--- apiVersion: apps/v1 items: - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "1" deployment.kubernetes.io/revision: "8" operator.openshift.io/spec-hash: 62a1fbe977e78e48169b4a86ebcc4030668684ca96d10861ca66a57d4f8f9dc9 release.openshift.io/version: 4.18.33 creationTimestamp: "2026-02-20T15:06:03Z" generation: 3 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: "5458766959" managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"1b1f93fc-0f09-458e-a975-0d23ae077280"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:configmaps/config: {} f:configmaps/openshift-global-ca: {} f:configmaps/openshift-service-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-02-20T15:06:23Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-02-20T15:06:23Z" name: controller-manager-5458766959 namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: 1b1f93fc-0f09-458e-a975-0d23ae077280 resourceVersion: "18029" uid: 8ccf7f22-1576-4124-8b28-3e783e90aca3 spec: replicas: 0 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: "5458766959" template: metadata: annotations: configmaps/client-ca: "6651" configmaps/config: "17733" configmaps/openshift-global-ca: "4097" configmaps/openshift-service-ca: "5311" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "4" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: "5458766959" name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:314be88d356b2c8a3c4416daeb4cfcd58d617a4526319c01ddaffae4b4179e74 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: observedGeneration: 3 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "1" deployment.kubernetes.io/revision: "2" operator.openshift.io/spec-hash: ee08fce45ccf6eb74906883f442efd0d55023a8cd353afc09bc910e4223e2080 release.openshift.io/version: 4.18.33 creationTimestamp: "2026-02-20T14:46:49Z" generation: 3 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 56bf465fcf managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"1b1f93fc-0f09-458e-a975-0d23ae077280"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:configmaps/config: {} f:configmaps/openshift-global-ca: {} f:configmaps/openshift-service-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-02-20T14:46:51Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-02-20T14:46:51Z" name: controller-manager-56bf465fcf namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: 1b1f93fc-0f09-458e-a975-0d23ae077280 resourceVersion: "4224" uid: 913f0f10-39b3-4300-a215-a02ed9bb497a spec: replicas: 0 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: 56bf465fcf template: metadata: annotations: configmaps/client-ca: "0" configmaps/config: "4088" configmaps/openshift-global-ca: "4094" configmaps/openshift-service-ca: "4093" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "2" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 56bf465fcf name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:314be88d356b2c8a3c4416daeb4cfcd58d617a4526319c01ddaffae4b4179e74 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: observedGeneration: 3 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "1" deployment.kubernetes.io/revision: "9" operator.openshift.io/spec-hash: 72f0359866109c49a53338bc9212f4307a516d5e6cf527f3cb405ce136201359 release.openshift.io/version: 4.18.33 creationTimestamp: "2026-02-20T15:06:23Z" generation: 2 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 5b6db4d85b managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"1b1f93fc-0f09-458e-a975-0d23ae077280"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:configmaps/config: {} f:configmaps/openshift-global-ca: {} f:configmaps/openshift-service-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-02-20T15:06:23Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:availableReplicas: {} f:fullyLabeledReplicas: {} f:observedGeneration: {} f:readyReplicas: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-02-20T15:06:28Z" name: controller-manager-5b6db4d85b namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: 1b1f93fc-0f09-458e-a975-0d23ae077280 resourceVersion: "18119" uid: a8b71458-2af5-4906-9d24-22e6231a3212 spec: replicas: 1 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: 5b6db4d85b template: metadata: annotations: configmaps/client-ca: "6651" configmaps/config: "17988" configmaps/openshift-global-ca: "4097" configmaps/openshift-service-ca: "5311" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "5" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 5b6db4d85b name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:314be88d356b2c8a3c4416daeb4cfcd58d617a4526319c01ddaffae4b4179e74 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: availableReplicas: 1 fullyLabeledReplicas: 1 observedGeneration: 2 readyReplicas: 1 replicas: 1 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "1" deployment.kubernetes.io/revision: "6" operator.openshift.io/spec-hash: 6764f81fcf704aefdffc4219afedaab1996607250b0abaf65ff459d6f942a616 release.openshift.io/version: 4.18.33 creationTimestamp: "2026-02-20T14:54:09Z" generation: 3 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 647657fcb managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"1b1f93fc-0f09-458e-a975-0d23ae077280"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:configmaps/config: {} f:configmaps/openshift-global-ca: {} f:configmaps/openshift-service-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-02-20T15:01:51Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-02-20T15:01:51Z" name: controller-manager-647657fcb namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: 1b1f93fc-0f09-458e-a975-0d23ae077280 resourceVersion: "16077" uid: 512e457d-381a-402b-9564-72462323d6f7 spec: replicas: 0 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: 647657fcb template: metadata: annotations: configmaps/client-ca: "6651" configmaps/config: "11381" configmaps/openshift-global-ca: "4097" configmaps/openshift-service-ca: "5311" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "2" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 647657fcb name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:314be88d356b2c8a3c4416daeb4cfcd58d617a4526319c01ddaffae4b4179e74 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: observedGeneration: 3 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "1" deployment.kubernetes.io/revision: "4" operator.openshift.io/spec-hash: d4334e6037a5849320c3d94dba5534d5a28f5ee5f0e9db9efec6c43b516d522d release.openshift.io/version: 4.18.33 creationTimestamp: "2026-02-20T14:47:08Z" generation: 3 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 6947c8468f managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"1b1f93fc-0f09-458e-a975-0d23ae077280"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:configmaps/config: {} f:configmaps/openshift-global-ca: {} f:configmaps/openshift-service-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-02-20T14:47:27Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-02-20T14:47:27Z" name: controller-manager-6947c8468f namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: 1b1f93fc-0f09-458e-a975-0d23ae077280 resourceVersion: "6695" uid: accd2bd6-4427-4c0d-a6cc-9d7f8936abf9 spec: replicas: 0 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: 6947c8468f template: metadata: annotations: configmaps/client-ca: "5517" configmaps/config: "5514" configmaps/openshift-global-ca: "4097" configmaps/openshift-service-ca: "5311" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "2" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 6947c8468f name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:314be88d356b2c8a3c4416daeb4cfcd58d617a4526319c01ddaffae4b4179e74 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: observedGeneration: 3 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "1" deployment.kubernetes.io/revision: "5" operator.openshift.io/spec-hash: cc711dcedb5feb59163c13cca249eef831c46f708171cbf0c66cc84822d511fe release.openshift.io/version: 4.18.33 creationTimestamp: "2026-02-20T14:47:27Z" generation: 3 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 69686f5989 managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"1b1f93fc-0f09-458e-a975-0d23ae077280"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:configmaps/config: {} f:configmaps/openshift-global-ca: {} f:configmaps/openshift-service-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-02-20T14:54:09Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-02-20T14:54:09Z" name: controller-manager-69686f5989 namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: 1b1f93fc-0f09-458e-a975-0d23ae077280 resourceVersion: "11420" uid: d00ddc39-7fd4-4d39-aac9-f32e031a3b3b spec: replicas: 0 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: 69686f5989 template: metadata: annotations: configmaps/client-ca: "6651" configmaps/config: "6645" configmaps/openshift-global-ca: "4097" configmaps/openshift-service-ca: "5311" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "2" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 69686f5989 name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:314be88d356b2c8a3c4416daeb4cfcd58d617a4526319c01ddaffae4b4179e74 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: observedGeneration: 3 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "1" deployment.kubernetes.io/revision: "7" operator.openshift.io/spec-hash: c919bc7442deb8cef43795b31b159ce8fa56c14ef9a5f614890fa318dde2e9cd release.openshift.io/version: 4.18.33 creationTimestamp: "2026-02-20T15:01:51Z" generation: 3 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 6c6bcb95bb managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"1b1f93fc-0f09-458e-a975-0d23ae077280"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:configmaps/config: {} f:configmaps/openshift-global-ca: {} f:configmaps/openshift-service-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-02-20T15:06:03Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-02-20T15:06:03Z" name: controller-manager-6c6bcb95bb namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: 1b1f93fc-0f09-458e-a975-0d23ae077280 resourceVersion: "17765" uid: d281b15c-04a1-40ff-9a9b-a5bbf58bb815 spec: replicas: 0 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: 6c6bcb95bb template: metadata: annotations: configmaps/client-ca: "6651" configmaps/config: "16033" configmaps/openshift-global-ca: "4097" configmaps/openshift-service-ca: "5311" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "3" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 6c6bcb95bb name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:314be88d356b2c8a3c4416daeb4cfcd58d617a4526319c01ddaffae4b4179e74 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: observedGeneration: 3 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "1" deployment.kubernetes.io/revision: "1" operator.openshift.io/spec-hash: ef2b0b8b927ef5a790cb47ecd8105cfddf8294b0bbb45613f37cba415f283c23 release.openshift.io/version: 4.18.33 creationTimestamp: "2026-02-20T14:46:48Z" generation: 2 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 6c9b8f4d95 managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"1b1f93fc-0f09-458e-a975-0d23ae077280"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-02-20T14:46:49Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-02-20T14:46:49Z" name: controller-manager-6c9b8f4d95 namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: 1b1f93fc-0f09-458e-a975-0d23ae077280 resourceVersion: "4132" uid: 33d85d14-014b-46ae-90c1-5f146e8ff44a spec: replicas: 0 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: 6c9b8f4d95 template: metadata: annotations: configmaps/client-ca: "0" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "1" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 6c9b8f4d95 name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:314be88d356b2c8a3c4416daeb4cfcd58d617a4526319c01ddaffae4b4179e74 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: observedGeneration: 2 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "1" deployment.kubernetes.io/revision: "3" operator.openshift.io/spec-hash: e8a5d79d302d4ce88a8ee4764c6a5298ea6080be0f444f4d0d95fe80436587b0 release.openshift.io/version: 4.18.33 creationTimestamp: "2026-02-20T14:46:51Z" generation: 3 labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 866d45c75d managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:release.openshift.io/version: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"1b1f93fc-0f09-458e-a975-0d23ae077280"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:configmaps/client-ca: {} f:configmaps/config: {} f:configmaps/openshift-global-ca: {} f:configmaps/openshift-service-ca: {} f:openshift.io/required-scc: {} f:openshiftcontrollermanagers.operator.openshift.io/cluster: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:controller-manager: {} f:openshift-route-controller-manager-anti-affinity: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: .: {} f:podAntiAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"controller-manager"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:initialDelaySeconds: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/client-ca"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/config"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"client-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"proxy-ca-bundles"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-02-20T14:47:08Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-02-20T14:47:08Z" name: controller-manager-866d45c75d namespace: openshift-controller-manager ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: controller-manager uid: 1b1f93fc-0f09-458e-a975-0d23ae077280 resourceVersion: "5546" uid: 18f9b6d9-023a-4d45-a83d-10c7c31a53eb spec: replicas: 0 selector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" pod-template-hash: 866d45c75d template: metadata: annotations: configmaps/client-ca: "0" configmaps/config: "4208" configmaps/openshift-global-ca: "4097" configmaps/openshift-service-ca: "4093" openshift.io/required-scc: restricted-v2 openshiftcontrollermanagers.operator.openshift.io/cluster: "2" target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" pod-template-hash: 866d45c75d name: openshift-controller-manager spec: affinity: podAntiAffinity: requiredDuringSchedulingIgnoredDuringExecution: - labelSelector: matchLabels: app: openshift-controller-manager-a controller-manager: "true" openshift-route-controller-manager-anti-affinity: "true" topologyKey: kubernetes.io/hostname containers: - args: - --config=/var/run/configmaps/config/config.yaml - -v=2 command: - openshift-controller-manager - start image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:314be88d356b2c8a3c4416daeb4cfcd58d617a4526319c01ddaffae4b4179e74 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: healthz port: 8443 scheme: HTTPS initialDelaySeconds: 30 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: controller-manager ports: - containerPort: 8443 protocol: TCP readinessProbe: failureThreshold: 10 httpGet: path: healthz port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 100m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/run/configmaps/config name: config - mountPath: /var/run/configmaps/client-ca name: client-ca - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /etc/pki/ca-trust/extracted/pem name: proxy-ca-bundles dnsPolicy: ClusterFirst nodeSelector: node-role.kubernetes.io/master: "" priorityClassName: system-node-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: openshift-controller-manager-sa serviceAccountName: openshift-controller-manager-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 120 volumes: - configMap: defaultMode: 420 name: config name: config - configMap: defaultMode: 420 name: client-ca name: client-ca - name: serving-cert secret: defaultMode: 420 secretName: serving-cert - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: openshift-global-ca name: proxy-ca-bundles status: observedGeneration: 3 replicas: 0 kind: ReplicaSetList metadata: resourceVersion: "41355"