484]: E0312 20:56:17.718383 7484 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="76e719af-a855-4c28-8aa7-61fcf0b2c0ee" containerName="extract-utilities" Mar 12 20:56:28.949433 master-0 kubenswrapper[7484]: E0312 20:56:28.949349 7484 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="514012c6-628d-4cbf-8a60-be70e3913366" containerName="extract-utilities" Mar 12 20:56:28.949433 master-0 kubenswrapper[7484]: E0312 20:56:28.949417 7484 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="514012c6-628d-4cbf-8a60-be70e3913366" containerName="extract-content" Mar 12 20:56:30.843685 master-0 kubenswrapper[7484]: E0312 20:56:30.842883 7484 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="f78c05e1499b533b83f091333d61f045" containerName="kube-controller-manager" Mar 12 20:56:30.843685 master-0 kubenswrapper[7484]: E0312 20:56:30.842940 7484 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="f78c05e1499b533b83f091333d61f045" containerName="cluster-policy-controller" Mar 12 20:56:30.843685 master-0 kubenswrapper[7484]: E0312 20:56:30.842978 7484 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="f78c05e1499b533b83f091333d61f045" containerName="kube-controller-manager" Mar 12 20:56:30.843685 master-0 kubenswrapper[7484]: E0312 20:56:30.843019 7484 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="f78c05e1499b533b83f091333d61f045" containerName="cluster-policy-controller" Mar 12 20:56:30.843685 master-0 kubenswrapper[7484]: E0312 20:56:30.843066 7484 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="f78c05e1499b533b83f091333d61f045" containerName="kube-controller-manager" Mar 12 20:56:30.843685 master-0 kubenswrapper[7484]: E0312 20:56:30.843621 7484 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="f78c05e1499b533b83f091333d61f045" containerName="kube-controller-manager" Mar 12 20:56:30.845095 master-0 kubenswrapper[7484]: E0312 20:56:30.844134 7484 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="f78c05e1499b533b83f091333d61f045" containerName="kube-controller-manager" Mar 12 20:56:32.197951 master-0 kubenswrapper[7484]: E0312 20:56:32.190862 7484 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"473010500c0fd5755ad97dc462629b8580e55a87fa11be411bf25911be941443\": container with ID starting with 473010500c0fd5755ad97dc462629b8580e55a87fa11be411bf25911be941443 not found: ID does not exist" containerID="473010500c0fd5755ad97dc462629b8580e55a87fa11be411bf25911be941443" Mar 12 20:56:32.197951 master-0 kubenswrapper[7484]: E0312 20:56:32.195764 7484 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"c6140b342e454560e27bc37359b130097e81f913d9eb4fdb50381c726897af14\": container with ID starting with c6140b342e454560e27bc37359b130097e81f913d9eb4fdb50381c726897af14 not found: ID does not exist" containerID="c6140b342e454560e27bc37359b130097e81f913d9eb4fdb50381c726897af14" Mar 12 20:56:32.197951 master-0 kubenswrapper[7484]: E0312 20:56:32.196234 7484 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"84660712d67f9b33ee49163616de93d3b9e986937307a8e3781dd5d5f489844c\": container with ID starting with 84660712d67f9b33ee49163616de93d3b9e986937307a8e3781dd5d5f489844c not found: ID does not exist" containerID="84660712d67f9b33ee49163616de93d3b9e986937307a8e3781dd5d5f489844c" Mar 12 20:56:34.798194 master-0 kubenswrapper[7484]: E0312 20:56:34.798062 7484 kubelet.go:2526] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="1.065s" Mar 12 20:56:53.280287 master-0 kubenswrapper[7484]: E0312 20:56:53.279614 7484 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="367123ca-5a21-415c-8ac2-6d875696536b" containerName="installer" Mar 12 20:56:54.545393 master-0 kubenswrapper[7484]: E0312 20:56:54.545315 7484 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"cf5a4e3fdfaf098fde310a2e55edff9907f8a106e9bfb0ed3d90b986edaaa500\": container with ID starting with cf5a4e3fdfaf098fde310a2e55edff9907f8a106e9bfb0ed3d90b986edaaa500 not found: ID does not exist" containerID="cf5a4e3fdfaf098fde310a2e55edff9907f8a106e9bfb0ed3d90b986edaaa500" Mar 12 20:56:54.546221 master-0 kubenswrapper[7484]: E0312 20:56:54.546162 7484 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"10c5515cb5ef67581a8254d958271ba2cb6a67cbb6ee1c3b3b7f00d6f3e32b8f\": container with ID starting with 10c5515cb5ef67581a8254d958271ba2cb6a67cbb6ee1c3b3b7f00d6f3e32b8f not found: ID does not exist" containerID="10c5515cb5ef67581a8254d958271ba2cb6a67cbb6ee1c3b3b7f00d6f3e32b8f" Mar 12 20:56:54.591176 master-0 kubenswrapper[7484]: E0312 20:56:54.590964 7484 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="2ce9bbb5-37b5-4b43-aeb6-904bd0d86500" containerName="kube-rbac-proxy" Mar 12 20:56:54.591176 master-0 kubenswrapper[7484]: E0312 20:56:54.591024 7484 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="2ce9bbb5-37b5-4b43-aeb6-904bd0d86500" containerName="machine-approver-controller"config/running_containers.json0000640000000000000000000001077115154624242015320 0ustar0000000000000000{"images":{"0":"sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","1":"sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","10":"sha256:381e96959e3c3b08a3e2715e6024697ae14af31bd0378b49f583e984b3b9a192","11":"sha256:c9330c756dd6ab107e9a4b671bc52742c90d5be11a8380d8b710e2bd4e0ed43c","12":"sha256:cf9670d0f269f8d49fd9ef4981999be195f6624a4146aa93d9201eb8acc81053","13":"sha256:5de69354d08184ecd6144facc1461777674674e8304971216d4cf1a5025472b9","14":"sha256:e1ec9d3dbcc6f9817c0f6d09f64c0d98c91b03afbb1fcb3c1e1718aca900754b","15":"sha256:263827a457b3cc707bdd050873234f5d0892a553af5cfab13f8db75de762d4cf","16":"sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460","17":"sha256:ace4dcd008420277d915fe983b07bbb50fb3ab0673f28d0166424a75bc2137e7","18":"sha256:b714a7ada1e295b599b432f32e1fd5b74c8cdbe6fe51e95306322b25cb873914","19":"sha256:c8f0fda36e9a2040dbe0537361dcd73658df4e669d846f8101a8f9f29f0be9a7","2":"sha256:41dbd66e9a886c1fd7a99752f358c6125a209e83c0dd37b35730baae58d82ee8","20":"sha256:9bd0b71d620cf0acbfcd1b58797dc30050bd167cb6b7a7f62c8333dd370c76d5","21":"sha256:b9b8bc43bac294be3c7669cde049e388ad9d8751242051ba40f83e1c401eceda","22":"sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","23":"sha256:76b719f5bd541eb1a8bae124d650896b533e7bc3107be536e598b3ab4e135282","24":"registry.redhat.io/redhat/certified-operator-index:v4.18","25":"sha256:ac6f0695d3386e6d601f4ae507940981352fa3ad884b0fed6fb25698c5e6f916","26":"sha256:00b591b3820682dc99f16f07a3a0a4ec06dfedba63cd0f79b998ac4509fabea3","27":"sha256:b8cb5e0caeca0fb02f3e8c72b7ddf1c49e3c602e42e119ba30c60525f1db1821","28":"sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","29":"sha256:4a4c3e6ca0cd26f7eb5270cfafbcf423cf2986d152bf5b9fc6469d40599e104e","3":"sha256:cc20748723f55f960cfb6328d1591880bbd1b3452155633996d4f41fc7c5f46b","30":"sha256:0c03cb25dc6f6a865529ebc979e8d7d08492b28fd3fb93beddf30e1cb06f1245","31":"sha256:5230462066ab36e3025524e948dd33fa6f51ee29a4f91fa469bfc268568b5fd9","32":"sha256:3f34dc492c80a3dee4643cc2291044750ac51e6e919b973de8723fa8b70bde70","33":"sha256:d74fe7cb12c554c120262683d9c4066f33ae4f60a5fad83cba419d851b98c12d","34":"sha256:2fe5144b1f72bdcf5d5a52130f02ed86fbec3875cc4ac108ead00eaac1659e06","35":"sha256:4010a8f9d932615336227e2fd43325d4fa9025dca4bebe032106efea733fcfc3","36":"registry.redhat.io/redhat/redhat-operator-index:v4.18","37":"registry.redhat.io/redhat/community-operator-index:v4.18","38":"sha256:89cb093f319eaa04acfe9431b8697bffbc71ab670546f7ed257daa332165c626","39":"sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","4":"sha256:8fca00eb71b1f03e5b5180a66f3871f5626d337b56196622f5842cfc165523b4","40":"sha256:eb82e437a701ce83b70e56be8477d987da67578714dda3d9fa6628804b1b56f5","41":"sha256:2508a5f66e509e813cb09825b5456be91b4cdd4d02f470f22a33de42c753f2b7","42":"sha256:28f33d62fd0b94c5ea0ebcd7a4216848c8dd671a38d901ce98f4c399b700e1c7","43":"sha256:3a324f47cf789c0480fa4bcb0812152abc3cd844318bab193108fe4349eed609","44":"sha256:e9ee63a30a9b95b5801afa36e09fc583ec2cda3c5cb3c8676e478fea016abfa1","45":"sha256:7220d16ea511c0f0410cf45db45aaafcc64847c9cb5732ad1eff39ceb482cdba","46":"sha256:834063dd26fb3d2489e193489198a0d5fbe9c775a0e30173e5fcef6994fbf0f6","47":"sha256:c54c3f7cffe057ae0bdf26163d5e46744685083ae16fc97112e32beacd2d8955","48":"sha256:76bdc35338c4d0f5e5b9448fb73e3578656f908a962286692e12a0372ec721d5","49":"sha256:8ceca1efee55b9fd5089428476bbc401fe73db7c0b0f5e16d4ad28ed0f0f9d43","5":"sha256:ff40e33e63d6c1f4e4393d5506e38def25ba20582d980fec8b81f81c867ceeec","50":"registry.redhat.io/redhat/redhat-marketplace-index:v4.18","51":"sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","52":"sha256:042e6a37747405da54cf91543d44408c9531327a2cce653c41ca851aa7c896d8","53":"sha256:ebee49810f493f9b566740bd61256fd40b897cc51423f1efa01a02bb57ce177d","6":"sha256:5500329ab50804678fb8a90b96bf2a469bca16b620fb6dd2f5f5a17106e94898","7":"sha256:6088910bdc1583b275fab261e3234c0b63b4cc16d01bcea697b6a7f6db13bdf3","8":"sha256:ee46e13e26156c904e5784e2d64511021ed0974a169ccd6476b05bff1c44ec56","9":"sha256:e207c762b7802ee0e54507d21ed1f25b19eddc511a4b824934c16c163193be6a"},"containers":{"2026-03":{"0":15,"1":8,"10":2,"11":2,"12":2,"13":2,"14":2,"15":2,"16":2,"17":1,"18":1,"19":1,"2":8,"20":1,"21":1,"22":1,"23":1,"24":1,"25":1,"26":1,"27":1,"28":1,"29":1,"3":6,"30":1,"31":1,"32":1,"33":1,"34":1,"35":1,"36":1,"37":1,"38":1,"39":1,"4":4,"40":1,"41":1,"42":1,"43":1,"44":1,"45":1,"46":1,"47":1,"48":1,"49":1,"5":4,"50":1,"51":1,"52":1,"53":1,"6":3,"7":3,"8":3,"9":2}}}config/pod/openshift-service-ca-operator/service-ca-operator-69b6fc6b88-f62j6.json0000640000000000000000000001610715154624242026155 0ustar0000000000000000{"metadata":{"name":"service-ca-operator-69b6fc6b88-f62j6","generateName":"service-ca-operator-69b6fc6b88-","namespace":"openshift-service-ca-operator","uid":"a1a3a3f9-8d60-4b79-9f72-b1defbf4ee4d","resourceVersion":"9167","creationTimestamp":"2026-03-12T20:48:17Z","labels":{"app":"service-ca-operator","pod-template-hash":"69b6fc6b88"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.14/23\"],\"mac_address\":\"0a:58:0a:80:00:0e\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.14/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.14\"\n ],\n \"mac\": \"0a:58:0a:80:00:0e\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"service-ca-operator-69b6fc6b88","uid":"18b7b4a0-03c1-427a-b5e8-cd73cd909dfa","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"service-ca-operator-config","defaultMode":420}},{"name":"kube-api-access-577p4","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"service-ca-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7220d16ea511c0f0410cf45db45aaafcc64847c9cb5732ad1eff39ceb482cdba","command":["service-ca-operator","operator"],"args":["--config=/var/run/configmaps/config/operator-config.yaml","-v=2"],"env":[{"name":"CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7220d16ea511c0f0410cf45db45aaafcc64847c9cb5732ad1eff39ceb482cdba"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"}],"resources":{"requests":{"cpu":"10m","memory":"80Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-577p4","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"service-ca-operator","serviceAccount":"service-ca-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c18,c2"},"runAsUser":1001,"runAsGroup":1001,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:48Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:34Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:55:15Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:55:15Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:34Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.14","podIPs":[{"ip":"10.128.0.14"}],"startTime":"2026-03-12T20:49:34Z","containerStatuses":[{"name":"service-ca-operator","state":{"running":{"startedAt":"2026-03-12T20:54:44Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0312 20:51:54.202338 1 cmd.go:253] Using service-serving-cert provided certificates\nI0312 20:51:54.202469 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0312 20:51:54.202900 1 observer_polling.go:159] Starting file observer\nI0312 20:51:54.203297 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0312 20:51:54.203309 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nW0312 20:52:54.210383 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods)\nI0312 20:52:54.211224 1 builder.go:304] service-ca-operator version -\nI0312 20:52:54.212145 1 dynamic_serving_content.go:116] \"Loaded a new cert/key pair\" name=\"serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key\"\nF0312 20:53:24.554382 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-service-ca-operator/leases/service-ca-operator-lock\": context deadline exceeded\n","startedAt":"2026-03-12T20:51:54Z","finishedAt":"2026-03-12T20:53:24Z","containerID":"cri-o://47c0e0d21aabebc91fcbee939e9b068c6a5287ab73aa0a38e830a0c4a7aa5051"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7220d16ea511c0f0410cf45db45aaafcc64847c9cb5732ad1eff39ceb482cdba","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7220d16ea511c0f0410cf45db45aaafcc64847c9cb5732ad1eff39ceb482cdba","containerID":"cri-o://083e8e2171f84572bdd5f30426ffba317f16817f3ae58d7c00019c197700b69d","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-577p4","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}operator-controller-controller-manager-6598bfb6c4-hdd4n.json0000640000000000000000000002474315154624242032337 0ustar0000000000000000config/pod/openshift-operator-controller{"metadata":{"name":"operator-controller-controller-manager-6598bfb6c4-hdd4n","generateName":"operator-controller-controller-manager-6598bfb6c4-","namespace":"openshift-operator-controller","uid":"8b96dd10-18a0-49f8-b488-63fc2b23da39","resourceVersion":"9172","creationTimestamp":"2026-03-12T20:50:16Z","labels":{"control-plane":"operator-controller-controller-manager","pod-template-hash":"6598bfb6c4"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.40/23\"],\"mac_address\":\"0a:58:0a:80:00:28\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.40/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.40\"\n ],\n \"mac\": \"0a:58:0a:80:00:28\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"manager","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"operator-controller-controller-manager-6598bfb6c4","uid":"9c6441a9-7d83-4537-ba00-bcb951143ab5","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cache","emptyDir":{}},{"name":"ca-certs","projected":{"sources":[{"configMap":{"name":"operator-controller-trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"ca-bundle.crt"}],"optional":false}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"optional":false}}],"defaultMode":420}},{"name":"etc-containers","hostPath":{"path":"/etc/containers","type":"Directory"}},{"name":"etc-docker","hostPath":{"path":"/etc/docker","type":"Directory"}},{"name":"kube-api-access-nhhdz","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","command":["/manager"],"args":["--health-probe-bind-address=:8081","--metrics-bind-address=127.0.0.1:8080","--leader-elect","--catalogd-cas-dir=/var/ca-certs","--v=2","--global-pull-secret=openshift-config/pull-secret"],"env":[{"name":"SSL_CERT_DIR","value":"/var/ca-certs"}],"resources":{"requests":{"cpu":"10m","memory":"64Mi"}},"volumeMounts":[{"name":"cache","mountPath":"/var/cache"},{"name":"ca-certs","readOnly":true,"mountPath":"/var/ca-certs"},{"name":"etc-containers","readOnly":true,"mountPath":"/etc/containers"},{"name":"etc-docker","readOnly":true,"mountPath":"/etc/docker"},{"name":"kube-api-access-nhhdz","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":15,"timeoutSeconds":1,"periodSeconds":20,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":5,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","args":["--secure-listen-address=0.0.0.0:8443","--http2-disable","--upstream=http://127.0.0.1:8080/","--logtostderr=true","--v=2"],"ports":[{"name":"https","containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"5m","memory":"64Mi"}},"volumeMounts":[{"name":"kube-api-access-nhhdz","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":10,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"operator-controller-controller-manager","serviceAccount":"operator-controller-controller-manager","nodeName":"master-0","securityContext":{"seLinuxOptions":{"type":"spc_t"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchExpressions":[{"key":"kubernetes.io/arch","operator":"In","values":["amd64","arm64","ppc64le","s390x"]},{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:50:18Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:50:16Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:55:16Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:55:16Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:50:16Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.40","podIPs":[{"ip":"10.128.0.40"}],"startTime":"2026-03-12T20:50:16Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-12T20:50:17Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","containerID":"cri-o://f2511ee6a585ce311cd524c29ce1e349ba18deb64a2518fdb20cd96791df398a","started":true,"volumeMounts":[{"name":"kube-api-access-nhhdz","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"manager","state":{"running":{"startedAt":"2026-03-12T20:54:44Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"rollerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-community-operators\" namespace=\"\" name=\"openshift-community-operators\" reconcileID=\"7aabbd97-d009-4e29-aab5-25bf1f208bf9\"\nI0312 20:50:35.589586 1 clustercatalog_controller.go:75] \"reconcile ending\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-community-operators\" namespace=\"\" name=\"openshift-community-operators\" reconcileID=\"7aabbd97-d009-4e29-aab5-25bf1f208bf9\"\nI0312 20:50:35.768314 1 clustercatalog_controller.go:54] \"reconcile starting\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"f9ebf546-3649-413f-ac6d-00c4231dc366\"\nI0312 20:50:35.768406 1 clustercatalog_controller.go:75] \"reconcile ending\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"f9ebf546-3649-413f-ac6d-00c4231dc366\"\nE0312 20:51:43.753231 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0312 20:52:43.757282 1 leaderelection.go:436] error retrieving resource lock openshift-operator-controller/9c4404e7.operatorframework.io: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io 9c4404e7.operatorframework.io)\nI0312 20:52:56.745236 1 leaderelection.go:297] failed to renew lease openshift-operator-controller/9c4404e7.operatorframework.io: timed out waiting for the condition\nE0312 20:52:56.745425 1 main.go:362] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\n","startedAt":"2026-03-12T20:50:17Z","finishedAt":"2026-03-12T20:52:56Z","containerID":"cri-o://60173c0f9984162f24ad65c25f3ae119353e5fb646ea28da5079828f5c237197"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ff2db11ce277288befab25ddb86177e832842d2edb5607a2da8f252a030e1cfc","containerID":"cri-o://41630d24dfd109bc636aa9398130da834c84ba29e895cfce030b4e66d9af23d1","started":true,"volumeMounts":[{"name":"cache","mountPath":"/var/cache"},{"name":"ca-certs","mountPath":"/var/ca-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-containers","mountPath":"/etc/containers","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-docker","mountPath":"/etc/docker","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-nhhdz","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-network-operator/network-operator-7c649bf6d4-62t2f.json0000640000000000000000000002514215154624242025275 0ustar0000000000000000{"metadata":{"name":"network-operator-7c649bf6d4-62t2f","generateName":"network-operator-7c649bf6d4-","namespace":"openshift-network-operator","uid":"fa5ff8e4-1c0f-4f0d-a2c4-1ad7649524c6","resourceVersion":"9156","creationTimestamp":"2026-03-12T20:48:18Z","labels":{"name":"network-operator","pod-template-hash":"7c649bf6d4"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"network-operator-7c649bf6d4","uid":"94d16da8-09ac-42ab-88aa-1074d2dd4c7d","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"host-etc-kube","hostPath":{"path":"/etc/kubernetes","type":"Directory"}},{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420,"optional":true}},{"name":"kube-api-access-2kng9","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"network-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","command":["/bin/bash","-c","#!/bin/bash\nset -o allexport\nif [[ -f /etc/kubernetes/apiserver-url.env ]]; then\n source /etc/kubernetes/apiserver-url.env\nelse\n echo \"Error: /etc/kubernetes/apiserver-url.env is missing\"\n exit 1\nfi\nexec /usr/bin/cluster-network-operator start --listen=0.0.0.0:9104\n"],"ports":[{"name":"cno","hostPort":9104,"containerPort":9104,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.34"},{"name":"KUBE_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9242604e78efada5aeb232d73a7963f806b754213f5d92b1dffc9b493d7b5a65"},{"name":"KUBE_RBAC_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501"},{"name":"MULTUS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:381e96959e3c3b08a3e2715e6024697ae14af31bd0378b49f583e984b3b9a192"},{"name":"MULTUS_ADMISSION_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5230462066ab36e3025524e948dd33fa6f51ee29a4f91fa469bfc268568b5fd9"},{"name":"CNI_PLUGINS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0c03cb25dc6f6a865529ebc979e8d7d08492b28fd3fb93beddf30e1cb06f1245"},{"name":"BOND_CNI_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ace4dcd008420277d915fe983b07bbb50fb3ab0673f28d0166424a75bc2137e7"},{"name":"WHEREABOUTS_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e207c762b7802ee0e54507d21ed1f25b19eddc511a4b824934c16c163193be6a"},{"name":"ROUTE_OVERRRIDE_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c8f0fda36e9a2040dbe0537361dcd73658df4e669d846f8101a8f9f29f0be9a7"},{"name":"MULTUS_NETWORKPOLICY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b19b9d0e5437b0bb19cafc3fb516f654c911cdf11184c0de9a27b43c6b80c9ce"},{"name":"OVN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0"},{"name":"OVN_NB_RAFT_ELECTION_TIMER","value":"10"},{"name":"OVN_SB_RAFT_ELECTION_TIMER","value":"16"},{"name":"OVN_NORTHD_PROBE_INTERVAL","value":"10000"},{"name":"OVN_CONTROLLER_INACTIVITY_PROBE","value":"180000"},{"name":"OVN_NB_INACTIVITY_PROBE","value":"60000"},{"name":"EGRESS_ROUTER_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ac6f0695d3386e6d601f4ae507940981352fa3ad884b0fed6fb25698c5e6f916"},{"name":"NETWORK_METRICS_DAEMON_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:89cb093f319eaa04acfe9431b8697bffbc71ab670546f7ed257daa332165c626"},{"name":"NETWORK_CHECK_SOURCE_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3"},{"name":"NETWORK_CHECK_TARGET_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3"},{"name":"NETWORK_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3"},{"name":"CLOUD_NETWORK_CONFIG_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3aa7c84e73a2a19cc9baca38b7e86dfcde579aa88221647c332c83f047d5ae6d"},{"name":"CLI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460"},{"name":"FRR_K8S_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5bfe4d3125d98cc501d5a529d3ae2497106a2bbb5a6dd06df7c0e0930d168212"},{"name":"NETWORKING_CONSOLE_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b62afe74fdcb011a4a8c8fa5572dbab2514dda673ae4be4c6beaef92d28216ba"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"host-etc-kube","readOnly":true,"mountPath":"/etc/kubernetes"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-2kng9","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-network-operator","serviceAccount":"cluster-network-operator","nodeName":"master-0","hostNetwork":true,"securityContext":{"runAsUser":65534,"runAsNonRoot":true},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"name":"network-operator"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:48:30Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:48:23Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:55:15Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:55:15Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:48:18Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-12T20:48:23Z","containerStatuses":[{"name":"network-operator","state":{"running":{"startedAt":"2026-03-12T20:54:44Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"nshift-iptables-alerter: client rate limiter Wait returned an error: context canceled\nI0312 20:51:19.893139 1 log.go:245] reconciling (/v1, Kind=ServiceAccount) openshift-network-operator/iptables-alerter\nI0312 20:51:19.893208 1 log.go:245] could not apply (/v1, Kind=ServiceAccount) openshift-network-operator/iptables-alerter: failed to apply / update (/v1, Kind=ServiceAccount) openshift-network-operator/iptables-alerter: client rate limiter Wait returned an error: context canceled\nI0312 20:51:19.893227 1 log.go:245] reconciling (rbac.authorization.k8s.io/v1, Kind=ClusterRoleBinding) /openshift-iptables-alerter\nI0312 20:51:19.893298 1 log.go:245] could not apply (rbac.authorization.k8s.io/v1, Kind=ClusterRoleBinding) /openshift-iptables-alerter: failed to apply / update (rbac.authorization.k8s.io/v1, Kind=ClusterRoleBinding) /openshift-iptables-alerter: client rate limiter Wait returned an error: context canceled\nI0312 20:51:19.893318 1 log.go:245] reconciling (/v1, Kind=ConfigMap) openshift-network-operator/iptables-alerter-script\nI0312 20:51:19.893401 1 log.go:245] could not apply (/v1, Kind=ConfigMap) openshift-network-operator/iptables-alerter-script: failed to apply / update (/v1, Kind=ConfigMap) openshift-network-operator/iptables-alerter-script: client rate limiter Wait returned an error: context canceled\nI0312 20:51:19.893424 1 log.go:245] reconciling (apps/v1, Kind=DaemonSet) openshift-network-operator/iptables-alerter\nI0312 20:51:19.893563 1 log.go:245] could not apply (apps/v1, Kind=DaemonSet) openshift-network-operator/iptables-alerter: failed to apply / update (apps/v1, Kind=DaemonSet) openshift-network-operator/iptables-alerter: client rate limiter Wait returned an error: context canceled\nI0312 20:51:24.886544 1 observer_polling.go:162] Shutting down file observer\nF0312 20:51:49.888491 1 operator.go:133] Failed to start controller-runtime manager: failed waiting for all runnables to end within grace period of 30s: context deadline exceeded\n","startedAt":"2026-03-12T20:48:29Z","finishedAt":"2026-03-12T20:51:49Z","containerID":"cri-o://d9fa8a123cfb8c14404c75a08b2365da17bc3d4b0cf2e193ac612689b8a4fc37"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a149ed17b20a7577fceacfc5198f8b7b3edf314ee22f77bd6ab87f06a3aa17f3","containerID":"cri-o://72fca1fe5edaa514a27832ab602fe41af2b798cb5366c953a186e585a0605c57","started":true,"volumeMounts":[{"name":"host-etc-kube","mountPath":"/etc/kubernetes","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-2kng9","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-network-node-identity/network-node-identity-48hk7.json0000640000000000000000000002463215154624242025544 0ustar0000000000000000{"metadata":{"name":"network-node-identity-48hk7","generateName":"network-node-identity-","namespace":"openshift-network-node-identity","uid":"426efd5c-69e1-43e5-835a-6e1c4ef85720","resourceVersion":"9162","creationTimestamp":"2026-03-12T20:49:00Z","labels":{"app":"network-node-identity","component":"network","controller-revision-hash":"68cb6fd5b","kubernetes.io/os":"linux","openshift.io/component":"network","pod-template-generation":"1","type":"infra"},"annotations":{"openshift.io/required-scc":"hostnetwork-v2","openshift.io/scc":"hostnetwork-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"DaemonSet","name":"network-node-identity","uid":"01b202c4-4e27-46c5-9764-1612480d87b2","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"webhook-cert","secret":{"secretName":"network-node-identity-cert","defaultMode":420}},{"name":"env-overrides","configMap":{"name":"env-overrides","defaultMode":420,"optional":true}},{"name":"ovnkube-identity-cm","configMap":{"name":"ovnkube-identity-cm","items":[{"key":"additional-cert-acceptance-cond.json","path":"additional-cert-acceptance-cond.json"},{"key":"additional-pod-admission-cond.json","path":"additional-pod-admission-cond.json"}],"defaultMode":420}},{"name":"kube-api-access-8rjm8","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"webhook","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n# OVN-K will try to remove hybrid overlay node annotations even when the hybrid overlay is not enabled.\n# https://github.com/ovn-org/ovn-kubernetes/blob/ac6820df0b338a246f10f412cd5ec903bd234694/go-controller/pkg/ovn/master.go#L791\nho_enable=\"--enable-hybrid-overlay\"\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start webhook\"\n# extra-allowed-user: service account `ovn-kubernetes-control-plane`\n# sets pod annotations in multi-homing layer3 network controller (cluster-manager)\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --webhook-cert-dir=\"/etc/webhook-cert\" \\\n --webhook-host=127.0.0.1 \\\n --webhook-port=9743 \\\n ${ho_enable} \\\n --enable-interconnect \\\n --disable-approver \\\n --extra-allowed-user=\"system:serviceaccount:openshift-ovn-kubernetes:ovn-kubernetes-control-plane\" \\\n --wait-for-kubernetes-api=200s \\\n --pod-admission-conditions=\"/var/run/ovnkube-identity-config/additional-pod-admission-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"2"},{"name":"KUBERNETES_NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-8rjm8","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}},{"name":"approver","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start approver\"\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --disable-webhook \\\n --csr-acceptance-conditions=\"/var/run/ovnkube-identity-config/additional-cert-acceptance-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"4"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-8rjm8","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":200,"dnsPolicy":"Default","nodeSelector":{"beta.kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"network-node-identity","serviceAccount":"network-node-identity","nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c23,c22"},"supplementalGroups":[1000550000],"fsGroup":1000550000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchFields":[{"key":"metadata.name","operator":"In","values":["master-0"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:15Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:01Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:55:15Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:55:15Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:01Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-12T20:49:01Z","containerStatuses":[{"name":"approver","state":{"running":{"startedAt":"2026-03-12T20:54:44Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"2s8qs\"} reason=\"CSRApproved\"\nI0312 20:49:20.852878 1 approver.go:230] Finished syncing CSR csr-2s8qs for master-0 node in 13.986168ms\nI0312 20:49:20.853054 1 approver.go:230] Finished syncing CSR csr-2s8qs for unknown node in 102.352µs\nI0312 20:49:20.869122 1 approver.go:230] Finished syncing CSR csr-2s8qs for unknown node in 99.432µs\nI0312 20:49:33.234075 1 recorder.go:104] \"CSR \\\"csr-bdrjh\\\" has been approved\" logger=\"events\" type=\"Normal\" object={\"kind\":\"CertificateSigningRequest\",\"name\":\"csr-bdrjh\"} reason=\"CSRApproved\"\nI0312 20:49:33.243299 1 approver.go:230] Finished syncing CSR csr-bdrjh for master-0 node in 9.545297ms\nI0312 20:49:33.243438 1 approver.go:230] Finished syncing CSR csr-bdrjh for unknown node in 73.172µs\nI0312 20:49:33.253350 1 approver.go:230] Finished syncing CSR csr-bdrjh for unknown node in 44.721µs\nE0312 20:51:09.610153 1 leaderelection.go:429] Failed to update lock optimistically: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded, falling back to slow path\nE0312 20:51:24.610081 1 leaderelection.go:436] error retrieving resource lock openshift-network-node-identity/ovnkube-identity: Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded\nI0312 20:51:24.610155 1 leaderelection.go:297] failed to renew lease openshift-network-node-identity/ovnkube-identity: context deadline exceeded\nE0312 20:51:39.610918 1 leaderelection.go:322] Failed to release lock: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nF0312 20:51:39.611099 1 ovnkubeidentity.go:309] error running approver: leader election lost\n","startedAt":"2026-03-12T20:49:14Z","finishedAt":"2026-03-12T20:51:39Z","containerID":"cri-o://28c691afcb8a45cb348e1216142781244b93a45eaf7cbab2716a18bf342b0dc8"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","containerID":"cri-o://26bae4b1151179f8943350ed41cce4211f30fc7d0bc576d35eb657f821dc0907","started":true,"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-8rjm8","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"webhook","state":{"running":{"startedAt":"2026-03-12T20:49:14Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:82f121f9d021a9843b9458f9f222c40f292f2c21dcfcf00f05daacaca8a949c0","containerID":"cri-o://43218fa1071d1a1eefbd9551ef5fb65042fae200cbd64eb4c8af31a81eddb011","started":true,"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-8rjm8","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-machine-config-operator/kube-rbac-proxy-crio-master-0.json0000640000000000000000000001521215154624242026257 0ustar0000000000000000{"metadata":{"name":"kube-rbac-proxy-crio-master-0","namespace":"openshift-machine-config-operator","uid":"1145cd7a-c276-4391-acab-1de2ff1d892b","resourceVersion":"4040","creationTimestamp":"2026-03-12T20:48:29Z","labels":{"k8s-app":"kube-rbac-proxy-crio"},"annotations":{"kubernetes.io/config.hash":"e9add8df47182fc2eaf8cd78016ebe72","kubernetes.io/config.mirror":"e9add8df47182fc2eaf8cd78016ebe72","kubernetes.io/config.seen":"2026-03-12T20:47:42.724718049Z","kubernetes.io/config.source":"file","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"2dfae8b8-e7f5-4d57-9eba-36a0bb1a6e83","controller":true}]},"spec":{"volumes":[{"name":"etc-kube","hostPath":{"path":"/etc/kubernetes","type":""}},{"name":"var-lib-kubelet","hostPath":{"path":"/var/lib/kubelet","type":""}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","command":["/bin/bash","-ec"],"args":["echo -n \"Waiting for kubelet key and certificate to be available\"\nwhile [ -n \"$(test -e /var/lib/kubelet/pki/kubelet-server-current.pem)\" ] ; do\n echo -n \".\"\n sleep 1\n (( tries += 1 ))\n if [[ \"${tries}\" -gt 10 ]]; then\n echo \"Timed out waiting for kubelet key and cert.\"\n exit 1\n fi\ndone\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"var-lib-kubelet","mountPath":"/var","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"kube-rbac-proxy-crio","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","args":["--secure-listen-address=:9637","--config-file=/etc/kubernetes/crio-metrics-proxy.cfg","--client-ca-file=/etc/kubernetes/kubelet-ca.crt","--logtostderr=true","--kubeconfig=/var/lib/kubelet/kubeconfig","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12","--upstream=http://127.0.0.1:9537","--tls-cert-file=/var/lib/kubelet/pki/kubelet-server-current.pem","--tls-private-key-file=/var/lib/kubelet/pki/kubelet-server-current.pem"],"ports":[{"hostPort":9637,"containerPort":9637,"protocol":"TCP"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-kube","readOnly":true,"mountPath":"/etc/kubernetes","mountPropagation":"HostToContainer"},{"name":"var-lib-kubelet","readOnly":true,"mountPath":"/var/lib/kubelet","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:48Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:48Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:48Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:48Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:48Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-12T20:49:48Z","initContainerStatuses":[{"name":"setup","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-12T20:47:45Z","finishedAt":"2026-03-12T20:47:46Z","containerID":"cri-o://5aa72aa1d101c59af48adafd81202e715494ce655baaeb5ca917a23de1012db8"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","containerID":"cri-o://5aa72aa1d101c59af48adafd81202e715494ce655baaeb5ca917a23de1012db8","started":false}],"containerStatuses":[{"name":"kube-rbac-proxy-crio","state":{"running":{"startedAt":"2026-03-12T20:48:30Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"W0312 20:48:04.189601 1 deprecated.go:66] \n==== Removed Flag Warning ======================\n\nlogtostderr is removed in the k8s upstream and has no effect any more.\n\n===============================================\n\t\t\nI0312 20:48:04.189781 1 kube-rbac-proxy.go:530] Reading config file: /etc/kubernetes/crio-metrics-proxy.cfg\nE0312 20:48:04.190842 1 run.go:72] \"command failed\" err=\"failed to load kubeconfig: unable to build rest config based on provided path to kubeconfig file: invalid configuration: [unable to read client-cert /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory, unable to read client-key /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory]\"\n","startedAt":"2026-03-12T20:48:04Z","finishedAt":"2026-03-12T20:48:04Z","containerID":"cri-o://faa71480f217fad716866bc98bd8270b2f07bd2a29f5aa069d90b575671a024e"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","containerID":"cri-o://6f5c19a3178e0ac81f6a0a19cf655238a7d3c02526a49af4ee450188873df923","started":true}],"qosClass":"Burstable"}}kube-storage-version-migrator-operator-7f65c457f5-qfbrj.json0000640000000000000000000001632315154624242036013 0ustar0000000000000000config/pod/openshift-kube-storage-version-migrator-operator{"metadata":{"name":"kube-storage-version-migrator-operator-7f65c457f5-qfbrj","generateName":"kube-storage-version-migrator-operator-7f65c457f5-","namespace":"openshift-kube-storage-version-migrator-operator","uid":"07542516-49c8-4e20-9b97-798fbff850a5","resourceVersion":"9169","creationTimestamp":"2026-03-12T20:48:17Z","labels":{"app":"kube-storage-version-migrator-operator","pod-template-hash":"7f65c457f5"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.21/23\"],\"mac_address\":\"0a:58:0a:80:00:15\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.21/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.21\"\n ],\n \"mac\": \"0a:58:0a:80:00:15\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-storage-version-migrator-operator-7f65c457f5","uid":"3867a3af-03ef-485a-b947-6b624d90c349","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"config","defaultMode":420}},{"name":"kube-api-access-z9xld","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-storage-version-migrator-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d11f13e867f4df046ca6789bb7273da5d0c08895b3dea00949c8a5458f9e22f9","command":["cluster-kube-storage-version-migrator-operator","start"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf9670d0f269f8d49fd9ef4981999be195f6624a4146aa93d9201eb8acc81053"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d11f13e867f4df046ca6789bb7273da5d0c08895b3dea00949c8a5458f9e22f9"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.34"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-z9xld","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1001,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-storage-version-migrator-operator","serviceAccount":"kube-storage-version-migrator-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c19,c14"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:48Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:34Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:55:15Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:55:15Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:34Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.21","podIPs":[{"ip":"10.128.0.21"}],"startTime":"2026-03-12T20:49:34Z","containerStatuses":[{"name":"kube-storage-version-migrator-operator","state":{"running":{"startedAt":"2026-03-12T20:54:44Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0312 20:51:54.163520 1 cmd.go:253] Using service-serving-cert provided certificates\nI0312 20:51:54.163646 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0312 20:51:54.164036 1 observer_polling.go:159] Starting file observer\nW0312 20:52:54.174220 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods)\nI0312 20:52:54.174638 1 builder.go:304] openshift-kube-storage-version-migrator-operator version 4.18.0-202602132343.p2.g59ba356.assembly.stream.el9-59ba356-59ba356f50ea3128905ffdb7137f868aa0588bab\nF0312 20:53:24.415991 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-storage-version-migrator-operator/leases/openshift-kube-storage-version-migrator-operator-lock\": context deadline exceeded\n","startedAt":"2026-03-12T20:51:54Z","finishedAt":"2026-03-12T20:53:24Z","containerID":"cri-o://ded70f8c305f91b4cd97482dbdf153ec9254b0cfdc370f5b14f5e7f5ee654d15"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d11f13e867f4df046ca6789bb7273da5d0c08895b3dea00949c8a5458f9e22f9","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d11f13e867f4df046ca6789bb7273da5d0c08895b3dea00949c8a5458f9e22f9","containerID":"cri-o://dd504a614de5e550f9072528b6c01840da9215811b43491a201cce7cb8c925b2","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-z9xld","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-ingress-operator/ingress-operator-677db989d6-qpf68.json0000640000000000000000000002434115154624242025273 0ustar0000000000000000{"metadata":{"name":"ingress-operator-677db989d6-qpf68","generateName":"ingress-operator-677db989d6-","namespace":"openshift-ingress-operator","uid":"2b71f537-1cc2-4645-8e50-23941635457c","resourceVersion":"9157","creationTimestamp":"2026-03-12T20:48:18Z","labels":{"name":"ingress-operator","pod-template-hash":"677db989d6"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.22/23\"],\"mac_address\":\"0a:58:0a:80:00:16\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.22/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.22\"\n ],\n \"mac\": \"0a:58:0a:80:00:16\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"ingress-operator-677db989d6","uid":"6fee898a-e521-42c0-89b7-1a7baa4bc7a5","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420}},{"name":"trusted-ca","configMap":{"name":"trusted-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420}},{"name":"bound-sa-token","projected":{"sources":[{"serviceAccountToken":{"audience":"openshift","expirationSeconds":3600,"path":"token"}}],"defaultMode":420}},{"name":"kube-api-access-8vvf6","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"ingress-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0","command":["ingress-operator","start","--namespace","$(WATCH_NAMESPACE)","--image","$(IMAGE)","--canary-image","$(CANARY_IMAGE)","--release-version","$(RELEASE_VERSION)"],"env":[{"name":"RELEASE_VERSION","value":"4.18.34"},{"name":"WATCH_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9b2e765b795c30c910c331c85226e5db0d56463b6c81d79ded739cba76e2b032"},{"name":"CANARY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0"}],"resources":{"requests":{"cpu":"10m","memory":"56Mi"}},"volumeMounts":[{"name":"trusted-ca","readOnly":true,"mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"bound-sa-token","readOnly":true,"mountPath":"/var/run/secrets/openshift/serviceaccount"},{"name":"kube-api-access-8vvf6","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","args":["--logtostderr","--secure-listen-address=:9393","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256","--upstream=http://127.0.0.1:60000/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key"],"ports":[{"name":"metrics","containerPort":9393,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"40Mi"}},"volumeMounts":[{"name":"metrics-tls","readOnly":true,"mountPath":"/etc/tls/private"},{"name":"kube-api-access-8vvf6","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"ingress-operator","serviceAccount":"ingress-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c12,c4"},"runAsNonRoot":true,"fsGroup":1000140000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:50:16Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:34Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:55:15Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:55:15Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:34Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.22","podIPs":[{"ip":"10.128.0.22"}],"startTime":"2026-03-12T20:49:34Z","containerStatuses":[{"name":"ingress-operator","state":{"running":{"startedAt":"2026-03-12T20:54:44Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"out waiting for cache to be synced for Kind *v1.Route\"}\n2026-03-12T20:52:16.671Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tStopping and waiting for caches\n2026-03-12T20:52:16.671Z\tERROR\toperator.init\truntime/asm_amd64.s:1695\terror received after stop sequence was engaged\t{\"error\": \"failed to wait for route_metrics_controller caches to sync: timed out waiting for cache to be synced for Kind *v1.Route\"}\nW0312 20:52:16.671709 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.Event ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0312 20:52:16.671980 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.DNSRecord ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\n2026-03-12T20:52:16.672Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tStopping and waiting for webhooks\n2026-03-12T20:52:16.672Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tStopping and waiting for HTTP servers\nW0312 20:52:16.672131 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.Service ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\n2026-03-12T20:52:16.672Z\tINFO\toperator.init.controller-runtime.metrics\truntime/asm_amd64.s:1695\tShutting down metrics server with timeout of 1 minute\n2026-03-12T20:52:16.672Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tWait completed, proceeding to shutdown the manager\n2026-03-12T20:52:16.677Z\tERROR\toperator.main\tcobra/command.go:989\terror starting\t{\"error\": \"failed to wait for canary_controller caches to sync: timed out waiting for cache to be synced for Kind *v1.Route\"}\n2026-03-12T20:52:16.677Z\tINFO\toperator.main\truntime/asm_amd64.s:1695\tfile watch events channel closed\n","startedAt":"2026-03-12T20:50:15Z","finishedAt":"2026-03-12T20:52:16Z","containerID":"cri-o://ae373579849ec0d4a33d66c2a3f6f43fccdff39968b29197dcdc4792d7cd63f3"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0","containerID":"cri-o://72247b0dd06b6af33787ec8f35afadef48c9b0d4221e98fe5435e01a0186d2bf","started":true,"volumeMounts":[{"name":"trusted-ca","mountPath":"/etc/pki/ca-trust/extracted/pem","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"bound-sa-token","mountPath":"/var/run/secrets/openshift/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-8vvf6","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-12T20:50:15Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","containerID":"cri-o://94db3df404adc79b06f6d39bed7801ea1fff7c3b57f50edc7ba7be9ec19fc3ab","started":true,"volumeMounts":[{"name":"metrics-tls","mountPath":"/etc/tls/private","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-8vvf6","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-controller-manager-operator-8565d84698-vp2hs.json0000640000000000000000000001661415154624242033416 0ustar0000000000000000config/pod/openshift-controller-manager-operator{"metadata":{"name":"openshift-controller-manager-operator-8565d84698-vp2hs","generateName":"openshift-controller-manager-operator-8565d84698-","namespace":"openshift-controller-manager-operator","uid":"7623a5c6-47a9-4b75-bda8-c0a2d7c67272","resourceVersion":"9163","creationTimestamp":"2026-03-12T20:48:18Z","labels":{"app":"openshift-controller-manager-operator","pod-template-hash":"8565d84698"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.24/23\"],\"mac_address\":\"0a:58:0a:80:00:18\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.24/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.24\"\n ],\n \"mac\": \"0a:58:0a:80:00:18\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-controller-manager-operator-8565d84698","uid":"77c53309-021d-4b1a-9698-85d937fe276f","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access-q78vj","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:526c5c02a8fa86a2fa83a7087d4a5c4b1c4072c0f3906163494cc3b3c1295e9b","command":["cluster-openshift-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.34"},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:eb82e437a701ce83b70e56be8477d987da67578714dda3d9fa6628804b1b56f5"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.34"},{"name":"ROUTE_CONTROLLER_MANAGER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2fe5144b1f72bdcf5d5a52130f02ed86fbec3875cc4ac108ead00eaac1659e06"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-q78vj","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-controller-manager-operator","serviceAccount":"openshift-controller-manager-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c16,c15"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:48Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:34Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:55:15Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:55:15Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:34Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.24","podIPs":[{"ip":"10.128.0.24"}],"startTime":"2026-03-12T20:49:34Z","containerStatuses":[{"name":"openshift-controller-manager-operator","state":{"running":{"startedAt":"2026-03-12T20:54:44Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0312 20:51:00.816124 1 cmd.go:253] Using service-serving-cert provided certificates\nI0312 20:51:00.816439 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0312 20:51:00.817252 1 observer_polling.go:159] Starting file observer\nW0312 20:52:00.826574 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods openshift-controller-manager-operator-8565d84698-vp2hs)\nI0312 20:52:00.826935 1 builder.go:304] openshift-controller-manager-operator version 4.18.0-202602132343.p2.gf1711cf.assembly.stream.el9-f1711cf-f1711cf30f683ec0eaa187cd5168caae9e8c1254\nF0312 20:52:31.385209 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-controller-manager-operator/leases/openshift-controller-manager-operator-lock\": context deadline exceeded\n","startedAt":"2026-03-12T20:51:00Z","finishedAt":"2026-03-12T20:52:31Z","containerID":"cri-o://1726ad62deed5adf886b68145fe6223edb7fe9f83fb593561c0b8bdb5aef13cf"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:526c5c02a8fa86a2fa83a7087d4a5c4b1c4072c0f3906163494cc3b3c1295e9b","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:526c5c02a8fa86a2fa83a7087d4a5c4b1c4072c0f3906163494cc3b3c1295e9b","containerID":"cri-o://d768bc84b40192023bb465579879b2b58033844ecac405b3a22bcb789eb76d17","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-q78vj","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-storage-operator/csi-snapshot-controller-7577d6f48-8fk8w.json0000640000000000000000000001401415154624242030064 0ustar0000000000000000{"metadata":{"name":"csi-snapshot-controller-7577d6f48-8fk8w","generateName":"csi-snapshot-controller-7577d6f48-","namespace":"openshift-cluster-storage-operator","uid":"d4a162d4-8086-4bcf-854d-7e6cd37fd4c7","resourceVersion":"9179","creationTimestamp":"2026-03-12T20:49:51Z","labels":{"app":"csi-snapshot-controller","pod-template-hash":"7577d6f48"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.28/23\"],\"mac_address\":\"0a:58:0a:80:00:1c\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.28/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.28\"\n ],\n \"mac\": \"0a:58:0a:80:00:1c\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"csi-snapshot-controller-7577d6f48","uid":"a0ae5bfd-d541-4d0b-b1f5-05459fc39624","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"kube-api-access-mfspc","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"snapshot-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a85dab5856916220df6f05ce9d6aa10cd4fa0234093b55355246690bba05ad1","args":["--v=2","--leader-election=true","--leader-election-lease-duration=137s","--leader-election-renew-deadline=107s","--leader-election-retry-period=26s","--leader-election-namespace=openshift-cluster-storage-operator"],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"kube-api-access-mfspc","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000150000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"csi-snapshot-controller","serviceAccount":"csi-snapshot-controller","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c12,c9"},"runAsNonRoot":true,"fsGroup":1000150000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"app":"csi-snapshot-controller"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:56Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:51Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:55:28Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:55:28Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:51Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.28","podIPs":[{"ip":"10.128.0.28"}],"startTime":"2026-03-12T20:49:51Z","containerStatuses":[{"name":"snapshot-controller","state":{"running":{"startedAt":"2026-03-12T20:55:27Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"I0312 20:54:44.357319 1 feature_gate.go:387] feature gates: {map[]}\nI0312 20:54:44.357681 1 main.go:169] Version: a3681c9bbf7c01e13d6bf97ae0384460950c97ec\nI0312 20:54:44.358752 1 main.go:220] Start NewCSISnapshotController with kubeconfig [] resyncPeriod [15m0s]\nE0312 20:55:14.362605 1 main.go:98] Failed to list v1 volumesnapshots with error=Get \"https://172.30.0.1:443/apis/snapshot.storage.k8s.io/v1/volumesnapshots?limit=1\": context deadline exceeded\nE0312 20:55:14.362898 1 main.go:246] Exiting due to failure to ensure CRDs exist during startup: context deadline exceeded\n","startedAt":"2026-03-12T20:54:44Z","finishedAt":"2026-03-12T20:55:14Z","containerID":"cri-o://0bd6a0b7ed84e5c57f80585b12035a2addd846361d63e97d5c4b6e34bb41dd20"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a85dab5856916220df6f05ce9d6aa10cd4fa0234093b55355246690bba05ad1","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3a85dab5856916220df6f05ce9d6aa10cd4fa0234093b55355246690bba05ad1","containerID":"cri-o://a61af5ddc801fc82532787a8099d3f864174adef92d53c028151cb9ec9d021a1","started":true,"volumeMounts":[{"name":"kube-api-access-mfspc","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-66c7586884-69rp9.json0000640000000000000000000002060515154624242031546 0ustar0000000000000000{"metadata":{"name":"cluster-node-tuning-operator-66c7586884-69rp9","generateName":"cluster-node-tuning-operator-66c7586884-","namespace":"openshift-cluster-node-tuning-operator","uid":"981da73f-fc4b-4c1d-bcc0-bf8aeebab2c9","resourceVersion":"9205","creationTimestamp":"2026-03-12T20:48:17Z","labels":{"name":"cluster-node-tuning-operator","pod-template-hash":"66c7586884"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.12/23\"],\"mac_address\":\"0a:58:0a:80:00:0c\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.12/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.12\"\n ],\n \"mac\": \"0a:58:0a:80:00:0c\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-node-tuning-operator-66c7586884","uid":"e4fad665-3253-4155-ac55-df01b548c838","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"node-tuning-operator-tls","secret":{"secretName":"node-tuning-operator-tls","defaultMode":420}},{"name":"apiservice-cert","secret":{"secretName":"performance-addon-operator-webhook-cert","items":[{"key":"tls.crt","path":"apiserver.crt"},{"key":"tls.key","path":"apiserver.key"}],"defaultMode":420}},{"name":"trusted-ca","configMap":{"name":"trusted-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420,"optional":true}},{"name":"kube-api-access-2lltk","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-node-tuning-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3f34dc492c80a3dee4643cc2291044750ac51e6e919b973de8723fa8b70bde70","command":["cluster-node-tuning-operator"],"args":["-v=0"],"ports":[{"name":"metrics","containerPort":60000,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.34"},{"name":"WATCH_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"RESYNC_PERIOD","value":"600"},{"name":"CLUSTER_NODE_TUNED_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3f34dc492c80a3dee4643cc2291044750ac51e6e919b973de8723fa8b70bde70"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"node-tuning-operator-tls","mountPath":"/etc/secrets"},{"name":"trusted-ca","mountPath":"/var/run/configmaps/trusted-ca/"},{"name":"apiservice-cert","mountPath":"/apiserver.local.config/certificates"},{"name":"kube-api-access-2lltk","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]},"readOnlyRootFilesystem":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-node-tuning-operator","serviceAccount":"cluster-node-tuning-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c16,c0"},"runAsUser":499,"runAsNonRoot":true},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:50:16Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:34Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:55:30Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:55:30Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:49:34Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.12","podIPs":[{"ip":"10.128.0.12"}],"startTime":"2026-03-12T20:49:34Z","containerStatuses":[{"name":"cluster-node-tuning-operator","state":{"running":{"startedAt":"2026-03-12T20:55:29Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"hift.io\",\"controllerKind\":\"PerformanceProfile\",\"source\":\"kind source: *v1.Profile\"}\n{\"level\":\"info\",\"ts\":\"2026-03-12T20:50:15Z\",\"msg\":\"Starting Controller\",\"controller\":\"performanceprofile\",\"controllerGroup\":\"performance.openshift.io\",\"controllerKind\":\"PerformanceProfile\"}\nI0312 20:50:16.070685 1 controller.go:1443] started events processor/controller\nI0312 20:50:16.119793 1 server.go:104] starting metrics server\nI0312 20:50:16.149627 1 controller.go:653] created profile master-0 [openshift-control-plane]\n{\"level\":\"info\",\"ts\":\"2026-03-12T20:50:16Z\",\"msg\":\"Starting workers\",\"controller\":\"performanceprofile\",\"controllerGroup\":\"performance.openshift.io\",\"controllerKind\":\"PerformanceProfile\",\"worker count\":1}\nE0312 20:51:49.987251 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0312 20:52:49.990139 1 leaderelection.go:436] error retrieving resource lock openshift-cluster-node-tuning-operator/node-tuning-operator-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io node-tuning-operator-lock)\nE0312 20:54:23.995105 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0312 20:55:15.982855 1 leaderelection.go:436] error retrieving resource lock openshift-cluster-node-tuning-operator/node-tuning-operator-lock: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-cluster-node-tuning-operator/leases/node-tuning-operator-lock\": context deadline exceeded\nI0312 20:55:15.982920 1 leaderelection.go:297] failed to renew lease openshift-cluster-node-tuning-operator/node-tuning-operator-lock: timed out waiting for the condition\nF0312 20:55:28.871733 1 main.go:242] manager exited with non-zero code: leader election lost\n","startedAt":"2026-03-12T20:50:15Z","finishedAt":"2026-03-12T20:55:28Z","containerID":"cri-o://ab35500d408324bc8f259a25814698a0950deafc4c75bcf972576200d718f280"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3f34dc492c80a3dee4643cc2291044750ac51e6e919b973de8723fa8b70bde70","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3f34dc492c80a3dee4643cc2291044750ac51e6e919b973de8723fa8b70bde70","containerID":"cri-o://1152dcaad32a43ba9e378941f51d853a2e7fc508d86ad05335f3c348f68fdd30","started":true,"volumeMounts":[{"name":"node-tuning-operator-tls","mountPath":"/etc/secrets"},{"name":"trusted-ca","mountPath":"/var/run/configmaps/trusted-ca/"},{"name":"apiservice-cert","mountPath":"/apiserver.local.config/certificates"},{"name":"kube-api-access-2lltk","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-catalogd/catalogd-controller-manager-7f8b8b6f4c-zgjqw.json0000640000000000000000000002540615154624242026141 0ustar0000000000000000{"metadata":{"name":"catalogd-controller-manager-7f8b8b6f4c-zgjqw","generateName":"catalogd-controller-manager-7f8b8b6f4c-","namespace":"openshift-catalogd","uid":"cf33c432-db42-4c6d-8ee4-f089e5bf8203","resourceVersion":"9166","creationTimestamp":"2026-03-12T20:50:16Z","labels":{"control-plane":"catalogd-controller-manager","pod-template-hash":"7f8b8b6f4c"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.39/23\"],\"mac_address\":\"0a:58:0a:80:00:27\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.39/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.39\"\n ],\n \"mac\": \"0a:58:0a:80:00:27\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"manager","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"catalogd-controller-manager-7f8b8b6f4c","uid":"2c118180-8f30-4d5e-8e1f-05b85377bd07","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cache","emptyDir":{}},{"name":"catalogserver-certs","secret":{"secretName":"catalogserver-cert","items":[{"key":"tls.crt","path":"tls.crt"},{"key":"tls.key","path":"tls.key"}],"defaultMode":420,"optional":false}},{"name":"ca-certs","projected":{"sources":[{"configMap":{"name":"catalogd-trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"ca-bundle.crt"}],"optional":false}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"optional":false}}],"defaultMode":420}},{"name":"etc-containers","hostPath":{"path":"/etc/containers","type":"Directory"}},{"name":"etc-docker","hostPath":{"path":"/etc/docker","type":"Directory"}},{"name":"kube-api-access-x8hp5","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","args":["--secure-listen-address=0.0.0.0:7443","--http2-disable","--upstream=http://127.0.0.1:8080/","--logtostderr=true","--v=2"],"ports":[{"name":"https","containerPort":7443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"5m","memory":"64Mi"}},"volumeMounts":[{"name":"kube-api-access-x8hp5","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}},{"name":"manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","command":["./manager"],"args":["--leader-elect","--metrics-bind-address=127.0.0.1:8080","--external-address=catalogd-service.openshift-catalogd.svc","--tls-cert=/var/certs/tls.crt","--tls-key=/var/certs/tls.key","--v=2","--global-pull-secret=openshift-config/pull-secret"],"env":[{"name":"SSL_CERT_DIR","value":"/var/ca-certs"}],"resources":{"requests":{"cpu":"100m","memory":"200Mi"}},"volumeMounts":[{"name":"cache","mountPath":"/var/cache/"},{"name":"catalogserver-certs","mountPath":"/var/certs"},{"name":"ca-certs","readOnly":true,"mountPath":"/var/ca-certs"},{"name":"etc-containers","readOnly":true,"mountPath":"/etc/containers"},{"name":"etc-docker","readOnly":true,"mountPath":"/etc/docker"},{"name":"kube-api-access-x8hp5","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":15,"timeoutSeconds":1,"periodSeconds":20,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":5,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":10,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"catalogd-controller-manager","serviceAccount":"catalogd-controller-manager","nodeName":"master-0","securityContext":{"seLinuxOptions":{"type":"spc_t"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchExpressions":[{"key":"kubernetes.io/arch","operator":"In","values":["amd64","arm64","ppc64le","s390x"]},{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:50:18Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:50:16Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:55:15Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:55:15Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:50:16Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.39","podIPs":[{"ip":"10.128.0.39"}],"startTime":"2026-03-12T20:50:16Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-12T20:50:17Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501","containerID":"cri-o://43569dfc922430e6bd267a95f8021d687d4d62fae45fe429dd06793fd1419ff6","started":true,"volumeMounts":[{"name":"kube-api-access-x8hp5","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"manager","state":{"running":{"startedAt":"2026-03-12T20:54:44Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"mework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-community-operators\" namespace=\"\" name=\"openshift-community-operators\" reconcileID=\"98238e9b-832d-4cd0-b2cf-ded43d2dd0ac\"\nE0312 20:52:54.521290 1 controller.go:316] \"Reconciler error\" err=\"error updating status: Timeout: request did not complete within requested timeout - context deadline exceeded\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-community-operators\" namespace=\"\" name=\"openshift-community-operators\" reconcileID=\"98238e9b-832d-4cd0-b2cf-ded43d2dd0ac\"\nI0312 20:52:54.521320 1 clustercatalog_controller.go:86] \"reconcile starting\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"7196ca9b-de0f-40d9-b147-892999daec5b\"\nI0312 20:52:54.521347 1 clustercatalog_controller.go:208] \"unpack required: no cached catalog metadata found for this catalog\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"7196ca9b-de0f-40d9-b147-892999daec5b\"\nI0312 20:52:54.521396 1 main.go:250] \"using available authentication information for pulling image\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"7196ca9b-de0f-40d9-b147-892999daec5b\"\nI0312 20:52:56.757553 1 leaderelection.go:297] failed to renew lease openshift-catalogd/catalogd-operator-lock: timed out waiting for the condition\nE0312 20:52:56.758360 1 main.go:351] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\n","startedAt":"2026-03-12T20:50:17Z","finishedAt":"2026-03-12T20:52:56Z","containerID":"cri-o://5932e7f75755d53b1d311f0b9e66cf21d66d861e9615083a39ac924565528bfd"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c680fcc9fd6b66099ca4c0f512521b6f8e0bc29273ddb9405730bc54bacb6783","containerID":"cri-o://56254e13e7b801a5fa972ca401568f81e069fab8d80a9daa794e70d67c31681f","started":true,"volumeMounts":[{"name":"cache","mountPath":"/var/cache/"},{"name":"catalogserver-certs","mountPath":"/var/certs"},{"name":"ca-certs","mountPath":"/var/ca-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-containers","mountPath":"/etc/containers","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-docker","mountPath":"/etc/docker","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-x8hp5","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-version/cluster-version-operator-8c9c967c7-g4bkd.json0000640000000000000000000001341415154624242026565 0ustar0000000000000000{"metadata":{"name":"cluster-version-operator-8c9c967c7-g4bkd","generateName":"cluster-version-operator-8c9c967c7-","namespace":"openshift-cluster-version","uid":"83368183-0368-44b1-9387-eed32b211988","resourceVersion":"8220","creationTimestamp":"2026-03-12T20:50:31Z","labels":{"k8s-app":"cluster-version-operator","pod-template-hash":"8c9c967c7"},"annotations":{"openshift.io/required-scc":"hostaccess","openshift.io/scc":"hostaccess"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-version-operator-8c9c967c7","uid":"624ee6f2-9085-45f4-af04-ca774343cd2d","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"etc-ssl-certs","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"etc-cvo-updatepayloads","hostPath":{"path":"/etc/cvo/updatepayloads","type":""}},{"name":"serving-cert","secret":{"secretName":"cluster-version-operator-serving-cert","defaultMode":420}},{"name":"service-ca","configMap":{"name":"openshift-service-ca.crt","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-version-operator","image":"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","args":["start","--release-image=quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","--enable-auto-update=false","--listen=0.0.0.0:9099","--serving-cert-file=/etc/tls/serving-cert/tls.crt","--serving-key-file=/etc/tls/serving-cert/tls.key","--v=2","--always-enable-capabilities=Ingress"],"env":[{"name":"OPERATOR_IMAGE_VERSION","value":"0.0.1-snapshot"},{"name":"KUBERNETES_SERVICE_PORT","value":"6443"},{"name":"KUBERNETES_SERVICE_HOST","value":"api-int.sno.openstack.lab"},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}},{"name":"CLUSTER_PROFILE","value":"self-managed-high-availability"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-ssl-certs","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"etc-cvo-updatepayloads","readOnly":true,"mountPath":"/etc/cvo/updatepayloads"},{"name":"serving-cert","readOnly":true,"mountPath":"/etc/tls/serving-cert"},{"name":"service-ca","readOnly":true,"mountPath":"/etc/tls/service-ca"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000040000,"runAsNonRoot":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":130,"dnsPolicy":"Default","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"default","serviceAccount":"default","automountServiceAccountToken":false,"nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c6,c5"},"fsGroup":1000040000},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:50:33Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:50:31Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:50:33Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:50:33Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-12T20:50:31Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-12T20:50:31Z","containerStatuses":[{"name":"cluster-version-operator","state":{"running":{"startedAt":"2026-03-12T20:50:32Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","imageID":"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","containerID":"cri-o://60c092d90b91d6c8d0848adbbe0eb73f3519357eaad109095cf0374d92826012","started":true,"volumeMounts":[{"name":"etc-ssl-certs","mountPath":"/etc/ssl/certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-cvo-updatepayloads","mountPath":"/etc/cvo/updatepayloads","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"serving-cert","mountPath":"/etc/tls/serving-cert","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca","mountPath":"/etc/tls/service-ca","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/id0000640000000000000000000000004415154624242011027 0ustar0000000000000000b779bafb-079c-4aee-8839-7649241b5ad7config/version.json0000640000000000000000000000715115154624242013076 0ustar0000000000000000{"metadata":{"name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","resourceVersion":"9946","generation":2,"creationTimestamp":"2026-03-12T20:43:57Z"},"spec":{"clusterID":"b779bafb-079c-4aee-8839-7649241b5ad7","channel":"stable-4.18","signatureStores":null},"status":{"desired":{"version":"4.18.34","image":"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","url":"https://access.redhat.com/errata/RHSA-2026:2977","channels":["candidate-4.18","candidate-4.19","candidate-4.20","eus-4.18","fast-4.18","fast-4.19","stable-4.18"]},"history":[{"state":"Partial","startedTime":"2026-03-12T20:44:22Z","completionTime":null,"version":"4.18.34","image":"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b","verified":false}],"observedGeneration":2,"versionHash":"p13mOMOOYQo=","capabilities":{"enabledCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"],"knownCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"]},"conditions":[{"type":"RetrievedUpdates","status":"True","lastTransitionTime":"2026-03-12T20:44:22Z"},{"type":"Upgradeable","status":"False","lastTransitionTime":"2026-03-12T20:44:22Z","reason":"AdminAckRequired","message":"Kubernetes 1.32 and therefore OpenShift 4.19 remove several APIs which require admin consideration. Please see the knowledge article https://access.redhat.com/articles/7112216 for details and instructions."},{"type":"ImplicitlyEnabledCapabilities","status":"False","lastTransitionTime":"2026-03-12T20:44:22Z","reason":"AsExpected","message":"Capabilities match configured spec"},{"type":"ReleaseAccepted","status":"True","lastTransitionTime":"2026-03-12T20:44:22Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.34\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:14bd3c04daa885009785d48f4973e2890751a7ec116cc14d17627245cda54d7b\" architecture=\"amd64\""},{"type":"Available","status":"False","lastTransitionTime":"2026-03-12T20:44:22Z"},{"type":"Failing","status":"True","lastTransitionTime":"2026-03-12T20:56:51Z","reason":"MultipleErrors","message":"Multiple errors are preventing progress:\n* Cluster operators authentication, baremetal, cloud-controller-manager, cluster-autoscaler, etcd, image-registry, insights, kube-apiserver, kube-controller-manager, kube-scheduler, machine-api, machine-approver, machine-config, monitoring, openshift-apiserver, openshift-samples, operator-lifecycle-manager-packageserver, storage are not available\n* Could not update imagestream \"openshift/driver-toolkit\" (617 of 908): the server is down or not responding\n* Could not update oauthclient \"console\" (550 of 908): the server does not recognize this resource, check extension API servers\n* Could not update role \"openshift-console-operator/prometheus-k8s\" (825 of 908): resource may have been deleted\n* Could not update role \"openshift-console/prometheus-k8s\" (829 of 908): resource may have been deleted"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-12T20:44:22Z","reason":"MultipleErrors","message":"Unable to apply 4.18.34: an unknown error has occurred: MultipleErrors"}],"availableUpdates":null}}config/clusteroperator/storage.json0000640000000000000000000000131215154624242016303 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"storage","uid":"ef998683-c314-420e-b0e1-4614a8d7a27b","resourceVersion":"825","generation":1,"creationTimestamp":"2026-03-12T20:44:22Z","annotations":{"capability.openshift.io/name":"Storage","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/service-ca.json0000640000000000000000000000340315154624242016663 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"service-ca","uid":"65f7789d-ad95-4618-95ff-cdf42045744a","resourceVersion":"4925","generation":1,"creationTimestamp":"2026-03-12T20:44:22Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T20:49:51Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-12T20:49:56Z","reason":"AsExpected","message":"Progressing: All service-ca-operator deployments updated"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-12T20:49:53Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T20:49:53Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-12T20:49:50Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"servicecas","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-service-ca-operator"},{"group":"","resource":"namespaces","name":"openshift-service-ca"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-packageserver.json0000640000000000000000000000252415154624242024665 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-packageserver","uid":"5913ab69-1af5-4585-aeb7-dd9910083810","resourceVersion":"8961","generation":1,"creationTimestamp":"2026-03-12T20:44:23Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T20:50:43Z"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-12T20:50:43Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-12T20:50:43Z","message":"Working toward 0.0.1-snapshot"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T20:50:45Z","message":"Safe to upgrade"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"},{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-catalog.json0000640000000000000000000000255515154624242023461 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-catalog","uid":"3f1c43d6-c223-45ee-9064-e3025bd3266f","resourceVersion":"9594","generation":1,"creationTimestamp":"2026-03-12T20:44:23Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T20:50:44Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-12T20:56:07Z","message":"Deployed 4.18.0-202602140513.p2.gc2df9e7.assembly.stream.el9-c2df9e7"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-12T20:50:44Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T20:50:44Z"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"operator-lifecycle-manager","version":"4.18.0-202602140513.p2.gc2df9e7.assembly.stream.el9-c2df9e7"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager.json0000640000000000000000000000264115154624242022045 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager","uid":"8576f387-7268-4b57-a62b-63c1bc075928","resourceVersion":"8805","generation":1,"creationTimestamp":"2026-03-12T20:44:22Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-12T20:50:42Z","message":"Deployed 4.18.0-202602140513.p2.gc2df9e7.assembly.stream.el9-c2df9e7"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-12T20:50:42Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T20:50:42Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T20:50:42Z"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"operator-lifecycle-manager","version":"4.18.0-202602140513.p2.gc2df9e7.assembly.stream.el9-c2df9e7"}],"relatedObjects":[{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/openshift-samples.json0000640000000000000000000000173315154624242020307 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-samples","uid":"e9b9e4cd-b5ce-40c3-b01d-7afb2a578404","resourceVersion":"819","generation":1,"creationTimestamp":"2026-03-12T20:44:22Z","annotations":{"capability.openshift.io/name":"openshift-samples","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"samples.operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-samples-operator"},{"group":"template.openshift.io","resource":"templates","namespace":"openshift","name":""},{"group":"image.openshift.io","resource":"imagestreams","namespace":"openshift","name":""}],"extension":null}}config/clusteroperator/openshift-controller-manager.json0000640000000000000000000000377215154624242022443 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-controller-manager","uid":"d0f9f800-9331-4973-8fa0-7532609339c7","resourceVersion":"8083","generation":1,"creationTimestamp":"2026-03-12T20:44:22Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T20:49:50Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-12T20:49:55Z","reason":"_DesiredStateNotYetAchieved","message":"Progressing: deployment/controller-manager: observed generation is 4, desired generation is 5.\nProgressing: deployment/route-controller-manager: observed generation is 2, desired generation is 3."},{"type":"Available","status":"True","lastTransitionTime":"2026-03-12T20:50:31Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T20:49:55Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-12T20:49:50Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftcontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-controller-manager-operator"},{"group":"","resource":"namespaces","name":"openshift-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-route-controller-manager"}],"extension":null}}config/clusteroperator/openshift-apiserver.json0000640000000000000000000001216215154624242020641 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-apiserver","uid":"e6f2a027-cf9a-42f5-9672-785863e2b80a","resourceVersion":"8738","generation":1,"creationTimestamp":"2026-03-12T20:44:22Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T20:49:51Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-12T20:50:34Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-12T20:49:51Z","reason":"APIServices_Error","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/apps.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/authorization.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/build.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/image.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/project.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/quota.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/route.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/security.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/template.openshift.io/v1: 401"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T20:49:50Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-12T20:49:50Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"openshift-apiserver","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftapiservers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-apiserver"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"endpoints","namespace":"openshift-etcd","name":"host-etcd-2"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-apiserver","name":""},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.apps.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.authorization.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.build.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.image.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.project.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.quota.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.route.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.security.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.template.openshift.io"}],"extension":null}}config/clusteroperator/olm.json0000640000000000000000000001420415154624242015432 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"olm","uid":"21aa5731-efb5-4e31-b6f9-ec1897c88dd2","resourceVersion":"8102","generation":1,"creationTimestamp":"2026-03-12T20:44:22Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManagerV1","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T20:50:00Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-12T20:50:32Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-12T20:50:32Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T20:50:00Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-12T20:50:00Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-catalogd"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clustercatalogs.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-catalogd","name":"catalogd-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-catalogd","name":"catalogd-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-catalogd","name":"catalogd-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-catalogd","name":"catalogd-service"},{"group":"apps","resource":"deployments","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-certified-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-community-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-marketplace"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-operators"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":"catalogd-mutating-webhook-configuration"},{"group":"","resource":"namespaces","name":"openshift-operator-controller"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusterextensions.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-operator-controller","name":"operator-controller-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager-metrics-service"},{"group":"apps","resource":"deployments","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"operator.openshift.io","resource":"olms","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-olm-operator"}],"extension":null}}config/clusteroperator/node-tuning.json0000640000000000000000000000342115154624242017071 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"node-tuning","uid":"2540fe93-d284-4f93-97c3-3a19618f8193","resourceVersion":"9593","generation":1,"creationTimestamp":"2026-03-12T20:44:22Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-12T20:50:17Z","reason":"AsExpected","message":"Cluster has deployed 1/1 \"4.18.34\" operands"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-12T20:56:07Z","reason":"AsExpected","message":"Cluster version is \"4.18.34\""},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T20:50:16Z","reason":"AsExpected","message":"DaemonSet \"tuned\" available"}],"versions":[{"name":"ocp-tuned","version":"4.18.34"},{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-node-tuning-operator"},{"group":"tuned.openshift.io","resource":"profiles","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"tuned.openshift.io","resource":"tuneds","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"apps","resource":"daemonsets","namespace":"openshift-cluster-node-tuning-operator","name":"tuned"},{"group":"performance.openshift.io","resource":"performanceprofiles","name":""}],"extension":null}}config/clusteroperator/network.json0000640000000000000000000003614315154624242016342 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"network","uid":"d2fdc063-8357-4b53-a1d5-2409a8464479","resourceVersion":"8226","generation":1,"creationTimestamp":"2026-03-12T20:44:22Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","network.operator.openshift.io/last-seen-state":"{\"DaemonsetStates\":[],\"DeploymentStates\":[],\"StatefulsetStates\":[]}","network.operator.openshift.io/relatedClusterObjects":""},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}]},"spec":{},"status":{"conditions":[{"type":"ManagementStateDegraded","status":"False","lastTransitionTime":"2026-03-12T20:48:42Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T20:48:30Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T20:48:30Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-12T20:50:33Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-12T20:49:50Z"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"applied-cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"network-attachment-definitions.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ippools.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"overlappingrangeipreservations.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"nodeslicepools.whereabouts.cni.cncf.io"},{"group":"","resource":"namespaces","name":"openshift-multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-ancillary-tools"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-transient"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-group"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-cluster-readers"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"net-attach-def-project"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"default-cni-sysctl-allowlist"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"cni-copy-resources"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"whereabouts-config"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"multus-daemon-config"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus-additional-cni-plugins"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"metrics-daemon-sa"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"metrics-daemon-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"metrics-daemon-sa-rolebinding"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"network-metrics-daemon"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-network"},{"group":"","resource":"services","namespace":"openshift-multus","name":"network-metrics-service"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"","resource":"services","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ac"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-admission-controller-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-admission-controller-webhook"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"multus.openshift.io"},{"group":"apps","resource":"deployments","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-multus-admission-controller"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-multus","name":"prometheus-k8s-rules"},{"group":"","resource":"namespaces","name":"openshift-ovn-kubernetes"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressfirewalls.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressips.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressqoses.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminpolicybasedexternalroutes.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressservices.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"baselineadminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ipamclaims.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"userdefinednetworks.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusteruserdefinednetworks.k8s.ovn.org"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-nodes-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-kube-rbac-proxy"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-kube-rbac-proxy"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-config"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"ovn"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"signer"},{"group":"flowcontrol.apiserver.k8s.io","resource":"flowschemas","name":"openshift-ovn-kubernetes"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-cluster-reader"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-script-lib"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-editor"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-viewer"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"master-rules"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"networking-rules"},{"group":"","resource":"configmaps","namespace":"openshift-config-managed","name":"openshift-network-features"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-control-plane-metrics"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-node"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"","resource":"namespaces","name":"openshift-host-network"},{"group":"","resource":"resourcequotas","namespace":"openshift-host-network","name":"host-network-namespace-quotas"},{"group":"apps","resource":"deployments","namespace":"openshift-ovn-kubernetes","name":"ovnkube-control-plane"},{"group":"apps","resource":"daemonsets","namespace":"openshift-ovn-kubernetes","name":"ovnkube-node"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicies","name":"user-defined-networks-namespace-label"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicybindings","name":"user-defined-networks-namespace-label-binding"},{"group":"","resource":"namespaces","name":"openshift-network-diagnostics"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"kube-system","name":"network-diagnostics"},{"group":"apps","resource":"deployments","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config-managed","name":"openshift-network-public-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config-managed","name":"openshift-network-public-role-binding"},{"group":"","resource":"namespaces","name":"openshift-network-node-identity"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"system:openshift:scc:hostnetwork-v2"},{"group":"","resource":"configmaps","namespace":"openshift-network-node-identity","name":"ovnkube-identity-cm"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"network-node-identity.openshift.io"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-network-operator","name":"openshift-network-operator-ipsec-rules"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-iptables-alerter"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-iptables-alerter"},{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"iptables-alerter-script"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"","resource":"namespaces","name":"openshift-network-operator"},{"group":"operator.openshift.io","resource":"networks","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cloud-network-config-controller"}],"extension":null}}config/clusteroperator/monitoring.json0000640000000000000000000000333715154624242017035 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"monitoring","uid":"877b9609-9b78-4d0a-97c9-b1bfc687a20f","resourceVersion":"8005","generation":1,"creationTimestamp":"2026-03-12T20:44:22Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"Unknown","lastTransitionTime":"2026-03-12T20:50:32Z"},{"type":"Degraded","status":"Unknown","lastTransitionTime":"2026-03-12T20:50:32Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-12T20:50:32Z","reason":"RollOutInProgress","message":"Rolling out the stack."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T20:50:32Z"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-monitoring"},{"group":"","resource":"namespaces","name":"openshift-user-workload-monitoring"},{"group":"monitoring.coreos.com","resource":"servicemonitors","name":""},{"group":"monitoring.coreos.com","resource":"podmonitors","name":""},{"group":"monitoring.coreos.com","resource":"prometheusrules","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagers","name":""},{"group":"monitoring.coreos.com","resource":"prometheuses","name":""},{"group":"monitoring.coreos.com","resource":"thanosrulers","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagerconfigs","name":""}],"extension":null}}config/clusteroperator/marketplace.json0000640000000000000000000000313315154624242017132 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"marketplace","uid":"85a99960-aa00-441e-b13f-a002e8b87c9e","resourceVersion":"8139","generation":1,"creationTimestamp":"2026-03-12T20:44:22Z","annotations":{"capability.openshift.io/name":"marketplace","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-12T20:50:32Z","reason":"OperatorAvailable","message":"Successfully progressed to release version: 4.18.34"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-12T20:50:32Z","reason":"OperatorAvailable","message":"Available release version: 4.18.34"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T20:50:32Z","reason":"OperatorAvailable","message":"Marketplace is upgradeable"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T20:50:32Z","reason":"OperatorAvailable","message":"Available release version: 4.18.34"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-marketplace"},{"group":"operators.coreos.com","resource":"catalogsources","namespace":"openshift-marketplace","name":""}],"extension":null}}config/clusteroperator/machine-config.json0000640000000000000000000000230015154624242017504 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-config","uid":"60fcced5-8b4d-46c6-b569-ca6ac7fc86ed","resourceVersion":"822","generation":1,"creationTimestamp":"2026-03-12T20:44:22Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-config-operator"},{"group":"machineconfiguration.openshift.io","resource":"machineconfigpools","name":""},{"group":"machineconfiguration.openshift.io","resource":"controllerconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"machineconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"kubeletconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"containerruntimeconfigs","name":""},{"group":"","resource":"nodes","name":""}],"extension":null}}config/clusteroperator/machine-approver.json0000640000000000000000000000253215154624242020104 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-approver","uid":"e1b38cab-a503-4d9e-8c35-8c45b8a4de64","resourceVersion":"9808","generation":1,"creationTimestamp":"2026-03-12T20:44:22Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-12T20:56:32Z","reason":"AsExpected","message":"Cluster Machine Approver is available at 4.18.34"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T20:56:32Z","reason":"AsExpected"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-12T20:56:32Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T20:56:32Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-machine-approver"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""}],"extension":null}}config/clusteroperator/machine-api.json0000640000000000000000000000371415154624242017022 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-api","uid":"a2d6c91c-be1c-49f0-b74b-bd1d7f79b195","resourceVersion":"10412","generation":1,"creationTimestamp":"2026-03-12T20:44:22Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-12T20:57:05Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T20:57:05Z","reason":"AsExpected"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-12T20:57:05Z","reason":"AsExpected","message":"Cluster Machine API Operator is in NoOp mode"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T20:57:05Z"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"machines","namespace":"openshift-machine-api","name":""},{"group":"machine.openshift.io","resource":"machinesets","namespace":"openshift-machine-api","name":""},{"group":"machine.openshift.io","resource":"machinehealthchecks","namespace":"openshift-machine-api","name":""},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-machine-api","name":""},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-operator"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-controllers"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/kube-storage-version-migrator.json0000640000000000000000000000325315154624242022542 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-storage-version-migrator","uid":"a14ab4ad-8deb-486d-81cc-9d52e0463770","resourceVersion":"4846","generation":1,"creationTimestamp":"2026-03-12T20:44:22Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T20:49:50Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-12T20:49:56Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-12T20:49:56Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T20:49:50Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-12T20:49:50Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubestorageversionmigrators","name":"cluster"},{"group":"migration.k8s.io","resource":"storageversionmigrations","name":""},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator"},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator-operator"}],"extension":null}}config/clusteroperator/kube-scheduler.json0000640000000000000000000000415615154624242017552 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-scheduler","uid":"0f2acf81-aea1-4c0a-b478-0c33c7bfb164","resourceVersion":"8777","generation":1,"creationTimestamp":"2026-03-12T20:44:22Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T20:49:51Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-12T20:50:07Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 4"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-12T20:49:52Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 4"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T20:49:51Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-12T20:49:51Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeschedulers","name":"cluster"},{"group":"config.openshift.io","resource":"schedulers","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler-operator"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""}],"extension":null}}config/clusteroperator/kube-controller-manager.json0000640000000000000000000000427715154624242021373 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-controller-manager","uid":"ca8358de-fdaa-4d97-921f-4e40c5c9b929","resourceVersion":"8948","generation":1,"creationTimestamp":"2026-03-12T20:44:22Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T20:49:51Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-12T20:50:26Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-12T20:49:53Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T20:49:51Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-12T20:49:51Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubecontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager-operator"},{"group":"","resource":"namespaces","name":"kube-system"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""},{"group":"","resource":"nodes","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/kube-apiserver.json0000640000000000000000000000517715154624242017600 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-apiserver","uid":"f9792e5d-6898-4443-8d9d-f240d5a382d4","resourceVersion":"6797","generation":1,"creationTimestamp":"2026-03-12T20:44:22Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T20:49:39Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-12T20:50:25Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-12T20:49:39Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T20:49:39Z","reason":"AsExpected","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced."},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-03-12T20:49:39Z","reason":"AsExpected","message":"All is well"}],"versions":[{"name":"raw-internal","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeapiservers","name":"cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":""},{"group":"security.openshift.io","resource":"securitycontextconstraints","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":""},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":""},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""},{"group":"apiserver.openshift.io","resource":"apirequestcounts","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/insights.json0000640000000000000000000000534115154624242016475 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"insights","uid":"38504639-31e5-425f-88b6-699e163ce52b","resourceVersion":"10469","generation":1,"creationTimestamp":"2026-03-12T20:44:22Z","annotations":{"capability.openshift.io/name":"Insights","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-12T20:57:05Z","reason":"AsExpected","message":"Insights works as expected"},{"type":"ClusterTransferAvailable","status":"Unknown","lastTransitionTime":"2026-03-12T20:57:05Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T20:57:05Z","reason":"AsExpected","message":"Insights works as expected"},{"type":"Disabled","status":"False","lastTransitionTime":"2026-03-12T20:57:05Z","reason":"AsExpected"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-12T20:57:05Z","reason":"AsExpected","message":"Monitoring the cluster"},{"type":"RemoteConfigurationAvailable","status":"True","lastTransitionTime":"2026-03-12T20:57:05Z","reason":"AsExpected"},{"type":"RemoteConfigurationValid","status":"True","lastTransitionTime":"2026-03-12T20:57:05Z","reason":"AsExpected"},{"type":"SCAAvailable","status":"Unknown","lastTransitionTime":"2026-03-12T20:57:05Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T20:57:05Z","reason":"InsightsUpgradeable","message":"Insights operator can be upgraded"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-insights"},{"group":"apps","resource":"deployments","namespace":"openshift-insights","name":"insights-operator"},{"group":"","resource":"secrets","namespace":"openshift-config","name":"pull-secret"},{"group":"","resource":"secrets","namespace":"openshift-config","name":"support"},{"group":"","resource":"serviceaccounts","namespace":"openshift-insights","name":"gather"},{"group":"","resource":"serviceaccounts","namespace":"openshift-insights","name":"operator"},{"group":"","resource":"services","namespace":"openshift-insights","name":"metrics"},{"group":"","resource":"configmaps","namespace":"openshift-insights","name":"service-ca-bundle"},{"group":"operator.openshift.io","resource":"insightsoperators","name":"cluster"}],"extension":{"lastReportTime":null}}}config/clusteroperator/ingress.json0000640000000000000000000000456715154624242016330 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"ingress","uid":"f3d5e3e3-b22a-4ed5-aa70-d36db148e6b9","resourceVersion":"6504","generation":1,"creationTimestamp":"2026-03-12T20:44:22Z","annotations":{"capability.openshift.io/name":"Ingress","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-12T20:50:17Z","reason":"IngressAvailable","message":"The \"default\" ingress controller reports Available=True."},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-12T20:50:16Z","reason":"Reconciling","message":"ingresscontroller \"default\" is progressing: IngressControllerProgressing: One or more status conditions indicate progressing: DeploymentRollingOut=True (DeploymentRollingOut: Waiting for router deployment rollout to finish: 0 of 1 updated replica(s) are available...\n)."},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T20:50:17Z","reason":"IngressNotDegraded","message":"The \"default\" ingress controller reports Degraded=False."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T20:50:16Z","reason":"Upgradeable"},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-03-12T20:50:16Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"ingress-controller","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9b2e765b795c30c910c331c85226e5db0d56463b6c81d79ded739cba76e2b032"},{"name":"canary-server","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b47d2b146e833bc1612a652136f43afcf1ba30f32cbd0a2f06ca9fc80d969f0"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-ingress-operator"},{"group":"operator.openshift.io","resource":"ingresscontrollers","namespace":"openshift-ingress-operator","name":""},{"group":"ingress.operator.openshift.io","resource":"dnsrecords","namespace":"openshift-ingress-operator","name":""},{"group":"","resource":"namespaces","name":"openshift-ingress"}],"extension":null}}config/clusteroperator/image-registry.json0000640000000000000000000000132715154624242017575 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"image-registry","uid":"06b56e9a-6dd2-4b66-b376-c220e9b6bd5a","resourceVersion":"821","generation":1,"creationTimestamp":"2026-03-12T20:44:22Z","annotations":{"capability.openshift.io/name":"ImageRegistry","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/etcd.json0000640000000000000000000000457015154624242015567 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"etcd","uid":"7f1f1799-3045-41d5-8689-ad4187482bd9","resourceVersion":"6072","generation":1,"creationTimestamp":"2026-03-12T20:44:22Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T20:49:51Z","reason":"AsExpected","message":"EtcdMembersControllerDegraded: giving up getting a cached client after 3 tries\nClusterMemberRemovalControllerDegraded: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries\nClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\nNodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-12T20:50:13Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-12T20:49:52Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T20:49:51Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-12T20:49:51Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"etcds","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"namespaces","name":"openshift-etcd"}],"extension":null}}config/clusteroperator/dns.json0000640000000000000000000000365515154624242015437 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"dns","uid":"69f6e901-c1a0-4fab-89d3-b4a2655e3b78","resourceVersion":"8925","generation":1,"creationTimestamp":"2026-03-12T20:44:22Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-12T20:50:44Z","reason":"AsExpected","message":"DNS \"default\" is available."},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-12T20:50:17Z","reason":"AsExpected","message":"Desired and current number of DNSes are equal"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T20:50:44Z","reason":"DNSNotDegraded"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T20:50:16Z","reason":"DNSUpgradeable","message":"DNS default is upgradeable: DNS Operator can be upgraded"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"coredns","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c54c3f7cffe057ae0bdf26163d5e46744685083ae16fc97112e32beacd2d8955"},{"name":"openshift-cli","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1575be013a898f153cbf012aeaf28ce720022f934dc05bdffbe479e30999d460"},{"name":"kube-rbac-proxy","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8677f7a973553c25d282bc249fc8bc0f5aa42fb144ea0956d1f04c5a6cd80501"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-dns-operator"},{"group":"operator.openshift.io","resource":"dnses","name":"default"},{"group":"","resource":"namespaces","name":"openshift-dns"}],"extension":null}}config/clusteroperator/csi-snapshot-controller.json0000640000000000000000000000321715154624242021441 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"csi-snapshot-controller","uid":"cb9ce7d3-e9f7-4d70-8c51-8d89c06dd0d5","resourceVersion":"4874","generation":1,"creationTimestamp":"2026-03-12T20:44:22Z","annotations":{"capability.openshift.io/name":"CSISnapshot","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T20:49:51Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-12T20:49:56Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-12T20:49:56Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T20:49:51Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-12T20:49:51Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"csi-snapshot-controller","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"operator.openshift.io","resource":"csisnapshotcontrollers","name":"cluster"}],"extension":null}}config/clusteroperator/control-plane-machine-set.json0000640000000000000000000000263515154624242021620 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"control-plane-machine-set","uid":"4082cb03-245d-457f-a255-686493250b98","resourceVersion":"9663","generation":1,"creationTimestamp":"2026-03-12T20:44:22Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-12T20:56:17Z","reason":"AsExpected","message":"cluster operator is available"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-12T20:56:17Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T20:56:17Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T20:56:17Z","reason":"AsExpected","message":"cluster operator is upgradable"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"controlplanemachinesets","name":""},{"group":"machine.openshift.io","resource":"machines","name":""}],"extension":null}}config/clusteroperator/console.json0000640000000000000000000000131215154624242016301 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"console","uid":"0c0c3887-a73f-421e-b789-16329c36a378","resourceVersion":"817","generation":1,"creationTimestamp":"2026-03-12T20:44:22Z","annotations":{"capability.openshift.io/name":"Console","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/config-operator.json0000640000000000000000000000311615154624242017741 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"config-operator","uid":"8fce0121-dbb1-47a1-a386-fd226bba0cbe","resourceVersion":"4968","generation":1,"creationTimestamp":"2026-03-12T20:44:22Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T20:49:56Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-12T20:49:56Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-12T20:49:56Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T20:49:56Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-12T20:49:56Z","reason":"NoData"}],"versions":[{"name":"feature-gates","version":"4.18.34"},{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-operator"}],"extension":null}}config/clusteroperator/cluster-autoscaler.json0000640000000000000000000000266015154624242020467 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster-autoscaler","uid":"2142fc90-2038-4d8d-8198-64dda0d55081","resourceVersion":"10416","generation":1,"creationTimestamp":"2026-03-12T20:44:22Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-12T20:57:05Z","reason":"AsExpected","message":"at version 4.18.34"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-12T20:57:05Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T20:57:05Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T20:57:05Z"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"autoscaling.openshift.io","resource":"machineautoscalers","namespace":"openshift-machine-api","name":""},{"group":"autoscaling.openshift.io","resource":"clusterautoscalers","namespace":"openshift-machine-api","name":""},{"group":"","resource":"namespaces","name":"openshift-machine-api"}],"extension":null}}config/clusteroperator/cloud-credential.json0000640000000000000000000001520715154624242020065 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-credential","uid":"d5d5b067-3a7f-4932-be38-1140e829f947","resourceVersion":"1967","generation":1,"creationTimestamp":"2026-03-12T20:44:22Z","annotations":{"capability.openshift.io/name":"CloudCredential","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-12T20:44:36Z","reason":"AsExpected","message":"All is well"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T20:44:36Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-12T20:44:36Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T20:44:36Z"}],"versions":[{"name":"operator","version":""}],"relatedObjects":[{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"aws-ebs-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"azure-disk-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"azure-file-csi-driver-operator"},{"group":"operator.openshift.io","resource":"cloudcredentials","name":"cluster"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ibm-powervs-block-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ibm-vpc-block-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"manila-csi-driver-operator"},{"group":"","resource":"namespaces","name":"openshift-cloud-credential-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-aws"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cluster-csi-drivers"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-gcp-pd-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-gcs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-ibmcos"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-ibmcos-powervs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-aws"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-ibmcloud"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-nutanix"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-powervs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-vsphere"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-network"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vmware-vsphere-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vsphere-problem-detector"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ovirt-csi-driver-operator"}],"extension":null}}config/clusteroperator/cloud-controller-manager.json0000640000000000000000000000173715154624242021551 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-controller-manager","uid":"c0ceec6e-c546-4095-bf36-e6bd937cb3a2","resourceVersion":"752","generation":1,"creationTimestamp":"2026-03-12T20:44:22Z","annotations":{"capability.openshift.io/name":"CloudControllerManager","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"config.openshift.io","resource":"clusteroperators","name":"cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager-operator"}],"extension":null}}config/clusteroperator/baremetal.json0000640000000000000000000000427115154624242016602 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"baremetal","uid":"291dc532-f7a9-4efa-a897-0f77dc0f85d9","resourceVersion":"10381","generation":1,"creationTimestamp":"2026-03-12T20:44:22Z","annotations":{"capability.openshift.io/name":"baremetal","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-12T20:57:05Z","reason":"WaitingForProvisioningCR"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T20:57:05Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-12T20:57:05Z","reason":"WaitingForProvisioningCR","message":"Waiting for Provisioning CR on BareMetal Platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T20:57:05Z"},{"type":"Disabled","status":"False","lastTransitionTime":"2026-03-12T20:57:05Z"}],"versions":[{"name":"operator","version":"4.18.34"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"provisioning","name":""},{"group":"metal3.io","resource":"hostfirmwaresettings","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"firmwareschemas","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"preprovisioningimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"bmceventsubscriptions","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostfirmwarecomponents","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"dataimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostupdatepolicies","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/authentication.json0000640000000000000000000000773615154624242017676 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"authentication","uid":"25e2977f-0b1c-4513-a245-db37ba51ff1c","resourceVersion":"8297","generation":1,"creationTimestamp":"2026-03-12T20:44:22Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T20:49:51Z","reason":"AsExpected","message":"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.227.118:443/healthz\": dial tcp 172.30.227.118:443: connect: connection refused\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-12T20:50:34Z","reason":"AsExpected","message":"AuthenticatorCertKeyProgressing: All is well"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-12T20:49:52Z","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.37:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.37:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.227.118:443/healthz\": dial tcp 172.30.227.118:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods)."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-12T20:49:51Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-12T20:49:51Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.34"},{"name":"oauth-apiserver","version":"4.18.34"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"infrastructures","name":"cluster"},{"group":"config.openshift.io","resource":"oauths","name":"cluster"},{"group":"route.openshift.io","resource":"routes","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"services","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-authentication"},{"group":"","resource":"namespaces","name":"openshift-authentication-operator"},{"group":"","resource":"namespaces","name":"openshift-ingress"},{"group":"","resource":"namespaces","name":"openshift-oauth-apiserver"}],"extension":null}}aggregated/unused_machine_configs_count.json0000640000000000000000000000004115154624242020134 0ustar0000000000000000{"unused_machineconfigs_count":9}config/configmaps/kube-system/cluster-config-v1/install-config0000640000000000000000000000155515154624242023222 0ustar0000000000000000apiVersion: v1 baseDomain: xxxxxxxxxxxxx compute: - hyperthreading: Enabled name: worker platform: {} replicas: 0 controlPlane: hyperthreading: Enabled name: master platform: {} replicas: 1 metadata: creationTimestamp: null name: sno networking: clusterNetwork: - cidr: 10.128.0.0/16 hostPrefix: 23 machineNetwork: - cidr: 192.168.32.0/24 networkType: OVNKubernetes serviceNetwork: - 172.30.0.0/16 platform: none: {} publish: External pullSecret: "" sshKey: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt0000640000000000000000000000010115154624242025432 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/openshift-install-manifests/version0000640000000000000000000000000715154624242025141 0ustar0000000000000000v4.18.0config/configmaps/openshift-config/openshift-install-manifests/invoker0000640000000000000000000000001715154624242025132 0ustar0000000000000000agent-installerconfig/configmaps/openshift-config/kube-root-ca.crt/ca.crt0000640000000000000000000000060615154624242022260 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/initial-kube-apiserver-server-ca/ca-bundle.crt0000640000000000000000000000050515154624242026706 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt0000640000000000000000000000010115154624242023411 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt0000640000000000000000000000010115154624242023205 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt0000640000000000000000000000010115154624242025475 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- aggregated/ingress_controllers_certs.json0000640000000000000000000000045715154624242017540 0ustar0000000000000000[{"name":"router-ca","namespace":"openshift-ingress-operator","not_before":"2026-03-12T20:50:15Z","not_after":"2028-03-11T20:50:16Z","controllers":[]},{"name":"router-certs-default","namespace":"openshift-ingress","not_before":"2026-03-12T20:50:17Z","not_after":"2028-03-11T20:50:18Z","controllers":[]}]config/node/master-0.json0000640000000000000000000000551415154624242013767 0ustar0000000000000000{"metadata":{"name":"master-0","uid":"2dfae8b8-e7f5-4d57-9eba-36a0bb1a6e83","resourceVersion":"9936","creationTimestamp":"2026-03-12T20:48:16Z","labels":{"beta.kubernetes.io/arch":"amd64","beta.kubernetes.io/os":"linux","kubernetes.io/arch":"amd64","kubernetes.io/hostname":"master-0","kubernetes.io/os":"linux","node-role.kubernetes.io/control-plane":"","node-role.kubernetes.io/master":"","node.openshift.io/os_id":"rhcos"},"annotations":{"k8s.ovn.org/host-cidrs":"","k8s.ovn.org/l3-gateway-config":"","k8s.ovn.org/node-chassis-id":"","k8s.ovn.org/node-encap-ips":"","k8s.ovn.org/node-id":"","k8s.ovn.org/node-masquerade-subnet":"","k8s.ovn.org/node-primary-ifaddr":"","k8s.ovn.org/node-subnets":"","k8s.ovn.org/node-transit-switch-port-ifaddr":"","k8s.ovn.org/remote-zone-migrated":"","k8s.ovn.org/zone-name":"","volumes.kubernetes.io/controller-managed-attach-detach":"true"}},"spec":{"taints":[{"key":"node-role.kubernetes.io/master","effect":"NoSchedule"}]},"status":{"capacity":{"cpu":"12","ephemeral-storage":"209124332Ki","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"32865356Ki","pods":"250"},"allocatable":{"cpu":"11500m","ephemeral-storage":"191655242229","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"31714380Ki","pods":"250"},"conditions":[{"type":"MemoryPressure","status":"False","lastHeartbeatTime":"2026-03-12T20:56:46Z","lastTransitionTime":"2026-03-12T20:48:16Z","reason":"KubeletHasSufficientMemory","message":"kubelet has sufficient memory available"},{"type":"DiskPressure","status":"False","lastHeartbeatTime":"2026-03-12T20:56:46Z","lastTransitionTime":"2026-03-12T20:48:16Z","reason":"KubeletHasNoDiskPressure","message":"kubelet has no disk pressure"},{"type":"PIDPressure","status":"False","lastHeartbeatTime":"2026-03-12T20:56:46Z","lastTransitionTime":"2026-03-12T20:48:16Z","reason":"KubeletHasSufficientPID","message":"kubelet has sufficient PID available"},{"type":"Ready","status":"True","lastHeartbeatTime":"2026-03-12T20:56:46Z","lastTransitionTime":"2026-03-12T20:49:34Z","reason":"KubeletReady","message":"kubelet is posting ready status"}],"addresses":[{"type":"InternalIP","address":"192.168.32.10"},{"type":"Hostname","address":"master-0"}],"daemonEndpoints":{"kubeletEndpoint":{"Port":10250}},"nodeInfo":{"machineID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","systemUUID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","bootID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","kernelVersion":"5.14.0-427.111.1.el9_4.x86_64","osImage":"Red Hat Enterprise Linux CoreOS 418.94.202602172219-0","containerRuntimeVersion":"cri-o://1.31.13-8.rhaos4.18.gitd78977c.el9","kubeletVersion":"v1.31.14","kubeProxyVersion":"v1.31.14","operatingSystem":"linux","architecture":"amd64"},"runtimeHandlers":[{"name":"crun","features":{"recursiveReadOnlyMounts":true}},{"name":"","features":{"recursiveReadOnlyMounts":true}},{"name":"runc","features":{"recursiveReadOnlyMounts":true}}]}}config/ingress.json0000640000000000000000000000043615154624242013062 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"88726737-82fe-4c36-bef4-b0a23e1fecb2","resourceVersion":"560","generation":1,"creationTimestamp":"2026-03-12T20:43:52Z"},"spec":{"domain":"apps.sno.openstack.lab","loadBalancer":{"platform":{"type":""}}},"status":{"defaultPlacement":"ControlPlane"}}config/crd/volumesnapshotcontents.snapshot.storage.k8s.io.json0000640000000000000000000005444315154624242023447 0ustar0000000000000000{"metadata":{"name":"volumesnapshotcontents.snapshot.storage.k8s.io","uid":"d66828ef-ac8c-42fa-91c3-672d5b709aae","resourceVersion":"4274","generation":1,"creationTimestamp":"2026-03-12T20:49:51Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/955","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"scope":"Cluster","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the\nunderlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system.\nRequired.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on\nthe underlying storage system should be deleted when its bound VolumeSnapshot is deleted.\nSupported values are \"Retain\" and \"Delete\".\n\"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept.\n\"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted.\nFor dynamically provisioned snapshots, this field will automatically be filled in by the\nCSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding\nVolumeSnapshotClass.\nFor pre-existing snapshots, users MUST specify this field when creating the\n VolumeSnapshotContent object.\nRequired.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on\nthe underlying storage system.\nThis MUST be the same as the name returned by the CSI GetPluginName() call for\nthat driver.\nRequired.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned\nor already exists, and just requires a Kubernetes object representation.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on\nthe underlying storage system for which a Kubernetes object representation\nwas (or should be) created.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"snapshotHandle is immutable"}]},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot\nshould be dynamically taken from.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeHandle is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.volumeHandle) || has(self.volumeHandle)","message":"volumeHandle is required once set"},{"rule":"!has(oldSelf.snapshotHandle) || has(self.snapshotHandle)","message":"snapshotHandle is required once set"},{"rule":"(has(self.volumeHandle) \u0026\u0026 !has(self.snapshotHandle)) || (!has(self.volumeHandle) \u0026\u0026 has(self.snapshotHandle))","message":"exactly one of volumeHandle and snapshotHandle must be set"}]},"sourceVolumeMode":{"description":"SourceVolumeMode is the mode of the volume whose snapshot is taken.\nCan be either “Filesystem” or “Block”.\nIf not specified, it indicates the source volume's mode is unknown.\nThis field is immutable.\nThis field is an alpha field.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"sourceVolumeMode is immutable"}]},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be)\ncreated.\nNote that after provisioning, the VolumeSnapshotClass may be deleted or\nrecreated with different set of values, and as such, should not be referenced\npost-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this\nVolumeSnapshotContent object is bound.\nVolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to\nthis VolumeSnapshotContent's name for the bidirectional binding to be valid.\nFor a pre-existing VolumeSnapshotContent object, name and namespace of the\nVolumeSnapshot object MUST be provided for binding to happen.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string\nshould contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2].\nFor example, if the object reference is to a container within a pod, this would take on a value like:\n\"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered\nthe event) or if no container name is specified \"spec.containers[2]\" (container with\nindex 2 in this pod). This syntax is chosen only to have some well-defined way of\nreferencing a part of an object.\nTODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}},"x-kubernetes-map-type":"atomic","x-kubernetes-validations":[{"rule":"has(self.name) \u0026\u0026 has(self.__namespace__)","message":"both spec.volumeSnapshotRef.name and spec.volumeSnapshotRef.namespace must be set"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.sourceVolumeMode) || has(self.sourceVolumeMode)","message":"sourceVolumeMode is required once set"}]},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it indicates the creation time is unknown.\nThe format of this field is a Unix nanoseconds time encoded as an int64.\nOn Unix, the command `date +%s%N` returns the current time in nanoseconds\nsince 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nUpon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system.\nIf not specified, it indicates that dynamic snapshot creation has either failed\nor it is still in progress.","type":"string"},"volumeGroupSnapshotHandle":{"description":"VolumeGroupSnapshotHandle is the CSI \"group_snapshot_id\" of a group snapshot\non the underlying storage system.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshotContent is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshotContent","schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the underlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system. Required.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted. Supported values are \"Retain\" and \"Delete\". \"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept. \"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted. For dynamically provisioned snapshots, this field will automatically be filled in by the CSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding VolumeSnapshotClass. For pre-existing snapshots, users MUST specify this field when creating the VolumeSnapshotContent object. Required.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on the underlying storage system. This MUST be the same as the name returned by the CSI GetPluginName() call for that driver. Required.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned or already exists, and just requires a Kubernetes object representation. This field is immutable after creation. Required.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on the underlying storage system for which a Kubernetes object representation was (or should be) created. This field is immutable.","type":"string"},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot should be dynamically taken from. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be) created. Note that after provisioning, the VolumeSnapshotClass may be deleted or recreated with different set of values, and as such, should not be referenced post-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this VolumeSnapshotContent object is bound. VolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to this VolumeSnapshotContent's name for the bidirectional binding to be valid. For a pre-existing VolumeSnapshotContent object, name and namespace of the VolumeSnapshot object MUST be provided for binding to happen. This field is immutable after creation. Required.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string should contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2]. For example, if the object reference is to a container within a pod, this would take on a value like: \"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered the event) or if no container name is specified \"spec.containers[2]\" (container with index 2 in this pod). This syntax is chosen only to have some well-defined way of referencing a part of an object. TODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}}}}},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it indicates the creation time is unknown. The format of this field is a Unix nanoseconds time encoded as an int64. On Unix, the command `date +%s%N` returns the current time in nanoseconds since 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any. Upon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system. If not specified, it indicates that dynamic snapshot creation has either failed or it is still in progress.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-03-12T20:49:51Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/955"},{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-03-12T20:49:51Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-03-12T20:49:51Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"}],"acceptedNames":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"storedVersions":["v1"]}}config/crd/volumesnapshots.snapshot.storage.k8s.io.json0000640000000000000000000004563015154624242022052 0ustar0000000000000000{"metadata":{"name":"volumesnapshots.snapshot.storage.k8s.io","uid":"abd690a9-2506-4505-a53b-7f3a14a4ab07","resourceVersion":"4241","generation":1,"creationTimestamp":"2026-03-12T20:49:51Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/814","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"scope":"Namespaced","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time\nsnapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user.\nMore info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots\nRequired.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim\nobject representing the volume from which a snapshot should be created.\nThis PVC is assumed to be in the same namespace as the VolumeSnapshot\nobject.\nThis field should be set if the snapshot does not exists, and needs to be\ncreated.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"persistentVolumeClaimName is immutable"}]},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent\nobject representing an existing volume snapshot.\nThis field should be set if the snapshot already exists and only needs a representation in Kubernetes.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeSnapshotContentName is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.persistentVolumeClaimName) || has(self.persistentVolumeClaimName)","message":"persistentVolumeClaimName is required once set"},{"rule":"!has(oldSelf.volumeSnapshotContentName) || has(self.volumeSnapshotContentName)","message":"volumeSnapshotContentName is required once set"},{"rule":"(has(self.volumeSnapshotContentName) \u0026\u0026 !has(self.persistentVolumeClaimName)) || (!has(self.volumeSnapshotContentName) \u0026\u0026 has(self.persistentVolumeClaimName))","message":"exactly one of volumeSnapshotContentName and persistentVolumeClaimName must be set"}]},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass\nrequested by the VolumeSnapshot.\nVolumeSnapshotClassName may be left nil to indicate that the default\nSnapshotClass should be used.\nA given cluster may have multiple default Volume SnapshotClasses: one\ndefault per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass,\nVolumeSnapshotSource will be checked to figure out what the associated\nCSI Driver is, and the default VolumeSnapshotClass associated with that\nCSI Driver will be used. If more than one VolumeSnapshotClass exist for\na given CSI Driver and more than one have been marked as default,\nCreateSnapshot will fail and generate an event.\nEmpty string is not allowed for this field.","type":"string","x-kubernetes-validations":[{"rule":"size(self) \u003e 0","message":"volumeSnapshotClassName must not be the empty string when set"}]}}},"status":{"description":"status represents the current information of a snapshot.\nConsumers must verify binding between VolumeSnapshot and\nVolumeSnapshotContent objects is successful (by validating that both\nVolumeSnapshot and VolumeSnapshotContent point at each other) before\nusing this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent\nobject to which this VolumeSnapshot object intends to bind to.\nIf not specified, it indicates that the VolumeSnapshot object has not been\nsuccessfully bound to a VolumeSnapshotContent object yet.\nNOTE: To avoid possible security issues, consumers must verify binding between\nVolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that\nboth VolumeSnapshot and VolumeSnapshotContent point at each other) before using\nthis object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nThis field could be helpful to upper level controllers(i.e., application controller)\nto decide whether they should continue on waiting for the snapshot to be created\nbased on the type of error reported.\nThe snapshot controller will keep retrying when an error occurs during the\nsnapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume\nfrom this snapshot.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"volumeGroupSnapshotName":{"description":"VolumeGroupSnapshotName is the name of the VolumeGroupSnapshot of which this\nVolumeSnapshot is a part of.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshot is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshot","schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time snapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user. More info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots Required.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from. This field is immutable after creation. Required.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim object representing the volume from which a snapshot should be created. This PVC is assumed to be in the same namespace as the VolumeSnapshot object. This field should be set if the snapshot does not exists, and needs to be created. This field is immutable.","type":"string"},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent object representing an existing volume snapshot. This field should be set if the snapshot already exists and only needs a representation in Kubernetes. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass requested by the VolumeSnapshot. VolumeSnapshotClassName may be left nil to indicate that the default SnapshotClass should be used. A given cluster may have multiple default Volume SnapshotClasses: one default per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass, VolumeSnapshotSource will be checked to figure out what the associated CSI Driver is, and the default VolumeSnapshotClass associated with that CSI Driver will be used. If more than one VolumeSnapshotClass exist for a given CSI Driver and more than one have been marked as default, CreateSnapshot will fail and generate an event. Empty string is not allowed for this field.","type":"string"}}},"status":{"description":"status represents the current information of a snapshot. Consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent object to which this VolumeSnapshot object intends to bind to. If not specified, it indicates that the VolumeSnapshot object has not been successfully bound to a VolumeSnapshotContent object yet. NOTE: To avoid possible security issues, consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any. This field could be helpful to upper level controllers(i.e., application controller) to decide whether they should continue on waiting for the snapshot to be created based on the type of error reported. The snapshot controller will keep retrying when an error occurs during the snapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume from this snapshot. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-03-12T20:49:51Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-03-12T20:49:51Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"},{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-03-12T20:49:51Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/814"}],"acceptedNames":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"storedVersions":["v1"]}}config/validatingwebhookconfigurations/performance-addon-operator.json0000640000000000000000000000552115154624242025301 0ustar0000000000000000{"metadata":{"name":"performance-addon-operator","uid":"7c2c7c7d-7733-4d00-9cb4-2d564144fea8","resourceVersion":"4985","generation":2,"creationTimestamp":"2026-03-12T20:44:49Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}]},"webhooks":[{"name":"vwb.performance.openshift.io","clientConfig":{"service":{"namespace":"openshift-cluster-node-tuning-operator","name":"performance-addon-operator-service","path":"/validate-performance-openshift-io-v2-performanceprofile","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["performance.openshift.io"],"apiVersions":["v2"],"resources":["performanceprofiles"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/network-node-identity.openshift.io.json0000640000000000000000000001075515154624242026740 0ustar0000000000000000{"metadata":{"name":"network-node-identity.openshift.io","uid":"fbab931c-e0c0-40f8-87d2-f1f9c8c167ea","resourceVersion":"7153","generation":1,"creationTimestamp":"2026-03-12T20:50:28Z","ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"e3993f2f-7854-4c11-bdac-85912b157c72","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"node.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/node","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["nodes/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"pod.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/pod","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["pods/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/multus.openshift.io.json0000640000000000000000000000506715154624242024026 0ustar0000000000000000{"metadata":{"name":"multus.openshift.io","uid":"3d5cefe5-db40-4bad-a881-b65921cd383b","resourceVersion":"4984","generation":2,"creationTimestamp":"2026-03-12T20:48:44Z","labels":{"app":"multus-admission-controller"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"e3993f2f-7854-4c11-bdac-85912b157c72","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"multus-validating-config.k8s.io","clientConfig":{"service":{"namespace":"openshift-multus","name":"multus-admission-controller","path":"/validate","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["k8s.cni.cncf.io"],"apiVersions":["v1"],"resources":["network-attachment-definitions"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"NoneOnDryRun","timeoutSeconds":30,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io.json0000640000000000000000000000537215154624242030640 0ustar0000000000000000{"metadata":{"name":"controlplanemachineset.machine.openshift.io","uid":"e254430a-b266-46b5-ba0c-9d3994285335","resourceVersion":"9727","generation":2,"creationTimestamp":"2026-03-12T20:56:26Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}]},"webhooks":[{"name":"controlplanemachineset.machine.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"control-plane-machine-set-operator","path":"/validate-machine-openshift-io-v1-controlplanemachineset","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["machine.openshift.io"],"apiVersions":["v1"],"resources":["controlplanemachinesets"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration.json0000640000000000000000000000500215154624242032112 0ustar0000000000000000{"metadata":{"name":"cluster-baremetal-validating-webhook-configuration","uid":"68fc34cc-7cc7-42ef-81f5-1d4f07943ad1","resourceVersion":"10385","generation":2,"creationTimestamp":"2026-03-12T20:57:05Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"vprovisioning.kb.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-baremetal-webhook-service","path":"/validate-metal3-io-v1alpha1-provisioning","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["metal3.io"],"apiVersions":["v1alpha1"],"resources":["provisionings"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1","v1beta1"]}]}config/validatingwebhookconfigurations/autoscaling.openshift.io.json0000640000000000000000000001102715154624242024777 0ustar0000000000000000{"metadata":{"name":"autoscaling.openshift.io","uid":"0cb0333f-8f82-4ca4-a3af-5621ec84c80c","resourceVersion":"10387","generation":2,"creationTimestamp":"2026-03-12T20:57:05Z","labels":{"k8s-app":"cluster-autoscaler-operator"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"clusterautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-clusterautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1"],"resources":["clusterautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"machineautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-machineautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1beta1"],"resources":["machineautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/image.json0000640000000000000000000000111715154624242012467 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"22e2a088-8d94-4a9b-b0e4-55091a5e31b4","resourceVersion":"1296","generation":1,"creationTimestamp":"2026-03-12T20:44:34Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695"}]},"spec":{"additionalTrustedCA":{"name":""},"registrySources":{},"imageStreamImportMode":""},"status":{}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/edit.json0000640000000000000000000002215615154624242025505 0ustar0000000000000000{"metadata":{"name":"edit","uid":"b277a19a-3577-45a6-b19b-16024a5a4726","resourceVersion":"6939","creationTimestamp":"2026-03-12T20:42:58Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults","rbac.authorization.k8s.io/aggregate-to-admin":"true"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-edit":"true"}}]}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/admin.json0000640000000000000000000002504315154624242025646 0ustar0000000000000000{"metadata":{"name":"admin","uid":"286ef2b1-2591-40f9-8dea-6673dc1f574f","resourceVersion":"6944","creationTimestamp":"2026-03-12T20:42:58Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["watch","list","get"],"apiGroups":["k8s.cni.cncf.io"],"resources":["network-attachment-definitions"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindings","roles"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["rbac.authorization.k8s.io"],"resources":["rolebindings","roles"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["localresourceaccessreviews","localsubjectaccessreviews","subjectrulesreviews"]},{"verbs":["create"],"apiGroups":["authorization.k8s.io"],"resources":["localsubjectaccessreviews"]},{"verbs":["delete","get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["resourceaccessreviews","subjectaccessreviews"]},{"verbs":["create"],"apiGroups":["","security.openshift.io"],"resources":["podsecuritypolicyreviews","podsecuritypolicyselfsubjectreviews","podsecuritypolicysubjectreviews"]},{"verbs":["get","list","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindingrestrictions"]},{"verbs":["admin","edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["delete","get","patch","update"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["update"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-admin":"true"}}]}}config/pdbs/openshift-operator-lifecycle-manager/packageserver-pdb.json0000640000000000000000000000173515154624242025125 0ustar0000000000000000{"metadata":{"name":"packageserver-pdb","namespace":"openshift-operator-lifecycle-manager","uid":"3a882e49-bc41-4379-bc1d-04e6f798d1b3","resourceVersion":"9092","generation":1,"creationTimestamp":"2026-03-12T20:44:39Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695","controller":true}]},"spec":{"selector":{"matchLabels":{"app":"packageserver"}},"maxUnavailable":1},"status":{"observedGeneration":1,"disruptionsAllowed":1,"currentHealthy":1,"desiredHealthy":0,"expectedPods":1,"conditions":[{"type":"DisruptionAllowed","status":"True","observedGeneration":1,"lastTransitionTime":"2026-03-12T20:50:47Z","reason":"SufficientPods","message":""}]}}config/mutatingwebhookconfigurations/catalogd-mutating-webhook-configuration.json0000640000000000000000000000533615154624242027503 0ustar0000000000000000{"metadata":{"name":"catalogd-mutating-webhook-configuration","uid":"c6ae179a-84ab-4fa1-a0c5-8218619c8517","resourceVersion":"5867","generation":2,"creationTimestamp":"2026-03-12T20:50:08Z","annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"inject-metadata-name.olm.operatorframework.io","clientConfig":{"service":{"namespace":"openshift-catalogd","name":"catalogd-service","path":"/mutate-olm-operatorframework-io-v1-clustercatalog","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["olm.operatorframework.io"],"apiVersions":["v1"],"resources":["clustercatalogs"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"],"reinvocationPolicy":"Never","matchConditions":[{"name":"MissingOrIncorrectMetadataNameLabel","expression":"'name' in object.metadata \u0026\u0026 (!has(object.metadata.labels) || !('olm.operatorframework.io/metadata.name' in object.metadata.labels) || object.metadata.labels['olm.operatorframework.io/metadata.name'] != object.metadata.name)"}]}]}config/infrastructure.json0000640000000000000000000000106515154624242014467 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"99f63a7a-5beb-4746-b0ae-2e16f7be3ccb","resourceVersion":"546","generation":1,"creationTimestamp":"2026-03-12T20:43:51Z"},"spec":{"cloudConfig":{"name":""},"platformSpec":{"type":"None"}},"status":{"infrastructureName":"xxx-xxxxx","platform":"None","platformStatus":{"type":"None"},"etcdDiscoveryDomain":"","apiServerURL":"https://api.sno.openstack.lab:6443","apiServerInternalURI":"https://api-int.sno.openstack.lab:6443","controlPlaneTopology":"SingleReplica","infrastructureTopology":"SingleReplica","cpuPartitioning":"None"}}config/oauth.json0000640000000000000000000000114415154624242012525 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"35062fad-d52b-4d19-9a1c-385c24e47454","resourceVersion":"1648","generation":1,"creationTimestamp":"2026-03-12T20:44:40Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695"}]},"spec":{"tokenConfig":{},"templates":{"login":{"name":""},"providerSelection":{"name":""},"error":{"name":""}}},"status":{}}config/featuregate.json0000640000000000000000000000613615154624242013707 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"e1a8a6e4-ebdc-4230-8fe7-519212a5344d","resourceVersion":"650","generation":1,"creationTimestamp":"2026-03-12T20:44:14Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true"}},"spec":{},"status":{"featureGates":[{"version":"4.18.34","enabled":[{"name":"AWSEFSDriverVolumeMetrics"},{"name":"AdminNetworkPolicy"},{"name":"AlibabaPlatform"},{"name":"AzureWorkloadIdentity"},{"name":"BareMetalLoadBalancer"},{"name":"BuildCSIVolumes"},{"name":"ChunkSizeMiB"},{"name":"CloudDualStackNodeIPs"},{"name":"DisableKubeletCloudCredentialProviders"},{"name":"GCPLabelsTags"},{"name":"HardwareSpeed"},{"name":"IngressControllerLBSubnetsAWS"},{"name":"KMSv1"},{"name":"ManagedBootImages"},{"name":"ManagedBootImagesAWS"},{"name":"MultiArchInstallAWS"},{"name":"MultiArchInstallGCP"},{"name":"NetworkDiagnosticsConfig"},{"name":"NetworkLiveMigration"},{"name":"NetworkSegmentation"},{"name":"NewOLM"},{"name":"NodeDisruptionPolicy"},{"name":"OnClusterBuild"},{"name":"PersistentIPsForVirtualization"},{"name":"PrivateHostedZoneAWS"},{"name":"SetEIPForNLBIngressController"},{"name":"StreamingCollectionEncodingToJSON"},{"name":"StreamingCollectionEncodingToProtobuf"},{"name":"VSphereControlPlaneMachineSet"},{"name":"VSphereDriverConfiguration"},{"name":"VSphereMultiVCenters"},{"name":"VSphereStaticIPs"},{"name":"ValidatingAdmissionPolicy"}],"disabled":[{"name":"AWSClusterHostedDNS"},{"name":"AdditionalRoutingCapabilities"},{"name":"AutomatedEtcdBackup"},{"name":"BootcNodeManagement"},{"name":"CSIDriverSharedResource"},{"name":"ClusterAPIInstall"},{"name":"ClusterAPIInstallIBMCloud"},{"name":"ClusterMonitoringConfig"},{"name":"ConsolePluginContentSecurityPolicy"},{"name":"DNSNameResolver"},{"name":"DynamicResourceAllocation"},{"name":"EtcdBackendQuota"},{"name":"EventedPLEG"},{"name":"Example"},{"name":"ExternalOIDC"},{"name":"ExternalOIDCWithUIDAndExtraClaimMappings"},{"name":"GCPClusterHostedDNS"},{"name":"GatewayAPI"},{"name":"ImageStreamImportMode"},{"name":"IngressControllerDynamicConfigurationManager"},{"name":"InsightsConfig"},{"name":"InsightsConfigAPI"},{"name":"InsightsOnDemandDataGather"},{"name":"InsightsRuntimeExtractor"},{"name":"MachineAPIMigration"},{"name":"MachineAPIOperatorDisableMachineHealthCheckController"},{"name":"MachineAPIProviderOpenStack"},{"name":"MachineConfigNodes"},{"name":"MaxUnavailableStatefulSet"},{"name":"MetricsCollectionProfiles"},{"name":"MinimumKubeletVersion"},{"name":"MixedCPUsAllocation"},{"name":"MultiArchInstallAzure"},{"name":"NodeSwap"},{"name":"NutanixMultiSubnets"},{"name":"OVNObservability"},{"name":"OpenShiftPodSecurityAdmission"},{"name":"PinnedImages"},{"name":"PlatformOperators"},{"name":"ProcMountType"},{"name":"RouteAdvertisements"},{"name":"RouteExternalCertificate"},{"name":"ServiceAccountTokenNodeBinding"},{"name":"SignatureStores"},{"name":"SigstoreImageVerification"},{"name":"TranslateStreamCloseWebsocketRequests"},{"name":"UpgradeStatus"},{"name":"UserNamespacesPodSecurityStandards"},{"name":"UserNamespacesSupport"},{"name":"VSphereMultiNetworks"},{"name":"VolumeAttributesClass"},{"name":"VolumeGroupSnapshot"}]}]}}config/machineconfigpools/worker.json0000640000000000000000000000106615154624242016570 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-03-12T20:56:54Z","generation":1,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","pools.operator.machineconfiguration.openshift.io/worker":""},"name":"worker","resourceVersion":"10241","uid":"f297c706-6b55-47d7-b3d5-37bf538868d4"},"spec":{"configuration":{},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"worker"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/worker":""}},"paused":false}}config/machineconfigpools/master.json0000640000000000000000000000117315154624242016551 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-03-12T20:56:54Z","generation":1,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","operator.machineconfiguration.openshift.io/required-for-upgrade":"","pools.operator.machineconfiguration.openshift.io/master":""},"name":"master","resourceVersion":"10240","uid":"56d38f62-d525-487b-8398-97579007d14d"},"spec":{"configuration":{},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"master"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/master":""}},"paused":false}}config/authentication.json0000640000000000000000000000116415154624242014426 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"794ab72f-e19e-4b9a-bcce-cc25b27061ce","resourceVersion":"924","generation":1,"creationTimestamp":"2026-03-12T20:44:25Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695"}]},"spec":{"type":"","oauthMetadata":{"name":""},"serviceAccountIssuer":""},"status":{"integratedOAuthMetadata":{"name":""},"oidcClients":null}}config/clusteroperator/imageregistry.operator.openshift.io/imagepruner/cluster.json0000640000000000000000000000163115154624242027753 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"7170235b-e91b-4af4-8fb4-6d20ddf638f1","resourceVersion":"6364","generation":1,"creationTimestamp":"2026-03-12T20:50:16Z"},"spec":{"schedule":"","suspend":false,"keepTagRevisions":3,"successfulJobsHistoryLimit":3,"failedJobsHistoryLimit":3,"ignoreInvalidImageReferences":true,"logLevel":"Normal"},"status":{"observedGeneration":1,"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-12T20:50:16Z","reason":"AsExpected","message":"Pruner CronJob has been created"},{"type":"Failed","status":"False","lastTransitionTime":"2026-03-12T20:50:16Z","reason":"Complete","message":"Pruner completed successfully"},{"type":"Scheduled","status":"True","lastTransitionTime":"2026-03-12T20:50:16Z","reason":"Scheduled","message":"The pruner job has been scheduled"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-12T20:50:16Z","reason":"AsExpected"}]}}config/namespaces_with_overlapping_uids.json0000640000000000000000000000000215154624242020201 0ustar0000000000000000[]config/proxy.json0000640000000000000000000000031315154624242012563 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"3c320afc-b8f6-462d-aee0-3a8ee20caa69","resourceVersion":"564","generation":1,"creationTimestamp":"2026-03-12T20:43:53Z"},"spec":{"trustedCA":{"name":""}},"status":{}}config/schedulers/cluster.json0000640000000000000000000000052415154624242015230 0ustar0000000000000000{"kind":"Scheduler","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster","uid":"a1a2c7ed-8e26-4655-b4c6-4aa511b8421e","resourceVersion":"569","generation":1,"creationTimestamp":"2026-03-12T20:43:55Z"},"spec":{"policy":{"name":""},"profileCustomizations":{"dynamicResourceAllocation":""},"mastersSchedulable":true},"status":{}}config/network.json0000640000000000000000000000117015154624242013075 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"871b36d7-ff4e-4fb5-bb84-75a7f36755e7","resourceVersion":"3268","generation":2,"creationTimestamp":"2026-03-12T20:43:53Z"},"spec":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","externalIP":{"policy":{}},"networkDiagnostics":{"mode":"","sourcePlacement":{"nodeSelector":null,"tolerations":null},"targetPlacement":{"nodeSelector":null,"tolerations":null}}},"status":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","clusterNetworkMTU":8900}}config/apiserver.json0000640000000000000000000000121615154624242013405 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"80ca561f-f9d9-4ca4-a0f3-f370ad3798ed","resourceVersion":"808","generation":1,"creationTimestamp":"2026-03-12T20:44:22Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","oauth-apiserver.openshift.io/secure-token-storage":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"8dd25b2d-9840-4ff4-81be-59ffe7fa0695"}]},"spec":{"servingCerts":{},"clientCA":{"name":""},"encryption":{},"audit":{"profile":"Default"}},"status":{}}