insights-operator/gathers.json0000640000000000000000000004233415144705201015256 0ustar0000000000000000{"status_reports":[{"name":"clusterconfig/proxies","duration_in_ms":26,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_config","duration_in_ms":25,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machines","duration_in_ms":35,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/config_maps","duration_in_ms":69,"records_count":9,"errors":["configmaps \"cluster-monitoring-config\" not found","configmaps \"gateway-mode-config\" not found","configmaps \"insights-config\" not found"],"warnings":["warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt\""],"panic":null},{"name":"conditional/conditional_gatherer_rules","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodes","duration_in_ms":37,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress","duration_in_ms":16,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/networks","duration_in_ms":21,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/schedulers","duration_in_ms":21,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_datahubs","duration_in_ms":21,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_sets","duration_in_ms":24,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkstates","duration_in_ms":26,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_config_pools","duration_in_ms":37,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/number_of_pods_and_netnamespaces_with_sdn_annotations","duration_in_ms":77,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/node_logs","duration_in_ms":152,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig","duration_in_ms":12287,"records_count":164,"errors":["function \"pod_network_connectivity_checks\" failed with an error","function \"tsdb_status\" failed with an error","function \"active_alerts\" failed with an error","function \"silenced_alerts\" failed with an error","function \"support_secret\" failed with an error","function \"metrics\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-authentication-operator/authentication-operator-755d954778-8gnq5.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-54984b6678-cl5ld.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-kube-controller-manager-operator/kube-controller-manager-operator-78ff47c7c5-7p9ft.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-apiserver-operator/openshift-apiserver-operator-6d4655d9cf-tvzdw.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/etcd-operator-67bf55ccdd-8cllz.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-operator-lifecycle-manager/package-server-manager-5c696dbdcd-9m94g.json\""],"warnings":null,"panic":null},{"name":"clusterconfig/olm_operators","duration_in_ms":17,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/tsdb_status","duration_in_ms":28,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/api/v1/status/tsdb\": dial tcp: lookup prometheus-k8s.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/oauths","duration_in_ms":36,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/metrics","duration_in_ms":34,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/federate?match%5B%5D=cluster_installer\u0026match%5B%5D=namespace%3Acontainer_cpu_usage%3Asum\u0026match%5B%5D=namespace%3Acontainer_memory_usage_bytes%3Asum\u0026match%5B%5D=vsphere_node_hw_version_total\u0026match%5B%5D=virt_platform\u0026match%5B%5D=console_helm_installs_total\u0026match%5B%5D=console_helm_upgrades_total\u0026match%5B%5D=console_helm_uninstalls_total\u0026match%5B%5D=openshift_apps_deploymentconfigs_strategy_total\u0026match%5B%5D=etcd_server_slow_apply_total\u0026match%5B%5D=etcd_server_slow_read_indexes_total\u0026match%5B%5D=haproxy_exporter_server_threshold\": dial tcp: lookup prometheus-k8s.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/container_images","duration_in_ms":83,"records_count":29,"errors":null,"warnings":null,"panic":null},{"name":"workloads","duration_in_ms":5825,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/jaegers","duration_in_ms":35,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/clusterroles","duration_in_ms":41,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ceph_cluster","duration_in_ms":22,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"conditional/remote_configuration","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/mutating_webhook_configurations","duration_in_ms":21,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_classes","duration_in_ms":27,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/silenced_alerts","duration_in_ms":36,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=false\u0026inhibited=false\u0026silenced=true\": dial tcp: lookup alertmanager-main.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/infrastructures","duration_in_ms":34,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_pods","duration_in_ms":22,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pdbs","duration_in_ms":22,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_registries","duration_in_ms":24,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"workloads/workload_info","duration_in_ms":5824,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_logging","duration_in_ms":22,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/monitoring_persistent_volumes","duration_in_ms":27,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/active_alerts","duration_in_ms":18,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=true\": dial tcp: lookup alertmanager-main.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/ingress_certificates","duration_in_ms":62,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"conditional/rapid_container_logs","duration_in_ms":0,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pod_network_connectivity_checks","duration_in_ms":23,"records_count":0,"errors":["the server could not find the requested resource (get podnetworkconnectivitychecks.controlplane.operator.openshift.io)"],"warnings":null,"panic":null},{"name":"clusterconfig/support_secret","duration_in_ms":33,"records_count":0,"errors":["secrets \"support\" not found"],"warnings":null,"panic":null},{"name":"clusterconfig/authentication","duration_in_ms":37,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_autoscalers","duration_in_ms":39,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/certificate_signing_requests","duration_in_ms":59,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators","duration_in_ms":102,"records_count":34,"errors":null,"warnings":null,"panic":null},{"name":"workloads/helmchart_info","duration_in_ms":12,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkconfigurationpolicies","duration_in_ms":21,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cluster_apiserver","duration_in_ms":23,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/aggregated_monitoring_cr_names","duration_in_ms":43,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"conditional","duration_in_ms":255,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_configs","duration_in_ms":121,"records_count":3,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/qemu_kubevirt_launcher_logs","duration_in_ms":18,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_version","duration_in_ms":19,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_runtime_configs","duration_in_ms":22,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_pruners","duration_in_ms":23,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_healthchecks","duration_in_ms":34,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/validating_webhook_configurations","duration_in_ms":35,"records_count":8,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/overlapping_namespace_uids","duration_in_ms":38,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators_pods_and_events","duration_in_ms":12276,"records_count":50,"errors":["the record with the same name \"config/pod/openshift-authentication-operator/authentication-operator-755d954778-8gnq5.json\" was already recorded and had the fingerprint \"76145f494e32a3b0a6c586b25e5e116adeb20373c7f290867858564199849ac7\", overwriting with the record having fingerprint \"76145f494e32a3b0a6c586b25e5e116adeb20373c7f290867858564199849ac7\"","the record with the same name \"config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-54984b6678-cl5ld.json\" was already recorded and had the fingerprint \"31406203c57039f0af44757793aed938ba21e2a369f9a0d71522eaebcf3719d8\", overwriting with the record having fingerprint \"31406203c57039f0af44757793aed938ba21e2a369f9a0d71522eaebcf3719d8\"","the record with the same name \"config/pod/openshift-kube-controller-manager-operator/kube-controller-manager-operator-78ff47c7c5-7p9ft.json\" was already recorded and had the fingerprint \"756d3bae9f2a2e3471f240f1df6f179f0599fee692010253b1a841dc297aec96\", overwriting with the record having fingerprint \"756d3bae9f2a2e3471f240f1df6f179f0599fee692010253b1a841dc297aec96\"","the record with the same name \"config/pod/openshift-apiserver-operator/openshift-apiserver-operator-6d4655d9cf-tvzdw.json\" was already recorded and had the fingerprint \"627ee8e40a7e16211c3e294f48e811160e98b5d150957864d549590565ecfee8\", overwriting with the record having fingerprint \"627ee8e40a7e16211c3e294f48e811160e98b5d150957864d549590565ecfee8\"","the record with the same name \"config/pod/openshift-etcd-operator/etcd-operator-67bf55ccdd-8cllz.json\" was already recorded and had the fingerprint \"c570670a5e2274f9538051b6e5a9cb919d8d91516ffe84b2600f0039e3611d94\", overwriting with the record having fingerprint \"c570670a5e2274f9538051b6e5a9cb919d8d91516ffe84b2600f0039e3611d94\"","the record with the same name \"config/pod/openshift-operator-lifecycle-manager/package-server-manager-5c696dbdcd-9m94g.json\" was already recorded and had the fingerprint \"bd7beff1664122036bd763215376a1a28b21a9c11078b6f2801b7162e1639c67\", overwriting with the record having fingerprint \"bd7beff1664122036bd763215376a1a28b21a9c11078b6f2801b7162e1639c67\""],"warnings":["warning: the record with the same fingerprint \"76145f494e32a3b0a6c586b25e5e116adeb20373c7f290867858564199849ac7\" was already recorded at path \"config/pod/openshift-authentication-operator/authentication-operator-755d954778-8gnq5.json\", recording another one with a different path \"config/pod/openshift-authentication-operator/authentication-operator-755d954778-8gnq5.json\"","warning: the record with the same fingerprint \"31406203c57039f0af44757793aed938ba21e2a369f9a0d71522eaebcf3719d8\" was already recorded at path \"config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-54984b6678-cl5ld.json\", recording another one with a different path \"config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-54984b6678-cl5ld.json\"","warning: the record with the same fingerprint \"756d3bae9f2a2e3471f240f1df6f179f0599fee692010253b1a841dc297aec96\" was already recorded at path \"config/pod/openshift-kube-controller-manager-operator/kube-controller-manager-operator-78ff47c7c5-7p9ft.json\", recording another one with a different path \"config/pod/openshift-kube-controller-manager-operator/kube-controller-manager-operator-78ff47c7c5-7p9ft.json\"","warning: the record with the same fingerprint \"627ee8e40a7e16211c3e294f48e811160e98b5d150957864d549590565ecfee8\" was already recorded at path \"config/pod/openshift-apiserver-operator/openshift-apiserver-operator-6d4655d9cf-tvzdw.json\", recording another one with a different path \"config/pod/openshift-apiserver-operator/openshift-apiserver-operator-6d4655d9cf-tvzdw.json\"","warning: the record with the same fingerprint \"c570670a5e2274f9538051b6e5a9cb919d8d91516ffe84b2600f0039e3611d94\" was already recorded at path \"config/pod/openshift-etcd-operator/etcd-operator-67bf55ccdd-8cllz.json\", recording another one with a different path \"config/pod/openshift-etcd-operator/etcd-operator-67bf55ccdd-8cllz.json\"","warning: the record with the same fingerprint \"bd7beff1664122036bd763215376a1a28b21a9c11078b6f2801b7162e1639c67\" was already recorded at path \"config/pod/openshift-operator-lifecycle-manager/package-server-manager-5c696dbdcd-9m94g.json\", recording another one with a different path \"config/pod/openshift-operator-lifecycle-manager/package-server-manager-5c696dbdcd-9m94g.json\""],"panic":null},{"name":"clusterconfig/dvo_metrics","duration_in_ms":22,"records_count":0,"errors":null,"warnings":["warning: no service found with label selector name=deployment-validation-operator"],"panic":null},{"name":"clusterconfig/openstack_dataplanenodesets","duration_in_ms":23,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_cluster","duration_in_ms":24,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/feature_gates","duration_in_ms":28,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanedeployments","duration_in_ms":25,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image","duration_in_ms":35,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/install_plans","duration_in_ms":11059,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cost_management_metrics_configs","duration_in_ms":22,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_controlplanes","duration_in_ms":23,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/lokistack","duration_in_ms":25,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/version","duration_in_ms":58,"records_count":4,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_machine_api_events","duration_in_ms":42,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/crds","duration_in_ms":73,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/service_accounts","duration_in_ms":11803,"records_count":1,"errors":null,"warnings":null,"panic":null}],"container_memory_bytes_usage":0,"uptime_seconds":1100.616,"is_global_obfuscation_enabled":false}insights-operator/remote-configuration.json0000640000000000000000000000443515144705201017761 0ustar0000000000000000{"conditional_gathering_rules":[{"conditions":[{"alert":{"name":"APIRemovedInNextEUSReleaseInUse"},"type":"alert_is_firing"}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedReload"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedToSendAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"KubePodCrashLooping"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","previous":true,"tail_lines":20}}},{"conditions":[{"alert":{"name":"KubePodNotReady"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},{"conditions":[{"alert":{"name":"PrometheusOperatorSyncFailed"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},{"conditions":[{"alert":{"name":"PrometheusRemoteStorageFailures"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},{"conditions":[{"alert":{"name":"PrometheusTargetSyncFailure"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},{"conditions":[{"alert":{"name":"SamplesImagestreamImportFailing"},"type":"alert_is_firing"}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},{"conditions":[{"alert":{"name":"ThanosRuleQueueIsDroppingAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}}],"container_logs":[],"version":"1.2.0"}insights-operator/conditional-gatherer-rules.json0000640000000000000000000000577515144705201021063 0ustar0000000000000000{"version":"1.2.0","conditional_gathering_rules":[{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"APIRemovedInNextEUSReleaseInUse"}}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedReload"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedToSendAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodCrashLooping"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","tail_lines":20,"previous":true}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodNotReady"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusOperatorSyncFailed"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusRemoteStorageFailures"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusTargetSyncFailure"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"SamplesImagestreamImportFailing"}}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"ThanosRuleQueueIsDroppingAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false}],"endpoint":"https://console.redhat.com/api/gathering/v2/%s/gathering_rules"}config/workload_info.json0000640000000000000000000005735015144705200014245 0ustar0000000000000000{"pods":88,"imageCount":68,"namespaces":{"0LiT6ZNtbpYL":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:fe683caef773a1963fc13f96afe58892563ea9921db8ac39369e3a9a05ea7181","firstCommand":"N9KxLV2avCo2","firstArg":"BuLIUMMJnyP_"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:bfc52d6ca96f377d53757dc437ca720e860e3e016d16c084bd5f6f2e337d3a1d","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:e786e28fbe0b95c4f5723bebc3abde1333b259fd26673716fc5638d88286d8b7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:5c38d58b62290b59d0182b50ce3cfd87fbb7729f3ce6fc06ffa46d9805c7dd78","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:15c5e645edf257a08c061ad9ae7dab4293104a042b8396181d76dd28f396cebe","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:df623c15a78ca969fb8ad134bde911c2047bf82b50244ee8e523763b6587e072","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:df623c15a78ca969fb8ad134bde911c2047bf82b50244ee8e523763b6587e072","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:fe683caef773a1963fc13f96afe58892563ea9921db8ac39369e3a9a05ea7181","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:bbe162375a11ed3810a1081c30dd400f461f2421d5f1e27d8792048bbd216956","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:80531a0fe966e1cc0582c581951b09a7a4e42037c106748c44859110361b2c1b","firstCommand":"FC0eu9ID58Bm","firstArg":"47DEQpj8HBSa"}]}]},"0h5ohwdJx4S5":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:ae30b3ab740f21c451d0272bceacb99fa34d22bbf2ea22f1e1e18230a156104b","firstCommand":"buSkac1OkQU4","firstArg":"XV1E-c-gSQmZ"}]}]},"2IqVYeidVUxV":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:9cc42212fb15c1f3e6a88acaaa4919c9693be3c6099ea849d28855e231dc9e44","firstCommand":"po5yju59c7HJ"}],"containers":[{"imageID":"sha256:2431778975829348e271dc9bf123c7a24c81a52537a61414cd17c8436436078b","firstCommand":"UcO4la9rqCTe"}]}]},"43Xz0HbE9FHX":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:0b4dc203ac00318362470f07842ed97dc1c724d32fa07c1613f15fcf4bf54ec8","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:aca57c8abaa83b2d1dce95fa7fe5b9416be70e100957ce48f212e2ec404387bc","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:06dcb25b4ae74ef159663cc2318f84e4665c7889b38ed62940259e5edd2b576f","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:aca57c8abaa83b2d1dce95fa7fe5b9416be70e100957ce48f212e2ec404387bc","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:dab7a82d88f90f1ef4ac307b16132d4d573a4fa9080acc3272ca084613bd902a","firstCommand":"4MEQ8E7-fUvu","firstArg":"mDEjdpyJDBZ4"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:28df36269fc553eb1adba5566d6dfc258a1a74063c4cfe8b5bdd3f202591cf56","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:aca57c8abaa83b2d1dce95fa7fe5b9416be70e100957ce48f212e2ec404387bc","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:3e2f869b1c4f98a628b2e54c1516a0d0c09c760c91e0e1a940cb76149217661b","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:aca57c8abaa83b2d1dce95fa7fe5b9416be70e100957ce48f212e2ec404387bc","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]}]},"47HAKWqp7-jn":{"count":3,"terminalCount":2,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","firstCommand":"N9KxLV2avCo2"}]}]},"4k7XyKW2A17e":{"count":3,"terminalCount":2,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","firstCommand":"930btY2ohuPL","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","firstCommand":"aC8iSHmKHojh","firstArg":"r7zEsGNvlNrk"},{"imageID":"sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","firstCommand":"WFJEBSInAJpw","firstArg":"5gS4z5mOnDuY"},{"imageID":"sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"}]}]},"5fn-sCitjq6a":{"count":3,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:a90d19460fbc705172df7759a3da394930623c6b6974620b79ffa07bab53c51f","firstCommand":"HgS-rIunFHfD","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:a26b20d3ef7b75aeb05acf9be2702f9d478822c43f679ff578811843692b960c","firstArg":"ESRPWfqdsWE1"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:13d06502c0f0a3c73f69bf8d0743718f7cfc46e71f4a12916517ad7e9bff17e1","firstArg":"zO0oxtw_mcI5"}]}]},"6KbiDGNUd_ub":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"}]}]},"6bLpdRMvgXVP":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:240701090a5f8e40d4b88fa200cf63dffb11a8e2eae713cf3c629b016c2823b0","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"},{"imageID":"sha256:240701090a5f8e40d4b88fa200cf63dffb11a8e2eae713cf3c629b016c2823b0","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]}]},"9dJB3pvMrhr8":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:0871b6c16b38a2eda5d1c89fd75079aff0775224307e940557e6fda6ba229f38","firstCommand":"51QuNwyM-xYf","firstArg":"r7zEsGNvlNrk"}]}]},"AN3N38xANElq":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":false,"containers":[{"imageID":"sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","firstCommand":"FATPL2W-sitV","firstArg":"gcNszUTvGLqr"}]}]},"CMkFy_B6OMUO":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5abe992def861ec075251ae17bbd66fa23bd05bd3701953c0fdcf68a8d161f1e","firstCommand":"7aQQEh6Tr2m7","firstArg":"r7zEsGNvlNrk"}]}]},"C_9an18W0cU6":{"count":6,"terminalCount":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"ZS9VAWJDvxuf","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"ArvlNzaZtYpC","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"PPJ_dAh1Wl4S","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","firstCommand":"5-ZY-7KtGiOe"}]}]},"EOB8Fqt74gVH":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1faa2081a881db884a86bdfe33fcb6a6af1d14c3e9ee5c44dfe4b09045684e13","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"}]}]},"EyQn00UhCg7z":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e","firstCommand":"bsRjeCtd7lVU","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e","firstCommand":"ZDrZSWYe4Hpn"}]}]},"F-y2qosZEzxd":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5abe992def861ec075251ae17bbd66fa23bd05bd3701953c0fdcf68a8d161f1e","firstCommand":"7aQQEh6Tr2m7","firstArg":"gcNszUTvGLqr"}]}]},"ICyEPw5KVYuy":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8ea13b0cbfe9be0d3d7ea80d50e512af6a453921a553c7c79b566530142b611b","firstCommand":"ijLlFtdBW-Uk","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:e155421620a4ac28a759265f53059b75308fdd1491caeba6a9a34d2fbeab4954","firstCommand":"N9KxLV2avCo2"}]}]},"KETRwZOPBpF9":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:3bb3c46533b24f1a6a6669117dc888ed8f0c7ae56b34068a4ff2052335e34c4e","firstCommand":"buSkac1OkQU4","firstArg":"47DEQpj8HBSa"}]}]},"Kt0qS5G8piJp":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:e3d21c51712e6e0cdd9c776479f6d1ab55bc1085df5bb5f583e69ee192d11fd3","firstCommand":"9RqZYN0XQJuD"}]}]},"LBp1kjMRhgCD":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"MBms5agiSYKb":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d6ab8803bac3ebada13e90d9dd6208301b981488277cdeb847c25ff8002f5a30","firstArg":"zO0oxtw_mcI5"}]}]},"N3z7Gdl4s2xN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:e1c8b9784a60860a08bd47935f0767b7b7f8f36c5c0adb7623a31b82c01d4c09","firstCommand":"vLhjmt4GJVrQ"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"47DEQpj8HBSa"}]}]},"NJ5StnkN7lNJ":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:56dffbd86bfae06921432678caf184b335bf2fc6ac7ee128f48aee396d57ea55","firstCommand":"euUHIZmT1r6w","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:56dffbd86bfae06921432678caf184b335bf2fc6ac7ee128f48aee396d57ea55","firstCommand":"euUHIZmT1r6w"}]}]},"NuNApgGLWU3S":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:0e446723bbab96c4e4662ff058d5eccba72d0c36d26c7b8b3f07183fa49d3ab9","firstCommand":"loDbMsNsNHAN"},{"imageID":"sha256:0e446723bbab96c4e4662ff058d5eccba72d0c36d26c7b8b3f07183fa49d3ab9","firstCommand":"BWdk-C4p4WVi","firstArg":"ov8ZFLf4OaCu"}]}]},"QRCRK87Nh9-g":{"count":3,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","firstCommand":"N9KxLV2avCo2","firstArg":"aC8iSHmKHojh"},{"imageID":"sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","firstCommand":"VvlllczXFX2z","firstArg":"Yfg8wToYnj2U"}]},{"restartAlways":false,"containers":[{"imageID":"sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","firstCommand":"VvlllczXFX2z","firstArg":"gcNszUTvGLqr"}]}]},"QhwI_DkC7RkW":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"}],"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","firstCommand":"N9KxLV2avCo2"}]}]},"RGIC92MKxXzi":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:1e7ac69aff2f28f6b3cbdb166c7dac7a3490167bcd670cd7057bdde1e1e7684d","firstCommand":"RxKEaTc90uWM","firstArg":"r7zEsGNvlNrk"}]}]},"WPOX0dN4tqDv":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:e3d21c51712e6e0cdd9c776479f6d1ab55bc1085df5bb5f583e69ee192d11fd3","firstCommand":"9RqZYN0XQJuD"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"47DEQpj8HBSa"}]}]},"XStfgPOmHYzB":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:e391fce0b2e04f22fc089597db9e0671ba7f8b5b3a709151b5f33dd23b262144","firstCommand":"AiycEq1CClLy","firstArg":"r7zEsGNvlNrk"}]}]},"YgQZCjyI6D9c":{"count":1,"terminalCount":1,"shapes":[]},"cMIdS73ad1cT":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","firstCommand":"09D_XsQaIohy","firstArg":"r7zEsGNvlNrk"}]}]},"cWNZj9dm5f4i":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","firstCommand":"WFJEBSInAJpw","firstArg":"r7zEsGNvlNrk"}]}]},"coRkJ8lvmtSk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb"}]}]},"de1zmznD1F_L":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:f353131d8a1223db7f637c9851016b3a348d80c2b2be663a2db6d01e14ddca88","firstCommand":"rb3iLnl9GmZR","firstArg":"r7zEsGNvlNrk"}]}]},"eCjF12pGOLUF":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:9f2b80358f029728d7f4ce46418bb6859d9ea7365de7b6f97a5f549ed6e77471","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:9f2b80358f029728d7f4ce46418bb6859d9ea7365de7b6f97a5f549ed6e77471","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"}]}]},"ecUe5cl6bPwX":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:bd8adea550cbbaf16cb9409b31ec8b997320d247f9f30c80608ac1fbf9c7a07e","firstCommand":"pgaYl1gqTV2L","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:7b8fb1f11df51c131f5be8ddfc1b1c95ac13481f58d2dcd5a465a4a8341c0f49","firstCommand":"kwBOP3_4oVMx","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:47c1d88223ffb35bb36a4d2bde736fb3e45f08e204519387e0e52e3e3dc00cfb","firstCommand":"buSkac1OkQU4","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:fa28b66298c8b34f2c7b357b012e663e3954cfc7c85aa1e44651a79aeaf8b2a9","firstCommand":"Tt12uskXp-TN","firstArg":"zO0oxtw_mcI5"}]}]},"iAB_cGZtvYGo":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5d54bd262ca625a326b01ea2bfd33db10a402c05590e6b710b0959712e1bf30b","firstCommand":"zT6_GoC4_8OY","firstArg":"r7zEsGNvlNrk"},{"imageID":"sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","firstCommand":"aC8iSHmKHojh","firstArg":"eE7ekwlit3Mq"}]}]},"inQbBSWydCWk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"ioFx0itCFPcs":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:3bb3c46533b24f1a6a6669117dc888ed8f0c7ae56b34068a4ff2052335e34c4e","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:ae30b3ab740f21c451d0272bceacb99fa34d22bbf2ea22f1e1e18230a156104b","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"}],"containers":[{"imageID":"sha256:333e6572029953b4c4676076f0991ee6e5c7d28cbe2887c71b1682f19831d8a1","firstCommand":"bFMn8sKmxXTo","firstArg":"zO0oxtw_mcI5"}]}]},"jmuesrd3LOV1":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","firstCommand":"aDHd4M_0XUOd","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","firstCommand":"wCdwTcAdXQ_H","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","firstCommand":"jXkiIgNfKeEy","firstArg":"zO0oxtw_mcI5"}]}]},"k2lPYOlQaXUX":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:6dd544a8a6b4d08fe0f4fd076109c09cf181302ab6056ec6b2b89d68a52954c5","firstCommand":"XqE_QmN1P920","firstArg":"r7zEsGNvlNrk"}]}]},"n8ih8iFf25K7":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:e155421620a4ac28a759265f53059b75308fdd1491caeba6a9a34d2fbeab4954","firstCommand":"CX8KiHZjJyVD"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e","firstCommand":"N9KxLV2avCo2"}]}]},"nMMaB9HQd060":{"count":7,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:0100b616991bd8bca68d583e902283aa4cc0d388046437d5d68407190e3fb041","firstArg":"aZFPdeh8u0QY"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:9e96b53e74d1b802c2e63544e4689c9d262e9c996902c6e8a7f3ca34b23fdd50","firstArg":"5wzTZA9Ffwb3"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:c1a0aba9ead3a33353dc8a033699dfa4795f4050516677dad6ed4ac664094692","firstArg":"P0uRYWPWnbxt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:a64a70eb2fef4095ba241021e37c52034c067c57121d6c588f8c7fd3dc24b55f","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:a64a70eb2fef4095ba241021e37c52034c067c57121d6c588f8c7fd3dc24b55f","firstCommand":"icTsn2s_EIax","firstArg":"SCcKjYHEPDKM"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:3f08586dd67c2d3d21053a044138f1bbedceb0847f1af8c3aa76127d86135a58","firstArg":"5wzTZA9Ffwb3"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:19c3c8392b72ccf9a518d1d60fab0fd1e58a05b544caa79eb11bb68f00981d9d","firstArg":"e1V8mDIYJ-Es"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:99ad83497ea12819957ccba33c807c6e4c5297621db568e5635202cb9cc69f8f","firstArg":"Sr6QxZ9vlnXv"}]}]},"nO8YkKLJMsaW":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:b41a8ae60c0eafa4a13e6dcd0e79ba63b0d7bd2bdc28aaed434b3bef98a5dc95","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:b41a8ae60c0eafa4a13e6dcd0e79ba63b0d7bd2bdc28aaed434b3bef98a5dc95","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","firstCommand":"VvlllczXFX2z","firstArg":"47DEQpj8HBSa"}]}]},"nTf6g7hF1YMN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cc03f91dbf08df9907c0ebad30c54a7fa92285b19ec4e440ed762b197378a861","firstArg":"8DZ1gO9Xqn6d"}]}]},"oNeg9VIL3k3N":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:f122c11c2f6a10ca150b136f7291d2e135b3a182d67809aa49727da289787cee","firstCommand":"oNeg9VIL3k3N","firstArg":"r7zEsGNvlNrk"}]}]},"pepxDbsB4SPa":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","firstCommand":"VvlllczXFX2z","firstArg":"r7zEsGNvlNrk"}]}]},"q1TpN3EUiKjG":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","firstCommand":"FATPL2W-sitV","firstArg":"r7zEsGNvlNrk"}]}]},"vDGHaQt8x6K_":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","firstArg":"zO0oxtw_mcI5"}]}]}}}packageserver_current.log0000640000000000000000000011723015144705173033663 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/packageserver-78d4b6b677-npmx42026-02-16T21:17:45.738990860Z E0216 21:17:45.738900 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:17:45.739063992Z E0216 21:17:45.739031 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:17:45.739265887Z E0216 21:17:45.739222 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:17:45.739485943Z E0216 21:17:45.739444 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:17:45.739547854Z E0216 21:17:45.739520 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:18:00.711722924Z E0216 21:18:00.710394 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:18:00.711722924Z E0216 21:18:00.710638 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:18:00.711722924Z E0216 21:18:00.710791 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:18:00.711722924Z E0216 21:18:00.710915 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:18:00.715398920Z E0216 21:18:00.715346 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:18:15.723701261Z E0216 21:18:15.723632 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:18:15.723864666Z E0216 21:18:15.723831 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:18:15.723937537Z E0216 21:18:15.723641 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:18:15.724015479Z E0216 21:18:15.723978 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:18:15.725068127Z E0216 21:18:15.725015 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:18:15.852359649Z E0216 21:18:15.852298 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:18:15.857879873Z E0216 21:18:15.857825 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:18:30.719357643Z E0216 21:18:30.719261 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:18:30.719357643Z E0216 21:18:30.719284 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:18:30.719462666Z E0216 21:18:30.719353 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:18:30.719528598Z E0216 21:18:30.719496 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:18:30.719951150Z E0216 21:18:30.719907 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:18:45.738441187Z E0216 21:18:45.736949 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:18:45.738441187Z E0216 21:18:45.737472 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:18:45.738441187Z E0216 21:18:45.736949 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:18:45.738441187Z E0216 21:18:45.737777 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:18:45.738441187Z E0216 21:18:45.738125 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:19:00.724036635Z E0216 21:19:00.723914 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:19:00.724036635Z E0216 21:19:00.724002 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:19:00.724156758Z E0216 21:19:00.724122 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:19:00.724156758Z E0216 21:19:00.724122 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:19:00.724501577Z E0216 21:19:00.724423 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:19:15.755588214Z E0216 21:19:15.752272 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:19:15.755588214Z E0216 21:19:15.752635 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:19:15.755588214Z E0216 21:19:15.752721 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:19:15.755588214Z E0216 21:19:15.753016 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:19:15.755588214Z E0216 21:19:15.753185 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:19:15.830189671Z E0216 21:19:15.830016 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:19:15.837440370Z E0216 21:19:15.837339 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:19:30.727719153Z E0216 21:19:30.727640 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:19:30.727719153Z E0216 21:19:30.727673 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:19:30.727719153Z E0216 21:19:30.727701 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:19:30.727773824Z E0216 21:19:30.727729 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:19:30.728107133Z E0216 21:19:30.728077 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:19:45.741085337Z E0216 21:19:45.741040 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:19:45.741329613Z E0216 21:19:45.741288 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:19:45.741464996Z E0216 21:19:45.741450 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:19:45.741534398Z E0216 21:19:45.741502 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:19:45.741634631Z E0216 21:19:45.741621 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:00.734750236Z E0216 21:20:00.734694 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:00.734896071Z E0216 21:20:00.734858 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:00.734896071Z E0216 21:20:00.734867 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:00.734967263Z E0216 21:20:00.734929 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:00.735018814Z E0216 21:20:00.734969 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:15.736760503Z E0216 21:20:15.736248 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:15.736760503Z E0216 21:20:15.736586 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:15.736868536Z E0216 21:20:15.736815 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:15.737024299Z E0216 21:20:15.736986 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:15.737237765Z E0216 21:20:15.737204 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:15.788514194Z E0216 21:20:15.788440 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:15.795422944Z E0216 21:20:15.795385 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:15.878168383Z E0216 21:20:15.878124 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:15.882981319Z E0216 21:20:15.882930 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:30.742723814Z E0216 21:20:30.742594 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:30.742801397Z E0216 21:20:30.742777 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:30.743100464Z E0216 21:20:30.743066 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:30.743283319Z E0216 21:20:30.743248 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:30.743367361Z E0216 21:20:30.743335 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:45.731489437Z E0216 21:20:45.731370 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:45.731489437Z E0216 21:20:45.731414 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:45.735457529Z E0216 21:20:45.735094 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:45.735457529Z E0216 21:20:45.735314 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:45.735540292Z E0216 21:20:45.735503 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:00.750537028Z E0216 21:21:00.750446 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:00.750537028Z E0216 21:21:00.750465 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:00.750537028Z E0216 21:21:00.750465 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:00.750714174Z E0216 21:21:00.750663 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:00.750828707Z E0216 21:21:00.750780 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:15.758205168Z E0216 21:21:15.757762 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:15.758205168Z E0216 21:21:15.757931 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:15.758205168Z E0216 21:21:15.757936 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:15.758581918Z E0216 21:21:15.758329 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:15.758581918Z E0216 21:21:15.758393 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:15.838570935Z E0216 21:21:15.838446 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:15.843280643Z E0216 21:21:15.843211 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:30.760066627Z E0216 21:21:30.758908 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:30.760066627Z E0216 21:21:30.758922 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:30.760066627Z E0216 21:21:30.758982 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:30.760066627Z E0216 21:21:30.759000 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:30.760066627Z E0216 21:21:30.759092 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.742780680Z E0216 21:21:45.740363 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.742780680Z E0216 21:21:45.740797 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.742780680Z E0216 21:21:45.741039 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.742780680Z E0216 21:21:45.741167 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.742780680Z E0216 21:21:45.741599 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:22:00.762259148Z E0216 21:22:00.762167 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:22:00.762744181Z E0216 21:22:00.762689 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:22:00.762988237Z E0216 21:22:00.762938 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:22:00.763005698Z E0216 21:22:00.762980 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:22:00.763170922Z E0216 21:22:00.763119 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" packageserver_previous.log0000640000000000000000000001406415144705173034056 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/packageserver-78d4b6b677-npmx42026-02-16T21:05:32.441739397Z time="2026-02-16T21:05:32Z" level=info msg="Using in-cluster kube client config" 2026-02-16T21:05:32.441739397Z time="2026-02-16T21:05:32Z" level=warning msg="Error retrieving Interval from OLMConfig: 'client rate limiter Wait returned an error: context canceled'" 2026-02-16T21:05:32.472409098Z I0216 21:05:32.469418 1 handler.go:286] Adding GroupVersion packages.operators.coreos.com v1 to ResourceManager 2026-02-16T21:05:32.474723683Z time="2026-02-16T21:05:32Z" level=info msg="connection established. cluster-version: v1.31.14" 2026-02-16T21:05:32.487735768Z I0216 21:05:32.487642 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-16T21:05:32.487735768Z I0216 21:05:32.487725 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-16T21:05:32.487831931Z I0216 21:05:32.487794 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-16T21:05:32.487831931Z I0216 21:05:32.487824 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T21:05:32.487883942Z I0216 21:05:32.487849 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-16T21:05:32.487926904Z I0216 21:05:32.487913 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T21:05:32.488005476Z I0216 21:05:32.487992 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-16T21:05:32.488040637Z I0216 21:05:32.488028 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-16T21:05:32.488532551Z I0216 21:05:32.488494 1 secure_serving.go:213] Serving securely on [::]:5443 2026-02-16T21:05:32.488532551Z I0216 21:05:32.488518 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-16T21:05:32.488548762Z I0216 21:05:32.488535 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T21:05:32.488582403Z I0216 21:05:32.488554 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-16T21:05:32.488582403Z I0216 21:05:32.488565 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-16T21:05:32.488582403Z I0216 21:05:32.488576 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T21:05:32.488596393Z I0216 21:05:32.488568 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::apiserver.local.config/certificates/apiserver.crt::apiserver.local.config/certificates/apiserver.key" 2026-02-16T21:05:32.489018575Z I0216 21:05:32.488982 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-02-16T21:05:32.489065926Z I0216 21:05:32.489024 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::apiserver.local.config/certificates/apiserver.crt::apiserver.local.config/certificates/apiserver.key" 2026-02-16T21:05:32.489152118Z I0216 21:05:32.489125 1 secure_serving.go:258] Stopped listening on [::]:5443 2026-02-16T21:05:32.489164699Z I0216 21:05:32.489154 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-02-16T21:05:32.489192049Z E0216 21:05:32.489161 1 shared_informer.go:316] "Unhandled Error" err="unable to sync caches for client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-16T21:05:32.489234380Z E0216 21:05:32.489133 1 shared_informer.go:316] "Unhandled Error" err="unable to sync caches for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-16T21:05:32.489271281Z E0216 21:05:32.489217 1 shared_informer.go:316] "Unhandled Error" err="unable to sync caches for RequestHeaderAuthRequestController" 2026-02-16T21:05:32.491280158Z E0216 21:05:32.489242 1 shared_informer.go:316] "Unhandled Error" err="unable to sync caches for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-16T21:05:32.491335300Z E0216 21:05:32.489266 1 shared_informer.go:316] "Unhandled Error" err="unable to sync caches for client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-16T21:05:32.491369341Z I0216 21:05:32.490244 1 configmap_cafile_content.go:213] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-16T21:05:32.491406512Z E0216 21:05:32.490386 1 shared_informer.go:316] "Unhandled Error" err="unable to sync caches for RequestHeaderAuthRequestController" 2026-02-16T21:05:32.491437783Z I0216 21:05:32.490411 1 configmap_cafile_content.go:213] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-16T21:05:32.495105905Z I0216 21:05:32.495042 1 requestheader_controller.go:179] Shutting down RequestHeaderAuthRequestController 2026-02-16T21:05:32.495105905Z I0216 21:05:32.495073 1 requestheader_controller.go:179] Shutting down RequestHeaderAuthRequestController 2026-02-16T21:05:32.495105905Z I0216 21:05:32.495091 1 configmap_cafile_content.go:213] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-16T21:05:32.495142706Z I0216 21:05:32.495113 1 configmap_cafile_content.go:213] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" config/pod/openshift-operator-lifecycle-manager/packageserver-78d4b6b677-npmx4.json0000640000000000000000000001535615144705173026610 0ustar0000000000000000{"metadata":{"name":"packageserver-78d4b6b677-npmx4","generateName":"packageserver-78d4b6b677-","namespace":"openshift-operator-lifecycle-manager","uid":"319dc882-e1f5-40f9-99f4-2bae028337e5","resourceVersion":"10031","creationTimestamp":"2026-02-16T20:58:03Z","labels":{"app":"packageserver","pod-template-hash":"78d4b6b677"},"annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.64/23\"],\"mac_address\":\"0a:58:0a:80:00:40\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.64/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.64\"\n ],\n \"mac\": \"0a:58:0a:80:00:40\",\n \"default\": true,\n \"dns\": {}\n}]","olm.operatorGroup":"olm-operators","olm.operatorNamespace":"openshift-operator-lifecycle-manager","olm.targetNamespaces":"openshift-operator-lifecycle-manager","olmcahash":"2143df414d81e9d94b4a4e5b8c69940cc00b93955f7d3f4c29dc35c24c0c24f4","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"packageserver-78d4b6b677","uid":"43d570bf-cfd6-47eb-8d7e-4439febe10e9","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"tmpfs","emptyDir":{}},{"name":"apiservice-cert","secret":{"secretName":"packageserver-service-cert","items":[{"key":"tls.crt","path":"apiserver.crt"},{"key":"tls.key","path":"apiserver.key"}],"defaultMode":420}},{"name":"webhook-cert","secret":{"secretName":"packageserver-service-cert","items":[{"key":"tls.crt","path":"tls.crt"},{"key":"tls.key","path":"tls.key"}],"defaultMode":420}},{"name":"kube-api-access-mtrzq","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"packageserver","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","command":["/bin/package-server","-v=4","--secure-port","5443","--global-namespace","openshift-marketplace"],"ports":[{"containerPort":5443,"protocol":"TCP"}],"env":[{"name":"OPERATOR_CONDITION_NAME","value":"packageserver"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"tmpfs","mountPath":"/tmp"},{"name":"apiservice-cert","mountPath":"/apiserver.local.config/certificates"},{"name":"webhook-cert","mountPath":"/tmp/k8s-webhook-server/serving-certs"},{"name":"kube-api-access-mtrzq","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":5443,"scheme":"HTTPS"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/healthz","port":5443,"scheme":"HTTPS"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000400000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"olm-operator-serviceaccount","serviceAccount":"olm-operator-serviceaccount","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c20,c10"},"runAsNonRoot":true,"fsGroup":1000400000,"seccompProfile":{"type":"RuntimeDefault"}},"imagePullSecrets":[{"name":"olm-operator-serviceaccount-dockercfg-6xcjr"}],"affinity":{},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:03:34Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:58:03Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:05:34Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:05:34Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:58:03Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.64","podIPs":[{"ip":"10.128.0.64"}],"startTime":"2026-02-16T20:58:03Z","containerStatuses":[{"name":"packageserver","state":{"running":{"startedAt":"2026-02-16T21:05:33Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-16T21:04:35Z","finishedAt":"2026-02-16T21:05:32Z","containerID":"cri-o://203b091a662b4912838a798e07794a8caa755508028a6b4fa5f1ef8b83de89af"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","containerID":"cri-o://b014fde00d656d88f73bc5afec71e6ac7dc4f1b7fdabe71571471749b0f80f22","started":true,"volumeMounts":[{"name":"tmpfs","mountPath":"/tmp"},{"name":"apiservice-cert","mountPath":"/apiserver.local.config/certificates"},{"name":"webhook-cert","mountPath":"/tmp/k8s-webhook-server/serving-certs"},{"name":"kube-api-access-mtrzq","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}package-server-manager_current.log0000640000000000000000000002674115144705173037057 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-5c696dbdcd-9m94g2026-02-16T21:13:51.062554116Z 2026-02-16T21:13:51Z ERROR setup unable to get cluster infrastructure status, using HA cluster values for leader election {"error": "Get \"https://172.30.0.1:443/apis/config.openshift.io/v1/infrastructures/cluster\": context deadline exceeded"} 2026-02-16T21:13:51.062554116Z github.com/openshift/operator-framework-olm/pkg/leaderelection.getLeaderElectionConfig 2026-02-16T21:13:51.062554116Z /build/pkg/leaderelection/leaderelection.go:61 2026-02-16T21:13:51.062554116Z github.com/openshift/operator-framework-olm/pkg/leaderelection.GetLeaderElectionConfig 2026-02-16T21:13:51.062554116Z /build/pkg/leaderelection/leaderelection.go:50 2026-02-16T21:13:51.062554116Z main.run 2026-02-16T21:13:51.062554116Z /build/cmd/package-server-manager/main.go:83 2026-02-16T21:13:51.062554116Z github.com/spf13/cobra.(*Command).execute 2026-02-16T21:13:51.062554116Z /build/vendor/github.com/spf13/cobra/command.go:985 2026-02-16T21:13:51.062554116Z github.com/spf13/cobra.(*Command).ExecuteC 2026-02-16T21:13:51.062554116Z /build/vendor/github.com/spf13/cobra/command.go:1117 2026-02-16T21:13:51.062554116Z github.com/spf13/cobra.(*Command).Execute 2026-02-16T21:13:51.062554116Z /build/vendor/github.com/spf13/cobra/command.go:1041 2026-02-16T21:13:51.062554116Z main.main 2026-02-16T21:13:51.062554116Z /build/cmd/package-server-manager/main.go:43 2026-02-16T21:13:51.062554116Z runtime.main 2026-02-16T21:13:51.062554116Z /usr/lib/golang/src/runtime/proc.go:271 2026-02-16T21:13:51.117958627Z 2026-02-16T21:13:51Z INFO setup starting manager 2026-02-16T21:13:51.121317478Z 2026-02-16T21:13:51Z INFO controller-runtime.metrics Starting metrics server 2026-02-16T21:13:51.121361519Z 2026-02-16T21:13:51Z INFO starting server {"name": "health probe", "addr": "[::]:8080"} 2026-02-16T21:13:51.121458942Z 2026-02-16T21:13:51Z INFO starting server {"name": "pprof", "addr": "[::]:6060"} 2026-02-16T21:13:51.122952492Z 2026-02-16T21:13:51Z INFO controller-runtime.metrics Serving metrics server {"bindAddress": ":9090", "secure": false} 2026-02-16T21:13:51.124364720Z I0216 21:13:51.124274 1 leaderelection.go:254] attempting to acquire leader lease openshift-operator-lifecycle-manager/packageserver-controller-lock... 2026-02-16T21:17:01.523151877Z I0216 21:17:01.523049 1 leaderelection.go:268] successfully acquired lease openshift-operator-lifecycle-manager/packageserver-controller-lock 2026-02-16T21:17:01.524500102Z 2026-02-16T21:17:01Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1alpha1.ClusterServiceVersion"} 2026-02-16T21:17:01.524547574Z 2026-02-16T21:17:01Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1.Infrastructure"} 2026-02-16T21:17:01.525537000Z 2026-02-16T21:17:01Z DEBUG events package-server-manager-5c696dbdcd-9m94g_cc718aa1-887d-4885-b4aa-94c5f7a3f0e3 became leader {"type": "Normal", "object": {"kind":"Lease","namespace":"openshift-operator-lifecycle-manager","name":"packageserver-controller-lock","uid":"43330fd1-f6de-4f3a-9399-6581c87101f5","apiVersion":"coordination.k8s.io/v1","resourceVersion":"12279"}, "reason": "LeaderElection"} 2026-02-16T21:17:01.526538916Z 2026-02-16T21:17:01Z INFO Starting Controller {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion"} 2026-02-16T21:17:01.650600713Z 2026-02-16T21:17:01Z INFO Starting workers {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "worker count": 1} 2026-02-16T21:17:01.650929792Z 2026-02-16T21:17:01Z INFO controllers.packageserver requeueing the packageserver deployment after encountering infrastructure event {"infrastructure": "cluster"} 2026-02-16T21:17:01.651884587Z 2026-02-16T21:17:01Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-16T21:17:01.651903027Z 2026-02-16T21:17:01Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T21:17:01.954949777Z 2026-02-16T21:17:01Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T21:17:01.955314646Z 2026-02-16T21:17:01Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-16T21:17:01.988490372Z 2026-02-16T21:17:01Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-16T21:17:01.988490372Z 2026-02-16T21:17:01Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T21:20:52.078638165Z 2026-02-16T21:20:52Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-16T21:20:52.078638165Z 2026-02-16T21:20:52Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T21:20:52.078760088Z 2026-02-16T21:20:52Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T21:20:52.078801459Z 2026-02-16T21:20:52Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-16T21:20:52.094480063Z 2026-02-16T21:20:52Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-16T21:20:52.094556645Z 2026-02-16T21:20:52Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T21:20:52.523898443Z 2026-02-16T21:20:52Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-16T21:20:52.523898443Z 2026-02-16T21:20:52Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T21:20:52.523898443Z 2026-02-16T21:20:52Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T21:20:52.523898443Z 2026-02-16T21:20:52Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-16T21:20:52.542278351Z 2026-02-16T21:20:52Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-16T21:20:52.542278351Z 2026-02-16T21:20:52Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T21:20:52.980112079Z 2026-02-16T21:20:52Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-16T21:20:52.980183501Z 2026-02-16T21:20:52Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T21:20:52.980392876Z 2026-02-16T21:20:52Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T21:20:52.980524760Z 2026-02-16T21:20:52Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-16T21:20:52.997141069Z 2026-02-16T21:20:52Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-16T21:20:52.997141069Z 2026-02-16T21:20:52Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T21:20:53.200396119Z 2026-02-16T21:20:53Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-16T21:20:53.200396119Z 2026-02-16T21:20:53Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T21:20:53.200439951Z 2026-02-16T21:20:53Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T21:20:53.200447401Z 2026-02-16T21:20:53Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-16T21:20:53.228361426Z 2026-02-16T21:20:53Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-16T21:20:53.228361426Z 2026-02-16T21:20:53Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T21:20:53.314426585Z 2026-02-16T21:20:53Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-16T21:20:53.314426585Z 2026-02-16T21:20:53Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T21:20:53.318954518Z 2026-02-16T21:20:53Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T21:20:53.318954518Z 2026-02-16T21:20:53Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-16T21:20:53.326918323Z 2026-02-16T21:20:53Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-16T21:20:53.326918323Z 2026-02-16T21:20:53Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} kube-rbac-proxy_current.log0000640000000000000000000000160415144705173035551 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-5c696dbdcd-9m94g2026-02-16T20:57:42.468754767Z W0216 20:57:42.468535 1 deprecated.go:66] 2026-02-16T20:57:42.468754767Z ==== Removed Flag Warning ====================== 2026-02-16T20:57:42.468754767Z 2026-02-16T20:57:42.468754767Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-02-16T20:57:42.468754767Z 2026-02-16T20:57:42.468754767Z =============================================== 2026-02-16T20:57:42.468754767Z 2026-02-16T20:57:42.469064666Z I0216 20:57:42.469045 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-02-16T20:57:42.470168837Z I0216 20:57:42.470144 1 kube-rbac-proxy.go:347] Reading certificate files 2026-02-16T20:57:42.470423535Z I0216 20:57:42.470392 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:8443 2026-02-16T20:57:42.470927180Z I0216 20:57:42.470900 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:8443 package-server-manager_previous.log0000640000000000000000000002143115144705173037240 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-5c696dbdcd-9m94g2026-02-16T21:03:37.842470637Z 2026-02-16T21:03:37Z ERROR setup unable to get cluster infrastructure status, using HA cluster values for leader election {"error": "Get \"https://172.30.0.1:443/apis/config.openshift.io/v1/infrastructures/cluster\": context deadline exceeded"} 2026-02-16T21:03:37.842470637Z github.com/openshift/operator-framework-olm/pkg/leaderelection.getLeaderElectionConfig 2026-02-16T21:03:37.842470637Z /build/pkg/leaderelection/leaderelection.go:61 2026-02-16T21:03:37.842470637Z github.com/openshift/operator-framework-olm/pkg/leaderelection.GetLeaderElectionConfig 2026-02-16T21:03:37.842470637Z /build/pkg/leaderelection/leaderelection.go:50 2026-02-16T21:03:37.842470637Z main.run 2026-02-16T21:03:37.842470637Z /build/cmd/package-server-manager/main.go:83 2026-02-16T21:03:37.842470637Z github.com/spf13/cobra.(*Command).execute 2026-02-16T21:03:37.842470637Z /build/vendor/github.com/spf13/cobra/command.go:985 2026-02-16T21:03:37.842470637Z github.com/spf13/cobra.(*Command).ExecuteC 2026-02-16T21:03:37.842470637Z /build/vendor/github.com/spf13/cobra/command.go:1117 2026-02-16T21:03:37.842470637Z github.com/spf13/cobra.(*Command).Execute 2026-02-16T21:03:37.842470637Z /build/vendor/github.com/spf13/cobra/command.go:1041 2026-02-16T21:03:37.842470637Z main.main 2026-02-16T21:03:37.842470637Z /build/cmd/package-server-manager/main.go:43 2026-02-16T21:03:37.842470637Z runtime.main 2026-02-16T21:03:37.842470637Z /usr/lib/golang/src/runtime/proc.go:271 2026-02-16T21:03:37.878920371Z 2026-02-16T21:03:37Z INFO setup starting manager 2026-02-16T21:03:37.879847327Z 2026-02-16T21:03:37Z INFO controller-runtime.metrics Starting metrics server 2026-02-16T21:03:37.880582267Z 2026-02-16T21:03:37Z INFO starting server {"name": "health probe", "addr": "[::]:8080"} 2026-02-16T21:03:37.880782973Z 2026-02-16T21:03:37Z INFO starting server {"name": "pprof", "addr": "[::]:6060"} 2026-02-16T21:03:37.880831384Z 2026-02-16T21:03:37Z INFO controller-runtime.metrics Serving metrics server {"bindAddress": ":9090", "secure": false} 2026-02-16T21:03:37.881784861Z I0216 21:03:37.880949 1 leaderelection.go:254] attempting to acquire leader lease openshift-operator-lifecycle-manager/packageserver-controller-lock... 2026-02-16T21:09:51.695696834Z I0216 21:09:51.695594 1 leaderelection.go:268] successfully acquired lease openshift-operator-lifecycle-manager/packageserver-controller-lock 2026-02-16T21:09:51.698563113Z 2026-02-16T21:09:51Z DEBUG events package-server-manager-5c696dbdcd-9m94g_1da3894e-0c77-416c-bd14-6b9497ae9d8f became leader {"type": "Normal", "object": {"kind":"Lease","namespace":"openshift-operator-lifecycle-manager","name":"packageserver-controller-lock","uid":"43330fd1-f6de-4f3a-9399-6581c87101f5","apiVersion":"coordination.k8s.io/v1","resourceVersion":"11169"}, "reason": "LeaderElection"} 2026-02-16T21:09:51.699511080Z 2026-02-16T21:09:51Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1alpha1.ClusterServiceVersion"} 2026-02-16T21:09:51.699511080Z 2026-02-16T21:09:51Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1.Infrastructure"} 2026-02-16T21:09:51.699531540Z 2026-02-16T21:09:51Z INFO Starting Controller {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion"} 2026-02-16T21:09:51.821360356Z 2026-02-16T21:09:51Z INFO controllers.packageserver requeueing the packageserver deployment after encountering infrastructure event {"infrastructure": "cluster"} 2026-02-16T21:09:51.826031054Z 2026-02-16T21:09:51Z INFO Starting workers {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "worker count": 1} 2026-02-16T21:09:51.826286732Z 2026-02-16T21:09:51Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-02-16T21:09:51.826312473Z 2026-02-16T21:09:51Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T21:09:52.130738602Z 2026-02-16T21:09:52Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T21:09:52.131086251Z 2026-02-16T21:09:52Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-02-16T21:09:52.176084394Z 2026-02-16T21:09:52Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-02-16T21:09:52.176084394Z 2026-02-16T21:09:52Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-02-16T21:11:43.758283312Z E0216 21:11:43.758078 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-02-16T21:12:43.765240552Z E0216 21:12:43.765093 1 leaderelection.go:436] error retrieving resource lock openshift-operator-lifecycle-manager/packageserver-controller-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io packageserver-controller-lock) 2026-02-16T21:12:56.748382036Z I0216 21:12:56.748309 1 leaderelection.go:297] failed to renew lease openshift-operator-lifecycle-manager/packageserver-controller-lock: timed out waiting for the condition 2026-02-16T21:13:30.755439688Z E0216 21:13:30.755354 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-02-16T21:13:30.755710686Z 2026-02-16T21:13:30Z INFO Stopping and waiting for non leader election runnables 2026-02-16T21:13:30.755765088Z 2026-02-16T21:13:30Z INFO Stopping and waiting for leader election runnables 2026-02-16T21:13:30.755765088Z 2026-02-16T21:13:30Z INFO Stopping and waiting for caches 2026-02-16T21:13:30.755789048Z 2026-02-16T21:13:30Z INFO Stopping and waiting for webhooks 2026-02-16T21:13:30.755922522Z 2026-02-16T21:13:30Z INFO Stopping and waiting for HTTP servers 2026-02-16T21:13:30.755922522Z 2026-02-16T21:13:30Z INFO Shutdown signal received, waiting for all workers to finish {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion"} 2026-02-16T21:13:30.755972713Z 2026-02-16T21:13:30Z INFO Wait completed, proceeding to shutdown the manager 2026-02-16T21:13:30.756266571Z 2026-02-16T21:13:30Z DEBUG events package-server-manager-5c696dbdcd-9m94g_1da3894e-0c77-416c-bd14-6b9497ae9d8f stopped leading {"type": "Normal", "object": {"kind":"Lease","namespace":"openshift-operator-lifecycle-manager","name":"packageserver-controller-lock","uid":"43330fd1-f6de-4f3a-9399-6581c87101f5","apiVersion":"coordination.k8s.io/v1","resourceVersion":"11376"}, "reason": "LeaderElection"} 2026-02-16T21:13:30.756341573Z 2026-02-16T21:13:30Z ERROR setup problem running manager {"error": "leader election lost"} 2026-02-16T21:13:30.756341573Z main.run 2026-02-16T21:13:30.756341573Z /build/cmd/package-server-manager/main.go:150 2026-02-16T21:13:30.756341573Z github.com/spf13/cobra.(*Command).execute 2026-02-16T21:13:30.756341573Z /build/vendor/github.com/spf13/cobra/command.go:985 2026-02-16T21:13:30.756341573Z github.com/spf13/cobra.(*Command).ExecuteC 2026-02-16T21:13:30.756341573Z /build/vendor/github.com/spf13/cobra/command.go:1117 2026-02-16T21:13:30.756341573Z github.com/spf13/cobra.(*Command).Execute 2026-02-16T21:13:30.756341573Z /build/vendor/github.com/spf13/cobra/command.go:1041 2026-02-16T21:13:30.756341573Z main.main 2026-02-16T21:13:30.756341573Z /build/cmd/package-server-manager/main.go:43 2026-02-16T21:13:30.756341573Z runtime.main 2026-02-16T21:13:30.756341573Z /usr/lib/golang/src/runtime/proc.go:271 2026-02-16T21:13:30.757111844Z 2026-02-16T21:13:30Z INFO shutting down server {"name": "health probe", "addr": "[::]:8080"} 2026-02-16T21:13:30.757204006Z 2026-02-16T21:13:30Z INFO All workers finished {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion"} 2026-02-16T21:13:30.757320899Z Error: leader election lost 2026-02-16T21:13:30.757320899Z encountered an error while executing the binary: leader election lost config/pod/openshift-operator-lifecycle-manager/package-server-manager-5c696dbdcd-9m94g.json0000640000000000000000000002342415144705173030304 0ustar0000000000000000{"metadata":{"name":"package-server-manager-5c696dbdcd-9m94g","generateName":"package-server-manager-5c696dbdcd-","namespace":"openshift-operator-lifecycle-manager","uid":"4b035e85-b2b0-4dee-bb86-3465fc4b98a8","resourceVersion":"11938","creationTimestamp":"2026-02-16T20:55:39Z","labels":{"app":"package-server-manager","pod-template-hash":"5c696dbdcd"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.20/23\"],\"mac_address\":\"0a:58:0a:80:00:14\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.20/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.20\"\n ],\n \"mac\": \"0a:58:0a:80:00:14\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"package-server-manager-5c696dbdcd","uid":"e0fd19c4-ed5c-485c-9ded-76b2323d0a83","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"package-server-manager-serving-cert","secret":{"secretName":"package-server-manager-serving-cert","defaultMode":420}},{"name":"kube-api-access-g7nmb","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","args":["--secure-listen-address=0.0.0.0:8443","--upstream=http://127.0.0.1:9090/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key","--logtostderr=true"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"package-server-manager-serving-cert","mountPath":"/etc/tls/private"},{"name":"kube-api-access-g7nmb","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000400000,"allowPrivilegeEscalation":false}},{"name":"package-server-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","command":["/bin/psm","start"],"args":["--name","$(PACKAGESERVER_NAME)","--namespace","$(PACKAGESERVER_NAMESPACE)","--metrics=:9090"],"env":[{"name":"PACKAGESERVER_NAME","value":"packageserver"},{"name":"PACKAGESERVER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c"},{"name":"PACKAGESERVER_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"RELEASE_VERSION","value":"4.18.32"},{"name":"GOMEMLIMIT","value":"5MiB"}],"resources":{"requests":{"cpu":"10m","memory":"10Mi"}},"volumeMounts":[{"name":"kube-api-access-g7nmb","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8080,"scheme":"HTTP"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/healthz","port":8080,"scheme":"HTTP"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000400000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"olm-operator-serviceaccount","serviceAccount":"olm-operator-serviceaccount","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c20,c10"},"runAsNonRoot":true,"fsGroup":1000400000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:52Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:56:58Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:14:21Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:14:21Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:56:57Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.20","podIPs":[{"ip":"10.128.0.20"}],"startTime":"2026-02-16T20:56:58Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-16T20:57:42Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://74bcb9c0e0e6190f4682d2a1f22029d9499551420f56ffed526a997deaabbd90","started":true,"volumeMounts":[{"name":"package-server-manager-serving-cert","mountPath":"/etc/tls/private"},{"name":"kube-api-access-g7nmb","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"package-server-manager","state":{"running":{"startedAt":"2026-02-16T21:13:47Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"iled to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded\n2026-02-16T21:13:30Z\tINFO\tStopping and waiting for non leader election runnables\n2026-02-16T21:13:30Z\tINFO\tStopping and waiting for leader election runnables\n2026-02-16T21:13:30Z\tINFO\tStopping and waiting for caches\n2026-02-16T21:13:30Z\tINFO\tStopping and waiting for webhooks\n2026-02-16T21:13:30Z\tINFO\tStopping and waiting for HTTP servers\n2026-02-16T21:13:30Z\tINFO\tShutdown signal received, waiting for all workers to finish\t{\"controller\": \"clusterserviceversion\", \"controllerGroup\": \"operators.coreos.com\", \"controllerKind\": \"ClusterServiceVersion\"}\n2026-02-16T21:13:30Z\tINFO\tWait completed, proceeding to shutdown the manager\n2026-02-16T21:13:30Z\tDEBUG\tevents\tpackage-server-manager-5c696dbdcd-9m94g_1da3894e-0c77-416c-bd14-6b9497ae9d8f stopped leading\t{\"type\": \"Normal\", \"object\": {\"kind\":\"Lease\",\"namespace\":\"openshift-operator-lifecycle-manager\",\"name\":\"packageserver-controller-lock\",\"uid\":\"43330fd1-f6de-4f3a-9399-6581c87101f5\",\"apiVersion\":\"coordination.k8s.io/v1\",\"resourceVersion\":\"11376\"}, \"reason\": \"LeaderElection\"}\n2026-02-16T21:13:30Z\tERROR\tsetup\tproblem running manager\t{\"error\": \"leader election lost\"}\nmain.run\n\t/build/cmd/package-server-manager/main.go:150\ngithub.com/spf13/cobra.(*Command).execute\n\t/build/vendor/github.com/spf13/cobra/command.go:985\ngithub.com/spf13/cobra.(*Command).ExecuteC\n\t/build/vendor/github.com/spf13/cobra/command.go:1117\ngithub.com/spf13/cobra.(*Command).Execute\n\t/build/vendor/github.com/spf13/cobra/command.go:1041\nmain.main\n\t/build/cmd/package-server-manager/main.go:43\nruntime.main\n\t/usr/lib/golang/src/runtime/proc.go:271\n2026-02-16T21:13:30Z\tINFO\tshutting down server\t{\"name\": \"health probe\", \"addr\": \"[::]:8080\"}\n2026-02-16T21:13:30Z\tINFO\tAll workers finished\t{\"controller\": \"clusterserviceversion\", \"controllerGroup\": \"operators.coreos.com\", \"controllerKind\": \"ClusterServiceVersion\"}\nError: leader election lost\nencountered an error while executing the binary: leader election lost\n","startedAt":"2026-02-16T21:03:34Z","finishedAt":"2026-02-16T21:13:30Z","containerID":"cri-o://fa5e5b86ee6d022e914514c6e1b9bc40b0ded23b4d78a78dbc84ca8df5d3a2bd"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","containerID":"cri-o://a6a2fb20def4cbde7b9bb47cdfdc79049f26b1950e4d47cb988ac8e11854652c","started":true,"volumeMounts":[{"name":"kube-api-access-g7nmb","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}olm-operator_current.log0000640000000000000000000005177415144705173033440 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/olm-operator-6b56bd877c-vlhvq2026-02-16T21:21:51.398572239Z time="2026-02-16T21:21:51Z" level=info msg="install strategy successful" csv=packageserver id=LeVIG namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:51.498742992Z time="2026-02-16T21:21:51Z" level=info msg="install strategy successful" csv=packageserver id=6Q6gz namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:51.598160865Z time="2026-02-16T21:21:51Z" level=info msg="install strategy successful" csv=packageserver id=Ipd9P namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:51.697808944Z time="2026-02-16T21:21:51Z" level=info msg="install strategy successful" csv=packageserver id=HARQ/ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:51.798264145Z time="2026-02-16T21:21:51Z" level=info msg="install strategy successful" csv=packageserver id=jkJ/C namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:51.898712155Z time="2026-02-16T21:21:51Z" level=info msg="install strategy successful" csv=packageserver id=JM6OA namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:51.998017525Z time="2026-02-16T21:21:51Z" level=info msg="install strategy successful" csv=packageserver id=A69op namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:52.097989003Z time="2026-02-16T21:21:52Z" level=info msg="install strategy successful" csv=packageserver id=CgyAX namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:52.199470362Z time="2026-02-16T21:21:52Z" level=info msg="install strategy successful" csv=packageserver id=T32Ob namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:52.298813363Z time="2026-02-16T21:21:52Z" level=info msg="install strategy successful" csv=packageserver id=8SBMF namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:52.399059617Z time="2026-02-16T21:21:52Z" level=info msg="install strategy successful" csv=packageserver id=WEjr3 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:52.498872781Z time="2026-02-16T21:21:52Z" level=info msg="install strategy successful" csv=packageserver id=P1MWy namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:52.598576622Z time="2026-02-16T21:21:52Z" level=info msg="install strategy successful" csv=packageserver id=M74/c namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:52.697370997Z time="2026-02-16T21:21:52Z" level=info msg="install strategy successful" csv=packageserver id=gGUh2 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:52.800151311Z time="2026-02-16T21:21:52Z" level=info msg="install strategy successful" csv=packageserver id=42uaJ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:52.898946557Z time="2026-02-16T21:21:52Z" level=info msg="install strategy successful" csv=packageserver id=XQqYt namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:52.997933038Z time="2026-02-16T21:21:52Z" level=info msg="install strategy successful" csv=packageserver id=5EfyF namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:53.097464534Z time="2026-02-16T21:21:53Z" level=info msg="install strategy successful" csv=packageserver id=ZnDcy namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:53.198414568Z time="2026-02-16T21:21:53Z" level=info msg="install strategy successful" csv=packageserver id=VqE6u namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:53.298206791Z time="2026-02-16T21:21:53Z" level=info msg="install strategy successful" csv=packageserver id=XiYtq namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:53.398497227Z time="2026-02-16T21:21:53Z" level=info msg="install strategy successful" csv=packageserver id=ZV0sC namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:53.499000349Z time="2026-02-16T21:21:53Z" level=info msg="install strategy successful" csv=packageserver id=z+w+k namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:53.600247892Z time="2026-02-16T21:21:53Z" level=info msg="install strategy successful" csv=packageserver id=41V/e namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:53.698077911Z time="2026-02-16T21:21:53Z" level=info msg="install strategy successful" csv=packageserver id=CtBry namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:53.799234401Z time="2026-02-16T21:21:53Z" level=info msg="install strategy successful" csv=packageserver id=wKG0G namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:53.897908814Z time="2026-02-16T21:21:53Z" level=info msg="install strategy successful" csv=packageserver id=a8ZCz namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:53.999331051Z time="2026-02-16T21:21:53Z" level=info msg="install strategy successful" csv=packageserver id=ZfYsn namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:54.096758750Z time="2026-02-16T21:21:54Z" level=info msg="install strategy successful" csv=packageserver id=sPvti namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:54.198494086Z time="2026-02-16T21:21:54Z" level=info msg="install strategy successful" csv=packageserver id=WAvjb namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:54.297900578Z time="2026-02-16T21:21:54Z" level=info msg="install strategy successful" csv=packageserver id=xQuY7 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:54.397364822Z time="2026-02-16T21:21:54Z" level=info msg="install strategy successful" csv=packageserver id=3IUlj namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:54.498997585Z time="2026-02-16T21:21:54Z" level=info msg="install strategy successful" csv=packageserver id=koAPe namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:54.598190231Z time="2026-02-16T21:21:54Z" level=info msg="install strategy successful" csv=packageserver id=rN6R+ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:54.698572871Z time="2026-02-16T21:21:54Z" level=info msg="install strategy successful" csv=packageserver id=ZBF+/ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:54.797618112Z time="2026-02-16T21:21:54Z" level=info msg="install strategy successful" csv=packageserver id=U2t1q namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:54.896918062Z time="2026-02-16T21:21:54Z" level=info msg="install strategy successful" csv=packageserver id=qdWxQ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:54.997833075Z time="2026-02-16T21:21:54Z" level=info msg="install strategy successful" csv=packageserver id=Ivpoj namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:55.097730972Z time="2026-02-16T21:21:55Z" level=info msg="install strategy successful" csv=packageserver id=wO16u namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:55.197682118Z time="2026-02-16T21:21:55Z" level=info msg="install strategy successful" csv=packageserver id=igG1h namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:55.297415490Z time="2026-02-16T21:21:55Z" level=info msg="install strategy successful" csv=packageserver id=sFpFx namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:55.397817159Z time="2026-02-16T21:21:55Z" level=info msg="install strategy successful" csv=packageserver id=cMeRQ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:55.497417517Z time="2026-02-16T21:21:55Z" level=info msg="install strategy successful" csv=packageserver id=VsHt0 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:55.597059476Z time="2026-02-16T21:21:55Z" level=info msg="install strategy successful" csv=packageserver id=h1KQM namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:55.698011261Z time="2026-02-16T21:21:55Z" level=info msg="install strategy successful" csv=packageserver id=m8X3S namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:55.798624495Z time="2026-02-16T21:21:55Z" level=info msg="install strategy successful" csv=packageserver id=3ygow namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:55.898542522Z time="2026-02-16T21:21:55Z" level=info msg="install strategy successful" csv=packageserver id=spF5z namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:55.997286906Z time="2026-02-16T21:21:55Z" level=info msg="install strategy successful" csv=packageserver id=iGMIG namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:56.096845742Z time="2026-02-16T21:21:56Z" level=info msg="install strategy successful" csv=packageserver id=45y5/ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:56.198356992Z time="2026-02-16T21:21:56Z" level=info msg="install strategy successful" csv=packageserver id=1cMTO namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:56.297086746Z time="2026-02-16T21:21:56Z" level=info msg="install strategy successful" csv=packageserver id=Wfxbw namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:56.397266680Z time="2026-02-16T21:21:56Z" level=info msg="install strategy successful" csv=packageserver id=UAEwP namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:56.497390731Z time="2026-02-16T21:21:56Z" level=info msg="install strategy successful" csv=packageserver id=vmO6v namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:56.600246728Z time="2026-02-16T21:21:56Z" level=info msg="install strategy successful" csv=packageserver id=QFH+X namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:56.696913756Z time="2026-02-16T21:21:56Z" level=info msg="install strategy successful" csv=packageserver id=YpEOC namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:56.797125701Z time="2026-02-16T21:21:56Z" level=info msg="install strategy successful" csv=packageserver id=H+v/X namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:56.897309324Z time="2026-02-16T21:21:56Z" level=info msg="install strategy successful" csv=packageserver id=bfMmk namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:56.997432836Z time="2026-02-16T21:21:56Z" level=info msg="install strategy successful" csv=packageserver id=mIgEx namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:57.097255440Z time="2026-02-16T21:21:57Z" level=info msg="install strategy successful" csv=packageserver id=7bYZA namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:57.197483615Z time="2026-02-16T21:21:57Z" level=info msg="install strategy successful" csv=packageserver id=U5FqJ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:57.297402271Z time="2026-02-16T21:21:57Z" level=info msg="install strategy successful" csv=packageserver id=CxA45 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:57.397613034Z time="2026-02-16T21:21:57Z" level=info msg="install strategy successful" csv=packageserver id=cvOyg namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:57.497254684Z time="2026-02-16T21:21:57Z" level=info msg="install strategy successful" csv=packageserver id=DVpdg namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:57.597178130Z time="2026-02-16T21:21:57Z" level=info msg="install strategy successful" csv=packageserver id=ceKMH namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:57.697840077Z time="2026-02-16T21:21:57Z" level=info msg="install strategy successful" csv=packageserver id=gXJbn namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:57.798122373Z time="2026-02-16T21:21:57Z" level=info msg="install strategy successful" csv=packageserver id=fvLR9 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:57.904732791Z time="2026-02-16T21:21:57Z" level=info msg="install strategy successful" csv=packageserver id=HoJ0P namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:57.997630487Z time="2026-02-16T21:21:57Z" level=info msg="install strategy successful" csv=packageserver id=tgnN4 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:58.097380658Z time="2026-02-16T21:21:58Z" level=info msg="install strategy successful" csv=packageserver id=S3iJv namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:58.198184509Z time="2026-02-16T21:21:58Z" level=info msg="install strategy successful" csv=packageserver id=0a88z namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:58.302203457Z time="2026-02-16T21:21:58Z" level=info msg="install strategy successful" csv=packageserver id=Mnnlh namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:58.397636531Z time="2026-02-16T21:21:58Z" level=info msg="install strategy successful" csv=packageserver id=rzv4P namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:58.497761163Z time="2026-02-16T21:21:58Z" level=info msg="install strategy successful" csv=packageserver id=15+jQ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:58.597304469Z time="2026-02-16T21:21:58Z" level=info msg="install strategy successful" csv=packageserver id=JdOc1 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:58.697886073Z time="2026-02-16T21:21:58Z" level=info msg="install strategy successful" csv=packageserver id=WT2Em namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:58.797841101Z time="2026-02-16T21:21:58Z" level=info msg="install strategy successful" csv=packageserver id=NbslV namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:58.898566358Z time="2026-02-16T21:21:58Z" level=info msg="install strategy successful" csv=packageserver id=f3/So namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:58.997415416Z time="2026-02-16T21:21:58Z" level=info msg="install strategy successful" csv=packageserver id=vvSiI namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:59.098769441Z time="2026-02-16T21:21:59Z" level=info msg="install strategy successful" csv=packageserver id=AwWZY namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:59.198131622Z time="2026-02-16T21:21:59Z" level=info msg="install strategy successful" csv=packageserver id=tPzDY namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:59.297788682Z time="2026-02-16T21:21:59Z" level=info msg="install strategy successful" csv=packageserver id=cyJ2v namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:59.398298354Z time="2026-02-16T21:21:59Z" level=info msg="install strategy successful" csv=packageserver id=G6Vhz namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:59.499027462Z time="2026-02-16T21:21:59Z" level=info msg="install strategy successful" csv=packageserver id=zxiGZ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:59.598072325Z time="2026-02-16T21:21:59Z" level=info msg="install strategy successful" csv=packageserver id=qqOD2 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:59.698357792Z time="2026-02-16T21:21:59Z" level=info msg="install strategy successful" csv=packageserver id=ZhcQr namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:59.797526317Z time="2026-02-16T21:21:59Z" level=info msg="install strategy successful" csv=packageserver id=5ArOj namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:21:59.936498362Z time="2026-02-16T21:21:59Z" level=info msg="install strategy successful" csv=packageserver id=jQXDA namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:22:00.037579660Z time="2026-02-16T21:22:00Z" level=info msg="install strategy successful" csv=packageserver id=Ox/z8 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:22:00.097093941Z time="2026-02-16T21:22:00Z" level=info msg="install strategy successful" csv=packageserver id=M/won namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:22:00.198894229Z time="2026-02-16T21:22:00Z" level=info msg="install strategy successful" csv=packageserver id=GeLqH namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:22:00.299856793Z time="2026-02-16T21:22:00Z" level=info msg="install strategy successful" csv=packageserver id=f2h/L namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:22:00.398703771Z time="2026-02-16T21:22:00Z" level=info msg="install strategy successful" csv=packageserver id=b1UQ+ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:22:00.498858733Z time="2026-02-16T21:22:00Z" level=info msg="install strategy successful" csv=packageserver id=ag0KJ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:22:00.597398603Z time="2026-02-16T21:22:00Z" level=info msg="install strategy successful" csv=packageserver id=4WSUi namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:22:00.699227630Z time="2026-02-16T21:22:00Z" level=info msg="install strategy successful" csv=packageserver id=cyMSE namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:22:00.798458228Z time="2026-02-16T21:22:00Z" level=info msg="install strategy successful" csv=packageserver id=XYcHr namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:22:00.908725825Z time="2026-02-16T21:22:00Z" level=info msg="install strategy successful" csv=packageserver id=0yL4U namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:22:00.997403236Z time="2026-02-16T21:22:00Z" level=info msg="install strategy successful" csv=packageserver id=GXJIH namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:22:01.097851077Z time="2026-02-16T21:22:01Z" level=info msg="install strategy successful" csv=packageserver id=8CRml namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:22:01.197002443Z time="2026-02-16T21:22:01Z" level=info msg="install strategy successful" csv=packageserver id=iAgI8 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-02-16T21:22:01.297556047Z time="2026-02-16T21:22:01Z" level=info msg="install strategy successful" csv=packageserver id=MZHx9 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment collect-profiles_current.log0000640000000000000000000000052415144705173034200 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/collect-profiles-29521275-fl78b2026-02-16T21:19:58.769803635Z time="2026-02-16T21:19:58Z" level=info msg="Successfully created configMap openshift-operator-lifecycle-manager/olm-operator-heap-n4c57" 2026-02-16T21:19:58.827288865Z time="2026-02-16T21:19:58Z" level=info msg="Successfully created configMap openshift-operator-lifecycle-manager/catalog-operator-heap-b6rvw" collect-profiles_current.log0000640000000000000000000000037315144705173034214 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/collect-profiles-29521260-fx98d2026-02-16T21:06:25.951459361Z time="2026-02-16T21:06:25Z" level=info msg="error verifying provided cert and key: cert file should not be empty" 2026-02-16T21:06:25.951459361Z time="2026-02-16T21:06:25Z" level=info msg="generating a new cert and key" catalog-operator_current.log0000640000000000000000000006001615144705173034474 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/catalog-operator-588944557d-h7xl62026-02-16T21:15:50.268060466Z time="2026-02-16T21:15:50Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=J6WVk 2026-02-16T21:15:50.268238250Z time="2026-02-16T21:15:50Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-j5kwc current-pod.namespace=openshift-marketplace id=J6WVk 2026-02-16T21:15:50.268238250Z time="2026-02-16T21:15:50Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-j5kwc current-pod.namespace=openshift-marketplace id=J6WVk 2026-02-16T21:15:50.268238250Z time="2026-02-16T21:15:50Z" level=info msg="checked registry server health" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace health=true id=J6WVk 2026-02-16T21:15:50.268238250Z time="2026-02-16T21:15:50Z" level=info msg="registry state good" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=J6WVk 2026-02-16T21:15:50.268250421Z time="2026-02-16T21:15:50Z" level=info msg="ensuring registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=J6WVk 2026-02-16T21:15:50.269131835Z time="2026-02-16T21:15:50Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=lVtA+ 2026-02-16T21:15:50.269131835Z time="2026-02-16T21:15:50Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-blw8x current-pod.namespace=openshift-marketplace id=lVtA+ 2026-02-16T21:15:50.269131835Z time="2026-02-16T21:15:50Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-blw8x current-pod.namespace=openshift-marketplace id=lVtA+ 2026-02-16T21:15:50.269131835Z time="2026-02-16T21:15:50Z" level=info msg="checked registry server health" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace health=true id=lVtA+ 2026-02-16T21:15:50.269131835Z time="2026-02-16T21:15:50Z" level=info msg="registry state good" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=lVtA+ 2026-02-16T21:15:50.269131835Z time="2026-02-16T21:15:50Z" level=info msg="ensuring registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=lVtA+ 2026-02-16T21:15:51.232521667Z time="2026-02-16T21:15:51Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=J6WVk 2026-02-16T21:15:51.233049581Z time="2026-02-16T21:15:51Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-j5kwc current-pod.namespace=openshift-marketplace id=J6WVk 2026-02-16T21:15:51.233049581Z time="2026-02-16T21:15:51Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-j5kwc current-pod.namespace=openshift-marketplace id=J6WVk 2026-02-16T21:15:51.233049581Z time="2026-02-16T21:15:51Z" level=info msg="ensured registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=J6WVk 2026-02-16T21:15:51.233049581Z time="2026-02-16T21:15:51Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=J6WVk 2026-02-16T21:15:51.242948089Z time="2026-02-16T21:15:51Z" level=info msg="syncing catalog source" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=6awHE 2026-02-16T21:15:51.242948089Z time="2026-02-16T21:15:51Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=6awHE 2026-02-16T21:15:51.431126148Z time="2026-02-16T21:15:51Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=lVtA+ 2026-02-16T21:15:51.431499068Z time="2026-02-16T21:15:51Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-blw8x current-pod.namespace=openshift-marketplace id=lVtA+ 2026-02-16T21:15:51.431499068Z time="2026-02-16T21:15:51Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-blw8x current-pod.namespace=openshift-marketplace id=lVtA+ 2026-02-16T21:15:51.431499068Z time="2026-02-16T21:15:51Z" level=info msg="ensured registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=lVtA+ 2026-02-16T21:15:51.431499068Z time="2026-02-16T21:15:51Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=lVtA+ 2026-02-16T21:15:51.441828268Z time="2026-02-16T21:15:51Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=nbJgb 2026-02-16T21:15:51.441828268Z time="2026-02-16T21:15:51Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=nbJgb 2026-02-16T21:15:52.031068843Z time="2026-02-16T21:15:52Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=6awHE 2026-02-16T21:15:52.031158266Z time="2026-02-16T21:15:52Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-sn2nh current-pod.namespace=openshift-marketplace id=6awHE 2026-02-16T21:15:52.031158266Z time="2026-02-16T21:15:52Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-sn2nh current-pod.namespace=openshift-marketplace id=6awHE 2026-02-16T21:15:52.031158266Z time="2026-02-16T21:15:52Z" level=info msg="checked registry server health" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace health=true id=6awHE 2026-02-16T21:15:52.031170196Z time="2026-02-16T21:15:52Z" level=info msg="registry state good" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=6awHE 2026-02-16T21:15:52.031170196Z time="2026-02-16T21:15:52Z" level=info msg="ensuring registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=6awHE 2026-02-16T21:15:52.232322056Z time="2026-02-16T21:15:52Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=nbJgb 2026-02-16T21:15:52.232427109Z time="2026-02-16T21:15:52Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-69wj8 current-pod.namespace=openshift-marketplace id=nbJgb 2026-02-16T21:15:52.232427109Z time="2026-02-16T21:15:52Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-69wj8 current-pod.namespace=openshift-marketplace id=nbJgb 2026-02-16T21:15:52.232454430Z time="2026-02-16T21:15:52Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=nbJgb 2026-02-16T21:15:52.232454430Z time="2026-02-16T21:15:52Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=nbJgb 2026-02-16T21:15:52.232454430Z time="2026-02-16T21:15:52Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=nbJgb 2026-02-16T21:15:53.231831227Z time="2026-02-16T21:15:53Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=6awHE 2026-02-16T21:15:53.231895309Z time="2026-02-16T21:15:53Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-sn2nh current-pod.namespace=openshift-marketplace id=6awHE 2026-02-16T21:15:53.231895309Z time="2026-02-16T21:15:53Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-sn2nh current-pod.namespace=openshift-marketplace id=6awHE 2026-02-16T21:15:53.232006502Z time="2026-02-16T21:15:53Z" level=info msg="ensured registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=6awHE 2026-02-16T21:15:53.232006502Z time="2026-02-16T21:15:53Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=6awHE 2026-02-16T21:15:53.232040903Z time="2026-02-16T21:15:53Z" level=info msg="syncing catalog source" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=P8eaF 2026-02-16T21:15:53.232056783Z time="2026-02-16T21:15:53Z" level=info msg="synchronizing registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=P8eaF 2026-02-16T21:15:53.431927899Z time="2026-02-16T21:15:53Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=nbJgb 2026-02-16T21:15:53.432082343Z time="2026-02-16T21:15:53Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-69wj8 current-pod.namespace=openshift-marketplace id=nbJgb 2026-02-16T21:15:53.432082343Z time="2026-02-16T21:15:53Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-69wj8 current-pod.namespace=openshift-marketplace id=nbJgb 2026-02-16T21:15:53.432246047Z time="2026-02-16T21:15:53Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=nbJgb 2026-02-16T21:15:53.432246047Z time="2026-02-16T21:15:53Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=nbJgb 2026-02-16T21:15:53.432331040Z time="2026-02-16T21:15:53Z" level=info msg="syncing catalog source" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=/q4Q2 2026-02-16T21:15:53.432344580Z time="2026-02-16T21:15:53Z" level=info msg="synchronizing registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=/q4Q2 2026-02-16T21:15:54.031756270Z time="2026-02-16T21:15:54Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=P8eaF 2026-02-16T21:15:54.031848183Z time="2026-02-16T21:15:54Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-j5kwc current-pod.namespace=openshift-marketplace id=P8eaF 2026-02-16T21:15:54.031848183Z time="2026-02-16T21:15:54Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-j5kwc current-pod.namespace=openshift-marketplace id=P8eaF 2026-02-16T21:15:54.031857643Z time="2026-02-16T21:15:54Z" level=info msg="checked registry server health" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace health=true id=P8eaF 2026-02-16T21:15:54.031865453Z time="2026-02-16T21:15:54Z" level=info msg="registry state good" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=P8eaF 2026-02-16T21:15:54.031874593Z time="2026-02-16T21:15:54Z" level=info msg="ensuring registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=P8eaF 2026-02-16T21:15:54.232434257Z time="2026-02-16T21:15:54Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=/q4Q2 2026-02-16T21:15:54.232577751Z time="2026-02-16T21:15:54Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-blw8x current-pod.namespace=openshift-marketplace id=/q4Q2 2026-02-16T21:15:54.232577751Z time="2026-02-16T21:15:54Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-blw8x current-pod.namespace=openshift-marketplace id=/q4Q2 2026-02-16T21:15:54.232577751Z time="2026-02-16T21:15:54Z" level=info msg="checked registry server health" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace health=true id=/q4Q2 2026-02-16T21:15:54.232577751Z time="2026-02-16T21:15:54Z" level=info msg="registry state good" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=/q4Q2 2026-02-16T21:15:54.232600972Z time="2026-02-16T21:15:54Z" level=info msg="ensuring registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=/q4Q2 2026-02-16T21:15:55.232904205Z time="2026-02-16T21:15:55Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=P8eaF 2026-02-16T21:15:55.233084240Z time="2026-02-16T21:15:55Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-j5kwc current-pod.namespace=openshift-marketplace id=P8eaF 2026-02-16T21:15:55.233084240Z time="2026-02-16T21:15:55Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-j5kwc current-pod.namespace=openshift-marketplace id=P8eaF 2026-02-16T21:15:55.233262615Z time="2026-02-16T21:15:55Z" level=info msg="ensured registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=P8eaF 2026-02-16T21:15:55.233262615Z time="2026-02-16T21:15:55Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=P8eaF 2026-02-16T21:15:55.431637850Z time="2026-02-16T21:15:55Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=/q4Q2 2026-02-16T21:15:55.431846215Z time="2026-02-16T21:15:55Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-blw8x current-pod.namespace=openshift-marketplace id=/q4Q2 2026-02-16T21:15:55.431846215Z time="2026-02-16T21:15:55Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-blw8x current-pod.namespace=openshift-marketplace id=/q4Q2 2026-02-16T21:15:55.432009710Z time="2026-02-16T21:15:55Z" level=info msg="ensured registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=/q4Q2 2026-02-16T21:15:55.432009710Z time="2026-02-16T21:15:55Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=/q4Q2 2026-02-16T21:19:24.329025487Z time="2026-02-16T21:19:24Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=B8ujJ 2026-02-16T21:19:24.329025487Z time="2026-02-16T21:19:24Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=B8ujJ 2026-02-16T21:19:24.339319326Z time="2026-02-16T21:19:24Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=B8ujJ 2026-02-16T21:19:24.339501110Z time="2026-02-16T21:19:24Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-69wj8 current-pod.namespace=openshift-marketplace id=B8ujJ 2026-02-16T21:19:24.339501110Z time="2026-02-16T21:19:24Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-69wj8 current-pod.namespace=openshift-marketplace id=B8ujJ 2026-02-16T21:19:24.339538461Z time="2026-02-16T21:19:24Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=B8ujJ 2026-02-16T21:19:24.339538461Z time="2026-02-16T21:19:24Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=B8ujJ 2026-02-16T21:19:24.339538461Z time="2026-02-16T21:19:24Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=B8ujJ 2026-02-16T21:19:24.356712520Z time="2026-02-16T21:19:24Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=B8ujJ 2026-02-16T21:19:24.356908025Z time="2026-02-16T21:19:24Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-69wj8 current-pod.namespace=openshift-marketplace id=B8ujJ 2026-02-16T21:19:24.356921645Z time="2026-02-16T21:19:24Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-69wj8 current-pod.namespace=openshift-marketplace id=B8ujJ 2026-02-16T21:19:24.357124021Z time="2026-02-16T21:19:24Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=B8ujJ 2026-02-16T21:19:24.357124021Z time="2026-02-16T21:19:24Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=B8ujJ 2026-02-16T21:19:59.635697583Z time="2026-02-16T21:19:59Z" level=info msg="syncing catalog source" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=UdFhl 2026-02-16T21:19:59.635697583Z time="2026-02-16T21:19:59Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=UdFhl 2026-02-16T21:19:59.641430053Z time="2026-02-16T21:19:59Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=UdFhl 2026-02-16T21:19:59.641430053Z time="2026-02-16T21:19:59Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-sn2nh current-pod.namespace=openshift-marketplace id=UdFhl 2026-02-16T21:19:59.641430053Z time="2026-02-16T21:19:59Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-sn2nh current-pod.namespace=openshift-marketplace id=UdFhl 2026-02-16T21:19:59.641430053Z time="2026-02-16T21:19:59Z" level=info msg="checked registry server health" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace health=true id=UdFhl 2026-02-16T21:19:59.641430053Z time="2026-02-16T21:19:59Z" level=info msg="registry state good" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=UdFhl 2026-02-16T21:19:59.641430053Z time="2026-02-16T21:19:59Z" level=info msg="ensuring registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=UdFhl 2026-02-16T21:19:59.650124330Z time="2026-02-16T21:19:59Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=UdFhl 2026-02-16T21:19:59.650268894Z time="2026-02-16T21:19:59Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-sn2nh current-pod.namespace=openshift-marketplace id=UdFhl 2026-02-16T21:19:59.650268894Z time="2026-02-16T21:19:59Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-sn2nh current-pod.namespace=openshift-marketplace id=UdFhl 2026-02-16T21:19:59.650379517Z time="2026-02-16T21:19:59Z" level=info msg="ensured registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=UdFhl 2026-02-16T21:19:59.650379517Z time="2026-02-16T21:19:59Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=UdFhl config/pod/openshift-etcd-operator/logs/etcd-operator-67bf55ccdd-8cllz/etcd-operator_current.log0000640000000000000000000017147715144705173031401 0ustar00000000000000002026-02-16T21:16:09.858761897Z I0216 21:16:09.858279 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"9b75eec8-d994-4d7f-bcab-0e1f85d84eae", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/etcd changed: Degraded message changed from "NodeControllerDegraded: All master nodes are ready\nEtcdMembersDegraded: No unhealthy members found" to "NodeControllerDegraded: All master nodes are ready\nMissingStaticPodControllerDegraded: static pod lifecycle failure - static pod: \"etcd\" in namespace: \"openshift-etcd\" for revision: 2 on node: \"master-0\" didn't show up, waited: 3m30s\nEtcdMembersDegraded: No unhealthy members found" 2026-02-16T21:16:09.858761897Z I0216 21:16:09.858323 1 status_controller.go:225] clusteroperator/etcd diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-16T21:10:21Z","message":"ScriptControllerDegraded: \"configmap/etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-scripts)\nNodeControllerDegraded: All master nodes are ready\nMissingStaticPodControllerDegraded: static pod lifecycle failure - static pod: \"etcd\" in namespace: \"openshift-etcd\" for revision: 2 on node: \"master-0\" didn't show up, waited: 3m30s\nEtcdEndpointsDegraded: applying configmap update failed :the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-endpoints)\nTargetConfigControllerDegraded: \"configmap/etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-pod)\nTargetConfigControllerDegraded: \"configmap/restore-etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps restore-etcd-pod)\nEtcdMembersDegraded: No unhealthy members found","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-16T21:10:33Z","message":"NodeInstallerProgressing: 1 node is at revision 1; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-16T21:10:23Z","message":"StaticPodsAvailable: 1 nodes are active; 1 node is at revision 1; 0 nodes have achieved new revision 2\nEtcdMembersAvailable: 1 members are available","reason":"AsExpected","status":"True","type":"Available"},{"lastTransitionTime":"2026-02-16T20:57:12Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-16T20:57:12Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-16T21:16:09.871265186Z E0216 21:16:09.870903 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_etcd reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"etcd\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-16T21:16:09.878839911Z I0216 21:16:09.878734 1 status_controller.go:225] clusteroperator/etcd diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-16T21:10:21Z","message":"ScriptControllerDegraded: \"configmap/etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-scripts)\nNodeControllerDegraded: All master nodes are ready\nMissingStaticPodControllerDegraded: static pod lifecycle failure - static pod: \"etcd\" in namespace: \"openshift-etcd\" for revision: 2 on node: \"master-0\" didn't show up, waited: 3m30s\nEtcdEndpointsDegraded: applying configmap update failed :the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-endpoints)\nTargetConfigControllerDegraded: \"configmap/etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-pod)\nTargetConfigControllerDegraded: \"configmap/restore-etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps restore-etcd-pod)\nEtcdMembersDegraded: No unhealthy members found","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-16T21:10:33Z","message":"NodeInstallerProgressing: 1 node is at revision 1; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-16T21:10:23Z","message":"StaticPodsAvailable: 1 nodes are active; 1 node is at revision 1; 0 nodes have achieved new revision 2\nEtcdMembersAvailable: 1 members are available","reason":"AsExpected","status":"True","type":"Available"},{"lastTransitionTime":"2026-02-16T20:57:12Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-16T20:57:12Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-16T21:16:09.887883096Z E0216 21:16:09.887803 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_etcd reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"etcd\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-16T21:16:09.900151638Z I0216 21:16:09.900068 1 status_controller.go:225] clusteroperator/etcd diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-16T21:10:21Z","message":"ScriptControllerDegraded: \"configmap/etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-scripts)\nNodeControllerDegraded: All master nodes are ready\nMissingStaticPodControllerDegraded: static pod lifecycle failure - static pod: \"etcd\" in namespace: \"openshift-etcd\" for revision: 2 on node: \"master-0\" didn't show up, waited: 3m30s\nEtcdEndpointsDegraded: applying configmap update failed :the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-endpoints)\nTargetConfigControllerDegraded: \"configmap/etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-pod)\nTargetConfigControllerDegraded: \"configmap/restore-etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps restore-etcd-pod)\nEtcdMembersDegraded: No unhealthy members found","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-16T21:10:33Z","message":"NodeInstallerProgressing: 1 node is at revision 1; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-16T21:10:23Z","message":"StaticPodsAvailable: 1 nodes are active; 1 node is at revision 1; 0 nodes have achieved new revision 2\nEtcdMembersAvailable: 1 members are available","reason":"AsExpected","status":"True","type":"Available"},{"lastTransitionTime":"2026-02-16T20:57:12Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-16T20:57:12Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-16T21:16:09.909676756Z E0216 21:16:09.908961 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_etcd reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"etcd\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-16T21:16:09.912558824Z I0216 21:16:09.912511 1 status_controller.go:225] clusteroperator/etcd diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-16T21:10:21Z","message":"ScriptControllerDegraded: \"configmap/etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-scripts)\nNodeControllerDegraded: All master nodes are ready\nMissingStaticPodControllerDegraded: static pod lifecycle failure - static pod: \"etcd\" in namespace: \"openshift-etcd\" for revision: 2 on node: \"master-0\" didn't show up, waited: 3m30s\nEtcdEndpointsDegraded: applying configmap update failed :the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-endpoints)\nTargetConfigControllerDegraded: \"configmap/etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-pod)\nTargetConfigControllerDegraded: \"configmap/restore-etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps restore-etcd-pod)\nEtcdMembersDegraded: No unhealthy members found","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-16T21:10:33Z","message":"NodeInstallerProgressing: 1 node is at revision 1; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-16T21:10:23Z","message":"StaticPodsAvailable: 1 nodes are active; 1 node is at revision 1; 0 nodes have achieved new revision 2\nEtcdMembersAvailable: 1 members are available","reason":"AsExpected","status":"True","type":"Available"},{"lastTransitionTime":"2026-02-16T20:57:12Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-16T20:57:12Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-16T21:16:09.930391848Z I0216 21:16:09.930319 1 status_controller.go:225] clusteroperator/etcd diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-16T21:10:21Z","message":"ScriptControllerDegraded: \"configmap/etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-scripts)\nNodeControllerDegraded: All master nodes are ready\nMissingStaticPodControllerDegraded: static pod lifecycle failure - static pod: \"etcd\" in namespace: \"openshift-etcd\" for revision: 2 on node: \"master-0\" didn't show up, waited: 3m30s\nEtcdEndpointsDegraded: applying configmap update failed :the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-endpoints)\nTargetConfigControllerDegraded: \"configmap/etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-pod)\nTargetConfigControllerDegraded: \"configmap/restore-etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps restore-etcd-pod)\nEtcdMembersDegraded: No unhealthy members found","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-16T21:10:33Z","message":"NodeInstallerProgressing: 1 node is at revision 1; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-16T21:10:23Z","message":"StaticPodsAvailable: 1 nodes are active; 1 node is at revision 1; 0 nodes have achieved new revision 2\nEtcdMembersAvailable: 1 members are available","reason":"AsExpected","status":"True","type":"Available"},{"lastTransitionTime":"2026-02-16T20:57:12Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-16T20:57:12Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-16T21:16:09.930423128Z I0216 21:16:09.930387 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"9b75eec8-d994-4d7f-bcab-0e1f85d84eae", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/etcd changed: Degraded message changed from "NodeControllerDegraded: All master nodes are ready\nMissingStaticPodControllerDegraded: static pod lifecycle failure - static pod: \"etcd\" in namespace: \"openshift-etcd\" for revision: 2 on node: \"master-0\" didn't show up, waited: 3m30s\nEtcdMembersDegraded: No unhealthy members found" to "ScriptControllerDegraded: \"configmap/etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-scripts)\nNodeControllerDegraded: All master nodes are ready\nMissingStaticPodControllerDegraded: static pod lifecycle failure - static pod: \"etcd\" in namespace: \"openshift-etcd\" for revision: 2 on node: \"master-0\" didn't show up, waited: 3m30s\nEtcdEndpointsDegraded: applying configmap update failed :the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-endpoints)\nTargetConfigControllerDegraded: \"configmap/etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-pod)\nTargetConfigControllerDegraded: \"configmap/restore-etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps restore-etcd-pod)\nEtcdMembersDegraded: No unhealthy members found" 2026-02-16T21:16:09.935550128Z E0216 21:16:09.935472 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_etcd reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"etcd\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-16T21:16:13.436182358Z E0216 21:16:13.436030 1 base_controller.go:279] "Unhandled Error" err="EtcdStaticResources-StaticResources reconciliation failed: [\"etcd/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-etcd), \"etcd/sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts etcd-sa), \"etcd/svc.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get services etcd), \"etcd/prometheus-rolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get rolebindings.rbac.authorization.k8s.io prometheus-k8s)]" 2026-02-16T21:16:13.444288538Z I0216 21:16:13.443318 1 status_controller.go:225] clusteroperator/etcd diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-16T21:10:21Z","message":"ScriptControllerDegraded: \"configmap/etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-scripts)\nNodeControllerDegraded: All master nodes are ready\nMissingStaticPodControllerDegraded: static pod lifecycle failure - static pod: \"etcd\" in namespace: \"openshift-etcd\" for revision: 2 on node: \"master-0\" didn't show up, waited: 3m30s\nEtcdEndpointsDegraded: applying configmap update failed :the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-endpoints)\nEtcdStaticResourcesDegraded: \"etcd/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-etcd)\nEtcdStaticResourcesDegraded: \"etcd/sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts etcd-sa)\nEtcdStaticResourcesDegraded: \"etcd/svc.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get services etcd)\nEtcdStaticResourcesDegraded: \"etcd/prometheus-rolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get rolebindings.rbac.authorization.k8s.io prometheus-k8s)\nEtcdStaticResourcesDegraded: \nTargetConfigControllerDegraded: \"configmap/etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-pod)\nTargetConfigControllerDegraded: \"configmap/restore-etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps restore-etcd-pod)\nEtcdMembersDegraded: No unhealthy members found","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-16T21:10:33Z","message":"NodeInstallerProgressing: 1 node is at revision 1; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-16T21:10:23Z","message":"StaticPodsAvailable: 1 nodes are active; 1 node is at revision 1; 0 nodes have achieved new revision 2\nEtcdMembersAvailable: 1 members are available","reason":"AsExpected","status":"True","type":"Available"},{"lastTransitionTime":"2026-02-16T20:57:12Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-16T20:57:12Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-16T21:16:13.444720739Z I0216 21:16:13.443382 1 prune_controller.go:277] Nothing to prune 2026-02-16T21:16:13.446178708Z E0216 21:16:13.446117 1 base_controller.go:279] "Unhandled Error" err="MissingStaticPodController reconciliation failed: static pod lifecycle failure - static pod: \"etcd\" in namespace: \"openshift-etcd\" for revision: 2 on node: \"master-0\" didn't show up, waited: 3m30s" 2026-02-16T21:16:13.458818341Z I0216 21:16:13.458729 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"9b75eec8-d994-4d7f-bcab-0e1f85d84eae", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/etcd changed: Degraded message changed from "ScriptControllerDegraded: \"configmap/etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-scripts)\nNodeControllerDegraded: All master nodes are ready\nMissingStaticPodControllerDegraded: static pod lifecycle failure - static pod: \"etcd\" in namespace: \"openshift-etcd\" for revision: 2 on node: \"master-0\" didn't show up, waited: 3m30s\nEtcdEndpointsDegraded: applying configmap update failed :the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-endpoints)\nTargetConfigControllerDegraded: \"configmap/etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-pod)\nTargetConfigControllerDegraded: \"configmap/restore-etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps restore-etcd-pod)\nEtcdMembersDegraded: No unhealthy members found" to "ScriptControllerDegraded: \"configmap/etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-scripts)\nNodeControllerDegraded: All master nodes are ready\nMissingStaticPodControllerDegraded: static pod lifecycle failure - static pod: \"etcd\" in namespace: \"openshift-etcd\" for revision: 2 on node: \"master-0\" didn't show up, waited: 3m30s\nEtcdEndpointsDegraded: applying configmap update failed :the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-endpoints)\nEtcdStaticResourcesDegraded: \"etcd/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-etcd)\nEtcdStaticResourcesDegraded: \"etcd/sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts etcd-sa)\nEtcdStaticResourcesDegraded: \"etcd/svc.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get services etcd)\nEtcdStaticResourcesDegraded: \"etcd/prometheus-rolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get rolebindings.rbac.authorization.k8s.io prometheus-k8s)\nEtcdStaticResourcesDegraded: \nTargetConfigControllerDegraded: \"configmap/etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-pod)\nTargetConfigControllerDegraded: \"configmap/restore-etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps restore-etcd-pod)\nEtcdMembersDegraded: No unhealthy members found" 2026-02-16T21:16:13.472062600Z I0216 21:16:13.471989 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because waiting for static pod of revision 2, found 1 2026-02-16T21:16:13.968769298Z I0216 21:16:13.968634 1 etcdcertsignercontroller.go:241] skipping EtcdCertSignerController can't get current revision. Err=revision rollout in progress, can't establish current revision 2026-02-16T21:16:13.978751878Z I0216 21:16:13.975750 1 status_controller.go:225] clusteroperator/etcd diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-16T21:10:21Z","message":"ScriptControllerDegraded: \"configmap/etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-scripts)\nNodeControllerDegraded: All master nodes are ready\nMissingStaticPodControllerDegraded: static pod lifecycle failure - static pod: \"etcd\" in namespace: \"openshift-etcd\" for revision: 2 on node: \"master-0\" didn't show up, waited: 3m30s\nEtcdStaticResourcesDegraded: \"etcd/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-etcd)\nEtcdStaticResourcesDegraded: \"etcd/sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts etcd-sa)\nEtcdStaticResourcesDegraded: \"etcd/svc.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get services etcd)\nEtcdStaticResourcesDegraded: \"etcd/prometheus-rolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get rolebindings.rbac.authorization.k8s.io prometheus-k8s)\nEtcdStaticResourcesDegraded: \nTargetConfigControllerDegraded: \"configmap/etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-pod)\nTargetConfigControllerDegraded: \"configmap/restore-etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps restore-etcd-pod)\nEtcdMembersDegraded: No unhealthy members found","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-16T21:10:33Z","message":"NodeInstallerProgressing: 1 node is at revision 1; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-16T21:10:23Z","message":"StaticPodsAvailable: 1 nodes are active; 1 node is at revision 1; 0 nodes have achieved new revision 2\nEtcdMembersAvailable: 1 members are available","reason":"AsExpected","status":"True","type":"Available"},{"lastTransitionTime":"2026-02-16T20:57:12Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-16T20:57:12Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-16T21:16:13.978751878Z I0216 21:16:13.977742 1 prune_controller.go:277] Nothing to prune 2026-02-16T21:16:14.004894567Z E0216 21:16:14.004093 1 base_controller.go:279] "Unhandled Error" err="MissingStaticPodController reconciliation failed: static pod lifecycle failure - static pod: \"etcd\" in namespace: \"openshift-etcd\" for revision: 2 on node: \"master-0\" didn't show up, waited: 3m30s" 2026-02-16T21:16:14.012425571Z I0216 21:16:14.012321 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"9b75eec8-d994-4d7f-bcab-0e1f85d84eae", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/etcd changed: Degraded message changed from "ScriptControllerDegraded: \"configmap/etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-scripts)\nNodeControllerDegraded: All master nodes are ready\nMissingStaticPodControllerDegraded: static pod lifecycle failure - static pod: \"etcd\" in namespace: \"openshift-etcd\" for revision: 2 on node: \"master-0\" didn't show up, waited: 3m30s\nEtcdEndpointsDegraded: applying configmap update failed :the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-endpoints)\nEtcdStaticResourcesDegraded: \"etcd/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-etcd)\nEtcdStaticResourcesDegraded: \"etcd/sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts etcd-sa)\nEtcdStaticResourcesDegraded: \"etcd/svc.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get services etcd)\nEtcdStaticResourcesDegraded: \"etcd/prometheus-rolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get rolebindings.rbac.authorization.k8s.io prometheus-k8s)\nEtcdStaticResourcesDegraded: \nTargetConfigControllerDegraded: \"configmap/etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-pod)\nTargetConfigControllerDegraded: \"configmap/restore-etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps restore-etcd-pod)\nEtcdMembersDegraded: No unhealthy members found" to "ScriptControllerDegraded: \"configmap/etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-scripts)\nNodeControllerDegraded: All master nodes are ready\nMissingStaticPodControllerDegraded: static pod lifecycle failure - static pod: \"etcd\" in namespace: \"openshift-etcd\" for revision: 2 on node: \"master-0\" didn't show up, waited: 3m30s\nEtcdStaticResourcesDegraded: \"etcd/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-etcd)\nEtcdStaticResourcesDegraded: \"etcd/sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts etcd-sa)\nEtcdStaticResourcesDegraded: \"etcd/svc.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get services etcd)\nEtcdStaticResourcesDegraded: \"etcd/prometheus-rolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get rolebindings.rbac.authorization.k8s.io prometheus-k8s)\nEtcdStaticResourcesDegraded: \nTargetConfigControllerDegraded: \"configmap/etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-pod)\nTargetConfigControllerDegraded: \"configmap/restore-etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps restore-etcd-pod)\nEtcdMembersDegraded: No unhealthy members found" 2026-02-16T21:16:14.012667888Z I0216 21:16:14.012591 1 status_controller.go:225] clusteroperator/etcd diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-16T21:10:21Z","message":"ScriptControllerDegraded: \"configmap/etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-scripts)\nNodeControllerDegraded: All master nodes are ready\nMissingStaticPodControllerDegraded: static pod lifecycle failure - static pod: \"etcd\" in namespace: \"openshift-etcd\" for revision: 2 on node: \"master-0\" didn't show up, waited: 3m30s\nEtcdStaticResourcesDegraded: \"etcd/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-etcd)\nEtcdStaticResourcesDegraded: \"etcd/sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts etcd-sa)\nEtcdStaticResourcesDegraded: \"etcd/svc.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get services etcd)\nEtcdStaticResourcesDegraded: \"etcd/prometheus-rolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get rolebindings.rbac.authorization.k8s.io prometheus-k8s)\nEtcdStaticResourcesDegraded: \nTargetConfigControllerDegraded: \"configmap/etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-pod)\nTargetConfigControllerDegraded: \"configmap/restore-etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps restore-etcd-pod)\nEtcdMembersDegraded: No unhealthy members found","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-16T21:10:33Z","message":"NodeInstallerProgressing: 1 node is at revision 1; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-16T21:10:23Z","message":"StaticPodsAvailable: 1 nodes are active; 1 node is at revision 1; 0 nodes have achieved new revision 2\nEtcdMembersAvailable: 1 members are available","reason":"AsExpected","status":"True","type":"Available"},{"lastTransitionTime":"2026-02-16T20:57:12Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-16T20:57:12Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-16T21:16:14.021697352Z E0216 21:16:14.021211 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_etcd reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"etcd\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-16T21:16:14.037048258Z I0216 21:16:14.036966 1 prune_controller.go:277] Nothing to prune 2026-02-16T21:16:14.037848500Z I0216 21:16:14.037793 1 status_controller.go:225] clusteroperator/etcd diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-16T21:10:21Z","message":"ScriptControllerDegraded: \"configmap/etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-scripts)\nNodeControllerDegraded: All master nodes are ready\nMissingStaticPodControllerDegraded: static pod lifecycle failure - static pod: \"etcd\" in namespace: \"openshift-etcd\" for revision: 2 on node: \"master-0\" didn't show up, waited: 3m30s\nEtcdStaticResourcesDegraded: \"etcd/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-etcd)\nEtcdStaticResourcesDegraded: \"etcd/sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts etcd-sa)\nEtcdStaticResourcesDegraded: \"etcd/svc.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get services etcd)\nEtcdStaticResourcesDegraded: \"etcd/prometheus-rolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get rolebindings.rbac.authorization.k8s.io prometheus-k8s)\nEtcdStaticResourcesDegraded: \nEtcdMembersDegraded: No unhealthy members found","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-16T21:10:33Z","message":"NodeInstallerProgressing: 1 node is at revision 1; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-16T21:10:23Z","message":"StaticPodsAvailable: 1 nodes are active; 1 node is at revision 1; 0 nodes have achieved new revision 2\nEtcdMembersAvailable: 1 members are available","reason":"AsExpected","status":"True","type":"Available"},{"lastTransitionTime":"2026-02-16T20:57:12Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-16T20:57:12Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-16T21:16:14.039927366Z E0216 21:16:14.039882 1 base_controller.go:279] "Unhandled Error" err="MissingStaticPodController reconciliation failed: static pod lifecycle failure - static pod: \"etcd\" in namespace: \"openshift-etcd\" for revision: 2 on node: \"master-0\" didn't show up, waited: 3m30s" 2026-02-16T21:16:14.047120811Z I0216 21:16:14.047041 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"9b75eec8-d994-4d7f-bcab-0e1f85d84eae", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/etcd changed: Degraded message changed from "ScriptControllerDegraded: \"configmap/etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-scripts)\nNodeControllerDegraded: All master nodes are ready\nMissingStaticPodControllerDegraded: static pod lifecycle failure - static pod: \"etcd\" in namespace: \"openshift-etcd\" for revision: 2 on node: \"master-0\" didn't show up, waited: 3m30s\nEtcdStaticResourcesDegraded: \"etcd/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-etcd)\nEtcdStaticResourcesDegraded: \"etcd/sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts etcd-sa)\nEtcdStaticResourcesDegraded: \"etcd/svc.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get services etcd)\nEtcdStaticResourcesDegraded: \"etcd/prometheus-rolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get rolebindings.rbac.authorization.k8s.io prometheus-k8s)\nEtcdStaticResourcesDegraded: \nTargetConfigControllerDegraded: \"configmap/etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-pod)\nTargetConfigControllerDegraded: \"configmap/restore-etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps restore-etcd-pod)\nEtcdMembersDegraded: No unhealthy members found" to "ScriptControllerDegraded: \"configmap/etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-scripts)\nNodeControllerDegraded: All master nodes are ready\nMissingStaticPodControllerDegraded: static pod lifecycle failure - static pod: \"etcd\" in namespace: \"openshift-etcd\" for revision: 2 on node: \"master-0\" didn't show up, waited: 3m30s\nEtcdStaticResourcesDegraded: \"etcd/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-etcd)\nEtcdStaticResourcesDegraded: \"etcd/sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts etcd-sa)\nEtcdStaticResourcesDegraded: \"etcd/svc.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get services etcd)\nEtcdStaticResourcesDegraded: \"etcd/prometheus-rolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get rolebindings.rbac.authorization.k8s.io prometheus-k8s)\nEtcdStaticResourcesDegraded: \nEtcdMembersDegraded: No unhealthy members found" 2026-02-16T21:16:14.117215720Z I0216 21:16:14.117125 1 prune_controller.go:277] Nothing to prune 2026-02-16T21:16:14.117675453Z E0216 21:16:14.117620 1 base_controller.go:279] "Unhandled Error" err="MissingStaticPodController reconciliation failed: static pod lifecycle failure - static pod: \"etcd\" in namespace: \"openshift-etcd\" for revision: 2 on node: \"master-0\" didn't show up, waited: 3m30s" 2026-02-16T21:16:14.117960471Z I0216 21:16:14.117916 1 status_controller.go:225] clusteroperator/etcd diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-16T21:10:21Z","message":"NodeControllerDegraded: All master nodes are ready\nMissingStaticPodControllerDegraded: static pod lifecycle failure - static pod: \"etcd\" in namespace: \"openshift-etcd\" for revision: 2 on node: \"master-0\" didn't show up, waited: 3m30s\nEtcdStaticResourcesDegraded: \"etcd/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-etcd)\nEtcdStaticResourcesDegraded: \"etcd/sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts etcd-sa)\nEtcdStaticResourcesDegraded: \"etcd/svc.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get services etcd)\nEtcdStaticResourcesDegraded: \"etcd/prometheus-rolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get rolebindings.rbac.authorization.k8s.io prometheus-k8s)\nEtcdStaticResourcesDegraded: \nEtcdMembersDegraded: No unhealthy members found","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-16T21:10:33Z","message":"NodeInstallerProgressing: 1 node is at revision 1; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-16T21:10:23Z","message":"StaticPodsAvailable: 1 nodes are active; 1 node is at revision 1; 0 nodes have achieved new revision 2\nEtcdMembersAvailable: 1 members are available","reason":"AsExpected","status":"True","type":"Available"},{"lastTransitionTime":"2026-02-16T20:57:12Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-16T20:57:12Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-16T21:16:14.128600538Z I0216 21:16:14.128507 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"9b75eec8-d994-4d7f-bcab-0e1f85d84eae", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/etcd changed: Degraded message changed from "ScriptControllerDegraded: \"configmap/etcd-pod\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps etcd-scripts)\nNodeControllerDegraded: All master nodes are ready\nMissingStaticPodControllerDegraded: static pod lifecycle failure - static pod: \"etcd\" in namespace: \"openshift-etcd\" for revision: 2 on node: \"master-0\" didn't show up, waited: 3m30s\nEtcdStaticResourcesDegraded: \"etcd/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-etcd)\nEtcdStaticResourcesDegraded: \"etcd/sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts etcd-sa)\nEtcdStaticResourcesDegraded: \"etcd/svc.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get services etcd)\nEtcdStaticResourcesDegraded: \"etcd/prometheus-rolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get rolebindings.rbac.authorization.k8s.io prometheus-k8s)\nEtcdStaticResourcesDegraded: \nEtcdMembersDegraded: No unhealthy members found" to "NodeControllerDegraded: All master nodes are ready\nMissingStaticPodControllerDegraded: static pod lifecycle failure - static pod: \"etcd\" in namespace: \"openshift-etcd\" for revision: 2 on node: \"master-0\" didn't show up, waited: 3m30s\nEtcdStaticResourcesDegraded: \"etcd/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-etcd)\nEtcdStaticResourcesDegraded: \"etcd/sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts etcd-sa)\nEtcdStaticResourcesDegraded: \"etcd/svc.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get services etcd)\nEtcdStaticResourcesDegraded: \"etcd/prometheus-rolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get rolebindings.rbac.authorization.k8s.io prometheus-k8s)\nEtcdStaticResourcesDegraded: \nEtcdMembersDegraded: No unhealthy members found" 2026-02-16T21:16:14.648780013Z I0216 21:16:14.648702 1 etcdcertsignercontroller.go:241] skipping EtcdCertSignerController can't get current revision. Err=revision rollout in progress, can't establish current revision 2026-02-16T21:16:15.039746706Z I0216 21:16:15.039640 1 request.go:700] Waited for 1.006003137s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/configmaps/etcd-pod 2026-02-16T21:16:16.239793002Z I0216 21:16:16.239581 1 request.go:700] Waited for 1.395885062s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/pods/installer-2-master-0 2026-02-16T21:16:16.629441190Z E0216 21:16:16.629375 1 base_controller.go:279] "Unhandled Error" err="FSyncController reconciliation failed: Post \"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/query\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: no such host" 2026-02-16T21:16:17.051126365Z I0216 21:16:17.051066 1 etcdcertsignercontroller.go:241] skipping EtcdCertSignerController can't get current revision. Err=revision rollout in progress, can't establish current revision 2026-02-16T21:16:17.244573216Z I0216 21:16:17.244480 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because waiting for static pod of revision 2, found 1 2026-02-16T21:16:17.839451694Z I0216 21:16:17.839251 1 request.go:700] Waited for 1.118728521s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/pods/etcd-master-0 2026-02-16T21:16:18.321377602Z E0216 21:16:18.321252 1 base_controller.go:279] "Unhandled Error" err="MissingStaticPodController reconciliation failed: static pod lifecycle failure - static pod: \"etcd\" in namespace: \"openshift-etcd\" for revision: 2 on node: \"master-0\" didn't show up, waited: 3m30s" 2026-02-16T21:16:18.840205250Z I0216 21:16:18.840041 1 request.go:700] Waited for 1.393317621s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/configmaps/restore-etcd-pod 2026-02-16T21:16:19.246908348Z W0216 21:16:19.246831 1 dynamic_operator_client.go:355] .status.conditions["EtcdStaticResourcesDegraded"].message is missing; this will eventually be fatal 2026-02-16T21:16:19.271101164Z I0216 21:16:19.270530 1 prune_controller.go:277] Nothing to prune 2026-02-16T21:16:19.271511685Z I0216 21:16:19.271403 1 status_controller.go:225] clusteroperator/etcd diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-16T21:10:21Z","message":"NodeControllerDegraded: All master nodes are ready\nMissingStaticPodControllerDegraded: static pod lifecycle failure - static pod: \"etcd\" in namespace: \"openshift-etcd\" for revision: 2 on node: \"master-0\" didn't show up, waited: 3m30s\nEtcdMembersDegraded: No unhealthy members found","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-16T21:10:33Z","message":"NodeInstallerProgressing: 1 node is at revision 1; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-16T21:10:23Z","message":"StaticPodsAvailable: 1 nodes are active; 1 node is at revision 1; 0 nodes have achieved new revision 2\nEtcdMembersAvailable: 1 members are available","reason":"AsExpected","status":"True","type":"Available"},{"lastTransitionTime":"2026-02-16T20:57:12Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-16T20:57:12Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-16T21:16:19.274152646Z E0216 21:16:19.274114 1 base_controller.go:279] "Unhandled Error" err="MissingStaticPodController reconciliation failed: static pod lifecycle failure - static pod: \"etcd\" in namespace: \"openshift-etcd\" for revision: 2 on node: \"master-0\" didn't show up, waited: 3m30s" 2026-02-16T21:16:19.289942595Z I0216 21:16:19.289854 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"9b75eec8-d994-4d7f-bcab-0e1f85d84eae", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/etcd changed: Degraded message changed from "NodeControllerDegraded: All master nodes are ready\nMissingStaticPodControllerDegraded: static pod lifecycle failure - static pod: \"etcd\" in namespace: \"openshift-etcd\" for revision: 2 on node: \"master-0\" didn't show up, waited: 3m30s\nEtcdStaticResourcesDegraded: \"etcd/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-etcd)\nEtcdStaticResourcesDegraded: \"etcd/sa.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get serviceaccounts etcd-sa)\nEtcdStaticResourcesDegraded: \"etcd/svc.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get services etcd)\nEtcdStaticResourcesDegraded: \"etcd/prometheus-rolebinding.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get rolebindings.rbac.authorization.k8s.io prometheus-k8s)\nEtcdStaticResourcesDegraded: \nEtcdMembersDegraded: No unhealthy members found" to "NodeControllerDegraded: All master nodes are ready\nMissingStaticPodControllerDegraded: static pod lifecycle failure - static pod: \"etcd\" in namespace: \"openshift-etcd\" for revision: 2 on node: \"master-0\" didn't show up, waited: 3m30s\nEtcdMembersDegraded: No unhealthy members found" 2026-02-16T21:16:19.457355430Z I0216 21:16:19.457273 1 etcdcertsignercontroller.go:241] skipping EtcdCertSignerController can't get current revision. Err=revision rollout in progress, can't establish current revision 2026-02-16T21:16:20.440023765Z I0216 21:16:20.439928 1 request.go:700] Waited for 1.169335173s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/pods/etcd-master-0 2026-02-16T21:16:21.244200954Z I0216 21:16:21.244117 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because waiting for static pod of revision 2, found 1 2026-02-16T21:16:21.440069701Z I0216 21:16:21.439949 1 request.go:700] Waited for 1.597851823s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/configmaps/restore-etcd-pod 2026-02-16T21:16:21.846887414Z I0216 21:16:21.846799 1 etcdcertsignercontroller.go:241] skipping EtcdCertSignerController can't get current revision. Err=revision rollout in progress, can't establish current revision 2026-02-16T21:16:23.251337417Z I0216 21:16:23.251261 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because waiting for static pod of revision 2, found 1 2026-02-16T21:16:28.960902095Z E0216 21:16:28.960834 1 base_controller.go:279] "Unhandled Error" err="MissingStaticPodController reconciliation failed: static pod lifecycle failure - static pod: \"etcd\" in namespace: \"openshift-etcd\" for revision: 2 on node: \"master-0\" didn't show up, waited: 3m30s" 2026-02-16T21:16:32.753214735Z E0216 21:16:32.753129 1 base_controller.go:279] "Unhandled Error" err="MissingStaticPodController reconciliation failed: static pod lifecycle failure - static pod: \"etcd\" in namespace: \"openshift-etcd\" for revision: 2 on node: \"master-0\" didn't show up, waited: 3m30s" 2026-02-16T21:16:32.768011676Z E0216 21:16:32.767942 1 base_controller.go:279] "Unhandled Error" err="MissingStaticPodController reconciliation failed: static pod lifecycle failure - static pod: \"etcd\" in namespace: \"openshift-etcd\" for revision: 2 on node: \"master-0\" didn't show up, waited: 3m30s" 2026-02-16T21:16:32.779677282Z I0216 21:16:32.779147 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because static pod is pending 2026-02-16T21:16:32.783497046Z W0216 21:16:32.783276 1 dynamic_operator_client.go:355] .status.conditions["MissingStaticPodControllerDegraded"].message is missing; this will eventually be fatal 2026-02-16T21:16:32.801605706Z I0216 21:16:32.801518 1 prune_controller.go:277] Nothing to prune 2026-02-16T21:16:32.803130598Z I0216 21:16:32.803087 1 status_controller.go:225] clusteroperator/etcd diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-16T21:10:21Z","message":"NodeControllerDegraded: All master nodes are ready\nEtcdMembersDegraded: No unhealthy members found","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-16T21:10:33Z","message":"NodeInstallerProgressing: 1 node is at revision 1; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-16T21:10:23Z","message":"StaticPodsAvailable: 1 nodes are active; 1 node is at revision 1; 0 nodes have achieved new revision 2\nEtcdMembersAvailable: 1 members are available","reason":"AsExpected","status":"True","type":"Available"},{"lastTransitionTime":"2026-02-16T20:57:12Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-16T20:57:12Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-16T21:16:32.814938257Z I0216 21:16:32.813412 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"9b75eec8-d994-4d7f-bcab-0e1f85d84eae", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/etcd changed: Degraded message changed from "NodeControllerDegraded: All master nodes are ready\nMissingStaticPodControllerDegraded: static pod lifecycle failure - static pod: \"etcd\" in namespace: \"openshift-etcd\" for revision: 2 on node: \"master-0\" didn't show up, waited: 3m30s\nEtcdMembersDegraded: No unhealthy members found" to "NodeControllerDegraded: All master nodes are ready\nEtcdMembersDegraded: No unhealthy members found" 2026-02-16T21:16:33.948216974Z I0216 21:16:33.948146 1 request.go:700] Waited for 1.14564572s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/serviceaccounts/installer-sa 2026-02-16T21:16:34.751672503Z I0216 21:16:34.751602 1 installer_controller.go:540] "master-0" moving to (v1.NodeStatus) { 2026-02-16T21:16:34.751672503Z NodeName: (string) (len=8) "master-0", 2026-02-16T21:16:34.751672503Z CurrentRevision: (int32) 2, 2026-02-16T21:16:34.751672503Z TargetRevision: (int32) 0, 2026-02-16T21:16:34.751672503Z LastFailedRevision: (int32) 0, 2026-02-16T21:16:34.751672503Z LastFailedTime: (*v1.Time)(), 2026-02-16T21:16:34.751672503Z LastFailedReason: (string) "", 2026-02-16T21:16:34.751672503Z LastFailedCount: (int) 0, 2026-02-16T21:16:34.751672503Z LastFallbackCount: (int) 0, 2026-02-16T21:16:34.751672503Z LastFailedRevisionErrors: ([]string) 2026-02-16T21:16:34.751672503Z } 2026-02-16T21:16:34.751672503Z because static pod is ready 2026-02-16T21:16:34.752877456Z W0216 21:16:34.752859 1 dynamic_operator_client.go:352] .status.conditions["InstallerControllerDegraded"].reason is missing; this will eventually be fatal 2026-02-16T21:16:34.752919417Z W0216 21:16:34.752909 1 dynamic_operator_client.go:355] .status.conditions["InstallerControllerDegraded"].message is missing; this will eventually be fatal 2026-02-16T21:16:34.752942188Z W0216 21:16:34.752933 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerDegraded"].reason is missing; this will eventually be fatal 2026-02-16T21:16:34.752963488Z W0216 21:16:34.752955 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2026-02-16T21:16:34.752984009Z W0216 21:16:34.752975 1 dynamic_operator_client.go:352] .status.conditions["StaticPodsAvailable"].reason is missing; this will eventually be fatal 2026-02-16T21:16:34.775229832Z I0216 21:16:34.775167 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"9b75eec8-d994-4d7f-bcab-0e1f85d84eae", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'NodeCurrentRevisionChanged' Updated node "master-0" from revision 1 to 2 because static pod is ready 2026-02-16T21:16:34.778609793Z I0216 21:16:34.778562 1 status_controller.go:225] clusteroperator/etcd diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-16T21:10:21Z","message":"NodeControllerDegraded: All master nodes are ready\nEtcdMembersDegraded: No unhealthy members found","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-16T21:16:34Z","message":"NodeInstallerProgressing: 1 node is at revision 2\nEtcdMembersProgressing: No unstarted etcd members found","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2026-02-16T21:10:23Z","message":"StaticPodsAvailable: 1 nodes are active; 1 node is at revision 2\nEtcdMembersAvailable: 1 members are available","reason":"AsExpected","status":"True","type":"Available"},{"lastTransitionTime":"2026-02-16T20:57:12Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-16T20:57:12Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-16T21:16:34.779296571Z I0216 21:16:34.779249 1 prune_controller.go:277] Nothing to prune 2026-02-16T21:16:34.788184373Z I0216 21:16:34.788088 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"9b75eec8-d994-4d7f-bcab-0e1f85d84eae", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/etcd changed: Progressing changed from True to False ("NodeInstallerProgressing: 1 node is at revision 2\nEtcdMembersProgressing: No unstarted etcd members found"),Available message changed from "StaticPodsAvailable: 1 nodes are active; 1 node is at revision 1; 0 nodes have achieved new revision 2\nEtcdMembersAvailable: 1 members are available" to "StaticPodsAvailable: 1 nodes are active; 1 node is at revision 2\nEtcdMembersAvailable: 1 members are available" 2026-02-16T21:16:34.949044241Z I0216 21:16:34.948950 1 request.go:700] Waited for 1.798411878s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/secrets/etcd-all-certs 2026-02-16T21:16:36.148718435Z I0216 21:16:36.148577 1 request.go:700] Waited for 1.365729293s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/configmaps/etcd-endpoints 2026-02-16T21:17:16.629699654Z E0216 21:17:16.629174 1 base_controller.go:279] "Unhandled Error" err="FSyncController reconciliation failed: Post \"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/query\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: no such host" 2026-02-16T21:18:16.630775275Z E0216 21:18:16.630724 1 base_controller.go:279] "Unhandled Error" err="FSyncController reconciliation failed: Post \"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/query\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: no such host" 2026-02-16T21:19:16.632985392Z E0216 21:19:16.632860 1 base_controller.go:279] "Unhandled Error" err="FSyncController reconciliation failed: Post \"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/query\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: no such host" 2026-02-16T21:20:16.634356548Z E0216 21:20:16.634177 1 base_controller.go:279] "Unhandled Error" err="FSyncController reconciliation failed: Post \"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/query\": dial tcp 172.30.156.89:9091: connect: connection refused" 2026-02-16T21:20:17.712822794Z I0216 21:20:17.712633 1 request.go:700] Waited for 1.069885662s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/configmaps/etcd-all-bundles 2026-02-16T21:20:18.224270683Z I0216 21:20:18.224149 1 prune_controller.go:277] Nothing to prune 2026-02-16T21:20:18.224459178Z I0216 21:20:18.224420 1 prune_controller.go:277] Nothing to prune 2026-02-16T21:20:18.224736425Z I0216 21:20:18.224695 1 prune_controller.go:277] Nothing to prune 2026-02-16T21:20:18.225032592Z I0216 21:20:18.224938 1 prune_controller.go:277] Nothing to prune 2026-02-16T21:20:18.225257778Z I0216 21:20:18.225213 1 prune_controller.go:277] Nothing to prune 2026-02-16T21:20:18.225515096Z I0216 21:20:18.225446 1 prune_controller.go:277] Nothing to prune 2026-02-16T21:20:18.225892005Z I0216 21:20:18.225738 1 prune_controller.go:277] Nothing to prune 2026-02-16T21:20:18.226002448Z I0216 21:20:18.225969 1 prune_controller.go:277] Nothing to prune 2026-02-16T21:20:18.712971747Z I0216 21:20:18.712835 1 request.go:700] Waited for 1.595650084s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/services/etcd 2026-02-16T21:20:19.912273827Z I0216 21:20:19.912140 1 request.go:700] Waited for 1.682298965s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/configmaps/etcd-endpoints 2026-02-16T21:21:16.632584892Z E0216 21:21:16.632462 1 base_controller.go:279] "Unhandled Error" err="FSyncController reconciliation failed: Post \"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/query\": dial tcp 172.30.156.89:9091: connect: connection refused" config/pod/openshift-etcd-operator/logs/etcd-operator-67bf55ccdd-8cllz/etcd-operator_previous.log0000640000000000000000000000315215144705173031553 0ustar00000000000000002026-02-16T21:03:09.283370179Z I0216 21:03:09.282730 1 profiler.go:21] Starting profiling endpoint at http://127.0.0.1:6060/debug/pprof/ 2026-02-16T21:03:09.283628636Z I0216 21:03:09.283582 1 observer_polling.go:159] Starting file observer 2026-02-16T21:03:09.284077508Z I0216 21:03:09.284046 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-16T21:03:09.284125519Z I0216 21:03:09.284091 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-16T21:03:09.285559760Z I0216 21:03:09.285505 1 observer_polling.go:159] Starting file observer 2026-02-16T21:04:33.822961768Z W0216 21:04:33.822885 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get replicasets.apps etcd-operator-67bf55ccdd) 2026-02-16T21:04:33.823090412Z I0216 21:04:33.823047 1 builder.go:304] openshift-cluster-etcd-operator version 4.18.0-202601171614.p2.g5a69ce1.assembly.stream.el9-5a69ce1-5a69ce18bb9a6c36cdeba6fcacb9f72f45aa16e9 2026-02-16T21:04:56.539732282Z I0216 21:04:56.539544 1 cmd.go:141] Received SIGTERM or SIGINT signal, shutting down controller. 2026-02-16T21:04:59.284240663Z I0216 21:04:59.284131 1 observer_polling.go:162] Shutting down file observer 2026-02-16T21:04:59.286531147Z I0216 21:04:59.286488 1 observer_polling.go:162] Shutting down file observer config/pod/openshift-etcd-operator/etcd-operator-67bf55ccdd-8cllz.json0000640000000000000000000002047415144705173024301 0ustar0000000000000000{"metadata":{"name":"etcd-operator-67bf55ccdd-8cllz","generateName":"etcd-operator-67bf55ccdd-","namespace":"openshift-etcd-operator","uid":"70d217a9-86b7-47b9-a7da-9ac920b9c7c2","resourceVersion":"9962","creationTimestamp":"2026-02-16T20:55:38Z","labels":{"app":"etcd-operator","pod-template-hash":"67bf55ccdd"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.10/23\"],\"mac_address\":\"0a:58:0a:80:00:0a\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.10/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.10\"\n ],\n \"mac\": \"0a:58:0a:80:00:0a\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"etcd-operator-67bf55ccdd","uid":"e2f72f7d-994d-4270-8419-165904ac458c","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"etcd-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"etcd-operator-config","defaultMode":420}},{"name":"etcd-ca","configMap":{"name":"etcd-ca-bundle","defaultMode":420}},{"name":"etcd-service-ca","configMap":{"name":"etcd-service-ca-bundle","defaultMode":420}},{"name":"etcd-client","secret":{"secretName":"etcd-client","defaultMode":420}},{"name":"kube-api-access-ll4rg","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"etcd-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","command":["cluster-etcd-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml","--terminate-on-files=/var/run/secrets/serving-cert/tls.crt","--terminate-on-files=/var/run/secrets/serving-cert/tls.key","--terminate-on-files=/var/run/secrets/etcd-client/tls.crt","--terminate-on-files=/var/run/secrets/etcd-client/tls.key","--terminate-on-files=/var/run/configmaps/etcd-ca/ca-bundle.crt","--terminate-on-files=/var/run/configmaps/etcd-service-ca/service-ca.crt"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.32"},{"name":"OPENSHIFT_PROFILE","value":"web"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-ll4rg","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":60,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"etcd-operator","serviceAccount":"etcd-operator","nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:09Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:56:57Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:03:33Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:03:33Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:56:57Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.10","podIPs":[{"ip":"10.128.0.10"}],"startTime":"2026-02-16T20:56:57Z","containerStatuses":[{"name":"etcd-operator","state":{"running":{"startedAt":"2026-02-16T21:05:26Z"}},"lastState":{"terminated":{"exitCode":137,"reason":"Error","message":"I0216 21:03:09.282730 1 profiler.go:21] Starting profiling endpoint at http://127.0.0.1:6060/debug/pprof/\nI0216 21:03:09.283582 1 observer_polling.go:159] Starting file observer\nI0216 21:03:09.284046 1 cmd.go:253] Using service-serving-cert provided certificates\nI0216 21:03:09.284091 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0216 21:03:09.285505 1 observer_polling.go:159] Starting file observer\nW0216 21:04:33.822885 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get replicasets.apps etcd-operator-67bf55ccdd)\nI0216 21:04:33.823047 1 builder.go:304] openshift-cluster-etcd-operator version 4.18.0-202601171614.p2.g5a69ce1.assembly.stream.el9-5a69ce1-5a69ce18bb9a6c36cdeba6fcacb9f72f45aa16e9\nI0216 21:04:56.539544 1 cmd.go:141] Received SIGTERM or SIGINT signal, shutting down controller.\nI0216 21:04:59.284131 1 observer_polling.go:162] Shutting down file observer\nI0216 21:04:59.286488 1 observer_polling.go:162] Shutting down file observer\n","startedAt":"2026-02-16T21:03:09Z","finishedAt":"2026-02-16T21:05:26Z","containerID":"cri-o://316bcd2b73e15fab60d8618d92eb77f101f2f53e423adb64b0f374a1f7fcda3a"}},"ready":true,"restartCount":4,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","containerID":"cri-o://4ac247b9876f21c966ab93ed72aa48642f97c92d4ad20edb90a8d4785ced5367","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-ll4rg","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-apiserver-check-endpoints_current.log0000640000000000000000000002746015144705173034062 0ustar0000000000000000config/pod/openshift-apiserver/logs/apiserver-6bdb76b9b7-z46x62026-02-16T20:57:37.881790102Z W0216 20:57:37.881527 1 cmd.go:257] Using insecure, self-signed certificates 2026-02-16T20:57:37.882193863Z I0216 20:57:37.882151 1 crypto.go:601] Generating new CA for check-endpoints-signer@1771275457 cert, and key in /tmp/serving-cert-3138783449/serving-signer.crt, /tmp/serving-cert-3138783449/serving-signer.key 2026-02-16T20:57:38.157390882Z I0216 20:57:38.157316 1 observer_polling.go:159] Starting file observer 2026-02-16T20:57:38.673716536Z I0216 20:57:38.670713 1 builder.go:304] check-endpoints version 4.18.0-202601171144.p2.g416eeae.assembly.stream.el9-416eeae-416eeae4e60970f5ab52a833774c7bb60644e6af 2026-02-16T20:57:38.673716536Z I0216 20:57:38.671468 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/tmp/serving-cert-3138783449/tls.crt::/tmp/serving-cert-3138783449/tls.key" 2026-02-16T20:57:38.925391561Z I0216 20:57:38.925054 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-02-16T20:57:38.927371218Z I0216 20:57:38.927311 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-02-16T20:57:38.927371218Z I0216 20:57:38.927339 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-02-16T20:57:38.927415719Z I0216 20:57:38.927367 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-02-16T20:57:38.927415719Z I0216 20:57:38.927377 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-02-16T20:57:38.947537014Z I0216 20:57:38.946949 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-16T20:57:38.947537014Z W0216 20:57:38.946988 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-16T20:57:38.947537014Z W0216 20:57:38.946999 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-16T20:57:38.947537014Z W0216 20:57:38.947008 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-16T20:57:38.947537014Z W0216 20:57:38.947014 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-16T20:57:38.947537014Z W0216 20:57:38.947020 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-16T20:57:38.947537014Z W0216 20:57:38.947026 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-16T20:57:38.947537014Z I0216 20:57:38.947376 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-02-16T20:57:39.528752783Z I0216 20:57:39.526475 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-16T20:57:39.528752783Z I0216 20:57:39.526564 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-16T20:57:39.528752783Z I0216 20:57:39.526623 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-16T20:57:39.528752783Z I0216 20:57:39.526675 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T20:57:39.528752783Z I0216 20:57:39.526701 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-16T20:57:39.528752783Z I0216 20:57:39.526712 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T20:57:39.528752783Z I0216 20:57:39.526888 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-16T20:57:39.528752783Z I0216 20:57:39.526903 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-16T20:57:39.528752783Z I0216 20:57:39.527106 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-3138783449/tls.crt::/tmp/serving-cert-3138783449/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1771275457\" (2026-02-16 20:57:37 +0000 UTC to 2026-03-18 20:57:38 +0000 UTC (now=2026-02-16 20:57:39.527040934 +0000 UTC))" 2026-02-16T20:57:39.528752783Z I0216 20:57:39.527497 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771275458\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771275458\" (2026-02-16 19:57:38 +0000 UTC to 2027-02-16 19:57:38 +0000 UTC (now=2026-02-16 20:57:39.527409065 +0000 UTC))" 2026-02-16T20:57:39.528752783Z I0216 20:57:39.527534 1 secure_serving.go:213] Serving securely on [::]:17698 2026-02-16T20:57:39.528752783Z I0216 20:57:39.527576 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-02-16T20:57:39.528752783Z I0216 20:57:39.527618 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/tmp/serving-cert-3138783449/tls.crt::/tmp/serving-cert-3138783449/tls.key" 2026-02-16T20:57:39.528752783Z I0216 20:57:39.527845 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-16T20:57:39.541386024Z I0216 20:57:39.538029 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T20:57:39.541386024Z I0216 20:57:39.538919 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T20:57:39.541386024Z I0216 20:57:39.539453 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T20:57:39.627837746Z I0216 20:57:39.627742 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T20:57:39.627945549Z I0216 20:57:39.627896 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-16T20:57:39.627963790Z I0216 20:57:39.627910 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T20:57:39.628177756Z I0216 20:57:39.628121 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-16 20:47:20 +0000 UTC to 2026-02-17 20:47:20 +0000 UTC (now=2026-02-16 20:57:39.628085163 +0000 UTC))" 2026-02-16T20:57:39.628357542Z I0216 20:57:39.628311 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-3138783449/tls.crt::/tmp/serving-cert-3138783449/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1771275457\" (2026-02-16 20:57:37 +0000 UTC to 2026-03-18 20:57:38 +0000 UTC (now=2026-02-16 20:57:39.62829262 +0000 UTC))" 2026-02-16T20:57:39.628515846Z I0216 20:57:39.628465 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771275458\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771275458\" (2026-02-16 19:57:38 +0000 UTC to 2027-02-16 19:57:38 +0000 UTC (now=2026-02-16 20:57:39.628442504 +0000 UTC))" 2026-02-16T20:57:39.628645510Z I0216 20:57:39.628612 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-02-16 20:40:33 +0000 UTC to 2036-02-14 20:40:33 +0000 UTC (now=2026-02-16 20:57:39.628595589 +0000 UTC))" 2026-02-16T20:57:39.628717132Z I0216 20:57:39.628681 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-02-16 20:47:22 +0000 UTC to 2026-02-17 20:47:22 +0000 UTC (now=2026-02-16 20:57:39.628625939 +0000 UTC))" 2026-02-16T20:57:39.628717132Z I0216 20:57:39.628703 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-02-16 20:47:22 +0000 UTC to 2027-02-16 20:47:22 +0000 UTC (now=2026-02-16 20:57:39.628689781 +0000 UTC))" 2026-02-16T20:57:39.628737842Z I0216 20:57:39.628723 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-02-16 20:47:22 +0000 UTC to 2027-02-16 20:47:22 +0000 UTC (now=2026-02-16 20:57:39.628710342 +0000 UTC))" 2026-02-16T20:57:39.628754753Z I0216 20:57:39.628742 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-02-16 20:47:20 +0000 UTC to 2036-02-14 20:47:20 +0000 UTC (now=2026-02-16 20:57:39.628731412 +0000 UTC))" 2026-02-16T20:57:39.628771533Z I0216 20:57:39.628760 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-16 20:47:20 +0000 UTC to 2026-02-17 20:47:20 +0000 UTC (now=2026-02-16 20:57:39.628750363 +0000 UTC))" 2026-02-16T20:57:39.628935458Z I0216 20:57:39.628901 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-3138783449/tls.crt::/tmp/serving-cert-3138783449/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1771275457\" (2026-02-16 20:57:37 +0000 UTC to 2026-03-18 20:57:38 +0000 UTC (now=2026-02-16 20:57:39.628887527 +0000 UTC))" 2026-02-16T20:57:39.629066882Z I0216 20:57:39.629036 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771275458\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771275458\" (2026-02-16 19:57:38 +0000 UTC to 2027-02-16 19:57:38 +0000 UTC (now=2026-02-16 20:57:39.62902274 +0000 UTC))" 2026-02-16T20:57:39.791796354Z I0216 20:57:39.791747 1 base_controller.go:76] Waiting for caches to sync for CheckEndpointsTimeToStart 2026-02-16T20:57:40.180953462Z I0216 20:57:40.180497 1 reflector.go:368] Caches populated for *v1.CustomResourceDefinition from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T20:57:40.192240874Z I0216 20:57:40.192170 1 base_controller.go:82] Caches are synced for CheckEndpointsTimeToStart 2026-02-16T20:57:40.192240874Z I0216 20:57:40.192211 1 base_controller.go:119] Starting #1 worker of CheckEndpointsTimeToStart controller ... config/pod/openshift-apiserver/logs/apiserver-6bdb76b9b7-z46x6/openshift-apiserver_current.log0000640000000000000000000011666015144705173031066 0ustar00000000000000002026-02-16T21:21:28.560394587Z E0216 21:21:28.560101 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:28.560500570Z E0216 21:21:28.560420 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:29.882794015Z E0216 21:21:29.882695 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:29.882794015Z E0216 21:21:29.882748 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:29.883722960Z E0216 21:21:29.883173 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:29.886362522Z E0216 21:21:29.886293 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:29.886362522Z E0216 21:21:29.886344 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:29.886891436Z E0216 21:21:29.886842 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:29.886917767Z E0216 21:21:29.886879 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:29.887229865Z E0216 21:21:29.887172 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:29.887253045Z E0216 21:21:29.887215 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:29.887349508Z E0216 21:21:29.887325 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:30.391181235Z E0216 21:21:30.391044 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:30.391286318Z E0216 21:21:30.391248 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:30.391664118Z E0216 21:21:30.391627 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:30.391886685Z E0216 21:21:30.391830 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:30.392053049Z E0216 21:21:30.392024 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:30.398898425Z E0216 21:21:30.398231 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:30.398898425Z E0216 21:21:30.398842 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:30.399486330Z E0216 21:21:30.399282 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:30.399556772Z E0216 21:21:30.399497 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:30.399681845Z E0216 21:21:30.399591 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:30.399681845Z E0216 21:21:30.399636 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:30.408485333Z E0216 21:21:30.408415 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:30.408485333Z E0216 21:21:30.408455 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:30.408540396Z E0216 21:21:30.408506 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:30.408759262Z E0216 21:21:30.408718 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.715751498Z E0216 21:21:45.714174 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.726721245Z E0216 21:21:45.725788 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.726721245Z E0216 21:21:45.726333 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.726721245Z E0216 21:21:45.726565 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.727817385Z E0216 21:21:45.726848 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.727817385Z E0216 21:21:45.726996 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.727817385Z E0216 21:21:45.727096 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.727817385Z E0216 21:21:45.727179 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.727817385Z E0216 21:21:45.727378 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.727817385Z E0216 21:21:45.727410 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.727817385Z E0216 21:21:45.727468 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.727817385Z E0216 21:21:45.727631 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.727817385Z E0216 21:21:45.727749 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.727860986Z E0216 21:21:45.727825 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.728075242Z E0216 21:21:45.728021 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.728075242Z E0216 21:21:45.728062 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.728127783Z E0216 21:21:45.728091 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.728327469Z E0216 21:21:45.728288 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.728490713Z E0216 21:21:45.728462 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.728724619Z E0216 21:21:45.728637 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.728825192Z E0216 21:21:45.728783 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.728825192Z E0216 21:21:45.728816 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.732700617Z E0216 21:21:45.729125 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.732700617Z E0216 21:21:45.729225 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.732700617Z E0216 21:21:45.731692 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.733754476Z E0216 21:21:45.732962 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.733754476Z E0216 21:21:45.733094 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.743820348Z E0216 21:21:45.743727 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.743876430Z E0216 21:21:45.743855 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.744252380Z E0216 21:21:45.744219 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.744339163Z E0216 21:21:45.744310 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.744537028Z E0216 21:21:45.744498 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.744548719Z E0216 21:21:45.744527 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.744594540Z E0216 21:21:45.744566 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.744848146Z E0216 21:21:45.744816 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.744909768Z E0216 21:21:45.744882 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.745155645Z E0216 21:21:45.745128 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.745416391Z E0216 21:21:45.745383 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.745772112Z E0216 21:21:45.745740 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.745866594Z E0216 21:21:45.745840 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.750043677Z E0216 21:21:45.749986 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.750043677Z E0216 21:21:45.750011 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.750309934Z E0216 21:21:45.750266 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.750598872Z E0216 21:21:45.750546 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.751768264Z E0216 21:21:45.750969 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.753013068Z http2: server: error reading preface from client 10.128.0.2:46852: read tcp 10.128.0.36:8443->10.128.0.2:46852: read: connection reset by peer 2026-02-16T21:21:57.422233172Z E0216 21:21:57.422169 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:57.422394096Z E0216 21:21:57.422354 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:57.422445937Z E0216 21:21:57.422407 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:57.422501309Z E0216 21:21:57.422354 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:57.422706494Z E0216 21:21:57.422676 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:58.025064210Z E0216 21:21:58.024941 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:58.025140742Z E0216 21:21:58.025062 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:58.025140742Z E0216 21:21:58.024957 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:58.025353008Z E0216 21:21:58.025281 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:58.025496291Z E0216 21:21:58.025433 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:58.359551539Z E0216 21:21:58.359470 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:58.359673693Z E0216 21:21:58.359630 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:58.359902989Z E0216 21:21:58.359867 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:58.359913930Z E0216 21:21:58.359901 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:58.360056163Z E0216 21:21:58.359988 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:58.564812869Z E0216 21:21:58.564755 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:58.564899811Z E0216 21:21:58.564846 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:58.564927062Z E0216 21:21:58.564900 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:58.565015614Z E0216 21:21:58.564955 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:58.565026535Z E0216 21:21:58.564997 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:59.897021833Z E0216 21:21:59.896930 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:59.897021833Z E0216 21:21:59.896974 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:59.897514956Z E0216 21:21:59.897480 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:59.897897756Z E0216 21:21:59.897857 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:59.899900851Z E0216 21:21:59.899848 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:59.899982143Z E0216 21:21:59.899947 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:59.906021176Z E0216 21:21:59.905952 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" openshift-apiserver-operator_current.log0000640000000000000000000005605415144705173040521 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-6d4655d9cf-tvzdw2026-02-16T21:20:47.807270440Z > 2026-02-16T21:20:49.606944149Z E0216 21:20:49.606836 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-16T21:20:49.606944149Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/apps.openshift.io/v1: 401 2026-02-16T21:20:49.606944149Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/authorization.openshift.io/v1: 401 2026-02-16T21:20:49.606944149Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/build.openshift.io/v1: 401 2026-02-16T21:20:49.606944149Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/image.openshift.io/v1: 401 2026-02-16T21:20:49.606944149Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/project.openshift.io/v1: 401 2026-02-16T21:20:49.606944149Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/quota.openshift.io/v1: 401 2026-02-16T21:20:49.606944149Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/route.openshift.io/v1: 401 2026-02-16T21:20:49.606944149Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/security.openshift.io/v1: 401 2026-02-16T21:20:49.606944149Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/template.openshift.io/v1: 401 2026-02-16T21:20:49.606944149Z > 2026-02-16T21:20:51.407986153Z E0216 21:20:51.407881 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-16T21:20:51.407986153Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/apps.openshift.io/v1: 401 2026-02-16T21:20:51.407986153Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/authorization.openshift.io/v1: 401 2026-02-16T21:20:51.407986153Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/build.openshift.io/v1: 401 2026-02-16T21:20:51.407986153Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/image.openshift.io/v1: 401 2026-02-16T21:20:51.407986153Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/project.openshift.io/v1: 401 2026-02-16T21:20:51.407986153Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/quota.openshift.io/v1: 401 2026-02-16T21:20:51.407986153Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/route.openshift.io/v1: 401 2026-02-16T21:20:51.407986153Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/security.openshift.io/v1: 401 2026-02-16T21:20:51.407986153Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/template.openshift.io/v1: 401 2026-02-16T21:20:51.407986153Z > 2026-02-16T21:20:58.510566565Z E0216 21:20:58.510454 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-16T21:20:58.510566565Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/apps.openshift.io/v1: 401 2026-02-16T21:20:58.510566565Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/authorization.openshift.io/v1: 401 2026-02-16T21:20:58.510566565Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/build.openshift.io/v1: 401 2026-02-16T21:20:58.510566565Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/image.openshift.io/v1: 401 2026-02-16T21:20:58.510566565Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/project.openshift.io/v1: 401 2026-02-16T21:20:58.510566565Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/quota.openshift.io/v1: 401 2026-02-16T21:20:58.510566565Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/route.openshift.io/v1: 401 2026-02-16T21:20:58.510566565Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/security.openshift.io/v1: 401 2026-02-16T21:20:58.510566565Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/template.openshift.io/v1: 401 2026-02-16T21:20:58.510566565Z > 2026-02-16T21:21:08.524993045Z E0216 21:21:08.524901 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-16T21:21:08.524993045Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/apps.openshift.io/v1: 401 2026-02-16T21:21:08.524993045Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/authorization.openshift.io/v1: 401 2026-02-16T21:21:08.524993045Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/build.openshift.io/v1: 401 2026-02-16T21:21:08.524993045Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/image.openshift.io/v1: 401 2026-02-16T21:21:08.524993045Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/project.openshift.io/v1: 401 2026-02-16T21:21:08.524993045Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/quota.openshift.io/v1: 401 2026-02-16T21:21:08.524993045Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/route.openshift.io/v1: 401 2026-02-16T21:21:08.524993045Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/security.openshift.io/v1: 401 2026-02-16T21:21:08.524993045Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/template.openshift.io/v1: 401 2026-02-16T21:21:08.524993045Z > 2026-02-16T21:21:18.518160613Z E0216 21:21:18.518060 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-16T21:21:18.518160613Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/apps.openshift.io/v1: 401 2026-02-16T21:21:18.518160613Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/authorization.openshift.io/v1: 401 2026-02-16T21:21:18.518160613Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/build.openshift.io/v1: 401 2026-02-16T21:21:18.518160613Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/image.openshift.io/v1: 401 2026-02-16T21:21:18.518160613Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/project.openshift.io/v1: 401 2026-02-16T21:21:18.518160613Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/quota.openshift.io/v1: 401 2026-02-16T21:21:18.518160613Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/route.openshift.io/v1: 401 2026-02-16T21:21:18.518160613Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/security.openshift.io/v1: 401 2026-02-16T21:21:18.518160613Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/template.openshift.io/v1: 401 2026-02-16T21:21:18.518160613Z > 2026-02-16T21:21:28.521524064Z E0216 21:21:28.521390 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-16T21:21:28.521524064Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/apps.openshift.io/v1: 401 2026-02-16T21:21:28.521524064Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/authorization.openshift.io/v1: 401 2026-02-16T21:21:28.521524064Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/build.openshift.io/v1: 401 2026-02-16T21:21:28.521524064Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/image.openshift.io/v1: 401 2026-02-16T21:21:28.521524064Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/project.openshift.io/v1: 401 2026-02-16T21:21:28.521524064Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/quota.openshift.io/v1: 401 2026-02-16T21:21:28.521524064Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/route.openshift.io/v1: 401 2026-02-16T21:21:28.521524064Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/security.openshift.io/v1: 401 2026-02-16T21:21:28.521524064Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/template.openshift.io/v1: 401 2026-02-16T21:21:28.521524064Z > 2026-02-16T21:21:38.519613788Z E0216 21:21:38.519503 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-16T21:21:38.519613788Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/apps.openshift.io/v1: 401 2026-02-16T21:21:38.519613788Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/authorization.openshift.io/v1: 401 2026-02-16T21:21:38.519613788Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/build.openshift.io/v1: 401 2026-02-16T21:21:38.519613788Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/image.openshift.io/v1: 401 2026-02-16T21:21:38.519613788Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/project.openshift.io/v1: 401 2026-02-16T21:21:38.519613788Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/quota.openshift.io/v1: 401 2026-02-16T21:21:38.519613788Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/route.openshift.io/v1: 401 2026-02-16T21:21:38.519613788Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/security.openshift.io/v1: 401 2026-02-16T21:21:38.519613788Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/template.openshift.io/v1: 401 2026-02-16T21:21:38.519613788Z > 2026-02-16T21:21:48.519396236Z E0216 21:21:48.519222 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-16T21:21:48.519396236Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/apps.openshift.io/v1: 401 2026-02-16T21:21:48.519396236Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/authorization.openshift.io/v1: 401 2026-02-16T21:21:48.519396236Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/build.openshift.io/v1: 401 2026-02-16T21:21:48.519396236Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/image.openshift.io/v1: 401 2026-02-16T21:21:48.519396236Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/project.openshift.io/v1: 401 2026-02-16T21:21:48.519396236Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/quota.openshift.io/v1: 401 2026-02-16T21:21:48.519396236Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/route.openshift.io/v1: 401 2026-02-16T21:21:48.519396236Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/security.openshift.io/v1: 401 2026-02-16T21:21:48.519396236Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/template.openshift.io/v1: 401 2026-02-16T21:21:48.519396236Z > 2026-02-16T21:21:58.516449400Z E0216 21:21:58.516380 1 base_controller.go:279] "Unhandled Error" err=< 2026-02-16T21:21:58.516449400Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/apps.openshift.io/v1: 401 2026-02-16T21:21:58.516449400Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/authorization.openshift.io/v1: 401 2026-02-16T21:21:58.516449400Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/build.openshift.io/v1: 401 2026-02-16T21:21:58.516449400Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/image.openshift.io/v1: 401 2026-02-16T21:21:58.516449400Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/project.openshift.io/v1: 401 2026-02-16T21:21:58.516449400Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/quota.openshift.io/v1: 401 2026-02-16T21:21:58.516449400Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/route.openshift.io/v1: 401 2026-02-16T21:21:58.516449400Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/security.openshift.io/v1: 401 2026-02-16T21:21:58.516449400Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/template.openshift.io/v1: 401 2026-02-16T21:21:58.516449400Z > openshift-apiserver-operator_previous.log0000640000000000000000000000213215144705173040677 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-6d4655d9cf-tvzdw2026-02-16T21:03:09.231176574Z I0216 21:03:09.229721 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-16T21:03:09.231176574Z I0216 21:03:09.229881 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-16T21:03:09.231285637Z I0216 21:03:09.231201 1 observer_polling.go:159] Starting file observer 2026-02-16T21:04:33.832381433Z W0216 21:04:33.832245 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get replicasets.apps openshift-apiserver-operator-6d4655d9cf) 2026-02-16T21:04:33.832523437Z I0216 21:04:33.832463 1 builder.go:304] openshift-apiserver-operator version - 2026-02-16T21:05:32.406443906Z F0216 21:05:32.406331 1 cmd.go:182] failed checking connectivity: client rate limiter Wait returned an error: context deadline exceeded config/pod/openshift-apiserver-operator/openshift-apiserver-operator-6d4655d9cf-tvzdw.json0000640000000000000000000001632015144705173030424 0ustar0000000000000000{"metadata":{"name":"openshift-apiserver-operator-6d4655d9cf-tvzdw","generateName":"openshift-apiserver-operator-6d4655d9cf-","namespace":"openshift-apiserver-operator","uid":"6b6be6de-6fcc-4f57-b163-fe8f970a01a4","resourceVersion":"10207","creationTimestamp":"2026-02-16T20:55:40Z","labels":{"app":"openshift-apiserver-operator","pod-template-hash":"6d4655d9cf"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.21/23\"],\"mac_address\":\"0a:58:0a:80:00:15\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.21/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.21\"\n ],\n \"mac\": \"0a:58:0a:80:00:15\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-apiserver-operator-6d4655d9cf","uid":"efa34ea3-83d3-4156-908c-42bb9313ad9d","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access-mkz65","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd544a8a6b4d08fe0f4fd076109c09cf181302ab6056ec6b2b89d68a52954c5","command":["cluster-openshift-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b41a8ae60c0eafa4a13e6dcd0e79ba63b0d7bd2bdc28aaed434b3bef98a5dc95"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd544a8a6b4d08fe0f4fd076109c09cf181302ab6056ec6b2b89d68a52954c5"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.32"},{"name":"KUBE_APISERVER_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-mkz65","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-apiserver-operator","serviceAccount":"openshift-apiserver-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c15,c5"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:09Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:56:58Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:06:02Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:06:02Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:56:57Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.21","podIPs":[{"ip":"10.128.0.21"}],"startTime":"2026-02-16T20:56:58Z","containerStatuses":[{"name":"openshift-apiserver-operator","state":{"running":{"startedAt":"2026-02-16T21:06:01Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0216 21:03:09.229721 1 cmd.go:253] Using service-serving-cert provided certificates\nI0216 21:03:09.229881 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0216 21:03:09.231201 1 observer_polling.go:159] Starting file observer\nW0216 21:04:33.832245 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get replicasets.apps openshift-apiserver-operator-6d4655d9cf)\nI0216 21:04:33.832463 1 builder.go:304] openshift-apiserver-operator version -\nF0216 21:05:32.406331 1 cmd.go:182] failed checking connectivity: client rate limiter Wait returned an error: context deadline exceeded\n","startedAt":"2026-02-16T21:03:09Z","finishedAt":"2026-02-16T21:05:32Z","containerID":"cri-o://d0e5f8a907c4851af3bce655e141083b0f633fdfa41c5abacbb48a7df33f9e94"}},"ready":true,"restartCount":4,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd544a8a6b4d08fe0f4fd076109c09cf181302ab6056ec6b2b89d68a52954c5","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd544a8a6b4d08fe0f4fd076109c09cf181302ab6056ec6b2b89d68a52954c5","containerID":"cri-o://c2a09a3b4592efd5c3950579bb4aaa5d970beb72eb354639340f9f2327450863","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-mkz65","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}cluster-policy-controller_current.log0000640000000000000000000020215615144705173034225 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-02-16T21:10:13.613019805Z I0216 21:10:13.612928 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T21:10:13.813767680Z I0216 21:10:13.813639 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T21:10:14.012247263Z I0216 21:10:14.012167 1 request.go:700] Waited for 6.391539896s due to client-side throttling, not priority and fairness, request: GET:https://localhost:6443/apis/monitoring.coreos.com/v1/prometheusrules?limit=500&resourceVersion=0 2026-02-16T21:10:14.015183634Z I0216 21:10:14.015118 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T21:10:14.213377329Z I0216 21:10:14.213318 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T21:10:14.413296092Z I0216 21:10:14.413226 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T21:10:14.615321512Z I0216 21:10:14.615228 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T21:10:14.813545327Z I0216 21:10:14.813430 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T21:10:15.012547894Z I0216 21:10:15.012455 1 request.go:700] Waited for 7.39049404s due to client-side throttling, not priority and fairness, request: GET:https://localhost:6443/apis/k8s.ovn.org/v1/egressservices?limit=500&resourceVersion=0 2026-02-16T21:10:15.013413649Z I0216 21:10:15.013379 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T21:10:15.213877266Z I0216 21:10:15.213777 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T21:10:15.414128498Z I0216 21:10:15.414048 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T21:10:15.429215905Z W0216 21:10:15.429159 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-16T21:10:15.429284266Z E0216 21:10:15.429223 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-16T21:10:15.613579638Z I0216 21:10:15.613515 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T21:10:15.816268277Z I0216 21:10:15.816188 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T21:10:16.012820076Z I0216 21:10:16.012730 1 request.go:700] Waited for 8.385798274s due to client-side throttling, not priority and fairness, request: GET:https://localhost:6443/apis/monitoring.coreos.com/v1/thanosrulers?limit=500&resourceVersion=0 2026-02-16T21:10:16.013871455Z I0216 21:10:16.013812 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T21:10:16.045244021Z I0216 21:10:16.045193 1 reconciliation_controller.go:224] synced cluster resource quota controller 2026-02-16T21:10:16.112084578Z I0216 21:10:16.111973 1 reconciliation_controller.go:149] Caches are synced 2026-02-16T21:10:27.504724773Z W0216 21:10:27.504592 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-16T21:10:27.504724773Z E0216 21:10:27.504697 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-16T21:10:46.060359931Z I0216 21:10:46.059824 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-16T21:10:46.060791753Z E0216 21:10:46.060575 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-16T21:10:50.039132999Z W0216 21:10:50.038973 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-16T21:10:50.039132999Z E0216 21:10:50.039109 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-16T21:11:16.071741989Z I0216 21:11:16.071569 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-16T21:11:16.071741989Z E0216 21:11:16.071670 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-16T21:11:25.445209846Z W0216 21:11:25.445089 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-16T21:11:25.445209846Z E0216 21:11:25.445152 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-16T21:11:46.085416894Z I0216 21:11:46.085237 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-16T21:11:46.085416894Z E0216 21:11:46.085385 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-16T21:12:13.797120204Z W0216 21:12:13.797020 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-16T21:12:13.797120204Z E0216 21:12:13.797066 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-16T21:12:16.099317600Z I0216 21:12:16.099103 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-16T21:12:16.099400122Z E0216 21:12:16.099308 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-16T21:12:41.209103785Z E0216 21:12:41.209016 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2026-02-16T21:12:46.113240911Z I0216 21:12:46.113112 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-16T21:12:46.113291802Z E0216 21:12:46.113259 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-16T21:12:49.494946137Z W0216 21:12:49.494848 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-16T21:12:49.494946137Z E0216 21:12:49.494927 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-16T21:13:16.137404880Z I0216 21:13:16.137281 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-16T21:13:16.137487262Z E0216 21:13:16.137430 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-16T21:13:31.374134971Z W0216 21:13:31.374047 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-16T21:13:31.374134971Z E0216 21:13:31.374110 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-16T21:13:41.211336469Z E0216 21:13:41.211265 1 leaderelection.go:436] error retrieving resource lock kube-system/cluster-policy-controller-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io cluster-policy-controller-lock) 2026-02-16T21:13:46.149362534Z I0216 21:13:46.149186 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-16T21:13:46.149362534Z E0216 21:13:46.149334 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-16T21:14:12.337433862Z W0216 21:14:12.337313 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-16T21:14:12.337433862Z E0216 21:14:12.337406 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-16T21:14:16.162096481Z I0216 21:14:16.161961 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-16T21:14:16.162096481Z E0216 21:14:16.162050 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-16T21:14:46.173065980Z I0216 21:14:46.172911 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-16T21:14:46.173065980Z E0216 21:14:46.173049 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-16T21:15:09.155350466Z W0216 21:15:09.155190 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-16T21:15:09.155350466Z E0216 21:15:09.155260 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-16T21:15:16.186624237Z I0216 21:15:16.186531 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-16T21:15:16.186624237Z E0216 21:15:16.186605 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-16T21:15:46.197709671Z I0216 21:15:46.197548 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-16T21:15:46.197709671Z E0216 21:15:46.197656 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-16T21:15:59.887682514Z W0216 21:15:59.887529 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-16T21:15:59.887682514Z E0216 21:15:59.887582 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-16T21:16:16.209313457Z I0216 21:16:16.209187 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-16T21:16:16.209313457Z E0216 21:16:16.209283 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-16T21:16:39.572905832Z W0216 21:16:39.572811 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-16T21:16:39.572905832Z E0216 21:16:39.572874 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-16T21:16:46.218787049Z I0216 21:16:46.218600 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-16T21:16:46.218787049Z E0216 21:16:46.218743 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-16T21:17:15.743697881Z W0216 21:17:15.743547 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-16T21:17:15.743697881Z E0216 21:17:15.743629 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-16T21:17:16.229265073Z I0216 21:17:16.229138 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-16T21:17:16.229265073Z E0216 21:17:16.229252 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-16T21:17:46.240815657Z I0216 21:17:46.240697 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-16T21:17:46.240960920Z E0216 21:17:46.240947 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-16T21:18:11.831159683Z W0216 21:18:11.831049 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-16T21:18:11.831159683Z E0216 21:18:11.831137 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-16T21:18:16.253520019Z I0216 21:18:16.253409 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-16T21:18:16.253572621Z E0216 21:18:16.253551 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-16T21:18:46.266830546Z I0216 21:18:46.266593 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-16T21:18:46.266912609Z E0216 21:18:46.266836 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-16T21:19:10.641455493Z W0216 21:19:10.641357 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-16T21:19:10.641516495Z E0216 21:19:10.641454 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-16T21:19:16.281141000Z I0216 21:19:16.280996 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-16T21:19:16.281211482Z E0216 21:19:16.281144 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-16T21:19:46.291694117Z I0216 21:19:46.291553 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-16T21:19:46.291764798Z E0216 21:19:46.291699 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-16T21:20:06.752097769Z W0216 21:20:06.752016 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-16T21:20:06.752097769Z E0216 21:20:06.752074 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-16T21:20:16.303125474Z I0216 21:20:16.302962 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-16T21:20:16.303125474Z E0216 21:20:16.303069 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-16T21:20:46.319612746Z I0216 21:20:46.319481 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, metrics.k8s.io/v1beta1: stale GroupVersion discovery: metrics.k8s.io/v1beta1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-16T21:20:46.319612746Z E0216 21:20:46.319593 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, metrics.k8s.io/v1beta1: stale GroupVersion discovery: metrics.k8s.io/v1beta1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-16T21:21:02.852779151Z W0216 21:21:02.852670 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-16T21:21:02.852779151Z E0216 21:21:02.852726 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-16T21:21:16.331884377Z I0216 21:21:16.331757 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, metrics.k8s.io/v1beta1: stale GroupVersion discovery: metrics.k8s.io/v1beta1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-16T21:21:16.331938709Z E0216 21:21:16.331885 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, metrics.k8s.io/v1beta1: stale GroupVersion discovery: metrics.k8s.io/v1beta1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" 2026-02-16T21:21:32.921176981Z W0216 21:21:32.921083 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-02-16T21:21:32.921176981Z E0216 21:21:32.921165 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-02-16T21:21:46.342645508Z I0216 21:21:46.342546 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, metrics.k8s.io/v1beta1: stale GroupVersion discovery: metrics.k8s.io/v1beta1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-02-16T21:21:46.342718300Z E0216 21:21:46.342680 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, metrics.k8s.io/v1beta1: stale GroupVersion discovery: metrics.k8s.io/v1beta1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" kube-controller-manager_current.log0000640000000000000000000011520615144705173033604 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-02-16T21:20:00.757901151Z I0216 21:20:00.757518 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[operator.openshift.io/v1/KubeStorageVersionMigrator, namespace: , name: cluster, uid: 33008cba-c756-49c3-8f70-8d7dd57f2fa8]" virtual=false 2026-02-16T21:20:00.763366753Z I0216 21:20:00.761861 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: system:openshift:operator:kube-apiserver-operator, uid: c8dfa5be-150a-4f7a-b2da-6b7520ebec75]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}] 2026-02-16T21:20:00.763366753Z I0216 21:20:00.761896 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[config.openshift.io/v1/Node, namespace: , name: cluster, uid: 19471cdd-5cfa-4a94-9fb3-aba164b2eaed]" virtual=false 2026-02-16T21:20:00.764005220Z I0216 21:20:00.763938 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: system:openshift:operator:etcd-operator, uid: 2daa0b16-652e-4af4-83f8-1eacc9d44f5b]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}] 2026-02-16T21:20:00.764005220Z I0216 21:20:00.763974 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: adminnetworkpolicies.policy.networking.k8s.io, uid: b9ee770e-4e4b-4406-bc11-bf37f28f5b0c]" virtual=false 2026-02-16T21:20:00.848129945Z I0216 21:20:00.847813 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: system:openshift:operator:openshift-controller-manager-operator, uid: 7214ad47-08a2-46e0-8047-e43395da0f31]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}] 2026-02-16T21:20:00.848129945Z I0216 21:20:00.847878 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: adminpolicybasedexternalroutes.k8s.ovn.org, uid: 8a83a7f0-1d53-4a33-a2b8-9fd9f388fcac]" virtual=false 2026-02-16T21:20:00.848129945Z I0216 21:20:00.848096 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: system:openshift:operator:openshift-config-operator, uid: bfc2e1f0-b7ae-4c41-919e-c69ec7ee9b8c]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}] 2026-02-16T21:20:00.848129945Z I0216 21:20:00.848115 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[operator.openshift.io/v1/Authentication, namespace: , name: cluster, uid: 60c7ba87-26a1-4912-9db8-cdf5240be0f5]" virtual=false 2026-02-16T21:20:00.848601908Z I0216 21:20:00.848547 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: system:openshift:operator:kube-storage-version-migrator-operator, uid: 09aa1898-2a4a-4eb9-a848-273904e216a7]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}] 2026-02-16T21:20:00.848601908Z I0216 21:20:00.848573 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[helm.openshift.io/v1beta1/HelmChartRepository, namespace: , name: openshift-helm-charts, uid: b4dba555-a6d8-4ed0-badd-29005d08e2b4]" virtual=false 2026-02-16T21:20:00.848673450Z I0216 21:20:00.848628 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: system:openshift:operator:openshift-apiserver-operator, uid: ef542578-7569-40cf-9181-cd386fe10406]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}] 2026-02-16T21:20:00.848673450Z I0216 21:20:00.848658 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[config.openshift.io/v1/Console, namespace: , name: cluster, uid: 21e19e78-bf6b-461f-b5c1-a99649bb2aa0]" virtual=false 2026-02-16T21:20:00.848872975Z I0216 21:20:00.848812 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: system:openshift:operator:kube-controller-manager-operator, uid: 98b269e2-40fa-4628-a092-dfe22f48ca32]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}] 2026-02-16T21:20:00.848872975Z I0216 21:20:00.848835 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: baselineadminnetworkpolicies.policy.networking.k8s.io, uid: 41a1dff9-ba78-46b1-934a-b03a6a13f753]" virtual=false 2026-02-16T21:20:00.860055057Z I0216 21:20:00.859921 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: system:openshift:operator:service-ca-operator, uid: e5ea8b54-c0f7-4913-b87d-46f2f9ad74cb]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}] 2026-02-16T21:20:00.860055057Z I0216 21:20:00.859997 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: clusteruserdefinednetworks.k8s.ovn.org, uid: cac01818-f3d1-4a47-93cc-43c66bca81e8]" virtual=false 2026-02-16T21:20:00.874361350Z I0216 21:20:00.874250 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[admissionregistration.k8s.io/v1/ValidatingAdmissionPolicyBinding, namespace: , name: user-defined-networks-namespace-label-binding, uid: b96bc38b-45db-4f88-8365-8cc72431de51]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"17900784-12f9-410e-a815-ce7fe10a9476","controller":true,"blockOwnerDeletion":true}] 2026-02-16T21:20:00.874361350Z I0216 21:20:00.874324 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: egressfirewalls.k8s.ovn.org, uid: a8b3dc21-0454-4021-8aa9-1d6773dfadd2]" virtual=false 2026-02-16T21:20:00.874622246Z I0216 21:20:00.874527 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[operator.openshift.io/v1/KubeStorageVersionMigrator, namespace: , name: cluster, uid: 33008cba-c756-49c3-8f70-8d7dd57f2fa8]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3"}] 2026-02-16T21:20:00.874805301Z I0216 21:20:00.874727 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: egressips.k8s.ovn.org, uid: 48c68b62-06ce-4d8e-b647-9935a7e41ccb]" virtual=false 2026-02-16T21:20:00.875521370Z I0216 21:20:00.875336 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[config.openshift.io/v1/Node, namespace: , name: cluster, uid: 19471cdd-5cfa-4a94-9fb3-aba164b2eaed]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3"}] 2026-02-16T21:20:00.875521370Z I0216 21:20:00.875369 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: egressqoses.k8s.ovn.org, uid: bd599f48-f536-457b-affe-0c4a24f619c4]" virtual=false 2026-02-16T21:20:00.875521370Z I0216 21:20:00.875502 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: system:openshift:scc:restricted-v2, uid: 8222bd6c-4ec2-4b64-8069-df62fd1bbcb5]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}] 2026-02-16T21:20:00.875556461Z I0216 21:20:00.875526 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: egressservices.k8s.ovn.org, uid: b38f69a5-39a8-4d5d-90b1-f42a00044141]" virtual=false 2026-02-16T21:20:00.875970752Z I0216 21:20:00.875902 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: adminnetworkpolicies.policy.networking.k8s.io, uid: b9ee770e-4e4b-4406-bc11-bf37f28f5b0c]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"17900784-12f9-410e-a815-ce7fe10a9476","controller":true,"blockOwnerDeletion":true}] 2026-02-16T21:20:00.876097325Z I0216 21:20:00.876056 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: ipamclaims.k8s.cni.cncf.io, uid: 2577c3e5-e7c1-4d21-ab31-bac5e209aa8a]" virtual=false 2026-02-16T21:20:00.876238518Z I0216 21:20:00.875979 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[operators.coreos.com/v1/OLMConfig, namespace: , name: cluster, uid: eeae8638-5897-44c1-9bde-ae24bc9e8949]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3"}] 2026-02-16T21:20:00.876320262Z I0216 21:20:00.876283 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: ippools.whereabouts.cni.cncf.io, uid: 1914ef31-3499-4d30-b7ac-3e49ceb7a11f]" virtual=false 2026-02-16T21:20:00.880590953Z I0216 21:20:00.880324 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[config.openshift.io/v1/OperatorHub, namespace: , name: cluster, uid: 7d63ade5-2b9a-4533-9890-21b0666664aa]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3"}] 2026-02-16T21:20:00.880590953Z I0216 21:20:00.880380 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: network-attachment-definitions.k8s.cni.cncf.io, uid: a6c5f25c-892c-4b2b-a715-3462dacad9e4]" virtual=false 2026-02-16T21:20:00.891549338Z I0216 21:20:00.891327 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[migration.k8s.io/v1alpha1/StorageVersionMigration, namespace: , name: machineconfiguration-machineconfigpool-storage-version-migration, uid: 22242f50-948e-4a93-8105-f0870867500a]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}] 2026-02-16T21:20:00.891549338Z I0216 21:20:00.891411 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: nodeslicepools.whereabouts.cni.cncf.io, uid: 879ed16c-6c46-4a28-a936-b7af2de23b87]" virtual=false 2026-02-16T21:20:00.899537137Z I0216 21:20:00.899420 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[operator.openshift.io/v1/ServiceCA, namespace: , name: cluster, uid: 2b775664-30f5-4561-8f2b-0d913017cd67]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3"}] 2026-02-16T21:20:00.899537137Z I0216 21:20:00.899501 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: overlappingrangeipreservations.whereabouts.cni.cncf.io, uid: d2c080ed-d64c-4fe9-93cf-30117a6d0ad4]" virtual=false 2026-02-16T21:20:00.900767499Z I0216 21:20:00.899677 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[config.openshift.io/v1/Authentication, namespace: , name: cluster, uid: 987ea4f0-d719-4676-985f-202f94fe8b7a]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3"}] 2026-02-16T21:20:00.900767499Z I0216 21:20:00.899716 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: userdefinednetworks.k8s.ovn.org, uid: 3e05dd5e-1136-46ab-8b7b-2e9904e40b52]" virtual=false 2026-02-16T21:20:00.912730472Z I0216 21:20:00.909014 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[config.openshift.io/v1/Build, namespace: , name: cluster, uid: c5c2dc8a-1941-48ad-ac67-2317648be202]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3"}] 2026-02-16T21:20:00.912730472Z I0216 21:20:00.909087 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[admissionregistration.k8s.io/v1/ValidatingWebhookConfiguration, namespace: , name: multus.openshift.io, uid: 60893af2-7bbe-4163-b3b3-a25af7dc709f]" virtual=false 2026-02-16T21:20:00.912730472Z I0216 21:20:00.912117 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[migration.k8s.io/v1alpha1/StorageVersionMigration, namespace: , name: machineconfiguration-controllerconfig-storage-version-migration, uid: 35e858d8-3cd8-4fc2-994d-ca99306d73a9]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}] 2026-02-16T21:20:00.912730472Z I0216 21:20:00.912159 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[admissionregistration.k8s.io/v1/ValidatingWebhookConfiguration, namespace: , name: network-node-identity.openshift.io, uid: 6bce977a-3140-4994-b6de-98a25e11935c]" virtual=false 2026-02-16T21:20:00.912730472Z I0216 21:20:00.912289 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[operator.openshift.io/v1/KubeScheduler, namespace: , name: cluster, uid: 0634e9ec-56f7-40c8-bfdf-be8a1533f930]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3"}] 2026-02-16T21:20:00.912730472Z I0216 21:20:00.912319 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-apiserver, name: revision-status-1, uid: 154da4c2-5322-47cb-945d-71a6b8dea4f0]" virtual=false 2026-02-16T21:20:00.916094069Z I0216 21:20:00.915910 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[operator.openshift.io/v1/KubeControllerManager, namespace: , name: cluster, uid: bc8a32cf-99bd-43d3-acc3-fdb5d9aaeff0]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3"}] 2026-02-16T21:20:00.916094069Z I0216 21:20:00.915958 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-oauth-apiserver, name: revision-status-1, uid: aa23469e-c3ef-457d-a9dd-877319af0615]" virtual=false 2026-02-16T21:20:00.926693365Z I0216 21:20:00.926534 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: adminpolicybasedexternalroutes.k8s.ovn.org, uid: 8a83a7f0-1d53-4a33-a2b8-9fd9f388fcac]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"17900784-12f9-410e-a815-ce7fe10a9476","controller":true,"blockOwnerDeletion":true}] 2026-02-16T21:20:00.946313367Z I0216 21:20:00.946212 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[operator.openshift.io/v1/Authentication, namespace: , name: cluster, uid: 60c7ba87-26a1-4912-9db8-cdf5240be0f5]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3"}] 2026-02-16T21:20:00.950742283Z I0216 21:20:00.950137 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[helm.openshift.io/v1beta1/HelmChartRepository, namespace: , name: openshift-helm-charts, uid: b4dba555-a6d8-4ed0-badd-29005d08e2b4]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3"}] 2026-02-16T21:20:00.952535120Z I0216 21:20:00.952386 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[config.openshift.io/v1/Console, namespace: , name: cluster, uid: 21e19e78-bf6b-461f-b5c1-a99649bb2aa0]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3"}] 2026-02-16T21:20:00.959485651Z I0216 21:20:00.959434 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: baselineadminnetworkpolicies.policy.networking.k8s.io, uid: 41a1dff9-ba78-46b1-934a-b03a6a13f753]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"17900784-12f9-410e-a815-ce7fe10a9476","controller":true,"blockOwnerDeletion":true}] 2026-02-16T21:20:00.976096175Z I0216 21:20:00.976023 1 garbagecollector.go:587] "item doesn't have an owner, continue on next item" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-apiserver, name: revision-status-1, uid: 154da4c2-5322-47cb-945d-71a6b8dea4f0]" 2026-02-16T21:20:00.978953470Z I0216 21:20:00.978874 1 garbagecollector.go:587] "item doesn't have an owner, continue on next item" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-oauth-apiserver, name: revision-status-1, uid: aa23469e-c3ef-457d-a9dd-877319af0615]" 2026-02-16T21:20:00.982950854Z I0216 21:20:00.982892 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: clusteruserdefinednetworks.k8s.ovn.org, uid: cac01818-f3d1-4a47-93cc-43c66bca81e8]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"17900784-12f9-410e-a815-ce7fe10a9476","controller":true,"blockOwnerDeletion":true}] 2026-02-16T21:20:00.987200595Z I0216 21:20:00.987122 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: egressfirewalls.k8s.ovn.org, uid: a8b3dc21-0454-4021-8aa9-1d6773dfadd2]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"17900784-12f9-410e-a815-ce7fe10a9476","controller":true,"blockOwnerDeletion":true}] 2026-02-16T21:20:00.990791578Z I0216 21:20:00.990688 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: egressips.k8s.ovn.org, uid: 48c68b62-06ce-4d8e-b647-9935a7e41ccb]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"17900784-12f9-410e-a815-ce7fe10a9476","controller":true,"blockOwnerDeletion":true}] 2026-02-16T21:20:00.993430117Z I0216 21:20:00.993363 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: egressqoses.k8s.ovn.org, uid: bd599f48-f536-457b-affe-0c4a24f619c4]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"17900784-12f9-410e-a815-ce7fe10a9476","controller":true,"blockOwnerDeletion":true}] 2026-02-16T21:20:00.995594654Z I0216 21:20:00.995535 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: egressservices.k8s.ovn.org, uid: b38f69a5-39a8-4d5d-90b1-f42a00044141]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"17900784-12f9-410e-a815-ce7fe10a9476","controller":true,"blockOwnerDeletion":true}] 2026-02-16T21:20:00.998753366Z I0216 21:20:00.998666 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: ipamclaims.k8s.cni.cncf.io, uid: 2577c3e5-e7c1-4d21-ab31-bac5e209aa8a]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"17900784-12f9-410e-a815-ce7fe10a9476","controller":true,"blockOwnerDeletion":true}] 2026-02-16T21:20:01.002896714Z I0216 21:20:01.002844 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: ippools.whereabouts.cni.cncf.io, uid: 1914ef31-3499-4d30-b7ac-3e49ceb7a11f]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"17900784-12f9-410e-a815-ce7fe10a9476","controller":true,"blockOwnerDeletion":true}] 2026-02-16T21:20:01.006426626Z I0216 21:20:01.006373 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: network-attachment-definitions.k8s.cni.cncf.io, uid: a6c5f25c-892c-4b2b-a715-3462dacad9e4]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"17900784-12f9-410e-a815-ce7fe10a9476","controller":true,"blockOwnerDeletion":true}] 2026-02-16T21:20:01.010105282Z I0216 21:20:01.010044 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: nodeslicepools.whereabouts.cni.cncf.io, uid: 879ed16c-6c46-4a28-a936-b7af2de23b87]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"17900784-12f9-410e-a815-ce7fe10a9476","controller":true,"blockOwnerDeletion":true}] 2026-02-16T21:20:01.012258269Z I0216 21:20:01.012191 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: overlappingrangeipreservations.whereabouts.cni.cncf.io, uid: d2c080ed-d64c-4fe9-93cf-30117a6d0ad4]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"17900784-12f9-410e-a815-ce7fe10a9476","controller":true,"blockOwnerDeletion":true}] 2026-02-16T21:20:01.015738099Z I0216 21:20:01.015610 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[apiextensions.k8s.io/v1/CustomResourceDefinition, namespace: , name: userdefinednetworks.k8s.ovn.org, uid: 3e05dd5e-1136-46ab-8b7b-2e9904e40b52]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"17900784-12f9-410e-a815-ce7fe10a9476","controller":true,"blockOwnerDeletion":true}] 2026-02-16T21:20:01.018624145Z I0216 21:20:01.018572 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[admissionregistration.k8s.io/v1/ValidatingWebhookConfiguration, namespace: , name: multus.openshift.io, uid: 60893af2-7bbe-4163-b3b3-a25af7dc709f]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"17900784-12f9-410e-a815-ce7fe10a9476","controller":true,"blockOwnerDeletion":true}] 2026-02-16T21:20:01.023055420Z I0216 21:20:01.022994 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[admissionregistration.k8s.io/v1/ValidatingWebhookConfiguration, namespace: , name: network-node-identity.openshift.io, uid: 6bce977a-3140-4994-b6de-98a25e11935c]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"17900784-12f9-410e-a815-ce7fe10a9476","controller":true,"blockOwnerDeletion":true}] 2026-02-16T21:20:01.193718744Z I0216 21:20:01.193414 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/openshift-state-metrics-546cc7d765" duration="75.742µs" 2026-02-16T21:20:01.268220728Z I0216 21:20:01.268130 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/kube-state-metrics-7cc9598d54" duration="155.194µs" 2026-02-16T21:20:01.416383975Z I0216 21:20:01.416294 1 job_controller.go:573] "enqueueing job" logger="job-controller" key="openshift-operator-lifecycle-manager/collect-profiles-29521275" delay="1s" 2026-02-16T21:20:01.428591274Z I0216 21:20:01.427999 1 job_controller.go:573] "enqueueing job" logger="job-controller" key="openshift-operator-lifecycle-manager/collect-profiles-29521275" delay="1s" 2026-02-16T21:20:01.435351351Z I0216 21:20:01.434081 1 job_controller.go:573] "enqueueing job" logger="job-controller" key="openshift-operator-lifecycle-manager/collect-profiles-29521275" delay="1s" 2026-02-16T21:20:04.151528519Z I0216 21:20:04.151452 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/openshift-state-metrics-546cc7d765" duration="9.219471ms" 2026-02-16T21:20:04.151931049Z I0216 21:20:04.151788 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/openshift-state-metrics-546cc7d765" duration="93.812µs" 2026-02-16T21:20:04.170874844Z I0216 21:20:04.170795 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/kube-state-metrics-7cc9598d54" duration="8.844341ms" 2026-02-16T21:20:04.171100280Z I0216 21:20:04.171037 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/kube-state-metrics-7cc9598d54" duration="125.944µs" 2026-02-16T21:20:05.186692074Z I0216 21:20:05.186601 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-monitoring/metrics-server-76c9c896c" need=1 creating=1 2026-02-16T21:20:05.198279856Z I0216 21:20:05.198198 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-monitoring/metrics-server" err="Operation cannot be fulfilled on deployments.apps \"metrics-server\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-16T21:20:05.209205282Z I0216 21:20:05.208624 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-76c9c896c" duration="22.072567ms" 2026-02-16T21:20:05.233824065Z I0216 21:20:05.232709 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-76c9c896c" duration="24.023867ms" 2026-02-16T21:20:05.233952998Z I0216 21:20:05.232903 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-76c9c896c" duration="123.113µs" 2026-02-16T21:20:05.233952998Z I0216 21:20:05.232981 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-76c9c896c" duration="40.981µs" 2026-02-16T21:20:05.238871976Z I0216 21:20:05.238770 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-76c9c896c" duration="73.372µs" 2026-02-16T21:20:05.967926213Z I0216 21:20:05.967602 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-76c9c896c" duration="86.842µs" 2026-02-16T21:20:08.765032373Z I0216 21:20:08.764952 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-76c9c896c" duration="75.912µs" 2026-02-16T21:20:09.196040402Z I0216 21:20:09.195931 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-76c9c896c" duration="126.633µs" 2026-02-16T21:20:11.231810342Z I0216 21:20:11.231631 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress-operator/ingress-operator-c588d8cb4" duration="11.47218ms" 2026-02-16T21:20:11.231897684Z I0216 21:20:11.231846 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress-operator/ingress-operator-c588d8cb4" duration="99.574µs" 2026-02-16T21:20:20.287921301Z I0216 21:20:20.287787 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress/router-default-864ddd5f56" duration="86.193µs" 2026-02-16T21:20:24.763141607Z I0216 21:20:24.762852 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress-operator/ingress-operator-c588d8cb4" duration="144.644µs" 2026-02-16T21:20:27.825799897Z I0216 21:20:27.825680 1 garbagecollector.go:826] "failed to discover some groups" logger="garbage-collector-controller" groups="" 2026-02-16T21:20:27.866464988Z E0216 21:20:27.866320 1 resource_quota_controller.go:446] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" logger="UnhandledError" 2026-02-16T21:20:45.572969299Z I0216 21:20:45.572879 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-76c9c896c" duration="132.783µs" 2026-02-16T21:20:45.605804986Z I0216 21:20:45.605721 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-76c9c896c" duration="11.139411ms" 2026-02-16T21:20:45.606433962Z I0216 21:20:45.606383 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/metrics-server-76c9c896c" duration="101.183µs" 2026-02-16T21:20:53.162895374Z I0216 21:20:53.162814 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-operator-lifecycle-manager/packageserver" err="Operation cannot be fulfilled on deployments.apps \"packageserver\": the object has been modified; please apply your changes to the latest version and try again" 2026-02-16T21:20:57.839701010Z I0216 21:20:57.839589 1 garbagecollector.go:826] "failed to discover some groups" logger="garbage-collector-controller" groups="" 2026-02-16T21:20:57.874256815Z E0216 21:20:57.874111 1 resource_quota_controller.go:446] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, metrics.k8s.io/v1beta1: stale GroupVersion discovery: metrics.k8s.io/v1beta1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" logger="UnhandledError" 2026-02-16T21:21:27.863896692Z I0216 21:21:27.863738 1 garbagecollector.go:826] "failed to discover some groups" logger="garbage-collector-controller" groups="" 2026-02-16T21:21:27.885535048Z E0216 21:21:27.885384 1 resource_quota_controller.go:446] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, metrics.k8s.io/v1beta1: stale GroupVersion discovery: metrics.k8s.io/v1beta1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" logger="UnhandledError" 2026-02-16T21:21:57.882643492Z I0216 21:21:57.882515 1 garbagecollector.go:826] "failed to discover some groups" logger="garbage-collector-controller" groups="" 2026-02-16T21:21:57.909380006Z E0216 21:21:57.909181 1 resource_quota_controller.go:446] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, metrics.k8s.io/v1beta1: stale GroupVersion discovery: metrics.k8s.io/v1beta1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" logger="UnhandledError" cluster-policy-controller_previous.log0000640000000000000000000000220715144705173034412 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-02-16T21:04:17.792112382Z I0216 21:04:17.791811 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-16T21:04:17.793882781Z I0216 21:04:17.793838 1 observer_polling.go:159] Starting file observer 2026-02-16T21:04:17.795066614Z I0216 21:04:17.795030 1 builder.go:298] cluster-policy-controller version 4.18.0-202601190115.p2.g5fd8525.assembly.stream.el9-5fd8525-5fd852525909ce6eab52972ba9ce8fcf56528eb9 2026-02-16T21:04:17.796104223Z I0216 21:04:17.796057 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.crt::/etc/kubernetes/secrets/kube-control-plane-kube-controller-manager-client.key" 2026-02-16T21:04:47.321389916Z I0216 21:04:47.321248 1 cmd.go:138] Received SIGTERM or SIGINT signal, shutting down controller. 2026-02-16T21:04:47.795080405Z I0216 21:04:47.794937 1 observer_polling.go:162] Shutting down file observer kube-controller-manager_previous.log0000640000000000000000000003142215144705173033773 0ustar0000000000000000config/pod/kube-system/logs/bootstrap-kube-controller-manager-master-02026-02-16T21:14:06.162918304Z I0216 21:14:06.162903 1 flags.go:64] FLAG: --pvclaimbinder-sync-period="15s" 2026-02-16T21:14:06.162926794Z I0216 21:14:06.162908 1 flags.go:64] FLAG: --requestheader-allowed-names="[]" 2026-02-16T21:14:06.162934544Z I0216 21:14:06.162923 1 flags.go:64] FLAG: --requestheader-client-ca-file="" 2026-02-16T21:14:06.162942315Z I0216 21:14:06.162928 1 flags.go:64] FLAG: --requestheader-extra-headers-prefix="[x-remote-extra-]" 2026-02-16T21:14:06.162967475Z I0216 21:14:06.162937 1 flags.go:64] FLAG: --requestheader-group-headers="[x-remote-group]" 2026-02-16T21:14:06.162967475Z I0216 21:14:06.162948 1 flags.go:64] FLAG: --requestheader-username-headers="[x-remote-user]" 2026-02-16T21:14:06.162967475Z I0216 21:14:06.162955 1 flags.go:64] FLAG: --resource-quota-sync-period="5m0s" 2026-02-16T21:14:06.162967475Z I0216 21:14:06.162959 1 flags.go:64] FLAG: --root-ca-file="/etc/kubernetes/secrets/kube-apiserver-complete-server-ca-bundle.crt" 2026-02-16T21:14:06.162967475Z I0216 21:14:06.162964 1 flags.go:64] FLAG: --route-reconciliation-period="10s" 2026-02-16T21:14:06.162977236Z I0216 21:14:06.162968 1 flags.go:64] FLAG: --secondary-node-eviction-rate="0.01" 2026-02-16T21:14:06.162977236Z I0216 21:14:06.162972 1 flags.go:64] FLAG: --secure-port="10257" 2026-02-16T21:14:06.162985436Z I0216 21:14:06.162976 1 flags.go:64] FLAG: --service-account-private-key-file="/etc/kubernetes/secrets/service-account.key" 2026-02-16T21:14:06.162985436Z I0216 21:14:06.162981 1 flags.go:64] FLAG: --service-cluster-ip-range="172.30.0.0/16" 2026-02-16T21:14:06.162993626Z I0216 21:14:06.162985 1 flags.go:64] FLAG: --show-hidden-metrics-for-version="" 2026-02-16T21:14:06.162993626Z I0216 21:14:06.162989 1 flags.go:64] FLAG: --terminated-pod-gc-threshold="12500" 2026-02-16T21:14:06.163001556Z I0216 21:14:06.162993 1 flags.go:64] FLAG: --tls-cert-file="" 2026-02-16T21:14:06.163009506Z I0216 21:14:06.162997 1 flags.go:64] FLAG: --tls-cipher-suites="[]" 2026-02-16T21:14:06.163009506Z I0216 21:14:06.163006 1 flags.go:64] FLAG: --tls-min-version="" 2026-02-16T21:14:06.163029157Z I0216 21:14:06.163010 1 flags.go:64] FLAG: --tls-private-key-file="" 2026-02-16T21:14:06.163029157Z I0216 21:14:06.163014 1 flags.go:64] FLAG: --tls-sni-cert-key="[]" 2026-02-16T21:14:06.163029157Z I0216 21:14:06.163023 1 flags.go:64] FLAG: --unhealthy-zone-threshold="0.55" 2026-02-16T21:14:06.163037567Z I0216 21:14:06.163027 1 flags.go:64] FLAG: --unsupported-kube-api-over-localhost="false" 2026-02-16T21:14:06.163037567Z I0216 21:14:06.163031 1 flags.go:64] FLAG: --use-service-account-credentials="true" 2026-02-16T21:14:06.163045007Z I0216 21:14:06.163035 1 flags.go:64] FLAG: --v="2" 2026-02-16T21:14:06.163045007Z I0216 21:14:06.163039 1 flags.go:64] FLAG: --version="false" 2026-02-16T21:14:06.163052438Z I0216 21:14:06.163044 1 flags.go:64] FLAG: --vmodule="" 2026-02-16T21:14:06.163235532Z W0216 21:14:06.163209 1 feature_gate.go:330] unrecognized feature gate: GatewayAPI 2026-02-16T21:14:06.163235532Z W0216 21:14:06.163222 1 feature_gate.go:330] unrecognized feature gate: AWSEFSDriverVolumeMetrics 2026-02-16T21:14:06.163235532Z W0216 21:14:06.163226 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallGCP 2026-02-16T21:14:06.163235532Z W0216 21:14:06.163230 1 feature_gate.go:330] unrecognized feature gate: AdminNetworkPolicy 2026-02-16T21:14:06.163250043Z W0216 21:14:06.163233 1 feature_gate.go:330] unrecognized feature gate: ClusterMonitoringConfig 2026-02-16T21:14:06.163250043Z W0216 21:14:06.163239 1 feature_gate.go:330] unrecognized feature gate: UpgradeStatus 2026-02-16T21:14:06.163250043Z W0216 21:14:06.163242 1 feature_gate.go:330] unrecognized feature gate: ClusterAPIInstallIBMCloud 2026-02-16T21:14:06.163250043Z W0216 21:14:06.163246 1 feature_gate.go:330] unrecognized feature gate: EtcdBackendQuota 2026-02-16T21:14:06.163258223Z W0216 21:14:06.163249 1 feature_gate.go:330] unrecognized feature gate: AutomatedEtcdBackup 2026-02-16T21:14:06.163258223Z W0216 21:14:06.163253 1 feature_gate.go:330] unrecognized feature gate: BuildCSIVolumes 2026-02-16T21:14:06.163293914Z W0216 21:14:06.163256 1 feature_gate.go:330] unrecognized feature gate: MixedCPUsAllocation 2026-02-16T21:14:06.163293914Z W0216 21:14:06.163260 1 feature_gate.go:330] unrecognized feature gate: DNSNameResolver 2026-02-16T21:14:06.163293914Z W0216 21:14:06.163264 1 feature_gate.go:330] unrecognized feature gate: BareMetalLoadBalancer 2026-02-16T21:14:06.163293914Z W0216 21:14:06.163268 1 feature_gate.go:330] unrecognized feature gate: MachineAPIMigration 2026-02-16T21:14:06.163293914Z W0216 21:14:06.163271 1 feature_gate.go:330] unrecognized feature gate: NewOLM 2026-02-16T21:14:06.163293914Z W0216 21:14:06.163275 1 feature_gate.go:330] unrecognized feature gate: InsightsConfig 2026-02-16T21:14:06.163293914Z W0216 21:14:06.163278 1 feature_gate.go:330] unrecognized feature gate: ManagedBootImagesAWS 2026-02-16T21:14:06.163293914Z W0216 21:14:06.163281 1 feature_gate.go:330] unrecognized feature gate: VSphereMultiNetworks 2026-02-16T21:14:06.163293914Z W0216 21:14:06.163285 1 feature_gate.go:330] unrecognized feature gate: InsightsRuntimeExtractor 2026-02-16T21:14:06.163293914Z W0216 21:14:06.163289 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallAzure 2026-02-16T21:14:06.163304144Z W0216 21:14:06.163292 1 feature_gate.go:330] unrecognized feature gate: OpenShiftPodSecurityAdmission 2026-02-16T21:14:06.163304144Z W0216 21:14:06.163295 1 feature_gate.go:330] unrecognized feature gate: MachineConfigNodes 2026-02-16T21:14:06.163304144Z W0216 21:14:06.163298 1 feature_gate.go:330] unrecognized feature gate: AdditionalRoutingCapabilities 2026-02-16T21:14:06.163304144Z W0216 21:14:06.163301 1 feature_gate.go:330] unrecognized feature gate: InsightsConfigAPI 2026-02-16T21:14:06.163312524Z W0216 21:14:06.163304 1 feature_gate.go:330] unrecognized feature gate: OnClusterBuild 2026-02-16T21:14:06.163312524Z W0216 21:14:06.163307 1 feature_gate.go:330] unrecognized feature gate: PinnedImages 2026-02-16T21:14:06.163312524Z W0216 21:14:06.163310 1 feature_gate.go:330] unrecognized feature gate: GCPLabelsTags 2026-02-16T21:14:06.163320515Z W0216 21:14:06.163314 1 feature_gate.go:330] unrecognized feature gate: NetworkSegmentation 2026-02-16T21:14:06.163320515Z W0216 21:14:06.163317 1 feature_gate.go:330] unrecognized feature gate: VSphereControlPlaneMachineSet 2026-02-16T21:14:06.163328015Z W0216 21:14:06.163320 1 feature_gate.go:330] unrecognized feature gate: NetworkDiagnosticsConfig 2026-02-16T21:14:06.163328015Z W0216 21:14:06.163323 1 feature_gate.go:330] unrecognized feature gate: HardwareSpeed 2026-02-16T21:14:06.163328015Z W0216 21:14:06.163325 1 feature_gate.go:330] unrecognized feature gate: VSphereDriverConfiguration 2026-02-16T21:14:06.163336435Z W0216 21:14:06.163328 1 feature_gate.go:330] unrecognized feature gate: VSphereMultiVCenters 2026-02-16T21:14:06.163336435Z W0216 21:14:06.163331 1 feature_gate.go:330] unrecognized feature gate: VSphereStaticIPs 2026-02-16T21:14:06.163336435Z W0216 21:14:06.163334 1 feature_gate.go:330] unrecognized feature gate: ExternalOIDCWithUIDAndExtraClaimMappings 2026-02-16T21:14:06.163348095Z W0216 21:14:06.163337 1 feature_gate.go:330] unrecognized feature gate: ManagedBootImages 2026-02-16T21:14:06.163348095Z W0216 21:14:06.163340 1 feature_gate.go:330] unrecognized feature gate: MachineAPIProviderOpenStack 2026-02-16T21:14:06.163348095Z W0216 21:14:06.163343 1 feature_gate.go:330] unrecognized feature gate: NetworkLiveMigration 2026-02-16T21:14:06.163377686Z W0216 21:14:06.163347 1 feature_gate.go:353] Setting GA feature gate ValidatingAdmissionPolicy=true. It will be removed in a future release. 2026-02-16T21:14:06.163377686Z W0216 21:14:06.163351 1 feature_gate.go:330] unrecognized feature gate: ChunkSizeMiB 2026-02-16T21:14:06.163377686Z W0216 21:14:06.163353 1 feature_gate.go:330] unrecognized feature gate: MinimumKubeletVersion 2026-02-16T21:14:06.163377686Z W0216 21:14:06.163357 1 feature_gate.go:330] unrecognized feature gate: ImageStreamImportMode 2026-02-16T21:14:06.163377686Z W0216 21:14:06.163360 1 feature_gate.go:330] unrecognized feature gate: RouteAdvertisements 2026-02-16T21:14:06.163377686Z W0216 21:14:06.163362 1 feature_gate.go:330] unrecognized feature gate: BootcNodeManagement 2026-02-16T21:14:06.163377686Z W0216 21:14:06.163365 1 feature_gate.go:330] unrecognized feature gate: IngressControllerLBSubnetsAWS 2026-02-16T21:14:06.163377686Z W0216 21:14:06.163369 1 feature_gate.go:353] Setting GA feature gate DisableKubeletCloudCredentialProviders=true. It will be removed in a future release. 2026-02-16T21:14:06.163377686Z W0216 21:14:06.163373 1 feature_gate.go:330] unrecognized feature gate: IngressControllerDynamicConfigurationManager 2026-02-16T21:14:06.163387476Z W0216 21:14:06.163376 1 feature_gate.go:330] unrecognized feature gate: ClusterAPIInstall 2026-02-16T21:14:06.163387476Z W0216 21:14:06.163380 1 feature_gate.go:330] unrecognized feature gate: OVNObservability 2026-02-16T21:14:06.163387476Z W0216 21:14:06.163382 1 feature_gate.go:330] unrecognized feature gate: ExternalOIDC 2026-02-16T21:14:06.163395607Z W0216 21:14:06.163386 1 feature_gate.go:351] Setting deprecated feature gate KMSv1=true. It will be removed in a future release. 2026-02-16T21:14:06.163395607Z W0216 21:14:06.163389 1 feature_gate.go:330] unrecognized feature gate: SignatureStores 2026-02-16T21:14:06.163395607Z W0216 21:14:06.163392 1 feature_gate.go:330] unrecognized feature gate: VolumeGroupSnapshot 2026-02-16T21:14:06.163403527Z W0216 21:14:06.163394 1 feature_gate.go:330] unrecognized feature gate: InsightsOnDemandDataGather 2026-02-16T21:14:06.163403527Z W0216 21:14:06.163399 1 feature_gate.go:330] unrecognized feature gate: AWSClusterHostedDNS 2026-02-16T21:14:06.163411787Z W0216 21:14:06.163404 1 feature_gate.go:353] Setting GA feature gate CloudDualStackNodeIPs=true. It will be removed in a future release. 2026-02-16T21:14:06.163411787Z W0216 21:14:06.163408 1 feature_gate.go:330] unrecognized feature gate: Example 2026-02-16T21:14:06.163419897Z W0216 21:14:06.163412 1 feature_gate.go:330] unrecognized feature gate: AlibabaPlatform 2026-02-16T21:14:06.163419897Z W0216 21:14:06.163417 1 feature_gate.go:330] unrecognized feature gate: CSIDriverSharedResource 2026-02-16T21:14:06.163427527Z W0216 21:14:06.163421 1 feature_gate.go:330] unrecognized feature gate: PrivateHostedZoneAWS 2026-02-16T21:14:06.163427527Z W0216 21:14:06.163424 1 feature_gate.go:330] unrecognized feature gate: NodeDisruptionPolicy 2026-02-16T21:14:06.163438598Z W0216 21:14:06.163428 1 feature_gate.go:330] unrecognized feature gate: ConsolePluginContentSecurityPolicy 2026-02-16T21:14:06.163438598Z W0216 21:14:06.163431 1 feature_gate.go:330] unrecognized feature gate: GCPClusterHostedDNS 2026-02-16T21:14:06.163438598Z W0216 21:14:06.163435 1 feature_gate.go:330] unrecognized feature gate: SetEIPForNLBIngressController 2026-02-16T21:14:06.163446538Z W0216 21:14:06.163439 1 feature_gate.go:330] unrecognized feature gate: PlatformOperators 2026-02-16T21:14:06.163446538Z W0216 21:14:06.163442 1 feature_gate.go:330] unrecognized feature gate: MachineAPIOperatorDisableMachineHealthCheckController 2026-02-16T21:14:06.163454058Z W0216 21:14:06.163446 1 feature_gate.go:330] unrecognized feature gate: MultiArchInstallAWS 2026-02-16T21:14:06.163454058Z W0216 21:14:06.163449 1 feature_gate.go:330] unrecognized feature gate: NutanixMultiSubnets 2026-02-16T21:14:06.163461448Z W0216 21:14:06.163453 1 feature_gate.go:330] unrecognized feature gate: PersistentIPsForVirtualization 2026-02-16T21:14:06.163461448Z W0216 21:14:06.163456 1 feature_gate.go:330] unrecognized feature gate: SigstoreImageVerification 2026-02-16T21:14:06.163468899Z W0216 21:14:06.163460 1 feature_gate.go:330] unrecognized feature gate: AzureWorkloadIdentity 2026-02-16T21:14:06.163468899Z W0216 21:14:06.163464 1 feature_gate.go:330] unrecognized feature gate: MetricsCollectionProfiles 2026-02-16T21:14:06.298393925Z I0216 21:14:06.298328 1 serving.go:380] Generated self-signed cert (/var/run/kubernetes/kube-controller-manager.crt, /var/run/kubernetes/kube-controller-manager.key) 2026-02-16T21:14:06.300181303Z I0216 21:14:06.300153 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/kubernetes/kube-controller-manager.crt::/var/run/kubernetes/kube-controller-manager.key" config/pod/kube-system/bootstrap-kube-controller-manager-master-0.json0000640000000000000000000002766615144705173024642 0ustar0000000000000000{"metadata":{"name":"bootstrap-kube-controller-manager-master-0","namespace":"kube-system","uid":"dfb5c6a6-2fb2-44d3-8744-2f73c83e1292","resourceVersion":"12533","creationTimestamp":"2026-02-16T20:56:41Z","labels":{"openshift.io/component":"controller-manager","openshift.io/control-plane":"true"},"annotations":{"kubernetes.io/config.hash":"80420f2e7c3cdda71f7d0d6ccbe6f9f3","kubernetes.io/config.mirror":"80420f2e7c3cdda71f7d0d6ccbe6f9f3","kubernetes.io/config.seen":"2026-02-16T20:55:04.730955942Z","kubernetes.io/config.source":"file","openshift.io/run-level":"0","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"c38c4104-28e6-4348-a07e-dd94820db5ac","controller":true}]},"spec":{"volumes":[{"name":"secrets","hostPath":{"path":"/etc/kubernetes/bootstrap-secrets","type":""}},{"name":"etc-kubernetes-cloud","hostPath":{"path":"/etc/kubernetes/cloud","type":""}},{"name":"config","hostPath":{"path":"/etc/kubernetes/bootstrap-configs","type":""}},{"name":"ssl-certs-host","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"logs","hostPath":{"path":"/var/log/bootstrap-control-plane","type":""}}],"containers":[{"name":"kube-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","command":["hyperkube","kube-controller-manager"],"args":["--openshift-config=/etc/kubernetes/config/kube-controller-manager-config.yaml","--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--v=2","--allocate-node-cidrs=false","--authentication-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--cert-dir=/var/run/kubernetes","--cloud-provider=external","--cluster-cidr=10.128.0.0/16","--cluster-signing-cert-file=/etc/kubernetes/secrets/kubelet-signer.crt","--cluster-signing-duration=720h","--cluster-signing-key-file=/etc/kubernetes/secrets/kubelet-signer.key","--controllers=*","--controllers=-bootstrapsigner","--controllers=-tokencleaner","--controllers=-ttl","--enable-dynamic-provisioning=true","--feature-gates=AWSClusterHostedDNS=false","--feature-gates=AWSEFSDriverVolumeMetrics=true","--feature-gates=AdditionalRoutingCapabilities=false","--feature-gates=AdminNetworkPolicy=true","--feature-gates=AlibabaPlatform=true","--feature-gates=AutomatedEtcdBackup=false","--feature-gates=AzureWorkloadIdentity=true","--feature-gates=BareMetalLoadBalancer=true","--feature-gates=BootcNodeManagement=false","--feature-gates=BuildCSIVolumes=true","--feature-gates=CSIDriverSharedResource=false","--feature-gates=ChunkSizeMiB=true","--feature-gates=CloudDualStackNodeIPs=true","--feature-gates=ClusterAPIInstall=false","--feature-gates=ClusterAPIInstallIBMCloud=false","--feature-gates=ClusterMonitoringConfig=false","--feature-gates=ConsolePluginContentSecurityPolicy=false","--feature-gates=DNSNameResolver=false","--feature-gates=DisableKubeletCloudCredentialProviders=true","--feature-gates=DynamicResourceAllocation=false","--feature-gates=EtcdBackendQuota=false","--feature-gates=EventedPLEG=false","--feature-gates=Example=false","--feature-gates=ExternalOIDC=false","--feature-gates=ExternalOIDCWithUIDAndExtraClaimMappings=false","--feature-gates=GCPClusterHostedDNS=false","--feature-gates=GCPLabelsTags=true","--feature-gates=GatewayAPI=false","--feature-gates=HardwareSpeed=true","--feature-gates=ImageStreamImportMode=false","--feature-gates=IngressControllerDynamicConfigurationManager=false","--feature-gates=IngressControllerLBSubnetsAWS=true","--feature-gates=InsightsConfig=false","--feature-gates=InsightsConfigAPI=false","--feature-gates=InsightsOnDemandDataGather=false","--feature-gates=InsightsRuntimeExtractor=false","--feature-gates=KMSv1=true","--feature-gates=MachineAPIMigration=false","--feature-gates=MachineAPIOperatorDisableMachineHealthCheckController=false","--feature-gates=MachineAPIProviderOpenStack=false","--feature-gates=MachineConfigNodes=false","--feature-gates=ManagedBootImages=true","--feature-gates=ManagedBootImagesAWS=true","--feature-gates=MaxUnavailableStatefulSet=false","--feature-gates=MetricsCollectionProfiles=false","--feature-gates=MinimumKubeletVersion=false","--feature-gates=MixedCPUsAllocation=false","--feature-gates=MultiArchInstallAWS=true","--feature-gates=MultiArchInstallAzure=false","--feature-gates=MultiArchInstallGCP=true","--feature-gates=NetworkDiagnosticsConfig=true","--feature-gates=NetworkLiveMigration=true","--feature-gates=NetworkSegmentation=true","--feature-gates=NewOLM=true","--feature-gates=NodeDisruptionPolicy=true","--feature-gates=NodeSwap=false","--feature-gates=NutanixMultiSubnets=false","--feature-gates=OVNObservability=false","--feature-gates=OnClusterBuild=true","--feature-gates=OpenShiftPodSecurityAdmission=false","--feature-gates=PersistentIPsForVirtualization=true","--feature-gates=PinnedImages=false","--feature-gates=PlatformOperators=false","--feature-gates=PrivateHostedZoneAWS=true","--feature-gates=ProcMountType=false","--feature-gates=RouteAdvertisements=false","--feature-gates=RouteExternalCertificate=false","--feature-gates=ServiceAccountTokenNodeBinding=false","--feature-gates=SetEIPForNLBIngressController=true","--feature-gates=SignatureStores=false","--feature-gates=SigstoreImageVerification=false","--feature-gates=StreamingCollectionEncodingToJSON=true","--feature-gates=StreamingCollectionEncodingToProtobuf=true","--feature-gates=TranslateStreamCloseWebsocketRequests=false","--feature-gates=UpgradeStatus=false","--feature-gates=UserNamespacesPodSecurityStandards=false","--feature-gates=UserNamespacesSupport=false","--feature-gates=VSphereControlPlaneMachineSet=true","--feature-gates=VSphereDriverConfiguration=true","--feature-gates=VSphereMultiNetworks=false","--feature-gates=VSphereMultiVCenters=true","--feature-gates=VSphereStaticIPs=true","--feature-gates=ValidatingAdmissionPolicy=true","--feature-gates=VolumeAttributesClass=false","--feature-gates=VolumeGroupSnapshot=false","--flex-volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec","--kube-api-burst=300","--kube-api-qps=150","--leader-elect-renew-deadline=12s","--leader-elect-resource-lock=leases","--leader-elect-retry-period=3s","--leader-elect=true","--pv-recycler-pod-template-filepath-hostpath=","--pv-recycler-pod-template-filepath-nfs=","--root-ca-file=/etc/kubernetes/secrets/kube-apiserver-complete-server-ca-bundle.crt","--secure-port=10257","--service-account-private-key-file=/etc/kubernetes/secrets/service-account.key","--service-cluster-ip-range=172.30.0.0/16","--use-service-account-credentials=true"],"ports":[{"hostPort":10257,"containerPort":10257,"protocol":"TCP"}],"resources":{"requests":{"cpu":"60m","memory":"200Mi"}},"volumeMounts":[{"name":"ssl-certs-host","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"etc-kubernetes-cloud","readOnly":true,"mountPath":"/etc/kubernetes/cloud"},{"name":"config","readOnly":true,"mountPath":"/etc/kubernetes/config"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"timeoutSeconds":3,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"},{"name":"cluster-policy-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5d54bd262ca625a326b01ea2bfd33db10a402c05590e6b710b0959712e1bf30b","command":["cluster-policy-controller","start"],"args":["--config=/etc/kubernetes/config/cluster-policy-controller-config.yaml","--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--namespace=$(POD_NAMESPACE)","--v=2"],"ports":[{"hostPort":10357,"containerPort":10357,"protocol":"TCP"}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"200Mi"}},"volumeMounts":[{"name":"ssl-certs-host","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"etc-kubernetes-cloud","readOnly":true,"mountPath":"/etc/kubernetes/cloud"},{"name":"config","readOnly":true,"mountPath":"/etc/kubernetes/config"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"timeoutSeconds":3,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priority":0,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:09Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:09Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:19:55Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:19:55Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:09Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-16T20:57:09Z","containerStatuses":[{"name":"cluster-policy-controller","state":{"running":{"startedAt":"2026-02-16T21:05:18Z"}},"lastState":{"terminated":{"exitCode":137,"reason":"Error","startedAt":"2026-02-16T21:04:17Z","finishedAt":"2026-02-16T21:05:17Z","containerID":"cri-o://004bfc046616ade5acce3345f914946a2b1075ac66e815294a04a1ccd9e0b9a2"}},"ready":true,"restartCount":4,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5d54bd262ca625a326b01ea2bfd33db10a402c05590e6b710b0959712e1bf30b","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5d54bd262ca625a326b01ea2bfd33db10a402c05590e6b710b0959712e1bf30b","containerID":"cri-o://6dfa6b8d2b84acd49a7559619cbb2034fe2294937bd8d4e0f86679d02bd2078a","started":true},{"name":"kube-controller-manager","state":{"running":{"startedAt":"2026-02-16T21:19:40Z"}},"lastState":{"terminated":{"exitCode":2,"reason":"Error","startedAt":"2026-02-16T21:14:06Z","finishedAt":"2026-02-16T21:14:29Z","containerID":"cri-o://a591b9fa8d74ad75ec2421d6c1738c199e947e0e55c24abea8bf7fc61016c406"}},"ready":true,"restartCount":8,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","containerID":"cri-o://6ae1597534c852a1aae5585dadba4c16b6d817d6984c35ca98940b0dfe1fcd77","started":true}],"qosClass":"Burstable"}}kube-controller-manager-operator_current.log0000640000000000000000000005014315144705173044274 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-78ff47c7c5-7p9ft2026-02-16T21:21:53.982163486Z I0216 21:21:53.982093 1 leaderelection.go:268] successfully acquired lease openshift-kube-controller-manager-operator/kube-controller-manager-operator-lock 2026-02-16T21:21:53.982322280Z I0216 21:21:53.982277 1 event.go:377] Event(v1.ObjectReference{Kind:"Lease", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator-lock", UID:"5f657d35-673b-4ba9-a4ff-a84f55258cef", APIVersion:"coordination.k8s.io/v1", ResourceVersion:"13061", FieldPath:""}): type: 'Normal' reason: 'LeaderElection' kube-controller-manager-operator-78ff47c7c5-7p9ft_33c11345-0be4-4e5f-bf37-06332e043fbc became leader 2026-02-16T21:21:53.983934934Z I0216 21:21:53.983888 1 simple_featuregate_reader.go:171] Starting feature-gate-detector 2026-02-16T21:21:53.986908644Z I0216 21:21:53.986809 1 starter.go:98] FeatureGates initialized: knownFeatureGates=[AWSEFSDriverVolumeMetrics AdminNetworkPolicy AlibabaPlatform AzureWorkloadIdentity BareMetalLoadBalancer BuildCSIVolumes ChunkSizeMiB CloudDualStackNodeIPs DisableKubeletCloudCredentialProviders GCPLabelsTags HardwareSpeed IngressControllerLBSubnetsAWS KMSv1 ManagedBootImages ManagedBootImagesAWS MultiArchInstallAWS MultiArchInstallGCP NetworkDiagnosticsConfig NetworkLiveMigration NetworkSegmentation NewOLM NodeDisruptionPolicy OnClusterBuild PersistentIPsForVirtualization PrivateHostedZoneAWS SetEIPForNLBIngressController StreamingCollectionEncodingToJSON StreamingCollectionEncodingToProtobuf VSphereControlPlaneMachineSet VSphereDriverConfiguration VSphereMultiVCenters VSphereStaticIPs ValidatingAdmissionPolicy AWSClusterHostedDNS AdditionalRoutingCapabilities AutomatedEtcdBackup BootcNodeManagement CSIDriverSharedResource ClusterAPIInstall ClusterAPIInstallIBMCloud ClusterMonitoringConfig ConsolePluginContentSecurityPolicy DNSNameResolver DynamicResourceAllocation EtcdBackendQuota EventedPLEG Example ExternalOIDC ExternalOIDCWithUIDAndExtraClaimMappings GCPClusterHostedDNS GatewayAPI ImageStreamImportMode IngressControllerDynamicConfigurationManager InsightsConfig InsightsConfigAPI InsightsOnDemandDataGather InsightsRuntimeExtractor MachineAPIMigration MachineAPIOperatorDisableMachineHealthCheckController MachineAPIProviderOpenStack MachineConfigNodes MaxUnavailableStatefulSet MetricsCollectionProfiles MinimumKubeletVersion MixedCPUsAllocation MultiArchInstallAzure NodeSwap NutanixMultiSubnets OVNObservability OpenShiftPodSecurityAdmission PinnedImages PlatformOperators ProcMountType RouteAdvertisements RouteExternalCertificate ServiceAccountTokenNodeBinding SignatureStores SigstoreImageVerification TranslateStreamCloseWebsocketRequests UpgradeStatus UserNamespacesPodSecurityStandards UserNamespacesSupport VSphereMultiNetworks VolumeAttributesClass VolumeGroupSnapshot] 2026-02-16T21:21:53.987798559Z I0216 21:21:53.987728 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"81345e63-af6b-4cc0-b3d1-2d1dfa7a321b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'FeatureGatesInitialized' FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{"AWSEFSDriverVolumeMetrics", "AdminNetworkPolicy", "AlibabaPlatform", "AzureWorkloadIdentity", "BareMetalLoadBalancer", "BuildCSIVolumes", "ChunkSizeMiB", "CloudDualStackNodeIPs", "DisableKubeletCloudCredentialProviders", "GCPLabelsTags", "HardwareSpeed", "IngressControllerLBSubnetsAWS", "KMSv1", "ManagedBootImages", "ManagedBootImagesAWS", "MultiArchInstallAWS", "MultiArchInstallGCP", "NetworkDiagnosticsConfig", "NetworkLiveMigration", "NetworkSegmentation", "NewOLM", "NodeDisruptionPolicy", "OnClusterBuild", "PersistentIPsForVirtualization", "PrivateHostedZoneAWS", "SetEIPForNLBIngressController", "StreamingCollectionEncodingToJSON", "StreamingCollectionEncodingToProtobuf", "VSphereControlPlaneMachineSet", "VSphereDriverConfiguration", "VSphereMultiVCenters", "VSphereStaticIPs", "ValidatingAdmissionPolicy"}, Disabled:[]v1.FeatureGateName{"AWSClusterHostedDNS", "AdditionalRoutingCapabilities", "AutomatedEtcdBackup", "BootcNodeManagement", "CSIDriverSharedResource", "ClusterAPIInstall", "ClusterAPIInstallIBMCloud", "ClusterMonitoringConfig", "ConsolePluginContentSecurityPolicy", "DNSNameResolver", "DynamicResourceAllocation", "EtcdBackendQuota", "EventedPLEG", "Example", "ExternalOIDC", "ExternalOIDCWithUIDAndExtraClaimMappings", "GCPClusterHostedDNS", "GatewayAPI", "ImageStreamImportMode", "IngressControllerDynamicConfigurationManager", "InsightsConfig", "InsightsConfigAPI", "InsightsOnDemandDataGather", "InsightsRuntimeExtractor", "MachineAPIMigration", "MachineAPIOperatorDisableMachineHealthCheckController", "MachineAPIProviderOpenStack", "MachineConfigNodes", "MaxUnavailableStatefulSet", "MetricsCollectionProfiles", "MinimumKubeletVersion", "MixedCPUsAllocation", "MultiArchInstallAzure", "NodeSwap", "NutanixMultiSubnets", "OVNObservability", "OpenShiftPodSecurityAdmission", "PinnedImages", "PlatformOperators", "ProcMountType", "RouteAdvertisements", "RouteExternalCertificate", "ServiceAccountTokenNodeBinding", "SignatureStores", "SigstoreImageVerification", "TranslateStreamCloseWebsocketRequests", "UpgradeStatus", "UserNamespacesPodSecurityStandards", "UserNamespacesSupport", "VSphereMultiNetworks", "VolumeAttributesClass", "VolumeGroupSnapshot"}} 2026-02-16T21:21:54.009430985Z I0216 21:21:54.009371 1 base_controller.go:76] Waiting for caches to sync for MissingStaticPodController 2026-02-16T21:21:54.009463426Z I0216 21:21:54.009422 1 base_controller.go:76] Waiting for caches to sync for kube-controller-manager-StaticPodState 2026-02-16T21:21:54.009589869Z I0216 21:21:54.009556 1 base_controller.go:76] Waiting for caches to sync for PruneController 2026-02-16T21:21:54.009599650Z I0216 21:21:54.009589 1 base_controller.go:76] Waiting for caches to sync for kube-controller-manager-Node 2026-02-16T21:21:54.010429191Z I0216 21:21:54.010392 1 base_controller.go:76] Waiting for caches to sync for BackingResourceController-StaticResources 2026-02-16T21:21:54.010442782Z I0216 21:21:54.010430 1 base_controller.go:76] Waiting for caches to sync for kube-controller-manager-operator-UnsupportedConfigOverrides 2026-02-16T21:21:54.010855014Z I0216 21:21:54.010610 1 base_controller.go:76] Waiting for caches to sync for kube-controller-manager-InstallerState 2026-02-16T21:21:54.011168382Z I0216 21:21:54.011128 1 base_controller.go:76] Waiting for caches to sync for TargetConfigController 2026-02-16T21:21:54.011529041Z I0216 21:21:54.011488 1 base_controller.go:76] Waiting for caches to sync for RevisionController 2026-02-16T21:21:54.011569252Z I0216 21:21:54.011551 1 base_controller.go:76] Waiting for caches to sync for GuardController 2026-02-16T21:21:54.011914422Z I0216 21:21:54.011884 1 base_controller.go:76] Waiting for caches to sync for ConfigObserver 2026-02-16T21:21:54.012596521Z I0216 21:21:54.012542 1 base_controller.go:76] Waiting for caches to sync for LoggingSyncer 2026-02-16T21:21:54.012769765Z I0216 21:21:54.012721 1 base_controller.go:76] Waiting for caches to sync for GarbageCollectorWatcherController 2026-02-16T21:21:54.012843077Z I0216 21:21:54.012816 1 base_controller.go:76] Waiting for caches to sync for kube-controller-manager 2026-02-16T21:21:54.013454153Z I0216 21:21:54.013407 1 base_controller.go:76] Waiting for caches to sync for SATokenSignerController 2026-02-16T21:21:54.013466464Z I0216 21:21:54.013452 1 base_controller.go:76] Waiting for caches to sync for CertRotationController 2026-02-16T21:21:54.018777538Z I0216 21:21:54.017401 1 base_controller.go:76] Waiting for caches to sync for KubeControllerManagerStaticResources-StaticResources 2026-02-16T21:21:54.018777538Z I0216 21:21:54.017815 1 base_controller.go:76] Waiting for caches to sync for Installer 2026-02-16T21:21:54.021845810Z I0216 21:21:54.021766 1 base_controller.go:76] Waiting for caches to sync for WorkerLatencyProfile 2026-02-16T21:21:54.022304824Z I0216 21:21:54.022266 1 base_controller.go:76] Waiting for caches to sync for StatusSyncer_kube-controller-manager 2026-02-16T21:21:54.110779730Z I0216 21:21:54.110691 1 base_controller.go:82] Caches are synced for PruneController 2026-02-16T21:21:54.110779730Z I0216 21:21:54.110709 1 base_controller.go:82] Caches are synced for kube-controller-manager-StaticPodState 2026-02-16T21:21:54.110779730Z I0216 21:21:54.110722 1 base_controller.go:119] Starting #1 worker of PruneController controller ... 2026-02-16T21:21:54.110779730Z I0216 21:21:54.110696 1 base_controller.go:82] Caches are synced for kube-controller-manager-operator-UnsupportedConfigOverrides 2026-02-16T21:21:54.110779730Z I0216 21:21:54.110749 1 base_controller.go:82] Caches are synced for BackingResourceController-StaticResources 2026-02-16T21:21:54.110779730Z I0216 21:21:54.110757 1 base_controller.go:119] Starting #1 worker of BackingResourceController-StaticResources controller ... 2026-02-16T21:21:54.110834461Z I0216 21:21:54.110769 1 base_controller.go:119] Starting #1 worker of kube-controller-manager-operator-UnsupportedConfigOverrides controller ... 2026-02-16T21:21:54.110895423Z I0216 21:21:54.110728 1 base_controller.go:119] Starting #1 worker of kube-controller-manager-StaticPodState controller ... 2026-02-16T21:21:54.110940604Z I0216 21:21:54.110829 1 base_controller.go:82] Caches are synced for MissingStaticPodController 2026-02-16T21:21:54.111017356Z I0216 21:21:54.110966 1 base_controller.go:119] Starting #1 worker of MissingStaticPodController controller ... 2026-02-16T21:21:54.111108698Z I0216 21:21:54.111054 1 base_controller.go:82] Caches are synced for kube-controller-manager-InstallerState 2026-02-16T21:21:54.111120219Z I0216 21:21:54.111101 1 base_controller.go:119] Starting #1 worker of kube-controller-manager-InstallerState controller ... 2026-02-16T21:21:54.111566131Z I0216 21:21:54.111531 1 prune_controller.go:277] Nothing to prune 2026-02-16T21:21:54.112954728Z I0216 21:21:54.112897 1 base_controller.go:82] Caches are synced for GarbageCollectorWatcherController 2026-02-16T21:21:54.112954728Z I0216 21:21:54.112933 1 base_controller.go:119] Starting #1 worker of GarbageCollectorWatcherController controller ... 2026-02-16T21:21:54.112969990Z I0216 21:21:54.112947 1 base_controller.go:82] Caches are synced for LoggingSyncer 2026-02-16T21:21:54.112978100Z I0216 21:21:54.112971 1 base_controller.go:119] Starting #1 worker of LoggingSyncer controller ... 2026-02-16T21:21:54.113069592Z I0216 21:21:54.113035 1 base_controller.go:82] Caches are synced for ConfigObserver 2026-02-16T21:21:54.113069592Z I0216 21:21:54.113052 1 base_controller.go:119] Starting #1 worker of ConfigObserver controller ... 2026-02-16T21:21:54.122119337Z I0216 21:21:54.122073 1 base_controller.go:82] Caches are synced for CertRotationController 2026-02-16T21:21:54.122119337Z I0216 21:21:54.122091 1 base_controller.go:119] Starting #1 worker of CertRotationController controller ... 2026-02-16T21:21:54.122162528Z I0216 21:21:54.122125 1 base_controller.go:82] Caches are synced for WorkerLatencyProfile 2026-02-16T21:21:54.122162528Z I0216 21:21:54.122138 1 base_controller.go:119] Starting #1 worker of WorkerLatencyProfile controller ... 2026-02-16T21:21:54.122794476Z I0216 21:21:54.122746 1 base_controller.go:82] Caches are synced for StatusSyncer_kube-controller-manager 2026-02-16T21:21:54.122794476Z I0216 21:21:54.122766 1 base_controller.go:119] Starting #1 worker of StatusSyncer_kube-controller-manager controller ... 2026-02-16T21:21:54.210445299Z I0216 21:21:54.210328 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T21:21:54.407387324Z I0216 21:21:54.407305 1 reflector.go:368] Caches populated for *v1.ServiceAccount from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T21:21:54.605759076Z I0216 21:21:54.605575 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T21:21:54.807325395Z I0216 21:21:54.807266 1 reflector.go:368] Caches populated for *v1.Secret from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T21:21:54.812005473Z I0216 21:21:54.811938 1 base_controller.go:82] Caches are synced for RevisionController 2026-02-16T21:21:54.812005473Z I0216 21:21:54.811967 1 base_controller.go:119] Starting #1 worker of RevisionController controller ... 2026-02-16T21:21:54.818346814Z I0216 21:21:54.818288 1 base_controller.go:82] Caches are synced for Installer 2026-02-16T21:21:54.818346814Z I0216 21:21:54.818315 1 base_controller.go:119] Starting #1 worker of Installer controller ... 2026-02-16T21:21:55.006364807Z I0216 21:21:55.006286 1 reflector.go:368] Caches populated for *v1.Secret from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T21:21:55.012166724Z I0216 21:21:55.012116 1 base_controller.go:82] Caches are synced for TargetConfigController 2026-02-16T21:21:55.012166724Z I0216 21:21:55.012137 1 base_controller.go:119] Starting #1 worker of TargetConfigController controller ... 2026-02-16T21:21:55.013692446Z I0216 21:21:55.013592 1 base_controller.go:82] Caches are synced for SATokenSignerController 2026-02-16T21:21:55.013692446Z I0216 21:21:55.013637 1 base_controller.go:119] Starting #1 worker of SATokenSignerController controller ... 2026-02-16T21:21:55.204347999Z I0216 21:21:55.204257 1 request.go:700] Waited for 1.192703245s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/kube-system/serviceaccounts?limit=500&resourceVersion=0 2026-02-16T21:21:55.206793276Z I0216 21:21:55.206746 1 reflector.go:368] Caches populated for *v1.ServiceAccount from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T21:21:55.410304448Z I0216 21:21:55.410181 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T21:21:55.417848612Z I0216 21:21:55.417760 1 base_controller.go:82] Caches are synced for KubeControllerManagerStaticResources-StaticResources 2026-02-16T21:21:55.417848612Z I0216 21:21:55.417781 1 base_controller.go:119] Starting #1 worker of KubeControllerManagerStaticResources-StaticResources controller ... 2026-02-16T21:21:55.606495431Z I0216 21:21:55.606348 1 reflector.go:368] Caches populated for *v1.Node from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T21:21:55.609858983Z I0216 21:21:55.609783 1 base_controller.go:82] Caches are synced for kube-controller-manager-Node 2026-02-16T21:21:55.609858983Z I0216 21:21:55.609801 1 base_controller.go:119] Starting #1 worker of kube-controller-manager-Node controller ... 2026-02-16T21:21:55.612228837Z I0216 21:21:55.612154 1 base_controller.go:82] Caches are synced for GuardController 2026-02-16T21:21:55.612228837Z I0216 21:21:55.612189 1 base_controller.go:119] Starting #1 worker of GuardController controller ... 2026-02-16T21:21:55.805605064Z I0216 21:21:55.805535 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T21:21:56.006715951Z I0216 21:21:56.006381 1 reflector.go:368] Caches populated for *v1.Secret from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T21:21:56.204575610Z I0216 21:21:56.204513 1 request.go:700] Waited for 2.192274787s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-infra/secrets?limit=500&resourceVersion=0 2026-02-16T21:21:56.206769260Z I0216 21:21:56.206709 1 reflector.go:368] Caches populated for *v1.Secret from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-02-16T21:21:56.213946754Z I0216 21:21:56.213897 1 base_controller.go:82] Caches are synced for kube-controller-manager 2026-02-16T21:21:56.213946754Z I0216 21:21:56.213913 1 base_controller.go:119] Starting #1 worker of kube-controller-manager controller ... 2026-02-16T21:21:57.006364048Z I0216 21:21:57.006207 1 installer_controller.go:540] "master-0" moving to (v1.NodeStatus) { 2026-02-16T21:21:57.006364048Z NodeName: (string) (len=8) "master-0", 2026-02-16T21:21:57.006364048Z CurrentRevision: (int32) 0, 2026-02-16T21:21:57.006364048Z TargetRevision: (int32) 2, 2026-02-16T21:21:57.006364048Z LastFailedRevision: (int32) 0, 2026-02-16T21:21:57.006364048Z LastFailedTime: (*v1.Time)(), 2026-02-16T21:21:57.006364048Z LastFailedReason: (string) "", 2026-02-16T21:21:57.006364048Z LastFailedCount: (int) 0, 2026-02-16T21:21:57.006364048Z LastFallbackCount: (int) 0, 2026-02-16T21:21:57.006364048Z LastFailedRevisionErrors: ([]string) 2026-02-16T21:21:57.006364048Z } 2026-02-16T21:21:57.006364048Z because new revision pending 2026-02-16T21:21:57.007595051Z W0216 21:21:57.007524 1 dynamic_operator_client.go:352] .status.conditions["InstallerControllerDegraded"].reason is missing; this will eventually be fatal 2026-02-16T21:21:57.007595051Z W0216 21:21:57.007545 1 dynamic_operator_client.go:355] .status.conditions["InstallerControllerDegraded"].message is missing; this will eventually be fatal 2026-02-16T21:21:57.007595051Z W0216 21:21:57.007550 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerDegraded"].reason is missing; this will eventually be fatal 2026-02-16T21:21:57.007595051Z W0216 21:21:57.007553 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2026-02-16T21:21:57.007595051Z W0216 21:21:57.007557 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-02-16T21:21:57.027107360Z I0216 21:21:57.027035 1 status_controller.go:225] clusteroperator/kube-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-16T20:57:12Z","message":"NodeControllerDegraded: All master nodes are ready","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-16T20:57:48Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-16T20:57:12Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-16T20:57:12Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-16T20:57:12Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-02-16T21:21:57.028696953Z I0216 21:21:57.028594 1 prune_controller.go:277] Nothing to prune 2026-02-16T21:21:57.039005652Z I0216 21:21:57.038867 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"81345e63-af6b-4cc0-b3d1-2d1dfa7a321b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-controller-manager changed: Progressing message changed from "NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1" to "NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2",Available message changed from "StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1" to "StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2" 2026-02-16T21:21:57.404300126Z I0216 21:21:57.404213 1 request.go:700] Waited for 2.380715942s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/configmaps/config kube-controller-manager-operator_previous.log0000640000000000000000000003523715144705173044475 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-78ff47c7c5-7p9ft2026-02-16T21:06:20.029544888Z I0216 21:06:20.029346 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-16T21:06:20.029715392Z I0216 21:06:20.029534 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-16T21:06:20.030239367Z I0216 21:06:20.030187 1 observer_polling.go:159] Starting file observer 2026-02-16T21:06:20.058397005Z I0216 21:06:20.058312 1 builder.go:304] kube-controller-manager-operator version 4.18.0-202601161039.p2.g9a9a437.assembly.stream.el9-9a9a437-9a9a437f2342dc9bba7844298b955d5f9bbc76bb 2026-02-16T21:06:20.269748193Z I0216 21:06:20.269639 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-16T21:06:20.269748193Z W0216 21:06:20.269682 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-16T21:06:20.269748193Z W0216 21:06:20.269688 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-16T21:06:20.269748193Z W0216 21:06:20.269694 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-16T21:06:20.269748193Z W0216 21:06:20.269698 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-16T21:06:20.269748193Z W0216 21:06:20.269702 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-16T21:06:20.269748193Z W0216 21:06:20.269705 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-16T21:06:20.284847820Z I0216 21:06:20.284781 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-16T21:06:20.285142288Z I0216 21:06:20.285034 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-controller-manager-operator/kube-controller-manager-operator-lock... 2026-02-16T21:06:20.286124055Z I0216 21:06:20.286072 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-16T21:06:20.286195287Z I0216 21:06:20.286166 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-16T21:06:20.286195287Z I0216 21:06:20.286187 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-16T21:06:20.286285830Z I0216 21:06:20.286241 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-16T21:06:20.286455344Z I0216 21:06:20.286366 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-16T21:06:20.286455344Z I0216 21:06:20.286425 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-16T21:06:20.286455344Z I0216 21:06:20.286436 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T21:06:20.286743073Z I0216 21:06:20.286407 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-16T21:06:20.286760953Z I0216 21:06:20.286744 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T21:06:20.386912399Z I0216 21:06:20.386836 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T21:06:20.386912399Z I0216 21:06:20.386900 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-16T21:06:20.387042023Z I0216 21:06:20.387009 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T21:12:25.069692630Z E0216 21:12:25.069505 1 leaderelection.go:436] error retrieving resource lock openshift-kube-controller-manager-operator/kube-controller-manager-operator-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io kube-controller-manager-operator-lock) 2026-02-16T21:14:20.973307220Z I0216 21:14:20.973237 1 leaderelection.go:268] successfully acquired lease openshift-kube-controller-manager-operator/kube-controller-manager-operator-lock 2026-02-16T21:14:20.974148782Z I0216 21:14:20.974084 1 event.go:377] Event(v1.ObjectReference{Kind:"Lease", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator-lock", UID:"5f657d35-673b-4ba9-a4ff-a84f55258cef", APIVersion:"coordination.k8s.io/v1", ResourceVersion:"11707", FieldPath:""}): type: 'Normal' reason: 'LeaderElection' kube-controller-manager-operator-78ff47c7c5-7p9ft_40d5a0c2-1c1d-48bd-97c5-f680da986355 became leader 2026-02-16T21:14:20.974547083Z I0216 21:14:20.974507 1 simple_featuregate_reader.go:171] Starting feature-gate-detector 2026-02-16T21:14:20.981715408Z I0216 21:14:20.978306 1 starter.go:98] FeatureGates initialized: knownFeatureGates=[AWSEFSDriverVolumeMetrics AdminNetworkPolicy AlibabaPlatform AzureWorkloadIdentity BareMetalLoadBalancer BuildCSIVolumes ChunkSizeMiB CloudDualStackNodeIPs DisableKubeletCloudCredentialProviders GCPLabelsTags HardwareSpeed IngressControllerLBSubnetsAWS KMSv1 ManagedBootImages ManagedBootImagesAWS MultiArchInstallAWS MultiArchInstallGCP NetworkDiagnosticsConfig NetworkLiveMigration NetworkSegmentation NewOLM NodeDisruptionPolicy OnClusterBuild PersistentIPsForVirtualization PrivateHostedZoneAWS SetEIPForNLBIngressController StreamingCollectionEncodingToJSON StreamingCollectionEncodingToProtobuf VSphereControlPlaneMachineSet VSphereDriverConfiguration VSphereMultiVCenters VSphereStaticIPs ValidatingAdmissionPolicy AWSClusterHostedDNS AdditionalRoutingCapabilities AutomatedEtcdBackup BootcNodeManagement CSIDriverSharedResource ClusterAPIInstall ClusterAPIInstallIBMCloud ClusterMonitoringConfig ConsolePluginContentSecurityPolicy DNSNameResolver DynamicResourceAllocation EtcdBackendQuota EventedPLEG Example ExternalOIDC ExternalOIDCWithUIDAndExtraClaimMappings GCPClusterHostedDNS GatewayAPI ImageStreamImportMode IngressControllerDynamicConfigurationManager InsightsConfig InsightsConfigAPI InsightsOnDemandDataGather InsightsRuntimeExtractor MachineAPIMigration MachineAPIOperatorDisableMachineHealthCheckController MachineAPIProviderOpenStack MachineConfigNodes MaxUnavailableStatefulSet MetricsCollectionProfiles MinimumKubeletVersion MixedCPUsAllocation MultiArchInstallAzure NodeSwap NutanixMultiSubnets OVNObservability OpenShiftPodSecurityAdmission PinnedImages PlatformOperators ProcMountType RouteAdvertisements RouteExternalCertificate ServiceAccountTokenNodeBinding SignatureStores SigstoreImageVerification TranslateStreamCloseWebsocketRequests UpgradeStatus UserNamespacesPodSecurityStandards UserNamespacesSupport VSphereMultiNetworks VolumeAttributesClass VolumeGroupSnapshot] 2026-02-16T21:14:20.981715408Z I0216 21:14:20.978888 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"81345e63-af6b-4cc0-b3d1-2d1dfa7a321b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'FeatureGatesInitialized' FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{"AWSEFSDriverVolumeMetrics", "AdminNetworkPolicy", "AlibabaPlatform", "AzureWorkloadIdentity", "BareMetalLoadBalancer", "BuildCSIVolumes", "ChunkSizeMiB", "CloudDualStackNodeIPs", "DisableKubeletCloudCredentialProviders", "GCPLabelsTags", "HardwareSpeed", "IngressControllerLBSubnetsAWS", "KMSv1", "ManagedBootImages", "ManagedBootImagesAWS", "MultiArchInstallAWS", "MultiArchInstallGCP", "NetworkDiagnosticsConfig", "NetworkLiveMigration", "NetworkSegmentation", "NewOLM", "NodeDisruptionPolicy", "OnClusterBuild", "PersistentIPsForVirtualization", "PrivateHostedZoneAWS", "SetEIPForNLBIngressController", "StreamingCollectionEncodingToJSON", "StreamingCollectionEncodingToProtobuf", "VSphereControlPlaneMachineSet", "VSphereDriverConfiguration", "VSphereMultiVCenters", "VSphereStaticIPs", "ValidatingAdmissionPolicy"}, Disabled:[]v1.FeatureGateName{"AWSClusterHostedDNS", "AdditionalRoutingCapabilities", "AutomatedEtcdBackup", "BootcNodeManagement", "CSIDriverSharedResource", "ClusterAPIInstall", "ClusterAPIInstallIBMCloud", "ClusterMonitoringConfig", "ConsolePluginContentSecurityPolicy", "DNSNameResolver", "DynamicResourceAllocation", "EtcdBackendQuota", "EventedPLEG", "Example", "ExternalOIDC", "ExternalOIDCWithUIDAndExtraClaimMappings", "GCPClusterHostedDNS", "GatewayAPI", "ImageStreamImportMode", "IngressControllerDynamicConfigurationManager", "InsightsConfig", "InsightsConfigAPI", "InsightsOnDemandDataGather", "InsightsRuntimeExtractor", "MachineAPIMigration", "MachineAPIOperatorDisableMachineHealthCheckController", "MachineAPIProviderOpenStack", "MachineConfigNodes", "MaxUnavailableStatefulSet", "MetricsCollectionProfiles", "MinimumKubeletVersion", "MixedCPUsAllocation", "MultiArchInstallAzure", "NodeSwap", "NutanixMultiSubnets", "OVNObservability", "OpenShiftPodSecurityAdmission", "PinnedImages", "PlatformOperators", "ProcMountType", "RouteAdvertisements", "RouteExternalCertificate", "ServiceAccountTokenNodeBinding", "SignatureStores", "SigstoreImageVerification", "TranslateStreamCloseWebsocketRequests", "UpgradeStatus", "UserNamespacesPodSecurityStandards", "UserNamespacesSupport", "VSphereMultiNetworks", "VolumeAttributesClass", "VolumeGroupSnapshot"}} 2026-02-16T21:14:54.977490445Z E0216 21:14:54.977416 1 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{kube-controller-manager-operator-lock.1894d68e7f51ce92 openshift-kube-controller-manager-operator 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Lease,Namespace:openshift-kube-controller-manager-operator,Name:kube-controller-manager-operator-lock,UID:5f657d35-673b-4ba9-a4ff-a84f55258cef,APIVersion:coordination.k8s.io/v1,ResourceVersion:11707,FieldPath:,},Reason:LeaderElection,Message:kube-controller-manager-operator-78ff47c7c5-7p9ft_40d5a0c2-1c1d-48bd-97c5-f680da986355 became leader,Source:EventSource{Component:kube-controller-manager-operator,Host:,},FirstTimestamp:2026-02-16 21:14:20.973215378 +0000 UTC m=+481.009086278,LastTimestamp:2026-02-16 21:14:20.973215378 +0000 UTC m=+481.009086278,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kube-controller-manager-operator,ReportingInstance:,}" 2026-02-16T21:14:54.982210733Z E0216 21:14:54.982162 1 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{kube-controller-manager-operator.1894d68e7f9bde75 openshift-kube-controller-manager-operator 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Deployment,Namespace:openshift-kube-controller-manager-operator,Name:kube-controller-manager-operator,UID:81345e63-af6b-4cc0-b3d1-2d1dfa7a321b,APIVersion:apps/v1,ResourceVersion:,FieldPath:,},Reason:FeatureGatesInitialized,Message:FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}},Source:EventSource{Component:kube-controller-manager-operator,Host:,},FirstTimestamp:2026-02-16 21:14:20.978069109 +0000 UTC m=+481.013940039,LastTimestamp:2026-02-16 21:14:20.978069109 +0000 UTC m=+481.013940039,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kube-controller-manager-operator,ReportingInstance:,}" 2026-02-16T21:15:20.994340349Z W0216 21:15:20.994254 1 builder.go:136] graceful termination failed, controllers failed with error: the server was unable to return a response in the time allotted, but may still be processing the request (get clusteroperators.config.openshift.io kube-controller-manager) kube-controller-manager-operator-78ff47c7c5-7p9ft.json0000640000000000000000000002103715144705173033406 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator{"metadata":{"name":"kube-controller-manager-operator-78ff47c7c5-7p9ft","generateName":"kube-controller-manager-operator-78ff47c7c5-","namespace":"openshift-kube-controller-manager-operator","uid":"7f2c3cda-f67e-4a6f-84ec-f702d2fdb29e","resourceVersion":"12183","creationTimestamp":"2026-02-16T20:55:38Z","labels":{"app":"kube-controller-manager-operator","pod-template-hash":"78ff47c7c5"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.13/23\"],\"mac_address\":\"0a:58:0a:80:00:0d\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.13/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.13\"\n ],\n \"mac\": \"0a:58:0a:80:00:0d\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-controller-manager-operator-78ff47c7c5","uid":"f8ff4893-3422-4452-8c5e-ec71420d9c68","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","command":["cluster-kube-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39"},{"name":"CLUSTER_POLICY_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5d54bd262ca625a326b01ea2bfd33db10a402c05590e6b710b0959712e1bf30b"},{"name":"TOOLS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ffa02bd6af0b44d4955aba57f727e13671f503393926be6d8965e31dcfcd6e3c"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-controller-manager-operator","serviceAccount":"kube-controller-manager-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:09Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:56:57Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:16:29Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:16:29Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:56:57Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.13","podIPs":[{"ip":"10.128.0.13"}],"startTime":"2026-02-16T20:56:57Z","containerStatuses":[{"name":"kube-controller-manager-operator","state":{"running":{"startedAt":"2026-02-16T21:16:29Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"ities\\\", \\\"AutomatedEtcdBackup\\\", \\\"BootcNodeManagement\\\", \\\"CSIDriverSharedResource\\\", \\\"ClusterAPIInstall\\\", \\\"ClusterAPIInstallIBMCloud\\\", \\\"ClusterMonitoringConfig\\\", \\\"ConsolePluginContentSecurityPolicy\\\", \\\"DNSNameResolver\\\", \\\"DynamicResourceAllocation\\\", \\\"EtcdBackendQuota\\\", \\\"EventedPLEG\\\", \\\"Example\\\", \\\"ExternalOIDC\\\", \\\"ExternalOIDCWithUIDAndExtraClaimMappings\\\", \\\"GCPClusterHostedDNS\\\", \\\"GatewayAPI\\\", \\\"ImageStreamImportMode\\\", \\\"IngressControllerDynamicConfigurationManager\\\", \\\"InsightsConfig\\\", \\\"InsightsConfigAPI\\\", \\\"InsightsOnDemandDataGather\\\", \\\"InsightsRuntimeExtractor\\\", \\\"MachineAPIMigration\\\", \\\"MachineAPIOperatorDisableMachineHealthCheckController\\\", \\\"MachineAPIProviderOpenStack\\\", \\\"MachineConfigNodes\\\", \\\"MaxUnavailableStatefulSet\\\", \\\"MetricsCollectionProfiles\\\", \\\"MinimumKubeletVersion\\\", \\\"MixedCPUsAllocation\\\", \\\"MultiArchInstallAzure\\\", \\\"NodeSwap\\\", \\\"NutanixMultiSubnets\\\", \\\"OVNObservability\\\", \\\"OpenShiftPodSecurityAdmission\\\", \\\"PinnedImages\\\", \\\"PlatformOperators\\\", \\\"ProcMountType\\\", \\\"RouteAdvertisements\\\", \\\"RouteExternalCertificate\\\", \\\"ServiceAccountTokenNodeBinding\\\", \\\"SignatureStores\\\", \\\"SigstoreImageVerification\\\", \\\"TranslateStreamCloseWebsocketRequests\\\", \\\"UpgradeStatus\\\", \\\"UserNamespacesPodSecurityStandards\\\", \\\"UserNamespacesSupport\\\", \\\"VSphereMultiNetworks\\\", \\\"VolumeAttributesClass\\\", \\\"VolumeGroupSnapshot\\\"}},Source:EventSource{Component:kube-controller-manager-operator,Host:,},FirstTimestamp:2026-02-16 21:14:20.978069109 +0000 UTC m=+481.013940039,LastTimestamp:2026-02-16 21:14:20.978069109 +0000 UTC m=+481.013940039,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kube-controller-manager-operator,ReportingInstance:,}\"\nW0216 21:15:20.994254 1 builder.go:136] graceful termination failed, controllers failed with error: the server was unable to return a response in the time allotted, but may still be processing the request (get clusteroperators.config.openshift.io kube-controller-manager)\n","startedAt":"2026-02-16T21:06:19Z","finishedAt":"2026-02-16T21:15:21Z","containerID":"cri-o://4b9eed56cd9de27df8732f0bf589198f3bec398bab1ee5d8d5d4047198bdc2b3"}},"ready":true,"restartCount":6,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","containerID":"cri-o://f967af0fcd187eeafd04691b96ae014e22fb86716fe0ba66d9ce5f55dd5c8b91","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-controller-manager/logs/installer-1-master-0/installer_current.log0000640000000000000000000001443515144705173031010 0ustar00000000000000002026-02-16T20:57:53.089800146Z I0216 20:57:53.007099 1 cmd.go:95] &{ true {false} installer true map[cert-configmaps:0xc000870f00 cert-dir:0xc0008710e0 cert-secrets:0xc000870e60 configmaps:0xc000870a00 namespace:0xc000870820 optional-cert-configmaps:0xc000871040 optional-configmaps:0xc000870b40 optional-secrets:0xc000870aa0 pod:0xc0008708c0 pod-manifest-dir:0xc000870c80 resource-dir:0xc000870be0 revision:0xc000870780 secrets:0xc000870960 v:0xc000871ae0] [0xc000871ae0 0xc000870780 0xc000870820 0xc0008708c0 0xc000870be0 0xc000870c80 0xc000870a00 0xc000870b40 0xc000870960 0xc000870aa0 0xc0008710e0 0xc000870f00 0xc000871040 0xc000870e60] [] map[cert-configmaps:0xc000870f00 cert-dir:0xc0008710e0 cert-secrets:0xc000870e60 configmaps:0xc000870a00 help:0xc000871ea0 kubeconfig:0xc0008706e0 log-flush-frequency:0xc000871a40 namespace:0xc000870820 optional-cert-configmaps:0xc000871040 optional-cert-secrets:0xc000870fa0 optional-configmaps:0xc000870b40 optional-secrets:0xc000870aa0 pod:0xc0008708c0 pod-manifest-dir:0xc000870c80 pod-manifests-lock-file:0xc000870dc0 resource-dir:0xc000870be0 revision:0xc000870780 secrets:0xc000870960 timeout-duration:0xc000870d20 v:0xc000871ae0 vmodule:0xc000871b80] [0xc0008706e0 0xc000870780 0xc000870820 0xc0008708c0 0xc000870960 0xc000870a00 0xc000870aa0 0xc000870b40 0xc000870be0 0xc000870c80 0xc000870d20 0xc000870dc0 0xc000870e60 0xc000870f00 0xc000870fa0 0xc000871040 0xc0008710e0 0xc000871a40 0xc000871ae0 0xc000871b80 0xc000871ea0] [0xc000870f00 0xc0008710e0 0xc000870e60 0xc000870a00 0xc000871ea0 0xc0008706e0 0xc000871a40 0xc000870820 0xc000871040 0xc000870fa0 0xc000870b40 0xc000870aa0 0xc0008708c0 0xc000870c80 0xc000870dc0 0xc000870be0 0xc000870780 0xc000870960 0xc000870d20 0xc000871ae0 0xc000871b80] map[104:0xc000871ea0 118:0xc000871ae0] [] -1 0 0xc00086e150 true 0x77b500 []} 2026-02-16T20:57:53.089800146Z I0216 20:57:53.007467 1 cmd.go:96] (*installerpod.InstallOptions)(0xc000c0bba0)({ 2026-02-16T20:57:53.089800146Z KubeConfig: (string) "", 2026-02-16T20:57:53.089800146Z KubeClient: (kubernetes.Interface) , 2026-02-16T20:57:53.089800146Z Revision: (string) (len=1) "1", 2026-02-16T20:57:53.089800146Z NodeName: (string) "", 2026-02-16T20:57:53.089800146Z Namespace: (string) (len=33) "openshift-kube-controller-manager", 2026-02-16T20:57:53.089800146Z Clock: (clock.RealClock) { 2026-02-16T20:57:53.089800146Z }, 2026-02-16T20:57:53.089800146Z PodConfigMapNamePrefix: (string) (len=27) "kube-controller-manager-pod", 2026-02-16T20:57:53.089800146Z SecretNamePrefixes: ([]string) (len=2 cap=2) { 2026-02-16T20:57:53.089800146Z (string) (len=27) "service-account-private-key", 2026-02-16T20:57:53.089800146Z (string) (len=31) "localhost-recovery-client-token" 2026-02-16T20:57:53.089800146Z }, 2026-02-16T20:57:53.089800146Z OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-16T20:57:53.089800146Z (string) (len=12) "serving-cert" 2026-02-16T20:57:53.089800146Z }, 2026-02-16T20:57:53.089800146Z ConfigMapNamePrefixes: ([]string) (len=8 cap=8) { 2026-02-16T20:57:53.089800146Z (string) (len=27) "kube-controller-manager-pod", 2026-02-16T20:57:53.089800146Z (string) (len=6) "config", 2026-02-16T20:57:53.089800146Z (string) (len=32) "cluster-policy-controller-config", 2026-02-16T20:57:53.089800146Z (string) (len=29) "controller-manager-kubeconfig", 2026-02-16T20:57:53.089800146Z (string) (len=38) "kube-controller-cert-syncer-kubeconfig", 2026-02-16T20:57:53.089800146Z (string) (len=17) "serviceaccount-ca", 2026-02-16T20:57:53.089800146Z (string) (len=10) "service-ca", 2026-02-16T20:57:53.089800146Z (string) (len=15) "recycler-config" 2026-02-16T20:57:53.089800146Z }, 2026-02-16T20:57:53.089800146Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-16T20:57:53.089800146Z (string) (len=12) "cloud-config" 2026-02-16T20:57:53.089800146Z }, 2026-02-16T20:57:53.089800146Z CertSecretNames: ([]string) (len=2 cap=2) { 2026-02-16T20:57:53.089800146Z (string) (len=39) "kube-controller-manager-client-cert-key", 2026-02-16T20:57:53.089800146Z (string) (len=10) "csr-signer" 2026-02-16T20:57:53.089800146Z }, 2026-02-16T20:57:53.089800146Z OptionalCertSecretNamePrefixes: ([]string) , 2026-02-16T20:57:53.089800146Z CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) { 2026-02-16T20:57:53.089800146Z (string) (len=20) "aggregator-client-ca", 2026-02-16T20:57:53.089800146Z (string) (len=9) "client-ca" 2026-02-16T20:57:53.089800146Z }, 2026-02-16T20:57:53.089800146Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-16T20:57:53.089800146Z (string) (len=17) "trusted-ca-bundle" 2026-02-16T20:57:53.089800146Z }, 2026-02-16T20:57:53.089800146Z CertDir: (string) (len=66) "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs", 2026-02-16T20:57:53.089800146Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-02-16T20:57:53.089800146Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-02-16T20:57:53.089800146Z Timeout: (time.Duration) 2m0s, 2026-02-16T20:57:53.089800146Z StaticPodManifestsLockFile: (string) "", 2026-02-16T20:57:53.089800146Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-02-16T20:57:53.089800146Z KubeletVersion: (string) "" 2026-02-16T20:57:53.089800146Z }) 2026-02-16T20:57:53.090956899Z I0216 20:57:53.090908 1 cmd.go:413] Getting controller reference for node master-0 2026-02-16T20:57:53.102481548Z I0216 20:57:53.102402 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-02-16T20:57:53.102512949Z I0216 20:57:53.102474 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-16T20:57:53.102512949Z I0216 20:57:53.102484 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-16T20:57:53.106295028Z I0216 20:57:53.106220 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-02-16T20:58:23.106996389Z I0216 20:58:23.106894 1 cmd.go:524] Getting installer pods for node master-0 2026-02-16T20:58:37.111394778Z F0216 20:58:37.111288 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-kube-controller-manager/installer-1-master-0.json0000640000000000000000000001716115144705173024474 0ustar0000000000000000{"metadata":{"name":"installer-1-master-0","namespace":"openshift-kube-controller-manager","uid":"b09d3c16-18e3-45b3-9d39-949d2464b300","resourceVersion":"9235","creationTimestamp":"2026-02-16T20:57:51Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.46/23\"],\"mac_address\":\"0a:58:0a:80:00:2e\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.46/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.46\"\n ],\n \"mac\": \"0a:58:0a:80:00:2e\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-1","uid":"b71b0fb3-4287-4d69-9fe0-6917771ec728"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","command":["cluster-kube-controller-manager-operator","installer"],"args":["-v=2","--revision=1","--namespace=openshift-kube-controller-manager","--pod=kube-controller-manager-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-controller-manager-pod","--configmaps=config","--configmaps=cluster-policy-controller-config","--configmaps=controller-manager-kubeconfig","--optional-configmaps=cloud-config","--configmaps=kube-controller-cert-syncer-kubeconfig","--configmaps=serviceaccount-ca","--configmaps=service-ca","--configmaps=recycler-config","--secrets=service-account-private-key","--optional-secrets=serving-cert","--secrets=localhost-recovery-client-token","--cert-dir=/etc/kubernetes/static-pod-resources/kube-controller-manager-certs","--cert-configmaps=aggregator-client-ca","--cert-configmaps=client-ca","--optional-cert-configmaps=trusted-ca-bundle","--cert-secrets=kube-controller-manager-client-cert-key","--cert-secrets=csr-signer"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:59:45Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:51Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:59:44Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:59:44Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:51Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.46","podIPs":[{"ip":"10.128.0.46"}],"startTime":"2026-02-16T20:57:51Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"icy-controller-config\",\n (string) (len=29) \"controller-manager-kubeconfig\",\n (string) (len=38) \"kube-controller-cert-syncer-kubeconfig\",\n (string) (len=17) \"serviceaccount-ca\",\n (string) (len=10) \"service-ca\",\n (string) (len=15) \"recycler-config\"\n },\n OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=12) \"cloud-config\"\n },\n CertSecretNames: ([]string) (len=2 cap=2) {\n (string) (len=39) \"kube-controller-manager-client-cert-key\",\n (string) (len=10) \"csr-signer\"\n },\n OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\n CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=66) \"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0216 20:57:53.090908 1 cmd.go:413] Getting controller reference for node master-0\nI0216 20:57:53.102402 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0216 20:57:53.102474 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0216 20:57:53.102484 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0216 20:57:53.106220 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0216 20:58:23.106894 1 cmd.go:524] Getting installer pods for node master-0\nF0216 20:58:37.111288 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","startedAt":"2026-02-16T20:57:52Z","finishedAt":"2026-02-16T20:58:37Z","containerID":"cri-o://ab3f1bdaa87534b4aa1ea4a058dea3457c695cfe1da23ed41ae2ee089315bd08"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39","containerID":"cri-o://ab3f1bdaa87534b4aa1ea4a058dea3457c695cfe1da23ed41ae2ee089315bd08","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}config/pod/openshift-kube-apiserver/logs/installer-1-master-0/installer_current.log0000640000000000000000000002041715144705173027212 0ustar00000000000000002026-02-16T20:58:01.706994728Z I0216 20:58:01.706626 1 cmd.go:95] &{ true {false} installer true map[cert-configmaps:0xc00004eb40 cert-dir:0xc00004ed20 cert-secrets:0xc00004eaa0 configmaps:0xc00004e640 namespace:0xc00004e460 optional-cert-configmaps:0xc00004ec80 optional-cert-secrets:0xc00004ebe0 optional-configmaps:0xc00004e780 optional-secrets:0xc00004e6e0 pod:0xc00004e500 pod-manifest-dir:0xc00004e8c0 resource-dir:0xc00004e820 revision:0xc00004e3c0 secrets:0xc00004e5a0 v:0xc0009481e0] [0xc0009481e0 0xc00004e3c0 0xc00004e460 0xc00004e500 0xc00004e820 0xc00004e8c0 0xc00004e640 0xc00004e780 0xc00004e5a0 0xc00004e6e0 0xc00004ed20 0xc00004eb40 0xc00004ec80 0xc00004eaa0 0xc00004ebe0] [] map[cert-configmaps:0xc00004eb40 cert-dir:0xc00004ed20 cert-secrets:0xc00004eaa0 configmaps:0xc00004e640 help:0xc0009485a0 kubeconfig:0xc00004e320 log-flush-frequency:0xc000948140 namespace:0xc00004e460 optional-cert-configmaps:0xc00004ec80 optional-cert-secrets:0xc00004ebe0 optional-configmaps:0xc00004e780 optional-secrets:0xc00004e6e0 pod:0xc00004e500 pod-manifest-dir:0xc00004e8c0 pod-manifests-lock-file:0xc00004ea00 resource-dir:0xc00004e820 revision:0xc00004e3c0 secrets:0xc00004e5a0 timeout-duration:0xc00004e960 v:0xc0009481e0 vmodule:0xc000948280] [0xc00004e320 0xc00004e3c0 0xc00004e460 0xc00004e500 0xc00004e5a0 0xc00004e640 0xc00004e6e0 0xc00004e780 0xc00004e820 0xc00004e8c0 0xc00004e960 0xc00004ea00 0xc00004eaa0 0xc00004eb40 0xc00004ebe0 0xc00004ec80 0xc00004ed20 0xc000948140 0xc0009481e0 0xc000948280 0xc0009485a0] [0xc00004eb40 0xc00004ed20 0xc00004eaa0 0xc00004e640 0xc0009485a0 0xc00004e320 0xc000948140 0xc00004e460 0xc00004ec80 0xc00004ebe0 0xc00004e780 0xc00004e6e0 0xc00004e500 0xc00004e8c0 0xc00004ea00 0xc00004e820 0xc00004e3c0 0xc00004e5a0 0xc00004e960 0xc0009481e0 0xc000948280] map[104:0xc0009485a0 118:0xc0009481e0] [] -1 0 0xc000bf90b0 true 0xae1c20 []} 2026-02-16T20:58:01.707153972Z I0216 20:58:01.707050 1 cmd.go:96] (*installerpod.InstallOptions)(0xc0008a9860)({ 2026-02-16T20:58:01.707153972Z KubeConfig: (string) "", 2026-02-16T20:58:01.707153972Z KubeClient: (kubernetes.Interface) , 2026-02-16T20:58:01.707153972Z Revision: (string) (len=1) "1", 2026-02-16T20:58:01.707153972Z NodeName: (string) "", 2026-02-16T20:58:01.707153972Z Namespace: (string) (len=24) "openshift-kube-apiserver", 2026-02-16T20:58:01.707153972Z Clock: (clock.RealClock) { 2026-02-16T20:58:01.707153972Z }, 2026-02-16T20:58:01.707153972Z PodConfigMapNamePrefix: (string) (len=18) "kube-apiserver-pod", 2026-02-16T20:58:01.707153972Z SecretNamePrefixes: ([]string) (len=3 cap=4) { 2026-02-16T20:58:01.707153972Z (string) (len=11) "etcd-client", 2026-02-16T20:58:01.707153972Z (string) (len=34) "localhost-recovery-serving-certkey", 2026-02-16T20:58:01.707153972Z (string) (len=31) "localhost-recovery-client-token" 2026-02-16T20:58:01.707153972Z }, 2026-02-16T20:58:01.707153972Z OptionalSecretNamePrefixes: ([]string) (len=2 cap=2) { 2026-02-16T20:58:01.707153972Z (string) (len=17) "encryption-config", 2026-02-16T20:58:01.707153972Z (string) (len=21) "webhook-authenticator" 2026-02-16T20:58:01.707153972Z }, 2026-02-16T20:58:01.707153972Z ConfigMapNamePrefixes: ([]string) (len=8 cap=8) { 2026-02-16T20:58:01.707153972Z (string) (len=18) "kube-apiserver-pod", 2026-02-16T20:58:01.707153972Z (string) (len=6) "config", 2026-02-16T20:58:01.707153972Z (string) (len=37) "kube-apiserver-cert-syncer-kubeconfig", 2026-02-16T20:58:01.707153972Z (string) (len=28) "bound-sa-token-signing-certs", 2026-02-16T20:58:01.707153972Z (string) (len=15) "etcd-serving-ca", 2026-02-16T20:58:01.707153972Z (string) (len=18) "kubelet-serving-ca", 2026-02-16T20:58:01.707153972Z (string) (len=22) "sa-token-signing-certs", 2026-02-16T20:58:01.707153972Z (string) (len=29) "kube-apiserver-audit-policies" 2026-02-16T20:58:01.707153972Z }, 2026-02-16T20:58:01.707153972Z OptionalConfigMapNamePrefixes: ([]string) (len=3 cap=4) { 2026-02-16T20:58:01.707153972Z (string) (len=14) "oauth-metadata", 2026-02-16T20:58:01.707153972Z (string) (len=12) "cloud-config", 2026-02-16T20:58:01.707153972Z (string) (len=24) "kube-apiserver-server-ca" 2026-02-16T20:58:01.707153972Z }, 2026-02-16T20:58:01.707153972Z CertSecretNames: ([]string) (len=10 cap=16) { 2026-02-16T20:58:01.707153972Z (string) (len=17) "aggregator-client", 2026-02-16T20:58:01.707153972Z (string) (len=30) "localhost-serving-cert-certkey", 2026-02-16T20:58:01.707153972Z (string) (len=31) "service-network-serving-certkey", 2026-02-16T20:58:01.707153972Z (string) (len=37) "external-loadbalancer-serving-certkey", 2026-02-16T20:58:01.707153972Z (string) (len=37) "internal-loadbalancer-serving-certkey", 2026-02-16T20:58:01.707153972Z (string) (len=33) "bound-service-account-signing-key", 2026-02-16T20:58:01.707153972Z (string) (len=40) "control-plane-node-admin-client-cert-key", 2026-02-16T20:58:01.707153972Z (string) (len=31) "check-endpoints-client-cert-key", 2026-02-16T20:58:01.707153972Z (string) (len=14) "kubelet-client", 2026-02-16T20:58:01.707153972Z (string) (len=16) "node-kubeconfigs" 2026-02-16T20:58:01.707153972Z }, 2026-02-16T20:58:01.707153972Z OptionalCertSecretNamePrefixes: ([]string) (len=11 cap=16) { 2026-02-16T20:58:01.707153972Z (string) (len=17) "user-serving-cert", 2026-02-16T20:58:01.707153972Z (string) (len=21) "user-serving-cert-000", 2026-02-16T20:58:01.707153972Z (string) (len=21) "user-serving-cert-001", 2026-02-16T20:58:01.707153972Z (string) (len=21) "user-serving-cert-002", 2026-02-16T20:58:01.707153972Z (string) (len=21) "user-serving-cert-003", 2026-02-16T20:58:01.707153972Z (string) (len=21) "user-serving-cert-004", 2026-02-16T20:58:01.707153972Z (string) (len=21) "user-serving-cert-005", 2026-02-16T20:58:01.707153972Z (string) (len=21) "user-serving-cert-006", 2026-02-16T20:58:01.707153972Z (string) (len=21) "user-serving-cert-007", 2026-02-16T20:58:01.707153972Z (string) (len=21) "user-serving-cert-008", 2026-02-16T20:58:01.707153972Z (string) (len=21) "user-serving-cert-009" 2026-02-16T20:58:01.707153972Z }, 2026-02-16T20:58:01.707153972Z CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) { 2026-02-16T20:58:01.707153972Z (string) (len=20) "aggregator-client-ca", 2026-02-16T20:58:01.707153972Z (string) (len=9) "client-ca", 2026-02-16T20:58:01.707153972Z (string) (len=29) "control-plane-node-kubeconfig", 2026-02-16T20:58:01.707153972Z (string) (len=26) "check-endpoints-kubeconfig" 2026-02-16T20:58:01.707153972Z }, 2026-02-16T20:58:01.707153972Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-16T20:58:01.707153972Z (string) (len=17) "trusted-ca-bundle" 2026-02-16T20:58:01.707153972Z }, 2026-02-16T20:58:01.707153972Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-apiserver-certs", 2026-02-16T20:58:01.707153972Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-02-16T20:58:01.707153972Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-02-16T20:58:01.707153972Z Timeout: (time.Duration) 2m0s, 2026-02-16T20:58:01.707153972Z StaticPodManifestsLockFile: (string) "", 2026-02-16T20:58:01.707153972Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-02-16T20:58:01.707153972Z KubeletVersion: (string) "" 2026-02-16T20:58:01.707153972Z }) 2026-02-16T20:58:01.711954630Z I0216 20:58:01.711895 1 cmd.go:413] Getting controller reference for node master-0 2026-02-16T20:58:01.765255814Z I0216 20:58:01.765190 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-02-16T20:58:01.790687111Z I0216 20:58:01.765279 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-16T20:58:01.790687111Z I0216 20:58:01.765301 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-16T20:58:01.790687111Z I0216 20:58:01.776932 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-02-16T20:58:31.777152786Z I0216 20:58:31.777093 1 cmd.go:524] Getting installer pods for node master-0 2026-02-16T20:58:45.781385300Z F0216 20:58:45.781242 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-kube-apiserver/installer-1-master-0.json0000640000000000000000000002132115144705173022672 0ustar0000000000000000{"metadata":{"name":"installer-1-master-0","namespace":"openshift-kube-apiserver","uid":"9ecf0a0a-f55d-47f0-9fcd-6a53edf2e965","resourceVersion":"9267","creationTimestamp":"2026-02-16T20:57:57Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.55/23\"],\"mac_address\":\"0a:58:0a:80:00:37\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.55/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.55\"\n ],\n \"mac\": \"0a:58:0a:80:00:37\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-1","uid":"0dd5913c-3f15-4369-a86b-cd56777c627c"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","command":["cluster-kube-apiserver-operator","installer"],"args":["-v=2","--revision=1","--namespace=openshift-kube-apiserver","--pod=kube-apiserver-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-apiserver-pod","--configmaps=config","--configmaps=kube-apiserver-cert-syncer-kubeconfig","--optional-configmaps=oauth-metadata","--optional-configmaps=cloud-config","--configmaps=bound-sa-token-signing-certs","--configmaps=etcd-serving-ca","--optional-configmaps=kube-apiserver-server-ca","--configmaps=kubelet-serving-ca","--configmaps=sa-token-signing-certs","--configmaps=kube-apiserver-audit-policies","--secrets=etcd-client","--optional-secrets=encryption-config","--secrets=localhost-recovery-serving-certkey","--secrets=localhost-recovery-client-token","--optional-secrets=webhook-authenticator","--cert-dir=/etc/kubernetes/static-pod-resources/kube-apiserver-certs","--cert-configmaps=aggregator-client-ca","--cert-configmaps=client-ca","--optional-cert-configmaps=trusted-ca-bundle","--cert-configmaps=control-plane-node-kubeconfig","--cert-configmaps=check-endpoints-kubeconfig","--cert-secrets=aggregator-client","--cert-secrets=localhost-serving-cert-certkey","--cert-secrets=service-network-serving-certkey","--cert-secrets=external-loadbalancer-serving-certkey","--cert-secrets=internal-loadbalancer-serving-certkey","--cert-secrets=bound-service-account-signing-key","--cert-secrets=control-plane-node-admin-client-cert-key","--cert-secrets=check-endpoints-client-cert-key","--cert-secrets=kubelet-client","--cert-secrets=node-kubeconfigs","--optional-cert-secrets=user-serving-cert","--optional-cert-secrets=user-serving-cert-000","--optional-cert-secrets=user-serving-cert-001","--optional-cert-secrets=user-serving-cert-002","--optional-cert-secrets=user-serving-cert-003","--optional-cert-secrets=user-serving-cert-004","--optional-cert-secrets=user-serving-cert-005","--optional-cert-secrets=user-serving-cert-006","--optional-cert-secrets=user-serving-cert-007","--optional-cert-secrets=user-serving-cert-008","--optional-cert-secrets=user-serving-cert-009"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:59:45Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:57Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:59:44Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:59:44Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:57Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.55","podIPs":[{"ip":"10.128.0.55"}],"startTime":"2026-02-16T20:57:57Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"ving-cert\",\n (string) (len=21) \"user-serving-cert-000\",\n (string) (len=21) \"user-serving-cert-001\",\n (string) (len=21) \"user-serving-cert-002\",\n (string) (len=21) \"user-serving-cert-003\",\n (string) (len=21) \"user-serving-cert-004\",\n (string) (len=21) \"user-serving-cert-005\",\n (string) (len=21) \"user-serving-cert-006\",\n (string) (len=21) \"user-serving-cert-007\",\n (string) (len=21) \"user-serving-cert-008\",\n (string) (len=21) \"user-serving-cert-009\"\n },\n CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\",\n (string) (len=29) \"control-plane-node-kubeconfig\",\n (string) (len=26) \"check-endpoints-kubeconfig\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0216 20:58:01.711895 1 cmd.go:413] Getting controller reference for node master-0\nI0216 20:58:01.765190 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0216 20:58:01.765279 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0216 20:58:01.765301 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0216 20:58:01.776932 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0216 20:58:31.777093 1 cmd.go:524] Getting installer pods for node master-0\nF0216 20:58:45.781242 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","startedAt":"2026-02-16T20:58:01Z","finishedAt":"2026-02-16T20:58:45Z","containerID":"cri-o://5f4f1f7bf4711de84107b1c6040a91b2b71847aa5f151a70149a5a43fdbb16fc"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","containerID":"cri-o://5f4f1f7bf4711de84107b1c6040a91b2b71847aa5f151a70149a5a43fdbb16fc","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}kube-apiserver-insecure-readyz_current.log0000640000000000000000000000014615144705173035772 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-02-16T20:55:18.032044419Z I0216 20:55:18.031785 1 readyz.go:111] Listening on 0.0.0.0:6080 kube-apiserver_current.log0000640000000000000000000010660615144705173032673 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-02-16T21:21:50.948636873Z I0216 21:21:50.948551 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:51.084286236Z I0216 21:21:51.084177 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:51.143733987Z I0216 21:21:51.143566 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:51.147960171Z I0216 21:21:51.147861 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:51.283563824Z I0216 21:21:51.283509 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:51.343324472Z I0216 21:21:51.343242 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:51.348334999Z I0216 21:21:51.348267 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:51.484396034Z I0216 21:21:51.484302 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:51.543771152Z I0216 21:21:51.543632 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:51.548947512Z I0216 21:21:51.548889 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:51.683723383Z I0216 21:21:51.683578 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:51.743129782Z I0216 21:21:51.743033 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:51.748730273Z I0216 21:21:51.748628 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:51.884614064Z I0216 21:21:51.884480 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:51.942532722Z I0216 21:21:51.942447 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:51.948360781Z I0216 21:21:51.948296 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:52.083966513Z I0216 21:21:52.083871 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:52.142980812Z I0216 21:21:52.142858 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:52.148124361Z I0216 21:21:52.148053 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:52.286252802Z I0216 21:21:52.285577 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:52.343466542Z I0216 21:21:52.343335 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:52.348508428Z I0216 21:21:52.348431 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:52.485908639Z I0216 21:21:52.484483 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:52.543094458Z I0216 21:21:52.542978 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:52.548203867Z I0216 21:21:52.548123 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:52.683335597Z I0216 21:21:52.683263 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:52.743027004Z I0216 21:21:52.742953 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:52.748221795Z I0216 21:21:52.748104 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:52.884080954Z I0216 21:21:52.883983 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:52.943282728Z I0216 21:21:52.943169 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:52.948628493Z I0216 21:21:52.948537 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:53.085015976Z I0216 21:21:53.084934 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:53.143420239Z I0216 21:21:53.143323 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:53.147669654Z I0216 21:21:53.147568 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:53.284311325Z I0216 21:21:53.284257 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:53.343180029Z I0216 21:21:53.343116 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:53.348525664Z I0216 21:21:53.348435 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:53.484061945Z I0216 21:21:53.483952 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:53.542381685Z I0216 21:21:53.542308 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:53.549106507Z I0216 21:21:53.549029 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:53.683917388Z I0216 21:21:53.683809 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:53.713240682Z W0216 21:21:53.713109 1 watcher.go:338] watch chan error: etcdserver: mvcc: required revision has been compacted 2026-02-16T21:21:53.744174810Z I0216 21:21:53.743349 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:53.747889701Z I0216 21:21:53.747827 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:53.883388021Z I0216 21:21:53.883293 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:53.943367715Z I0216 21:21:53.943264 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:53.948257068Z I0216 21:21:53.948184 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:54.084218670Z I0216 21:21:54.084128 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:54.143046724Z I0216 21:21:54.142961 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:54.147929335Z I0216 21:21:54.147878 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:54.284055173Z I0216 21:21:54.283990 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:54.342962029Z I0216 21:21:54.342878 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:54.348080847Z I0216 21:21:54.348032 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:54.483337711Z I0216 21:21:54.483267 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:54.543098350Z I0216 21:21:54.542959 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:54.548844945Z I0216 21:21:54.548714 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:54.684398947Z I0216 21:21:54.684265 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:54.742282284Z I0216 21:21:54.742226 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:54.748152303Z I0216 21:21:54.748120 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:54.883983652Z I0216 21:21:54.883915 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:54.943238397Z I0216 21:21:54.943158 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:54.947947765Z I0216 21:21:54.947907 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:55.084475102Z I0216 21:21:55.084396 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:55.142316419Z I0216 21:21:55.142221 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:55.147790348Z I0216 21:21:55.147748 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:55.284332466Z I0216 21:21:55.284237 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:55.343289272Z I0216 21:21:55.343213 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:55.348778221Z I0216 21:21:55.348728 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:55.484403255Z I0216 21:21:55.484322 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:55.543031683Z I0216 21:21:55.542934 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:55.547991037Z I0216 21:21:55.547909 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:55.684373671Z I0216 21:21:55.684290 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:55.742814884Z I0216 21:21:55.742693 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:55.749406282Z I0216 21:21:55.749311 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:55.881346976Z I0216 21:21:55.881187 1 apf_controller.go:493] "Update CurrentCL" plName="exempt" seatDemandHighWatermark=2 seatDemandAvg=0.00853318414858089 seatDemandStdev=0.09259429665941897 seatDemandSmoothed=7.520719399383606 fairFrac=2.331974373907979 currentCL=2 concurrencyDenominator=2 backstop=false 2026-02-16T21:21:55.884422960Z I0216 21:21:55.884323 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:55.942425590Z I0216 21:21:55.942321 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:55.948972368Z I0216 21:21:55.948832 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:56.084172429Z I0216 21:21:56.084094 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:56.142490269Z I0216 21:21:56.142416 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:56.147737031Z I0216 21:21:56.147693 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:56.283324664Z I0216 21:21:56.283268 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:56.342770454Z I0216 21:21:56.342687 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:56.348458678Z I0216 21:21:56.348419 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:56.483465805Z I0216 21:21:56.483389 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:56.543117330Z I0216 21:21:56.543049 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:56.548595689Z I0216 21:21:56.548521 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:56.683876333Z I0216 21:21:56.683787 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:56.742696976Z I0216 21:21:56.742618 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:56.747688991Z I0216 21:21:56.747627 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:56.884300192Z I0216 21:21:56.884257 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:56.943909686Z I0216 21:21:56.943806 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:56.947399341Z I0216 21:21:56.947346 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:57.083786044Z I0216 21:21:57.083706 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:57.142773952Z I0216 21:21:57.142711 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:57.148817096Z I0216 21:21:57.148748 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:57.284166962Z I0216 21:21:57.284089 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:57.293783792Z E0216 21:21:57.293722 1 remote_available_controller.go:470] "Unhandled Error" err="v1beta1.metrics.k8s.io failed with: failing or missing response from https://10.128.0.83:10250/apis/metrics.k8s.io/v1beta1: bad status from https://10.128.0.83:10250/apis/metrics.k8s.io/v1beta1: 401" logger="UnhandledError" 2026-02-16T21:21:57.342329417Z I0216 21:21:57.342230 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-02-16T21:21:57.348308729Z I0216 21:21:57.348248 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-0/setup_current.log0000640000000000000000000000007015144705173031152 0ustar00000000000000002026-02-16T20:55:13.012028761Z Fixing audit permissions.kube-apiserver-operator_current.log0000640000000000000000000004632215144705173036734 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-54984b6678-cl5ld2026-02-16T21:21:47.707916887Z I0216 20:58:01.711895 1 cmd.go:413] Getting controller reference for node master-0 2026-02-16T21:21:47.707916887Z I0216 20:58:01.765190 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-02-16T21:21:47.707916887Z I0216 20:58:01.765279 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-16T21:21:47.707916887Z I0216 20:58:01.765301 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-16T21:21:47.707916887Z I0216 20:58:01.776932 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-02-16T21:21:47.707916887Z I0216 20:58:31.777093 1 cmd.go:524] Getting installer pods for node master-0 2026-02-16T21:21:47.707916887Z F0216 20:58:45.781242 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-16T21:21:47.707967068Z I0216 21:21:47.707945 1 installer_controller.go:540] "master-0" moving to (v1.NodeStatus) { 2026-02-16T21:21:47.707967068Z NodeName: (string) (len=8) "master-0", 2026-02-16T21:21:47.707967068Z CurrentRevision: (int32) 0, 2026-02-16T21:21:47.707967068Z TargetRevision: (int32) 1, 2026-02-16T21:21:47.707967068Z LastFailedRevision: (int32) 1, 2026-02-16T21:21:47.707967068Z LastFailedTime: (*v1.Time)(0xc0053d3278)(2026-02-16 21:21:47.707829205 +0000 UTC m=+315.709981447), 2026-02-16T21:21:47.707967068Z LastFailedReason: (string) (len=15) "InstallerFailed", 2026-02-16T21:21:47.707967068Z LastFailedCount: (int) 1, 2026-02-16T21:21:47.707967068Z LastFallbackCount: (int) 0, 2026-02-16T21:21:47.707967068Z LastFailedRevisionErrors: ([]string) (len=1 cap=1) { 2026-02-16T21:21:47.707967068Z (string) (len=2059) "installer: ving-cert\",\n (string) (len=21) \"user-serving-cert-000\",\n (string) (len=21) \"user-serving-cert-001\",\n (string) (len=21) \"user-serving-cert-002\",\n (string) (len=21) \"user-serving-cert-003\",\n (string) (len=21) \"user-serving-cert-004\",\n (string) (len=21) \"user-serving-cert-005\",\n (string) (len=21) \"user-serving-cert-006\",\n (string) (len=21) \"user-serving-cert-007\",\n (string) (len=21) \"user-serving-cert-008\",\n (string) (len=21) \"user-serving-cert-009\"\n },\n CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\",\n (string) (len=29) \"control-plane-node-kubeconfig\",\n (string) (len=26) \"check-endpoints-kubeconfig\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) ,\n KubeletVersion: (string) \"\"\n})\nI0216 20:58:01.711895 1 cmd.go:413] Getting controller reference for node master-0\nI0216 20:58:01.765190 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0216 20:58:01.765279 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0216 20:58:01.765301 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0216 20:58:01.776932 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0216 20:58:31.777093 1 cmd.go:524] Getting installer pods for node master-0\nF0216 20:58:45.781242 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n" 2026-02-16T21:21:47.707967068Z } 2026-02-16T21:21:47.707967068Z } 2026-02-16T21:21:47.707967068Z because installer pod failed: installer: ving-cert", 2026-02-16T21:21:47.707967068Z (string) (len=21) "user-serving-cert-000", 2026-02-16T21:21:47.707967068Z (string) (len=21) "user-serving-cert-001", 2026-02-16T21:21:47.707967068Z (string) (len=21) "user-serving-cert-002", 2026-02-16T21:21:47.707967068Z (string) (len=21) "user-serving-cert-003", 2026-02-16T21:21:47.707967068Z (string) (len=21) "user-serving-cert-004", 2026-02-16T21:21:47.707967068Z (string) (len=21) "user-serving-cert-005", 2026-02-16T21:21:47.707967068Z (string) (len=21) "user-serving-cert-006", 2026-02-16T21:21:47.707967068Z (string) (len=21) "user-serving-cert-007", 2026-02-16T21:21:47.707967068Z (string) (len=21) "user-serving-cert-008", 2026-02-16T21:21:47.707967068Z (string) (len=21) "user-serving-cert-009" 2026-02-16T21:21:47.707967068Z }, 2026-02-16T21:21:47.707967068Z CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) { 2026-02-16T21:21:47.707967068Z (string) (len=20) "aggregator-client-ca", 2026-02-16T21:21:47.707967068Z (string) (len=9) "client-ca", 2026-02-16T21:21:47.707967068Z (string) (len=29) "control-plane-node-kubeconfig", 2026-02-16T21:21:47.707967068Z (string) (len=26) "check-endpoints-kubeconfig" 2026-02-16T21:21:47.707967068Z }, 2026-02-16T21:21:47.707967068Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-16T21:21:47.707967068Z (string) (len=17) "trusted-ca-bundle" 2026-02-16T21:21:47.707967068Z }, 2026-02-16T21:21:47.707967068Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-apiserver-certs", 2026-02-16T21:21:47.707967068Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-02-16T21:21:47.707967068Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-02-16T21:21:47.707967068Z Timeout: (time.Duration) 2m0s, 2026-02-16T21:21:47.707967068Z StaticPodManifestsLockFile: (string) "", 2026-02-16T21:21:47.707967068Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-02-16T21:21:47.707967068Z KubeletVersion: (string) "" 2026-02-16T21:21:47.707967068Z }) 2026-02-16T21:21:47.707967068Z I0216 20:58:01.711895 1 cmd.go:413] Getting controller reference for node master-0 2026-02-16T21:21:47.707967068Z I0216 20:58:01.765190 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-02-16T21:21:47.707967068Z I0216 20:58:01.765279 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-16T21:21:47.707967068Z I0216 20:58:01.765301 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-16T21:21:47.707967068Z I0216 20:58:01.776932 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-02-16T21:21:47.707967068Z I0216 20:58:31.777093 1 cmd.go:524] Getting installer pods for node master-0 2026-02-16T21:21:47.707967068Z F0216 20:58:45.781242 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-16T21:21:47.708948825Z I0216 21:21:47.708892 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"6c0f9e0b-f674-44d5-8c24-c41deb2821e9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'InstallerPodFailed' installer errors: installer: ving-cert", 2026-02-16T21:21:47.708948825Z (string) (len=21) "user-serving-cert-000", 2026-02-16T21:21:47.708948825Z (string) (len=21) "user-serving-cert-001", 2026-02-16T21:21:47.708948825Z (string) (len=21) "user-serving-cert-002", 2026-02-16T21:21:47.708948825Z (string) (len=21) "user-serving-cert-003", 2026-02-16T21:21:47.708948825Z (string) (len=21) "user-serving-cert-004", 2026-02-16T21:21:47.708948825Z (string) (len=21) "user-serving-cert-005", 2026-02-16T21:21:47.708948825Z (string) (len=21) "user-serving-cert-006", 2026-02-16T21:21:47.708948825Z (string) (len=21) "user-serving-cert-007", 2026-02-16T21:21:47.708948825Z (string) (len=21) "user-serving-cert-008", 2026-02-16T21:21:47.708948825Z (string) (len=21) "user-serving-cert-009" 2026-02-16T21:21:47.708948825Z }, 2026-02-16T21:21:47.708948825Z CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) { 2026-02-16T21:21:47.708948825Z (string) (len=20) "aggregator-client-ca", 2026-02-16T21:21:47.708948825Z (string) (len=9) "client-ca", 2026-02-16T21:21:47.708948825Z (string) (len=29) "control-plane-node-kubeconfig", 2026-02-16T21:21:47.708948825Z (string) (len=26) "check-endpoints-kubeconfig" 2026-02-16T21:21:47.708948825Z }, 2026-02-16T21:21:47.708948825Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-02-16T21:21:47.708948825Z (string) (len=17) "trusted-ca-bundle" 2026-02-16T21:21:47.708948825Z }, 2026-02-16T21:21:47.708948825Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-apiserver-certs", 2026-02-16T21:21:47.708948825Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-02-16T21:21:47.708948825Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-02-16T21:21:47.708948825Z Timeout: (time.Duration) 2m0s, 2026-02-16T21:21:47.708948825Z StaticPodManifestsLockFile: (string) "", 2026-02-16T21:21:47.708948825Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-02-16T21:21:47.708948825Z KubeletVersion: (string) "" 2026-02-16T21:21:47.708948825Z }) 2026-02-16T21:21:47.708948825Z I0216 20:58:01.711895 1 cmd.go:413] Getting controller reference for node master-0 2026-02-16T21:21:47.708948825Z I0216 20:58:01.765190 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-02-16T21:21:47.708948825Z I0216 20:58:01.765279 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-16T21:21:47.708948825Z I0216 20:58:01.765301 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-16T21:21:47.708948825Z I0216 20:58:01.776932 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-02-16T21:21:47.708948825Z I0216 20:58:31.777093 1 cmd.go:524] Getting installer pods for node master-0 2026-02-16T21:21:47.708948825Z F0216 20:58:45.781242 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-02-16T21:21:47.710124897Z W0216 21:21:47.710073 1 dynamic_operator_client.go:352] .status.conditions["InstallerControllerDegraded"].reason is missing; this will eventually be fatal 2026-02-16T21:21:47.710124897Z W0216 21:21:47.710092 1 dynamic_operator_client.go:355] .status.conditions["InstallerControllerDegraded"].message is missing; this will eventually be fatal 2026-02-16T21:21:47.710124897Z W0216 21:21:47.710097 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-02-16T21:21:47.744159989Z I0216 21:21:47.744076 1 prune_controller.go:277] Nothing to prune 2026-02-16T21:21:47.750158641Z I0216 21:21:47.750094 1 status_controller.go:225] clusteroperator/kube-apiserver diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-16T20:57:01Z","message":"NodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: ving-cert\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-000\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-001\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-002\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-003\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-004\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-005\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-006\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-007\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-008\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-009\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\",\nNodeInstallerDegraded: (string) (len=29) \"control-plane-node-kubeconfig\",\nNodeInstallerDegraded: (string) (len=26) \"check-endpoints-kubeconfig\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0216 20:58:01.711895 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0216 20:58:01.765190 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0216 20:58:01.765279 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0216 20:58:01.765301 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0216 20:58:01.776932 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0216 20:58:31.777093 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0216 20:58:45.781242 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nNodeControllerDegraded: All master nodes are ready","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-16T20:57:53Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-16T20:57:02Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-02-16T20:57:00Z","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced.","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-02-16T20:57:00Z","message":"All is well","reason":"AsExpected","status":"False","type":"EvaluationConditionsDetected"}]}} 2026-02-16T21:21:47.757028777Z I0216 21:21:47.756969 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.32) to be completed. 2026-02-16T21:21:47.771054657Z I0216 21:21:47.770989 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"6c0f9e0b-f674-44d5-8c24-c41deb2821e9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-apiserver changed: Degraded message changed from "NodeControllerDegraded: All master nodes are ready" to "NodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: ving-cert\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-000\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-001\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-002\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-003\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-004\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-005\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-006\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-007\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-008\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-009\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\",\nNodeInstallerDegraded: (string) (len=29) \"control-plane-node-kubeconfig\",\nNodeInstallerDegraded: (string) (len=26) \"check-endpoints-kubeconfig\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) ,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0216 20:58:01.711895 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0216 20:58:01.765190 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0216 20:58:01.765279 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0216 20:58:01.765301 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0216 20:58:01.776932 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0216 20:58:31.777093 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0216 20:58:45.781242 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nNodeControllerDegraded: All master nodes are ready" 2026-02-16T21:21:48.904384073Z I0216 21:21:48.904328 1 request.go:700] Waited for 1.146366169s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/configmaps/kube-apiserver-audit-policies kube-apiserver-operator_previous.log0000640000000000000000000003464515144705173037133 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-54984b6678-cl5ld2026-02-16T21:06:26.114471285Z I0216 21:06:26.114286 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-16T21:06:26.114471285Z I0216 21:06:26.114438 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-16T21:06:26.115703659Z I0216 21:06:26.115616 1 observer_polling.go:159] Starting file observer 2026-02-16T21:06:26.131521915Z I0216 21:06:26.131479 1 builder.go:304] kube-apiserver-operator version 4.18.0-202601171144.p2.g416eeae.assembly.stream.el9-416eeae-416eeae4e60970f5ab52a833774c7bb60644e6af 2026-02-16T21:06:26.530475276Z I0216 21:06:26.530398 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-16T21:06:26.530537128Z W0216 21:06:26.530527 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-16T21:06:26.530568588Z W0216 21:06:26.530551 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-16T21:06:26.530590859Z W0216 21:06:26.530582 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-16T21:06:26.530612040Z W0216 21:06:26.530604 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-16T21:06:26.530632090Z W0216 21:06:26.530624 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-16T21:06:26.530683312Z W0216 21:06:26.530673 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-16T21:06:26.532349327Z I0216 21:06:26.532316 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-16T21:06:26.532631905Z I0216 21:06:26.532618 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-apiserver-operator/kube-apiserver-operator-lock... 2026-02-16T21:06:26.535006821Z I0216 21:06:26.534984 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-16T21:06:26.535069233Z I0216 21:06:26.535059 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-16T21:06:26.535119454Z I0216 21:06:26.535110 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-16T21:06:26.535163885Z I0216 21:06:26.535151 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-16T21:06:26.535292179Z I0216 21:06:26.535279 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-16T21:06:26.535388121Z I0216 21:06:26.535376 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-16T21:06:26.535412932Z I0216 21:06:26.535403 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T21:06:26.535446354Z I0216 21:06:26.535436 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-16T21:06:26.535467714Z I0216 21:06:26.535459 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T21:06:26.635620330Z I0216 21:06:26.635572 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T21:06:26.635741314Z I0216 21:06:26.635730 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-16T21:06:26.635857897Z I0216 21:06:26.635847 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T21:13:24.168583411Z E0216 21:13:24.168464 1 leaderelection.go:436] error retrieving resource lock openshift-kube-apiserver-operator/kube-apiserver-operator-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io kube-apiserver-operator-lock) 2026-02-16T21:14:51.420807467Z I0216 21:14:51.420690 1 leaderelection.go:268] successfully acquired lease openshift-kube-apiserver-operator/kube-apiserver-operator-lock 2026-02-16T21:14:51.421196987Z I0216 21:14:51.421048 1 event.go:377] Event(v1.ObjectReference{Kind:"Lease", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator-lock", UID:"2f0f15be-fef0-4416-ac8b-601292451262", APIVersion:"coordination.k8s.io/v1", ResourceVersion:"11757", FieldPath:""}): type: 'Normal' reason: 'LeaderElection' kube-apiserver-operator-54984b6678-cl5ld_eeea40a1-b740-460d-ae3d-106bdcdafba4 became leader 2026-02-16T21:14:51.422538174Z I0216 21:14:51.422472 1 simple_featuregate_reader.go:171] Starting feature-gate-detector 2026-02-16T21:14:51.426990764Z I0216 21:14:51.426773 1 starter.go:163] FeatureGates initialized: knownFeatureGates=[AWSEFSDriverVolumeMetrics AdminNetworkPolicy AlibabaPlatform AzureWorkloadIdentity BareMetalLoadBalancer BuildCSIVolumes ChunkSizeMiB CloudDualStackNodeIPs DisableKubeletCloudCredentialProviders GCPLabelsTags HardwareSpeed IngressControllerLBSubnetsAWS KMSv1 ManagedBootImages ManagedBootImagesAWS MultiArchInstallAWS MultiArchInstallGCP NetworkDiagnosticsConfig NetworkLiveMigration NetworkSegmentation NewOLM NodeDisruptionPolicy OnClusterBuild PersistentIPsForVirtualization PrivateHostedZoneAWS SetEIPForNLBIngressController StreamingCollectionEncodingToJSON StreamingCollectionEncodingToProtobuf VSphereControlPlaneMachineSet VSphereDriverConfiguration VSphereMultiVCenters VSphereStaticIPs ValidatingAdmissionPolicy AWSClusterHostedDNS AdditionalRoutingCapabilities AutomatedEtcdBackup BootcNodeManagement CSIDriverSharedResource ClusterAPIInstall ClusterAPIInstallIBMCloud ClusterMonitoringConfig ConsolePluginContentSecurityPolicy DNSNameResolver DynamicResourceAllocation EtcdBackendQuota EventedPLEG Example ExternalOIDC ExternalOIDCWithUIDAndExtraClaimMappings GCPClusterHostedDNS GatewayAPI ImageStreamImportMode IngressControllerDynamicConfigurationManager InsightsConfig InsightsConfigAPI InsightsOnDemandDataGather InsightsRuntimeExtractor MachineAPIMigration MachineAPIOperatorDisableMachineHealthCheckController MachineAPIProviderOpenStack MachineConfigNodes MaxUnavailableStatefulSet MetricsCollectionProfiles MinimumKubeletVersion MixedCPUsAllocation MultiArchInstallAzure NodeSwap NutanixMultiSubnets OVNObservability OpenShiftPodSecurityAdmission PinnedImages PlatformOperators ProcMountType RouteAdvertisements RouteExternalCertificate ServiceAccountTokenNodeBinding SignatureStores SigstoreImageVerification TranslateStreamCloseWebsocketRequests UpgradeStatus UserNamespacesPodSecurityStandards UserNamespacesSupport VSphereMultiNetworks VolumeAttributesClass VolumeGroupSnapshot] 2026-02-16T21:14:51.426990764Z I0216 21:14:51.426896 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"6c0f9e0b-f674-44d5-8c24-c41deb2821e9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'FeatureGatesInitialized' FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{"AWSEFSDriverVolumeMetrics", "AdminNetworkPolicy", "AlibabaPlatform", "AzureWorkloadIdentity", "BareMetalLoadBalancer", "BuildCSIVolumes", "ChunkSizeMiB", "CloudDualStackNodeIPs", "DisableKubeletCloudCredentialProviders", "GCPLabelsTags", "HardwareSpeed", "IngressControllerLBSubnetsAWS", "KMSv1", "ManagedBootImages", "ManagedBootImagesAWS", "MultiArchInstallAWS", "MultiArchInstallGCP", "NetworkDiagnosticsConfig", "NetworkLiveMigration", "NetworkSegmentation", "NewOLM", "NodeDisruptionPolicy", "OnClusterBuild", "PersistentIPsForVirtualization", "PrivateHostedZoneAWS", "SetEIPForNLBIngressController", "StreamingCollectionEncodingToJSON", "StreamingCollectionEncodingToProtobuf", "VSphereControlPlaneMachineSet", "VSphereDriverConfiguration", "VSphereMultiVCenters", "VSphereStaticIPs", "ValidatingAdmissionPolicy"}, Disabled:[]v1.FeatureGateName{"AWSClusterHostedDNS", "AdditionalRoutingCapabilities", "AutomatedEtcdBackup", "BootcNodeManagement", "CSIDriverSharedResource", "ClusterAPIInstall", "ClusterAPIInstallIBMCloud", "ClusterMonitoringConfig", "ConsolePluginContentSecurityPolicy", "DNSNameResolver", "DynamicResourceAllocation", "EtcdBackendQuota", "EventedPLEG", "Example", "ExternalOIDC", "ExternalOIDCWithUIDAndExtraClaimMappings", "GCPClusterHostedDNS", "GatewayAPI", "ImageStreamImportMode", "IngressControllerDynamicConfigurationManager", "InsightsConfig", "InsightsConfigAPI", "InsightsOnDemandDataGather", "InsightsRuntimeExtractor", "MachineAPIMigration", "MachineAPIOperatorDisableMachineHealthCheckController", "MachineAPIProviderOpenStack", "MachineConfigNodes", "MaxUnavailableStatefulSet", "MetricsCollectionProfiles", "MinimumKubeletVersion", "MixedCPUsAllocation", "MultiArchInstallAzure", "NodeSwap", "NutanixMultiSubnets", "OVNObservability", "OpenShiftPodSecurityAdmission", "PinnedImages", "PlatformOperators", "ProcMountType", "RouteAdvertisements", "RouteExternalCertificate", "ServiceAccountTokenNodeBinding", "SignatureStores", "SigstoreImageVerification", "TranslateStreamCloseWebsocketRequests", "UpgradeStatus", "UserNamespacesPodSecurityStandards", "UserNamespacesSupport", "VSphereMultiNetworks", "VolumeAttributesClass", "VolumeGroupSnapshot"}} 2026-02-16T21:15:25.424731818Z E0216 21:15:25.424676 1 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{kube-apiserver-operator-lock.1894d6959620571b openshift-kube-apiserver-operator 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Lease,Namespace:openshift-kube-apiserver-operator,Name:kube-apiserver-operator-lock,UID:2f0f15be-fef0-4416-ac8b-601292451262,APIVersion:coordination.k8s.io/v1,ResourceVersion:11757,FieldPath:,},Reason:LeaderElection,Message:kube-apiserver-operator-54984b6678-cl5ld_eeea40a1-b740-460d-ae3d-106bdcdafba4 became leader,Source:EventSource{Component:kube-apiserver-operator,Host:,},FirstTimestamp:2026-02-16 21:14:51.420620571 +0000 UTC m=+505.356787166,LastTimestamp:2026-02-16 21:14:51.420620571 +0000 UTC m=+505.356787166,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kube-apiserver-operator,ReportingInstance:,}" 2026-02-16T21:15:25.430754621Z E0216 21:15:25.430696 1 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{kube-apiserver-operator.1894d695967d6f29 openshift-kube-apiserver-operator 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Deployment,Namespace:openshift-kube-apiserver-operator,Name:kube-apiserver-operator,UID:6c0f9e0b-f674-44d5-8c24-c41deb2821e9,APIVersion:apps/v1,ResourceVersion:,FieldPath:,},Reason:FeatureGatesInitialized,Message:FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}},Source:EventSource{Component:kube-apiserver-operator,Host:,},FirstTimestamp:2026-02-16 21:14:51.426721577 +0000 UTC m=+505.362888152,LastTimestamp:2026-02-16 21:14:51.426721577 +0000 UTC m=+505.362888152,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kube-apiserver-operator,ReportingInstance:,}" 2026-02-16T21:15:51.429072612Z W0216 21:15:51.429020 1 builder.go:136] graceful termination failed, controllers failed with error: the server was unable to return a response in the time allotted, but may still be processing the request (get infrastructures.config.openshift.io cluster) config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-54984b6678-cl5ld.json0000640000000000000000000002015615144705173027715 0ustar0000000000000000{"metadata":{"name":"kube-apiserver-operator-54984b6678-cl5ld","generateName":"kube-apiserver-operator-54984b6678-","namespace":"openshift-kube-apiserver-operator","uid":"0b02b740-5698-4e9a-90fe-2873bd0b0958","resourceVersion":"12220","creationTimestamp":"2026-02-16T20:55:39Z","labels":{"app":"kube-apiserver-operator","pod-template-hash":"54984b6678"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.8/23\"],\"mac_address\":\"0a:58:0a:80:00:08\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.8/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.8\"\n ],\n \"mac\": \"0a:58:0a:80:00:08\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-apiserver-operator-54984b6678","uid":"c97e0f53-5216-4517-8958-b371d7290276","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","command":["cluster-kube-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-apiserver-operator","serviceAccount":"kube-apiserver-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:56:59Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:56:57Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:16:32Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:16:32Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:56:57Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.8","podIPs":[{"ip":"10.128.0.8"}],"startTime":"2026-02-16T20:56:57Z","containerStatuses":[{"name":"kube-apiserver-operator","state":{"running":{"startedAt":"2026-02-16T21:16:31Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"edDNS\\\", \\\"AdditionalRoutingCapabilities\\\", \\\"AutomatedEtcdBackup\\\", \\\"BootcNodeManagement\\\", \\\"CSIDriverSharedResource\\\", \\\"ClusterAPIInstall\\\", \\\"ClusterAPIInstallIBMCloud\\\", \\\"ClusterMonitoringConfig\\\", \\\"ConsolePluginContentSecurityPolicy\\\", \\\"DNSNameResolver\\\", \\\"DynamicResourceAllocation\\\", \\\"EtcdBackendQuota\\\", \\\"EventedPLEG\\\", \\\"Example\\\", \\\"ExternalOIDC\\\", \\\"ExternalOIDCWithUIDAndExtraClaimMappings\\\", \\\"GCPClusterHostedDNS\\\", \\\"GatewayAPI\\\", \\\"ImageStreamImportMode\\\", \\\"IngressControllerDynamicConfigurationManager\\\", \\\"InsightsConfig\\\", \\\"InsightsConfigAPI\\\", \\\"InsightsOnDemandDataGather\\\", \\\"InsightsRuntimeExtractor\\\", \\\"MachineAPIMigration\\\", \\\"MachineAPIOperatorDisableMachineHealthCheckController\\\", \\\"MachineAPIProviderOpenStack\\\", \\\"MachineConfigNodes\\\", \\\"MaxUnavailableStatefulSet\\\", \\\"MetricsCollectionProfiles\\\", \\\"MinimumKubeletVersion\\\", \\\"MixedCPUsAllocation\\\", \\\"MultiArchInstallAzure\\\", \\\"NodeSwap\\\", \\\"NutanixMultiSubnets\\\", \\\"OVNObservability\\\", \\\"OpenShiftPodSecurityAdmission\\\", \\\"PinnedImages\\\", \\\"PlatformOperators\\\", \\\"ProcMountType\\\", \\\"RouteAdvertisements\\\", \\\"RouteExternalCertificate\\\", \\\"ServiceAccountTokenNodeBinding\\\", \\\"SignatureStores\\\", \\\"SigstoreImageVerification\\\", \\\"TranslateStreamCloseWebsocketRequests\\\", \\\"UpgradeStatus\\\", \\\"UserNamespacesPodSecurityStandards\\\", \\\"UserNamespacesSupport\\\", \\\"VSphereMultiNetworks\\\", \\\"VolumeAttributesClass\\\", \\\"VolumeGroupSnapshot\\\"}},Source:EventSource{Component:kube-apiserver-operator,Host:,},FirstTimestamp:2026-02-16 21:14:51.426721577 +0000 UTC m=+505.362888152,LastTimestamp:2026-02-16 21:14:51.426721577 +0000 UTC m=+505.362888152,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kube-apiserver-operator,ReportingInstance:,}\"\nW0216 21:15:51.429020 1 builder.go:136] graceful termination failed, controllers failed with error: the server was unable to return a response in the time allotted, but may still be processing the request (get infrastructures.config.openshift.io cluster)\n","startedAt":"2026-02-16T21:06:26Z","finishedAt":"2026-02-16T21:15:51Z","containerID":"cri-o://71d2f873a3383c5d4e4ea361c9b4723201e4600cb1f7ea3ef5cecd7778b39d86"}},"ready":true,"restartCount":5,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","containerID":"cri-o://9a4fbebd80c93d723f4b6793cf7b0ccb622b9b9b4616c52e1479c9e9afb211d0","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-oauth-apiserver/logs/apiserver-64f7f8746f-xj7z6/oauth-apiserver_current.log0000640000000000000000000011723015144705173031263 0ustar00000000000000002026-02-16T21:19:45.723752004Z E0216 21:19:45.720783 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:19:45.723752004Z E0216 21:19:45.721118 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:19:45.723752004Z E0216 21:19:45.721286 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:19:45.723752004Z E0216 21:19:45.721442 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:19:45.723752004Z E0216 21:19:45.721625 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:19:45.741706933Z E0216 21:19:45.740945 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:19:45.741706933Z E0216 21:19:45.740960 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:19:45.741706933Z E0216 21:19:45.741006 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:19:45.741706933Z E0216 21:19:45.741339 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:19:45.741706933Z E0216 21:19:45.741502 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:01.868101335Z E0216 21:20:01.868029 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:01.868168867Z E0216 21:20:01.868145 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:01.868284890Z E0216 21:20:01.868234 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:01.868421603Z E0216 21:20:01.868363 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:01.868638639Z E0216 21:20:01.868601 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:01.929557469Z E0216 21:20:01.929482 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:01.929621141Z E0216 21:20:01.929482 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:01.929621141Z E0216 21:20:01.929590 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:01.929621141Z E0216 21:20:01.929594 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:01.929748454Z E0216 21:20:01.929715 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:15.741189058Z E0216 21:20:15.741124 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:15.741469955Z E0216 21:20:15.741431 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:15.741625109Z E0216 21:20:15.741596 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:15.741751364Z E0216 21:20:15.741713 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:15.741826985Z E0216 21:20:15.741797 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:15.742209645Z E0216 21:20:15.742181 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:15.748399576Z E0216 21:20:15.748355 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:15.748737626Z E0216 21:20:15.748705 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:15.748967042Z E0216 21:20:15.748942 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:15.749182667Z E0216 21:20:15.749154 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:15.785069384Z E0216 21:20:15.785013 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:15.794274604Z E0216 21:20:15.794214 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:15.818599638Z E0216 21:20:15.818532 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:15.824569945Z E0216 21:20:15.824524 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:15.877984269Z E0216 21:20:15.877914 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:15.884536880Z E0216 21:20:15.884489 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:31.881760651Z E0216 21:20:31.881609 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:31.882026098Z E0216 21:20:31.881942 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:31.882026098Z E0216 21:20:31.881993 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:31.882142331Z E0216 21:20:31.882073 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:31.882570033Z E0216 21:20:31.882433 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:31.933270786Z E0216 21:20:31.933124 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:31.933270786Z E0216 21:20:31.933169 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:31.933270786Z E0216 21:20:31.933182 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:31.933420279Z E0216 21:20:31.933350 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:31.933641055Z E0216 21:20:31.933501 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:45.734872684Z E0216 21:20:45.733627 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:45.734872684Z E0216 21:20:45.734058 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:45.734872684Z E0216 21:20:45.734219 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:45.734872684Z E0216 21:20:45.734318 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:45.734872684Z E0216 21:20:45.734444 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:45.734872684Z E0216 21:20:45.734595 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:45.735030388Z E0216 21:20:45.734995 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:45.735030388Z E0216 21:20:45.735020 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:45.742614747Z E0216 21:20:45.742573 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:20:45.742614747Z E0216 21:20:45.742605 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:01.891979317Z E0216 21:21:01.891885 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:01.892703096Z E0216 21:21:01.892630 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:01.892818069Z E0216 21:21:01.892768 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:01.892932892Z E0216 21:21:01.892861 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:01.892967803Z E0216 21:21:01.892779 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:01.942062622Z E0216 21:21:01.941978 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:01.942348000Z E0216 21:21:01.942324 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:01.942389901Z E0216 21:21:01.942358 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:01.942559436Z E0216 21:21:01.942511 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:01.943369677Z E0216 21:21:01.943311 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:15.758460885Z E0216 21:21:15.757871 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:15.758516157Z E0216 21:21:15.758456 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:15.759706819Z E0216 21:21:15.758870 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:15.759706819Z E0216 21:21:15.759138 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:15.759706819Z E0216 21:21:15.759267 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:15.776250847Z E0216 21:21:15.776037 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:15.776398691Z E0216 21:21:15.776353 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:15.776574136Z E0216 21:21:15.776500 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:15.776691959Z E0216 21:21:15.776625 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:15.776913525Z E0216 21:21:15.776864 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:15.818488611Z E0216 21:21:15.818412 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:15.828730048Z E0216 21:21:15.828637 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:15.841195516Z E0216 21:21:15.841126 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:15.848836343Z E0216 21:21:15.848774 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:31.899839268Z E0216 21:21:31.899786 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:31.900152406Z E0216 21:21:31.900128 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:31.901727419Z E0216 21:21:31.900373 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:31.901727419Z E0216 21:21:31.900465 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:31.901727419Z E0216 21:21:31.900373 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:31.950702186Z E0216 21:21:31.950622 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:31.950759717Z E0216 21:21:31.950728 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:31.950829249Z E0216 21:21:31.950812 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:31.950882870Z E0216 21:21:31.950848 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:31.950919221Z E0216 21:21:31.950893 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.743511400Z E0216 21:21:45.743445 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.743958012Z E0216 21:21:45.743928 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.744188048Z E0216 21:21:45.744159 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.744418095Z E0216 21:21:45.744390 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.744632881Z E0216 21:21:45.744601 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.748998829Z E0216 21:21:45.748935 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.750544021Z E0216 21:21:45.749228 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.750544021Z E0216 21:21:45.749473 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.750544021Z E0216 21:21:45.749755 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" 2026-02-16T21:21:45.750544021Z E0216 21:21:45.750027 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=1484810507668651069, SKID=A4:D9:3B:2A:0F:6B:EE:0B:4C:A9:71:4D:7E:C0:A7:29:31:2F:81:B5, AKID=3B:D3:60:EF:94:BF:1C:90:7E:FE:F7:F0:5F:9B:62:47:67:AA:74:B9 failed: x509: certificate signed by unknown authority]" config/pod/openshift-ingress/logs/router-default-864ddd5f56-z4bnk/router_current.log0000640000000000000000000002240215144705173027067 0ustar00000000000000002026-02-16T21:21:23.184634160Z [-]backend-http failed: backend reported failure 2026-02-16T21:21:23.184634160Z [-]has-synced failed: Router not synced 2026-02-16T21:21:24.185929101Z I0216 21:21:24.185858 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:21:24.185929101Z [-]backend-http failed: backend reported failure 2026-02-16T21:21:24.185929101Z [-]has-synced failed: Router not synced 2026-02-16T21:21:25.184827818Z I0216 21:21:25.184713 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:21:25.184827818Z [-]backend-http failed: backend reported failure 2026-02-16T21:21:25.184827818Z [-]has-synced failed: Router not synced 2026-02-16T21:21:26.185216294Z I0216 21:21:26.185077 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:21:26.185216294Z [-]backend-http failed: backend reported failure 2026-02-16T21:21:26.185216294Z [-]has-synced failed: Router not synced 2026-02-16T21:21:27.184184412Z I0216 21:21:27.184105 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:21:27.184184412Z [-]backend-http failed: backend reported failure 2026-02-16T21:21:27.184184412Z [-]has-synced failed: Router not synced 2026-02-16T21:21:28.278480761Z I0216 21:21:28.278418 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:21:28.278480761Z [-]backend-http failed: backend reported failure 2026-02-16T21:21:28.278480761Z [-]has-synced failed: Router not synced 2026-02-16T21:21:29.185337034Z I0216 21:21:29.185227 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:21:29.185337034Z [-]backend-http failed: backend reported failure 2026-02-16T21:21:29.185337034Z [-]has-synced failed: Router not synced 2026-02-16T21:21:30.186360548Z I0216 21:21:30.186242 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:21:30.186360548Z [-]backend-http failed: backend reported failure 2026-02-16T21:21:30.186360548Z [-]has-synced failed: Router not synced 2026-02-16T21:21:31.185143810Z I0216 21:21:31.185059 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:21:31.185143810Z [-]backend-http failed: backend reported failure 2026-02-16T21:21:31.185143810Z [-]has-synced failed: Router not synced 2026-02-16T21:21:32.184110798Z I0216 21:21:32.183999 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:21:32.184110798Z [-]backend-http failed: backend reported failure 2026-02-16T21:21:32.184110798Z [-]has-synced failed: Router not synced 2026-02-16T21:21:33.185289505Z I0216 21:21:33.185204 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:21:33.185289505Z [-]backend-http failed: backend reported failure 2026-02-16T21:21:33.185289505Z [-]has-synced failed: Router not synced 2026-02-16T21:21:34.185317421Z I0216 21:21:34.185204 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:21:34.185317421Z [-]backend-http failed: backend reported failure 2026-02-16T21:21:34.185317421Z [-]has-synced failed: Router not synced 2026-02-16T21:21:35.184957668Z I0216 21:21:35.184863 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:21:35.184957668Z [-]backend-http failed: backend reported failure 2026-02-16T21:21:35.184957668Z [-]has-synced failed: Router not synced 2026-02-16T21:21:36.184580133Z I0216 21:21:36.184437 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:21:36.184580133Z [-]backend-http failed: backend reported failure 2026-02-16T21:21:36.184580133Z [-]has-synced failed: Router not synced 2026-02-16T21:21:37.185461372Z I0216 21:21:37.185360 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:21:37.185461372Z [-]backend-http failed: backend reported failure 2026-02-16T21:21:37.185461372Z [-]has-synced failed: Router not synced 2026-02-16T21:21:38.187295947Z I0216 21:21:38.185336 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:21:38.187295947Z [-]backend-http failed: backend reported failure 2026-02-16T21:21:38.187295947Z [-]has-synced failed: Router not synced 2026-02-16T21:21:38.187405370Z W0216 21:21:38.187362 1 reflector.go:547] github.com/openshift/router/pkg/router/controller/factory/factory.go:124: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-16T21:21:38.187405370Z E0216 21:21:38.187399 1 reflector.go:150] github.com/openshift/router/pkg/router/controller/factory/factory.go:124: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-16T21:21:39.185506114Z I0216 21:21:39.185413 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:21:39.185506114Z [-]backend-http failed: backend reported failure 2026-02-16T21:21:39.185506114Z [-]has-synced failed: Router not synced 2026-02-16T21:21:40.184040619Z I0216 21:21:40.183935 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:21:40.184040619Z [-]backend-http failed: backend reported failure 2026-02-16T21:21:40.184040619Z [-]has-synced failed: Router not synced 2026-02-16T21:21:41.185400471Z I0216 21:21:41.185273 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:21:41.185400471Z [-]backend-http failed: backend reported failure 2026-02-16T21:21:41.185400471Z [-]has-synced failed: Router not synced 2026-02-16T21:21:42.185594673Z I0216 21:21:42.185442 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:21:42.185594673Z [-]backend-http failed: backend reported failure 2026-02-16T21:21:42.185594673Z [-]has-synced failed: Router not synced 2026-02-16T21:21:43.184749074Z I0216 21:21:43.184623 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:21:43.184749074Z [-]backend-http failed: backend reported failure 2026-02-16T21:21:43.184749074Z [-]has-synced failed: Router not synced 2026-02-16T21:21:44.185400598Z I0216 21:21:44.185278 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:21:44.185400598Z [-]backend-http failed: backend reported failure 2026-02-16T21:21:44.185400598Z [-]has-synced failed: Router not synced 2026-02-16T21:21:45.186055731Z I0216 21:21:45.185950 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:21:45.186055731Z [-]backend-http failed: backend reported failure 2026-02-16T21:21:45.186055731Z [-]has-synced failed: Router not synced 2026-02-16T21:21:46.184540436Z I0216 21:21:46.184446 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:21:46.184540436Z [-]backend-http failed: backend reported failure 2026-02-16T21:21:46.184540436Z [-]has-synced failed: Router not synced 2026-02-16T21:21:47.185075236Z I0216 21:21:47.184993 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:21:47.185075236Z [-]backend-http failed: backend reported failure 2026-02-16T21:21:47.185075236Z [-]has-synced failed: Router not synced 2026-02-16T21:21:48.184878136Z I0216 21:21:48.184812 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:21:48.184878136Z [-]backend-http failed: backend reported failure 2026-02-16T21:21:48.184878136Z [-]has-synced failed: Router not synced 2026-02-16T21:21:49.185120697Z I0216 21:21:49.184995 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:21:49.185120697Z [-]backend-http failed: backend reported failure 2026-02-16T21:21:49.185120697Z [-]has-synced failed: Router not synced 2026-02-16T21:21:50.185846543Z I0216 21:21:50.185741 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:21:50.185846543Z [-]backend-http failed: backend reported failure 2026-02-16T21:21:50.185846543Z [-]has-synced failed: Router not synced 2026-02-16T21:21:51.184945923Z I0216 21:21:51.184835 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:21:51.184945923Z [-]backend-http failed: backend reported failure 2026-02-16T21:21:51.184945923Z [-]has-synced failed: Router not synced 2026-02-16T21:21:52.185044681Z I0216 21:21:52.184974 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:21:52.185044681Z [-]backend-http failed: backend reported failure 2026-02-16T21:21:52.185044681Z [-]has-synced failed: Router not synced 2026-02-16T21:21:53.185773555Z I0216 21:21:53.185678 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:21:53.185773555Z [-]backend-http failed: backend reported failure 2026-02-16T21:21:53.185773555Z [-]has-synced failed: Router not synced 2026-02-16T21:21:54.185613686Z I0216 21:21:54.185516 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:21:54.185613686Z [-]backend-http failed: backend reported failure 2026-02-16T21:21:54.185613686Z [-]has-synced failed: Router not synced 2026-02-16T21:21:55.184563474Z I0216 21:21:55.184477 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:21:55.184563474Z [-]backend-http failed: backend reported failure 2026-02-16T21:21:55.184563474Z [-]has-synced failed: Router not synced config/pod/openshift-ingress/logs/router-default-864ddd5f56-z4bnk/router_previous.log0000640000000000000000000002334715144705173027272 0ustar00000000000000002026-02-16T21:19:03.186563873Z [-]has-synced failed: Router not synced 2026-02-16T21:19:04.186026478Z I0216 21:19:04.185866 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:19:04.186026478Z [-]backend-http failed: backend reported failure 2026-02-16T21:19:04.186026478Z [-]has-synced failed: Router not synced 2026-02-16T21:19:05.184465605Z I0216 21:19:05.184348 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:19:05.184465605Z [-]backend-http failed: backend reported failure 2026-02-16T21:19:05.184465605Z [-]has-synced failed: Router not synced 2026-02-16T21:19:06.186048965Z I0216 21:19:06.185933 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:19:06.186048965Z [-]backend-http failed: backend reported failure 2026-02-16T21:19:06.186048965Z [-]has-synced failed: Router not synced 2026-02-16T21:19:07.061329718Z W0216 21:19:07.061239 1 reflector.go:547] github.com/openshift/router/pkg/router/controller/factory/factory.go:124: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-16T21:19:07.061329718Z E0216 21:19:07.061294 1 reflector.go:150] github.com/openshift/router/pkg/router/controller/factory/factory.go:124: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io) 2026-02-16T21:19:07.185495359Z I0216 21:19:07.185351 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:19:07.185495359Z [-]backend-http failed: backend reported failure 2026-02-16T21:19:07.185495359Z [-]has-synced failed: Router not synced 2026-02-16T21:19:08.184820630Z I0216 21:19:08.184722 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:19:08.184820630Z [-]backend-http failed: backend reported failure 2026-02-16T21:19:08.184820630Z [-]has-synced failed: Router not synced 2026-02-16T21:19:09.184806948Z I0216 21:19:09.184596 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:19:09.184806948Z [-]backend-http failed: backend reported failure 2026-02-16T21:19:09.184806948Z [-]has-synced failed: Router not synced 2026-02-16T21:19:10.184774205Z I0216 21:19:10.184699 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:19:10.184774205Z [-]backend-http failed: backend reported failure 2026-02-16T21:19:10.184774205Z [-]has-synced failed: Router not synced 2026-02-16T21:19:11.184297331Z I0216 21:19:11.184193 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:19:11.184297331Z [-]backend-http failed: backend reported failure 2026-02-16T21:19:11.184297331Z [-]has-synced failed: Router not synced 2026-02-16T21:19:12.185510351Z I0216 21:19:12.185411 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:19:12.185510351Z [-]backend-http failed: backend reported failure 2026-02-16T21:19:12.185510351Z [-]has-synced failed: Router not synced 2026-02-16T21:19:13.184732349Z I0216 21:19:13.184536 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:19:13.184732349Z [-]backend-http failed: backend reported failure 2026-02-16T21:19:13.184732349Z [-]has-synced failed: Router not synced 2026-02-16T21:19:14.185236250Z I0216 21:19:14.185135 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:19:14.185236250Z [-]backend-http failed: backend reported failure 2026-02-16T21:19:14.185236250Z [-]has-synced failed: Router not synced 2026-02-16T21:19:15.185189767Z I0216 21:19:15.185066 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:19:15.185189767Z [-]backend-http failed: backend reported failure 2026-02-16T21:19:15.185189767Z [-]has-synced failed: Router not synced 2026-02-16T21:19:16.185559566Z I0216 21:19:16.185469 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:19:16.185559566Z [-]backend-http failed: backend reported failure 2026-02-16T21:19:16.185559566Z [-]has-synced failed: Router not synced 2026-02-16T21:19:17.184511687Z I0216 21:19:17.184429 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:19:17.184511687Z [-]backend-http failed: backend reported failure 2026-02-16T21:19:17.184511687Z [-]has-synced failed: Router not synced 2026-02-16T21:19:18.185845689Z I0216 21:19:18.185750 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:19:18.185845689Z [-]backend-http failed: backend reported failure 2026-02-16T21:19:18.185845689Z [-]has-synced failed: Router not synced 2026-02-16T21:19:19.184501674Z I0216 21:19:19.184286 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:19:19.184501674Z [-]backend-http failed: backend reported failure 2026-02-16T21:19:19.184501674Z [-]has-synced failed: Router not synced 2026-02-16T21:19:20.184500592Z I0216 21:19:20.184416 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:19:20.184500592Z [-]backend-http failed: backend reported failure 2026-02-16T21:19:20.184500592Z [-]has-synced failed: Router not synced 2026-02-16T21:19:21.185331962Z I0216 21:19:21.185252 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:19:21.185331962Z [-]backend-http failed: backend reported failure 2026-02-16T21:19:21.185331962Z [-]has-synced failed: Router not synced 2026-02-16T21:19:22.184757966Z I0216 21:19:22.184628 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:19:22.184757966Z [-]backend-http failed: backend reported failure 2026-02-16T21:19:22.184757966Z [-]has-synced failed: Router not synced 2026-02-16T21:19:23.185698258Z I0216 21:19:23.185566 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:19:23.185698258Z [-]backend-http failed: backend reported failure 2026-02-16T21:19:23.185698258Z [-]has-synced failed: Router not synced 2026-02-16T21:19:24.185518622Z I0216 21:19:24.185415 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:19:24.185518622Z [-]backend-http failed: backend reported failure 2026-02-16T21:19:24.185518622Z [-]has-synced failed: Router not synced 2026-02-16T21:19:25.184619437Z I0216 21:19:25.184531 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:19:25.184619437Z [-]backend-http failed: backend reported failure 2026-02-16T21:19:25.184619437Z [-]has-synced failed: Router not synced 2026-02-16T21:19:26.185156840Z I0216 21:19:26.185058 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:19:26.185156840Z [-]backend-http failed: backend reported failure 2026-02-16T21:19:26.185156840Z [-]has-synced failed: Router not synced 2026-02-16T21:19:27.184715767Z I0216 21:19:27.184579 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:19:27.184715767Z [-]backend-http failed: backend reported failure 2026-02-16T21:19:27.184715767Z [-]has-synced failed: Router not synced 2026-02-16T21:19:28.184922720Z I0216 21:19:28.184827 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:19:28.184922720Z [-]backend-http failed: backend reported failure 2026-02-16T21:19:28.184922720Z [-]has-synced failed: Router not synced 2026-02-16T21:19:29.185340969Z I0216 21:19:29.185252 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:19:29.185340969Z [-]backend-http failed: backend reported failure 2026-02-16T21:19:29.185340969Z [-]has-synced failed: Router not synced 2026-02-16T21:19:30.184281580Z I0216 21:19:30.184222 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:19:30.184281580Z [-]backend-http failed: backend reported failure 2026-02-16T21:19:30.184281580Z [-]has-synced failed: Router not synced 2026-02-16T21:19:31.185173642Z I0216 21:19:31.185117 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:19:31.185173642Z [-]backend-http failed: backend reported failure 2026-02-16T21:19:31.185173642Z [-]has-synced failed: Router not synced 2026-02-16T21:19:32.184680837Z I0216 21:19:32.184581 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:19:32.184680837Z [-]backend-http failed: backend reported failure 2026-02-16T21:19:32.184680837Z [-]has-synced failed: Router not synced 2026-02-16T21:19:33.184783748Z I0216 21:19:33.184708 1 healthz.go:255] backend-http,has-synced check failed: healthz 2026-02-16T21:19:33.184783748Z [-]backend-http failed: backend reported failure 2026-02-16T21:19:33.184783748Z [-]has-synced failed: Router not synced 2026-02-16T21:19:33.189776498Z E0216 21:19:33.189743 1 factory.go:130] failed to sync cache for *v1.Route shared informer 2026-02-16T21:19:33.191205665Z I0216 21:19:33.191186 1 template.go:844] "msg"="Shutdown requested, waiting 45s for new connections to cease" "logger"="router" 2026-02-16T21:19:33.195330453Z E0216 21:19:33.195284 1 haproxy.go:418] can't scrape HAProxy: dial unix /var/lib/haproxy/run/haproxy.sock: connect: no such file or directory 2026-02-16T21:19:33.236004534Z I0216 21:19:33.235925 1 router.go:669] "msg"="router reloaded" "logger"="template" "output"=" - Checking http://localhost:80 ...\n - Health check ok : 0 retry attempt(s).\n" 2026-02-16T21:20:18.193823638Z I0216 21:20:18.193702 1 template.go:846] "msg"="Instructing the template router to terminate" "logger"="router" 2026-02-16T21:20:18.216805648Z I0216 21:20:18.216710 1 router.go:669] "msg"="router reloaded" "logger"="template" "output"=" - Shutting down\n" 2026-02-16T21:20:18.217034873Z I0216 21:20:18.216995 1 template.go:850] "msg"="Shutdown complete, exiting" "logger"="router" config/pod/openshift-ingress/router-default-864ddd5f56-z4bnk.json0000640000000000000000000002111315144705173023227 0ustar0000000000000000{"metadata":{"name":"router-default-864ddd5f56-z4bnk","generateName":"router-default-864ddd5f56-","namespace":"openshift-ingress","uid":"c7eddb51-cb37-4dd5-9c24-64cc4ae2e6ee","resourceVersion":"12861","creationTimestamp":"2026-02-16T20:57:31Z","labels":{"ingresscontroller.operator.openshift.io/deployment-ingresscontroller":"default","ingresscontroller.operator.openshift.io/hash":"575d6c6cf5","pod-template-hash":"864ddd5f56"},"annotations":{"openshift.io/required-scc":"hostnetwork","openshift.io/scc":"hostnetwork"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"router-default-864ddd5f56","uid":"b8345006-c234-40d1-bfaa-97a2b776df85","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"default-certificate","secret":{"secretName":"router-certs-default","defaultMode":420}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"defaultMode":420,"optional":false}},{"name":"stats-auth","secret":{"secretName":"router-stats-default","defaultMode":420}},{"name":"metrics-certs","secret":{"secretName":"router-metrics-certs-default","defaultMode":420}},{"name":"kube-api-access-7xgcn","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"router","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb","ports":[{"name":"http","hostPort":80,"containerPort":80,"protocol":"TCP"},{"name":"https","hostPort":443,"containerPort":443,"protocol":"TCP"},{"name":"metrics","hostPort":1936,"containerPort":1936,"protocol":"TCP"}],"env":[{"name":"DEFAULT_CERTIFICATE_DIR","value":"/etc/pki/tls/private"},{"name":"DEFAULT_DESTINATION_CA_PATH","value":"/var/run/configmaps/service-ca/service-ca.crt"},{"name":"RELOAD_INTERVAL","value":"5s"},{"name":"ROUTER_ALLOW_WILDCARD_ROUTES","value":"false"},{"name":"ROUTER_CANONICAL_HOSTNAME","value":"router-default.apps.sno.openstack.lab"},{"name":"ROUTER_CIPHERS","value":"ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384"},{"name":"ROUTER_CIPHERSUITES","value":"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256"},{"name":"ROUTER_DISABLE_HTTP2","value":"true"},{"name":"ROUTER_DISABLE_NAMESPACE_OWNERSHIP_CHECK","value":"false"},{"name":"ROUTER_DOMAIN","value":"apps.sno.openstack.lab"},{"name":"ROUTER_IDLE_CLOSE_ON_RESPONSE","value":"true"},{"name":"ROUTER_LOAD_BALANCE_ALGORITHM","value":"random"},{"name":"ROUTER_METRICS_TLS_CERT_FILE","value":"/etc/pki/tls/metrics-certs/tls.crt"},{"name":"ROUTER_METRICS_TLS_KEY_FILE","value":"/etc/pki/tls/metrics-certs/tls.key"},{"name":"ROUTER_METRICS_TYPE","value":"haproxy"},{"name":"ROUTER_SERVICE_HTTPS_PORT","value":"443"},{"name":"ROUTER_SERVICE_HTTP_PORT","value":"80"},{"name":"ROUTER_SERVICE_NAME","value":"default"},{"name":"ROUTER_SERVICE_NAMESPACE","value":"openshift-ingress"},{"name":"ROUTER_SET_FORWARDED_HEADERS","value":"append"},{"name":"ROUTER_TCP_BALANCE_SCHEME","value":"source"},{"name":"ROUTER_THREADS","value":"4"},{"name":"SSL_MIN_VERSION","value":"TLSv1.2"},{"name":"STATS_PASSWORD_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsPassword"},{"name":"STATS_PORT","value":"1936"},{"name":"STATS_USERNAME_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsUsername"}],"resources":{"requests":{"cpu":"100m","memory":"256Mi"}},"volumeMounts":[{"name":"default-certificate","readOnly":true,"mountPath":"/etc/pki/tls/private"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca"},{"name":"stats-auth","readOnly":true,"mountPath":"/var/lib/haproxy/conf/metrics-auth"},{"name":"metrics-certs","readOnly":true,"mountPath":"/etc/pki/tls/metrics-certs"},{"name":"kube-api-access-7xgcn","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3,"terminationGracePeriodSeconds":10},"readinessProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":1,"successThreshold":1,"failureThreshold":120},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000660000,"runAsNonRoot":true,"readOnlyRootFilesystem":false,"allowPrivilegeEscalation":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":3600,"dnsPolicy":"ClusterFirstWithHostNet","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"router","serviceAccount":"router","nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c26,c5"},"supplementalGroups":[1000660000],"fsGroup":1000660000},"schedulerName":"default-scheduler","tolerations":[{"key":"kubernetes.io/e2e-evict-taint-key","operator":"Equal","value":"evictTaintVal","effect":"NoExecute"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority","topologySpreadConstraints":[{"maxSkew":1,"topologyKey":"topology.kubernetes.io/zone","whenUnsatisfiable":"ScheduleAnyway","labelSelector":{"matchExpressions":[{"key":"ingresscontroller.operator.openshift.io/hash","operator":"In","values":["575d6c6cf5"]}]}}]},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:06:28Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:06:24Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:06:24Z","reason":"ContainersNotReady","message":"containers with unready status: [router]"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:06:24Z","reason":"ContainersNotReady","message":"containers with unready status: [router]"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:06:24Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-16T21:06:24Z","containerStatuses":[{"name":"router","state":{"running":{"startedAt":"2026-02-16T21:20:19Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-16T21:17:33Z","finishedAt":"2026-02-16T21:20:19Z","containerID":"cri-o://2d8a3bac5bc14187e5d2a390ac77e494ae47030d02fa35967ecd1bb1934d32e8"}},"ready":false,"restartCount":5,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb","containerID":"cri-o://7eb9d606c0ba4432a3c104c5bb2952f3efa3dee4e29f1c0d81a5b0db607ceac8","started":false,"volumeMounts":[{"name":"default-certificate","mountPath":"/etc/pki/tls/private","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca-bundle","mountPath":"/var/run/configmaps/service-ca","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"stats-auth","mountPath":"/var/lib/haproxy/conf/metrics-auth","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"metrics-certs","mountPath":"/etc/pki/tls/metrics-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-7xgcn","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}authentication-operator_current.log0000640000000000000000000003062615144705173037156 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-755d954778-8gnq52026-02-16T21:17:01.877559907Z Copying system trust bundle 2026-02-16T21:17:01.970518113Z W0216 21:17:01.970454 1 cmd.go:167] Unable to read initial content of "/tmp/terminate": open /tmp/terminate: no such file or directory 2026-02-16T21:17:01.971237932Z I0216 21:17:01.971196 1 observer_polling.go:159] Starting file observer 2026-02-16T21:17:01.971284813Z I0216 21:17:01.971271 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-16T21:17:01.971390445Z I0216 21:17:01.971331 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-16T21:17:01.974604830Z I0216 21:17:01.974497 1 observer_polling.go:159] Starting file observer 2026-02-16T21:17:01.990141135Z I0216 21:17:01.990096 1 builder.go:304] cluster-authentication-operator version - 2026-02-16T21:17:01.990851243Z I0216 21:17:01.990810 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-16T21:17:02.284334893Z I0216 21:17:02.284258 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-02-16T21:17:02.288032399Z I0216 21:17:02.287990 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-02-16T21:17:02.288032399Z I0216 21:17:02.288016 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-02-16T21:17:02.288050191Z I0216 21:17:02.288038 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-02-16T21:17:02.288050191Z I0216 21:17:02.288044 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-02-16T21:17:02.292140466Z I0216 21:17:02.292108 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-16T21:17:02.292140466Z W0216 21:17:02.292124 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-16T21:17:02.292140466Z I0216 21:17:02.292125 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-02-16T21:17:02.292140466Z W0216 21:17:02.292129 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-16T21:17:02.292160887Z W0216 21:17:02.292139 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-16T21:17:02.292160887Z W0216 21:17:02.292144 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-16T21:17:02.292160887Z W0216 21:17:02.292148 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-16T21:17:02.292160887Z W0216 21:17:02.292151 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-16T21:17:02.294379805Z I0216 21:17:02.294346 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-16T21:17:02.294430816Z I0216 21:17:02.294413 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-16T21:17:02.294430816Z I0216 21:17:02.294406 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-16T21:17:02.294454507Z I0216 21:17:02.294439 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T21:17:02.294494608Z I0216 21:17:02.294406 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-16T21:17:02.294526509Z I0216 21:17:02.294515 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T21:17:02.294622071Z I0216 21:17:02.294599 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-16T21:17:02.294622071Z I0216 21:17:02.294614 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-16T21:17:02.294722424Z I0216 21:17:02.294698 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771275432\" (2026-02-16 20:57:15 +0000 UTC to 2028-02-16 20:57:16 +0000 UTC (now=2026-02-16 21:17:02.294614051 +0000 UTC))" 2026-02-16T21:17:02.294789076Z I0216 21:17:02.294754 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-16T21:17:02.294889268Z I0216 21:17:02.294866 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771276622\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771276622\" (2026-02-16 20:17:01 +0000 UTC to 2027-02-16 20:17:01 +0000 UTC (now=2026-02-16 21:17:02.294843577 +0000 UTC))" 2026-02-16T21:17:02.294899048Z I0216 21:17:02.294891 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-16T21:17:02.294931229Z I0216 21:17:02.294915 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-02-16T21:17:02.294964180Z I0216 21:17:02.294944 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-16T21:17:02.294999451Z I0216 21:17:02.294978 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-16T21:17:02.295237388Z I0216 21:17:02.295210 1 leaderelection.go:254] attempting to acquire leader lease openshift-authentication-operator/cluster-authentication-operator-lock... 2026-02-16T21:17:02.297818404Z I0216 21:17:02.297781 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/authentication/request/headerrequest/requestheader_controller.go:175 2026-02-16T21:17:02.298080812Z I0216 21:17:02.298022 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2026-02-16T21:17:02.298080812Z I0216 21:17:02.298053 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2026-02-16T21:17:02.395619767Z I0216 21:17:02.395542 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-16T21:17:02.395619767Z I0216 21:17:02.395581 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T21:17:02.395726130Z I0216 21:17:02.395702 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T21:17:02.395948826Z I0216 21:17:02.395912 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-16 20:47:20 +0000 UTC to 2026-02-17 20:47:20 +0000 UTC (now=2026-02-16 21:17:02.395881355 +0000 UTC))" 2026-02-16T21:17:02.396109171Z I0216 21:17:02.396079 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771275432\" (2026-02-16 20:57:15 +0000 UTC to 2028-02-16 20:57:16 +0000 UTC (now=2026-02-16 21:17:02.396059519 +0000 UTC))" 2026-02-16T21:17:02.396241814Z I0216 21:17:02.396212 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771276622\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771276622\" (2026-02-16 20:17:01 +0000 UTC to 2027-02-16 20:17:01 +0000 UTC (now=2026-02-16 21:17:02.396197403 +0000 UTC))" 2026-02-16T21:17:02.396724366Z I0216 21:17:02.396689 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-02-16 20:40:33 +0000 UTC to 2036-02-14 20:40:33 +0000 UTC (now=2026-02-16 21:17:02.396664645 +0000 UTC))" 2026-02-16T21:17:02.396738437Z I0216 21:17:02.396727 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-02-16 20:47:22 +0000 UTC to 2026-02-17 20:47:22 +0000 UTC (now=2026-02-16 21:17:02.396705666 +0000 UTC))" 2026-02-16T21:17:02.397027464Z I0216 21:17:02.396908 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-02-16 20:47:22 +0000 UTC to 2027-02-16 20:47:22 +0000 UTC (now=2026-02-16 21:17:02.396735256 +0000 UTC))" 2026-02-16T21:17:02.397027464Z I0216 21:17:02.397003 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-02-16 20:47:22 +0000 UTC to 2027-02-16 20:47:22 +0000 UTC (now=2026-02-16 21:17:02.396958012 +0000 UTC))" 2026-02-16T21:17:02.397042344Z I0216 21:17:02.397030 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-02-16 20:47:20 +0000 UTC to 2036-02-14 20:47:20 +0000 UTC (now=2026-02-16 21:17:02.397014534 +0000 UTC))" 2026-02-16T21:17:02.397088425Z I0216 21:17:02.397066 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-16 20:47:20 +0000 UTC to 2026-02-17 20:47:20 +0000 UTC (now=2026-02-16 21:17:02.397041374 +0000 UTC))" 2026-02-16T21:17:02.397349333Z I0216 21:17:02.397328 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771275432\" (2026-02-16 20:57:15 +0000 UTC to 2028-02-16 20:57:16 +0000 UTC (now=2026-02-16 21:17:02.397301632 +0000 UTC))" 2026-02-16T21:17:02.397480366Z I0216 21:17:02.397463 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771276622\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771276622\" (2026-02-16 20:17:01 +0000 UTC to 2027-02-16 20:17:01 +0000 UTC (now=2026-02-16 21:17:02.397450376 +0000 UTC))" authentication-operator_previous.log0000640000000000000000000003543115144705173037347 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-755d954778-8gnq52026-02-16T21:06:52.964220954Z Copying system trust bundle 2026-02-16T21:06:53.050205550Z W0216 21:06:53.050091 1 cmd.go:167] Unable to read initial content of "/tmp/terminate": open /tmp/terminate: no such file or directory 2026-02-16T21:06:53.050401325Z I0216 21:06:53.050333 1 observer_polling.go:159] Starting file observer 2026-02-16T21:06:53.050709284Z I0216 21:06:53.050666 1 cmd.go:253] Using service-serving-cert provided certificates 2026-02-16T21:06:53.050734004Z I0216 21:06:53.050700 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-02-16T21:06:53.051224717Z I0216 21:06:53.051168 1 observer_polling.go:159] Starting file observer 2026-02-16T21:06:53.072705142Z I0216 21:06:53.072568 1 builder.go:304] cluster-authentication-operator version - 2026-02-16T21:06:53.073836133Z I0216 21:06:53.073754 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-16T21:06:53.461392438Z I0216 21:06:53.461314 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-02-16T21:06:53.468237317Z I0216 21:06:53.468151 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-02-16T21:06:53.468237317Z I0216 21:06:53.468188 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-02-16T21:06:53.468237317Z I0216 21:06:53.468221 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-02-16T21:06:53.468237317Z I0216 21:06:53.468230 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-02-16T21:06:53.473742179Z I0216 21:06:53.473684 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-02-16T21:06:53.473742179Z W0216 21:06:53.473717 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-16T21:06:53.473742179Z W0216 21:06:53.473724 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-02-16T21:06:53.473742179Z I0216 21:06:53.473726 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-02-16T21:06:53.473833652Z W0216 21:06:53.473733 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-02-16T21:06:53.473833652Z W0216 21:06:53.473763 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-02-16T21:06:53.473833652Z W0216 21:06:53.473772 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-02-16T21:06:53.473833652Z W0216 21:06:53.473780 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-02-16T21:06:53.477448972Z I0216 21:06:53.477407 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-02-16T21:06:53.477475853Z I0216 21:06:53.477461 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-02-16T21:06:53.477540964Z I0216 21:06:53.477505 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-02-16T21:06:53.477540964Z I0216 21:06:53.477532 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T21:06:53.477586786Z I0216 21:06:53.477560 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-02-16T21:06:53.477586786Z I0216 21:06:53.477578 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T21:06:53.477904104Z I0216 21:06:53.477863 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771275432\" (2026-02-16 20:57:15 +0000 UTC to 2028-02-16 20:57:16 +0000 UTC (now=2026-02-16 21:06:53.477798401 +0000 UTC))" 2026-02-16T21:06:53.477904104Z I0216 21:06:53.477888 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-02-16T21:06:53.477929345Z I0216 21:06:53.477907 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-02-16T21:06:53.478164791Z I0216 21:06:53.478100 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771276013\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771276013\" (2026-02-16 20:06:53 +0000 UTC to 2027-02-16 20:06:53 +0000 UTC (now=2026-02-16 21:06:53.478045548 +0000 UTC))" 2026-02-16T21:06:53.478164791Z I0216 21:06:53.478124 1 secure_serving.go:213] Serving securely on [::]:8443 2026-02-16T21:06:53.478164791Z I0216 21:06:53.478157 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-02-16T21:06:53.478217642Z I0216 21:06:53.478188 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-02-16T21:06:53.478377867Z I0216 21:06:53.478344 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-02-16T21:06:53.478432479Z I0216 21:06:53.478408 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-02-16T21:06:53.479017515Z I0216 21:06:53.478992 1 leaderelection.go:254] attempting to acquire leader lease openshift-authentication-operator/cluster-authentication-operator-lock... 2026-02-16T21:06:53.480185818Z I0216 21:06:53.480147 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/authentication/request/headerrequest/requestheader_controller.go:175 2026-02-16T21:06:53.480832855Z I0216 21:06:53.480768 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2026-02-16T21:06:53.480945148Z I0216 21:06:53.480917 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2026-02-16T21:06:53.578442421Z I0216 21:06:53.578336 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-02-16T21:06:53.578442421Z I0216 21:06:53.578416 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-02-16T21:06:53.578493693Z I0216 21:06:53.578451 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-02-16T21:06:53.578778650Z I0216 21:06:53.578735 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-16 20:47:20 +0000 UTC to 2026-02-17 20:47:20 +0000 UTC (now=2026-02-16 21:06:53.578629236 +0000 UTC))" 2026-02-16T21:06:53.579010247Z I0216 21:06:53.578961 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771275432\" (2026-02-16 20:57:15 +0000 UTC to 2028-02-16 20:57:16 +0000 UTC (now=2026-02-16 21:06:53.578937975 +0000 UTC))" 2026-02-16T21:06:53.579172971Z I0216 21:06:53.579127 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771276013\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771276013\" (2026-02-16 20:06:53 +0000 UTC to 2027-02-16 20:06:53 +0000 UTC (now=2026-02-16 21:06:53.579109569 +0000 UTC))" 2026-02-16T21:06:53.579319706Z I0216 21:06:53.579277 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-02-16 20:40:33 +0000 UTC to 2036-02-14 20:40:33 +0000 UTC (now=2026-02-16 21:06:53.579257854 +0000 UTC))" 2026-02-16T21:06:53.579336756Z I0216 21:06:53.579323 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-02-16 20:47:22 +0000 UTC to 2026-02-17 20:47:22 +0000 UTC (now=2026-02-16 21:06:53.579293515 +0000 UTC))" 2026-02-16T21:06:53.579376768Z I0216 21:06:53.579350 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-02-16 20:47:22 +0000 UTC to 2027-02-16 20:47:22 +0000 UTC (now=2026-02-16 21:06:53.579332366 +0000 UTC))" 2026-02-16T21:06:53.579414299Z I0216 21:06:53.579378 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-02-16 20:47:22 +0000 UTC to 2027-02-16 20:47:22 +0000 UTC (now=2026-02-16 21:06:53.579359577 +0000 UTC))" 2026-02-16T21:06:53.579464410Z I0216 21:06:53.579416 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-02-16 20:47:20 +0000 UTC to 2036-02-14 20:47:20 +0000 UTC (now=2026-02-16 21:06:53.579398688 +0000 UTC))" 2026-02-16T21:06:53.579552902Z I0216 21:06:53.579519 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-16 20:47:20 +0000 UTC to 2026-02-17 20:47:20 +0000 UTC (now=2026-02-16 21:06:53.57946049 +0000 UTC))" 2026-02-16T21:06:53.579771128Z I0216 21:06:53.579721 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1771275432\" (2026-02-16 20:57:15 +0000 UTC to 2028-02-16 20:57:16 +0000 UTC (now=2026-02-16 21:06:53.579703476 +0000 UTC))" 2026-02-16T21:06:53.579950383Z I0216 21:06:53.579905 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771276013\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771276013\" (2026-02-16 20:06:53 +0000 UTC to 2027-02-16 20:06:53 +0000 UTC (now=2026-02-16 21:06:53.579885741 +0000 UTC))" 2026-02-16T21:12:27.455576066Z E0216 21:12:27.455405 1 leaderelection.go:436] error retrieving resource lock openshift-authentication-operator/cluster-authentication-operator-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io cluster-authentication-operator-lock) 2026-02-16T21:14:26.917919649Z I0216 21:14:26.917841 1 leaderelection.go:268] successfully acquired lease openshift-authentication-operator/cluster-authentication-operator-lock 2026-02-16T21:14:26.918378582Z I0216 21:14:26.918305 1 event.go:377] Event(v1.ObjectReference{Kind:"Lease", Namespace:"openshift-authentication-operator", Name:"cluster-authentication-operator-lock", UID:"38050c5a-7da1-4805-8b09-f8d0eb2f9d96", APIVersion:"coordination.k8s.io/v1", ResourceVersion:"11724", FieldPath:""}): type: 'Normal' reason: 'LeaderElection' authentication-operator-755d954778-8gnq5_e8a95435-eb0c-42aa-a326-d8b37e72c096 became leader 2026-02-16T21:15:00.921774117Z E0216 21:15:00.921708 1 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{cluster-authentication-operator-lock.1894d68fe1a4c8b1 openshift-authentication-operator 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Lease,Namespace:openshift-authentication-operator,Name:cluster-authentication-operator-lock,UID:38050c5a-7da1-4805-8b09-f8d0eb2f9d96,APIVersion:coordination.k8s.io/v1,ResourceVersion:11724,FieldPath:,},Reason:LeaderElection,Message:authentication-operator-755d954778-8gnq5_e8a95435-eb0c-42aa-a326-d8b37e72c096 became leader,Source:EventSource{Component:cluster-authentication-operator,Host:,},FirstTimestamp:2026-02-16 21:14:26.917787825 +0000 UTC m=+453.941540969,LastTimestamp:2026-02-16 21:14:26.917787825 +0000 UTC m=+453.941540969,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cluster-authentication-operator,ReportingInstance:,}" 2026-02-16T21:15:26.920959208Z W0216 21:15:26.920802 1 builder.go:136] graceful termination failed, controllers failed with error: the server was unable to return a response in the time allotted, but may still be processing the request (get clusteroperators.config.openshift.io authentication) config/pod/openshift-authentication-operator/authentication-operator-755d954778-8gnq5.json0000640000000000000000000002217715144705173030051 0ustar0000000000000000{"metadata":{"name":"authentication-operator-755d954778-8gnq5","generateName":"authentication-operator-755d954778-","namespace":"openshift-authentication-operator","uid":"27c20f63-9bfb-4703-94d5-0c65475e08d1","resourceVersion":"12282","creationTimestamp":"2026-02-16T20:55:40Z","labels":{"app":"authentication-operator","pod-template-hash":"755d954778"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.15/23\"],\"mac_address\":\"0a:58:0a:80:00:0f\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.15/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.15\"\n ],\n \"mac\": \"0a:58:0a:80:00:0f\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"authentication-operator-755d954778","uid":"5ae4f2e7-8baa-425a-82e5-63922db879c0","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config","configMap":{"name":"authentication-operator-config","defaultMode":440}},{"name":"trusted-ca-bundle","configMap":{"name":"trusted-ca-bundle","defaultMode":420,"optional":true}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","defaultMode":420,"optional":true}},{"name":"kube-api-access-hjsnz","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"authentication-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963","command":["/bin/bash","-ec"],"args":["if [ -s /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\nexec authentication-operator operator --config=/var/run/configmaps/config/operator-config.yaml --v=2 --terminate-on-files=/var/run/configmaps/trusted-ca-bundle/ca-bundle.crt --terminate-on-files=/tmp/terminate\n"],"env":[{"name":"IMAGE_OAUTH_SERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2969828f1fcae82b7ef16d3588046ace3cf51b9ea578658c42475386e0ee1fc7"},{"name":"IMAGE_OAUTH_APISERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"},{"name":"OPERAND_OAUTH_SERVER_IMAGE_VERSION","value":"4.18.32_openshift"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"20m","memory":"200Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/trusted-ca-bundle"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca-bundle"},{"name":"kube-api-access-hjsnz","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]},"runAsUser":0,"readOnlyRootFilesystem":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"authentication-operator","serviceAccount":"authentication-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c16,c5"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:09Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:56:58Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:17:02Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:17:02Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:56:57Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.15","podIPs":[{"ip":"10.128.0.15"}],"startTime":"2026-02-16T20:56:58Z","containerStatuses":[{"name":"authentication-operator","state":{"running":{"startedAt":"2026-02-16T21:17:01Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"l be processing the request (get leases.coordination.k8s.io cluster-authentication-operator-lock)\nI0216 21:14:26.917841 1 leaderelection.go:268] successfully acquired lease openshift-authentication-operator/cluster-authentication-operator-lock\nI0216 21:14:26.918305 1 event.go:377] Event(v1.ObjectReference{Kind:\"Lease\", Namespace:\"openshift-authentication-operator\", Name:\"cluster-authentication-operator-lock\", UID:\"38050c5a-7da1-4805-8b09-f8d0eb2f9d96\", APIVersion:\"coordination.k8s.io/v1\", ResourceVersion:\"11724\", FieldPath:\"\"}): type: 'Normal' reason: 'LeaderElection' authentication-operator-755d954778-8gnq5_e8a95435-eb0c-42aa-a326-d8b37e72c096 became leader\nE0216 21:15:00.921708 1 event.go:359] \"Server rejected event (will not retry!)\" err=\"Timeout: request did not complete within requested timeout - context deadline exceeded\" event=\"\u0026Event{ObjectMeta:{cluster-authentication-operator-lock.1894d68fe1a4c8b1 openshift-authentication-operator 0 0001-01-01 00:00:00 +0000 UTC \u003cnil\u003e \u003cnil\u003e map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Lease,Namespace:openshift-authentication-operator,Name:cluster-authentication-operator-lock,UID:38050c5a-7da1-4805-8b09-f8d0eb2f9d96,APIVersion:coordination.k8s.io/v1,ResourceVersion:11724,FieldPath:,},Reason:LeaderElection,Message:authentication-operator-755d954778-8gnq5_e8a95435-eb0c-42aa-a326-d8b37e72c096 became leader,Source:EventSource{Component:cluster-authentication-operator,Host:,},FirstTimestamp:2026-02-16 21:14:26.917787825 +0000 UTC m=+453.941540969,LastTimestamp:2026-02-16 21:14:26.917787825 +0000 UTC m=+453.941540969,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cluster-authentication-operator,ReportingInstance:,}\"\nW0216 21:15:26.920802 1 builder.go:136] graceful termination failed, controllers failed with error: the server was unable to return a response in the time allotted, but may still be processing the request (get clusteroperators.config.openshift.io authentication)\n","startedAt":"2026-02-16T21:06:52Z","finishedAt":"2026-02-16T21:15:26Z","containerID":"cri-o://cbff59f9a87f22154ac16be0a1fd4153598047d145747da8c5ad418b6de5b9ba"}},"ready":true,"restartCount":7,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963","containerID":"cri-o://472d6ea4b832d6dda5b947964aa6ee6e541f575109f7f54f510a3c8f6075fe63","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","mountPath":"/var/run/configmaps/trusted-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca-bundle","mountPath":"/var/run/configmaps/service-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-hjsnz","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}events/openshift-operator-lifecycle-manager.json0000640000000000000000000006641015144705173020652 0ustar0000000000000000{"items":[{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:52:13Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:52:24Z","reason":"ScalingReplicaSet","message":"Scaled up replica set package-server-manager-5c696dbdcd to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:52:26Z","reason":"ScalingReplicaSet","message":"Scaled up replica set catalog-operator-588944557d to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:52:26Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-5c696dbdcd-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:52:26Z","reason":"ScalingReplicaSet","message":"Scaled up replica set olm-operator-6b56bd877c to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:52:26Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-6b56bd877c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:52:26Z","reason":"FailedCreate","message":"Error creating: pods \"catalog-operator-588944557d-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:55:34Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:55:37Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-6b56bd877c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:55:37Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-5c696dbdcd-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:55:37Z","reason":"FailedCreate","message":"Error creating: pods \"catalog-operator-588944557d-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:55:39Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:55:39Z","reason":"SuccessfulCreate","message":"Created pod: catalog-operator-588944557d-h7xl6","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:55:39Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:55:39Z","reason":"SuccessfulCreate","message":"Created pod: package-server-manager-5c696dbdcd-9m94g","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:55:39Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:55:39Z","reason":"SuccessfulCreate","message":"Created pod: olm-operator-6b56bd877c-vlhvq","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:56:57Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/package-server-manager-5c696dbdcd-9m94g to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:56:57Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/olm-operator-6b56bd877c-vlhvq to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:56:57Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/catalog-operator-588944557d-h7xl6 to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:57:05Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"catalog-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:57:05Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:57:05Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:57:25Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"catalog-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:57:25Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:57:25Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:57:42Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:57:42Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.22/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:57:42Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:57:42Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:57:42Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:57:42Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:57:42Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:57:42Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.14/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:57:42Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.20/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:57:51Z","reason":"Created","message":"Created container: catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:57:51Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c\" in 9.301s (9.301s including waiting). Image size: 857432360 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:57:51Z","reason":"Started","message":"Started container olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:57:51Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c\" in 9.469s (9.469s including waiting). Image size: 857432360 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:57:51Z","reason":"Created","message":"Created container: olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:57:51Z","reason":"Started","message":"Started container catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:57:51Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c\" in 9.398s (9.398s including waiting). Image size: 857432360 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:57:52Z","reason":"LeaderElection","message":"package-server-manager-5c696dbdcd-9m94g_1513cc4c-a07c-4493-99f8-75f843f7b591 became leader","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:57:53Z","reason":"NoOperatorGroup","message":"csv in namespace with no operatorgroups","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:58:01Z","reason":"RequirementsUnknown","message":"InstallModes now support target namespaces","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:58:03Z","reason":"SuccessfulCreate","message":"Created pod: packageserver-78d4b6b677-npmx4","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:58:03Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/packageserver-78d4b6b677-npmx4 to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:58:03Z","reason":"ScalingReplicaSet","message":"Scaled up replica set packageserver-78d4b6b677 to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T20:59:17Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_packageserver-78d4b6b677-npmx4_openshift-operator-lifecycle-manager_319dc882-e1f5-40f9-99f4-2bae028337e5_0(a2bfde703fc059984b6dd18b3d7bbcdde4a356b76599a80d79a4e894e5ea2432): error adding pod openshift-operator-lifecycle-manager_packageserver-78d4b6b677-npmx4 to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"a2bfde703fc059984b6dd18b3d7bbcdde4a356b76599a80d79a4e894e5ea2432\" Netns:\"/var/run/netns/15f4adda-761d-4dea-a261-539075462cc6\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-operator-lifecycle-manager;K8S_POD_NAME=packageserver-78d4b6b677-npmx4;K8S_POD_INFRA_CONTAINER_ID=a2bfde703fc059984b6dd18b3d7bbcdde4a356b76599a80d79a4e894e5ea2432;K8S_POD_UID=319dc882-e1f5-40f9-99f4-2bae028337e5\" Path:\"\" ERRORED: error configuring pod [openshift-operator-lifecycle-manager/packageserver-78d4b6b677-npmx4] networking: Multus: [openshift-operator-lifecycle-manager/packageserver-78d4b6b677-npmx4/319dc882-e1f5-40f9-99f4-2bae028337e5]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod packageserver-78d4b6b677-npmx4 in out of cluster comm: SetNetworkStatus: failed to update the pod packageserver-78d4b6b677-npmx4 in out of cluster comm: status update failed for pod /: Get \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-operator-lifecycle-manager/pods/packageserver-78d4b6b677-npmx4?timeout=1m0s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:00:18Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_packageserver-78d4b6b677-npmx4_openshift-operator-lifecycle-manager_319dc882-e1f5-40f9-99f4-2bae028337e5_0(52cca691f67d0d082671dad0dab6ebb77bf536eb7470afd44f2253d4a32a6833): error adding pod openshift-operator-lifecycle-manager_packageserver-78d4b6b677-npmx4 to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"52cca691f67d0d082671dad0dab6ebb77bf536eb7470afd44f2253d4a32a6833\" Netns:\"/var/run/netns/12efe8d7-d340-47f0-8330-fd6898846acb\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-operator-lifecycle-manager;K8S_POD_NAME=packageserver-78d4b6b677-npmx4;K8S_POD_INFRA_CONTAINER_ID=52cca691f67d0d082671dad0dab6ebb77bf536eb7470afd44f2253d4a32a6833;K8S_POD_UID=319dc882-e1f5-40f9-99f4-2bae028337e5\" Path:\"\" ERRORED: error configuring pod [openshift-operator-lifecycle-manager/packageserver-78d4b6b677-npmx4] networking: Multus: [openshift-operator-lifecycle-manager/packageserver-78d4b6b677-npmx4/319dc882-e1f5-40f9-99f4-2bae028337e5]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod packageserver-78d4b6b677-npmx4 in out of cluster comm: SetNetworkStatus: failed to update the pod packageserver-78d4b6b677-npmx4 in out of cluster comm: status update failed for pod /: Get \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-operator-lifecycle-manager/pods/packageserver-78d4b6b677-npmx4?timeout=1m0s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:01:20Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_packageserver-78d4b6b677-npmx4_openshift-operator-lifecycle-manager_319dc882-e1f5-40f9-99f4-2bae028337e5_0(810e7b23c87f0b52ffe134543668db5cdf13630f25d221830dba8e2ed8de4cce): error adding pod openshift-operator-lifecycle-manager_packageserver-78d4b6b677-npmx4 to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"810e7b23c87f0b52ffe134543668db5cdf13630f25d221830dba8e2ed8de4cce\" Netns:\"/var/run/netns/c324e400-c9f8-42d7-92d7-2dc198b86bea\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-operator-lifecycle-manager;K8S_POD_NAME=packageserver-78d4b6b677-npmx4;K8S_POD_INFRA_CONTAINER_ID=810e7b23c87f0b52ffe134543668db5cdf13630f25d221830dba8e2ed8de4cce;K8S_POD_UID=319dc882-e1f5-40f9-99f4-2bae028337e5\" Path:\"\" ERRORED: error configuring pod [openshift-operator-lifecycle-manager/packageserver-78d4b6b677-npmx4] networking: Multus: [openshift-operator-lifecycle-manager/packageserver-78d4b6b677-npmx4/319dc882-e1f5-40f9-99f4-2bae028337e5]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod packageserver-78d4b6b677-npmx4 in out of cluster comm: SetNetworkStatus: failed to update the pod packageserver-78d4b6b677-npmx4 in out of cluster comm: status update failed for pod /: Get \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-operator-lifecycle-manager/pods/packageserver-78d4b6b677-npmx4?timeout=1m0s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:02:35Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.64/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:03:31Z","reason":"ProbeError","message":"Liveness probe error: Get \"http://10.128.0.20:8080/healthz\": dial tcp 10.128.0.20:8080: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:03:31Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"http://10.128.0.20:8080/healthz\": dial tcp 10.128.0.20:8080: connect: connection refused","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:03:31Z","reason":"ProbeError","message":"Readiness probe error: Get \"http://10.128.0.20:8080/healthz\": dial tcp 10.128.0.20:8080: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:03:31Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"http://10.128.0.20:8080/healthz\": dial tcp 10.128.0.20:8080: connect: connection refused","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:03:33Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:03:34Z","reason":"Created","message":"Created container: packageserver","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:03:34Z","reason":"Started","message":"Started container packageserver","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:03:44Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"https://10.128.0.64:5443/healthz\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:03:44Z","reason":"ProbeError","message":"Readiness probe error: Get \"https://10.128.0.64:5443/healthz\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)\nbody: \n","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:04:04Z","reason":"Killing","message":"Container packageserver failed liveness probe, will be restarted","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:04:04Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.64:5443/healthz\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:04:04Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.64:5443/healthz\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)\nbody: \n","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:04:05Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"https://10.128.0.64:5443/healthz\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:04:05Z","reason":"ProbeError","message":"Readiness probe error: Get \"https://10.128.0.64:5443/healthz\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)\nbody: \n","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:06:19Z","reason":"SuccessfulCreate","message":"Created pod: collect-profiles-29521260-fx98d","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:06:19Z","reason":"SuccessfulCreate","message":"Created job collect-profiles-29521260","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:06:25Z","reason":"Started","message":"Started container collect-profiles","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:06:25Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.71/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:06:25Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:06:25Z","reason":"Created","message":"Created container: collect-profiles","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:06:30Z","reason":"Completed","message":"Job completed","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:06:30Z","reason":"SawCompletedJob","message":"Saw completed job: collect-profiles-29521260, condition: Complete","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:09:51Z","reason":"LeaderElection","message":"package-server-manager-5c696dbdcd-9m94g_1da3894e-0c77-416c-bd14-6b9497ae9d8f became leader","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:13:32Z","reason":"BackOff","message":"Back-off restarting failed container package-server-manager in pod package-server-manager-5c696dbdcd-9m94g_openshift-operator-lifecycle-manager(4b035e85-b2b0-4dee-bb86-3465fc4b98a8)","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:13:47Z","reason":"Started","message":"Started container package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:13:47Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:13:47Z","reason":"Created","message":"Created container: package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:17:01Z","reason":"LeaderElection","message":"package-server-manager-5c696dbdcd-9m94g_cc718aa1-887d-4885-b4aa-94c5f7a3f0e3 became leader","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:19:57Z","reason":"SuccessfulCreate","message":"Created job collect-profiles-29521275","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:19:57Z","reason":"SuccessfulCreate","message":"Created pod: collect-profiles-29521275-fl78b","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:19:58Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.80/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:19:58Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:19:58Z","reason":"Started","message":"Started container collect-profiles","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:19:58Z","reason":"Created","message":"Created container: collect-profiles","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:20:01Z","reason":"SawCompletedJob","message":"Saw completed job: collect-profiles-29521275, condition: Complete","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:20:01Z","reason":"Completed","message":"Job completed","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:20:52Z","reason":"InstallCheckFailed","message":"install timeout","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:20:52Z","reason":"NeedsReinstall","message":"apiServices not installed","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:20:53Z","reason":"AllRequirementsMet","message":"all requirements found, attempting install","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:20:53Z","reason":"InstallSucceeded","message":"waiting for install components to report healthy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-02-16T21:20:53Z","reason":"InstallWaiting","message":"apiServices not installed","type":"Normal"}]}events/openshift-etcd-operator.json0000640000000000000000000006277215144705173016231 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:52:11Z","reason":"ScalingReplicaSet","message":"Scaled up replica set etcd-operator-67bf55ccdd to 1","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:52:21Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-67bf55ccdd-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:55:36Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-67bf55ccdd-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:55:38Z","reason":"SuccessfulCreate","message":"Created pod: etcd-operator-67bf55ccdd-8cllz","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:55:38Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:56:57Z","reason":"Scheduled","message":"Successfully assigned openshift-etcd-operator/etcd-operator-67bf55ccdd-8cllz to master-0","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:56:58Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.10/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:56:58Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:57:07Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399\" in 8.693s (8.693s including waiting). Image size: 513211213 bytes.","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:57:12Z","reason":"OperatorVersionChanged","message":"clusteroperator/etcd version \"raw-internal\" changed from \"\" to \"4.18.32\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:57:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\" to \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\\nScriptControllerDegraded: \\\"configmap/etcd-pod\\\": missing env var values\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:57:12Z","reason":"LeaderElection","message":"etcd-operator-67bf55ccdd-8cllz_764a4a2a-1698-4da5-9fef-b23e057136af became leader","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:57:12Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:57:12Z","reason":"ReportEtcdMembersErrorUpdatingStatus","message":"etcds.operator.openshift.io \"cluster\" not found","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:57:12Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:57:12Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:57:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded set to False (\"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"raw-internal\" \"4.18.32\"}]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:57:13Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:57:13Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:57:13Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\\nScriptControllerDegraded: \\\"configmap/etcd-pod\\\": missing env var values\" to \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: configmaps lister not synced\\nScriptControllerDegraded: \\\"configmap/etcd-pod\\\": missing env var values\\nNodeControllerDegraded: All master nodes are ready\",Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:57:13Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"controlPlane\": map[string]any{\"replicas\": float64(1)},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:57:15Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/etcd-ca-bundle -n openshift-etcd-operator:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:57:15Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: etcd-all-bundles-0,etcd-endpoints-0,etcd-pod-0, secrets: etcd-all-certs-0","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:57:15Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:57:15Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-etcd-installer because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:57:15Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:57:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-ca-bundle -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:57:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:57:17Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/etcd-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:57:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-config-v1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:57:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-metric-serving-ca -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:57:19Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:57:19Z","reason":"ServiceUpdated","message":"Updated Service/etcd -n openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:57:19Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd-minimal -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:57:21Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:57:21Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"etcd-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:57:21Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-scripts -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:57:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:57:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/restore-etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:57:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-endpoints-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:57:26Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-all-bundles-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T20:57:27Z","reason":"SecretCreated","message":"Created Secret/etcd-all-certs-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T21:03:46Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.10:8443/healthz\": dial tcp 10.128.0.10:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T21:03:46Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.10:8443/healthz\": dial tcp 10.128.0.10:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T21:04:56Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.10:8443/healthz\": net/http: TLS handshake timeout\nbody: \n","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T21:04:56Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.10:8443/healthz\": net/http: TLS handshake timeout","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T21:04:56Z","reason":"Killing","message":"Container etcd-operator failed liveness probe, will be restarted","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T21:05:26Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T21:05:26Z","reason":"Created","message":"Created container: etcd-operator","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T21:05:26Z","reason":"Started","message":"Started container etcd-operator","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T21:10:16Z","reason":"ReportEtcdMembersErrorUpdatingStatus","message":"etcds.operator.openshift.io \"cluster\" not found","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T21:10:16Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T21:10:16Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"ClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\\nClusterMemberRemovalControllerDegraded: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries\\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\\nEtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\" to \"ClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\\nClusterMemberRemovalControllerDegraded: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries\\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\\nEtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nScriptControllerDegraded: \\\"configmap/etcd-pod\\\": missing env var values\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T21:10:16Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded changed from False to True (\"ClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\\nClusterMemberRemovalControllerDegraded: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries\\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\\nEtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\")","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T21:10:16Z","reason":"LeaderElection","message":"etcd-operator-67bf55ccdd-8cllz_3ff69021-4ad8-4d96-9cd6-e83d94c3aaa5 became leader","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T21:10:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"ClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\\nClusterMemberRemovalControllerDegraded: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries\\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\\nEtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nScriptControllerDegraded: \\\"configmap/etcd-pod\\\": missing env var values\" to \"ClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\\nEtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nScriptControllerDegraded: \\\"configmap/etcd-pod\\\": missing env var values\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T21:10:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"ClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries\\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\\nEtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nScriptControllerDegraded: \\\"configmap/etcd-pod\\\": missing env var values\" to \"EtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\\nEtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nScriptControllerDegraded: \\\"configmap/etcd-pod\\\": missing env var values\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T21:10:18Z","reason":"OperatorVersionChanged","message":"clusteroperator/etcd version \"etcd\" changed from \"\" to \"4.18.32\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T21:10:21Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/etcd-endpoints -n openshift-etcd:\ncause by changes in data.91eb892c5ee87610,data.MTkyLjE2OC4zMi4xMA","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T21:10:21Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/etcd-endpoints has changed\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T21:10:23Z","reason":"NodeCurrentRevisionChanged","message":"Updated node \"master-0\" from revision 0 to 1 because static pod is ready","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T21:10:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod-2 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T21:10:26Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-endpoints-2 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T21:10:28Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-all-bundles-2 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T21:10:29Z","reason":"SecretCreated","message":"Created Secret/etcd-all-certs-2 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T21:10:33Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 1 to 2 because node master-0 with revision 1 is the oldest","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T21:10:36Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T21:15:43Z","reason":"MissingStaticPod","message":"static pod lifecycle failure - static pod: \"etcd\" in namespace: \"openshift-etcd\" for revision: 2 on node: \"master-0\" didn't show up, waited: 3m30s","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T21:16:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nEtcdMembersDegraded: No unhealthy members found\" to \"NodeControllerDegraded: All master nodes are ready\\nMissingStaticPodControllerDegraded: static pod lifecycle failure - static pod: \\\"etcd\\\" in namespace: \\\"openshift-etcd\\\" for revision: 2 on node: \\\"master-0\\\" didn't show up, waited: 3m30s\\nEtcdMembersDegraded: No unhealthy members found\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-02-16T21:16:34Z","reason":"NodeCurrentRevisionChanged","message":"Updated node \"master-0\" from revision 1 to 2 because static pod is ready","type":"Normal"}]}events/openshift-apiserver.json0000640000000000000000000001343215144705173015446 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T20:57:23Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-64c454bc85-s4b86","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T20:57:23Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-64c454bc85 to 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T20:57:23Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver/apiserver-64c454bc85-s4b86 to master-0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T20:57:27Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-6bdb76b9b7 to 1 from 0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T20:57:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T20:57:27Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"audit\" : configmap \"audit-0\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T20:57:27Z","reason":"SuccessfulDelete","message":"Deleted pod: apiserver-64c454bc85-s4b86","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T20:57:27Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T20:57:27Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-6bdb76b9b7-z46x6","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T20:57:27Z","reason":"ScalingReplicaSet","message":"Scaled down replica set apiserver-64c454bc85 to 0 from 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T20:57:29Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver/apiserver-6bdb76b9b7-z46x6 to master-0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T20:57:29Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T20:57:31Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b41a8ae60c0eafa4a13e6dcd0e79ba63b0d7bd2bdc28aaed434b3bef98a5dc95\"","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T20:57:31Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.36/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T20:57:36Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T20:57:36Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T20:57:36Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b41a8ae60c0eafa4a13e6dcd0e79ba63b0d7bd2bdc28aaed434b3bef98a5dc95\" in 5.504s (5.504s including waiting). Image size: 584205881 bytes.","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T20:57:37Z","reason":"Started","message":"Started container openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T20:57:37Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T20:57:37Z","reason":"Created","message":"Created container: openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T20:57:37Z","reason":"Started","message":"Started container openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T20:57:37Z","reason":"Created","message":"Created container: openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T20:57:37Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b41a8ae60c0eafa4a13e6dcd0e79ba63b0d7bd2bdc28aaed434b3bef98a5dc95\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T20:57:40Z","reason":"ProbeError","message":"Startup probe error: HTTP probe failed with statuscode: 500\nbody: [+]ping ok\n[+]log ok\n[+]etcd ok\n[+]poststarthook/start-apiserver-admission-initializer ok\n[+]poststarthook/generic-apiserver-start-informers ok\n[+]poststarthook/max-in-flight-filter ok\n[+]poststarthook/storage-object-count-tracker-hook ok\n[+]poststarthook/image.openshift.io-apiserver-caches ok\n[-]poststarthook/authorization.openshift.io-bootstrapclusterroles failed: reason withheld\n[+]poststarthook/authorization.openshift.io-ensurenodebootstrap-sa ok\n[+]poststarthook/project.openshift.io-projectcache ok\n[+]poststarthook/project.openshift.io-projectauthorizationcache ok\n[+]poststarthook/openshift.io-startinformers ok\n[+]poststarthook/openshift.io-restmapperupdater ok\n[+]poststarthook/quota.openshift.io-clusterquotamapping ok\nlivez check failed\n\n","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-02-16T20:57:40Z","reason":"Unhealthy","message":"Startup probe failed: HTTP probe failed with statuscode: 500","type":"Warning"}]}events/openshift-apiserver-operator.json0000640000000000000000000011100415144705173017271 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:52:10Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-apiserver-operator-6d4655d9cf to 1","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:52:21Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-6d4655d9cf-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:55:38Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-6d4655d9cf-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:55:40Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:55:40Z","reason":"SuccessfulCreate","message":"Created pod: openshift-apiserver-operator-6d4655d9cf-tvzdw","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:56:57Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver-operator/openshift-apiserver-operator-6d4655d9cf-tvzdw to master-0","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:56:58Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.21/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:56:58Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd544a8a6b4d08fe0f4fd076109c09cf181302ab6056ec6b2b89d68a52954c5\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:07Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd544a8a6b4d08fe0f4fd076109c09cf181302ab6056ec6b2b89d68a52954c5\" in 8.64s (8.64s including waiting). Image size: 507103881 bytes.","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:11Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:11Z","reason":"LeaderElection","message":"openshift-apiserver-operator-6d4655d9cf-tvzdw_89f937a2-15e5-44fe-8cce-542c4b0f0bc4 became leader","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:12Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"operator\" changed from \"\" to \"4.18.32\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:12Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded changed from Unknown to False (\"RevisionControllerDegraded: configmap \\\"audit\\\" not found\"),Available changed from Unknown to False (\"APIServicesAvailable: endpoints \\\"api\\\" not found\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [] to [{\"operator.openshift.io\" \"openshiftapiservers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver\"} {\"\" \"namespaces\" \"\" \"openshift-etcd-operator\"} {\"\" \"endpoints\" \"openshift-etcd\" \"host-etcd-2\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-apiserver\" \"\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.apps.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.authorization.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.build.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.image.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.project.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.quota.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.route.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.security.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.template.openshift.io\"}],status.versions changed from [] to [{\"operator\" \"4.18.32\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:12Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:12Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t},\n+ \t\"projectConfig\": map[string]any{\"projectRequestMessage\": string(\"\")},\n+ \t\"routingConfig\": map[string]any{\"subdomain\": string(\"apps.sno.openstack.lab\")},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n+ \t\"storageConfig\": map[string]any{\"urls\": []any{string(\"https://192.168.32.10:2379\")}},\n  }\n","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:12Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:12Z","reason":"RoutingConfigSubdomainChanged","message":"Domain changed from \"\" to \"apps.sno.openstack.lab\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:12Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:12Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:12Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:16Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/audit -n openshift-apiserver: namespaces \"openshift-apiserver\" not found","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:16Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAuditPolicyDegraded: namespaces \\\"openshift-apiserver\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:16Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:16Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:17Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAuditPolicyDegraded: namespaces \\\"openshift-apiserver\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:17Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:18Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/image-import-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:19Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:20Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-apiserver-sa -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"All is well\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:21Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:21Z","reason":"ConfigMapCreated","message":"Created ConfigMap/trusted-ca-bundle -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:23Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from False to True (\"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\",Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:24Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:27Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-apiserver because it changed","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:32Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:45Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.apps.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:45Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.authorization.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:46Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.quota.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:46Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.route.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from True to False (\"All is well\"),Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: status.versions changed from [{\"operator\" \"4.18.32\"}] to [{\"operator\" \"4.18.32\"} {\"openshift-apiserver\" \"4.18.32\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:46Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.build.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:46Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.image.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:46Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.project.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:46Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"openshift-apiserver\" changed from \"\" to \"4.18.32\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:47Z","reason":"OpenShiftAPICheckFailed","message":"\"authorization.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:47Z","reason":"OpenShiftAPICheckFailed","message":"\"quota.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:47Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:47Z","reason":"OpenShiftAPICheckFailed","message":"\"template.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:47Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.security.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:47Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.template.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:47Z","reason":"OpenShiftAPICheckFailed","message":"\"apps.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:47Z","reason":"OpenShiftAPICheckFailed","message":"\"security.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:47Z","reason":"OpenShiftAPICheckFailed","message":"\"build.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:47Z","reason":"OpenShiftAPICheckFailed","message":"\"image.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:47Z","reason":"OpenShiftAPICheckFailed","message":"\"project.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:47Z","reason":"OpenShiftAPICheckFailed","message":"\"route.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T20:57:49Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/apps.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/authorization.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/build.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/image.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/project.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/quota.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/route.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/security.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/template.openshift.io/v1: 401\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T21:05:47Z","reason":"BackOff","message":"Back-off restarting failed container openshift-apiserver-operator in pod openshift-apiserver-operator-6d4655d9cf-tvzdw_openshift-apiserver-operator(6b6be6de-6fcc-4f57-b163-fe8f970a01a4)","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T21:06:01Z","reason":"Started","message":"Started container openshift-apiserver-operator","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T21:06:01Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6dd544a8a6b4d08fe0f4fd076109c09cf181302ab6056ec6b2b89d68a52954c5\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T21:06:01Z","reason":"Created","message":"Created container: openshift-apiserver-operator","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T21:16:13Z","reason":"LeaderElection","message":"openshift-apiserver-operator-6d4655d9cf-tvzdw_f47e6a18-b80b-4674-838e-eed0a90c3040 became leader","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T21:16:13Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T21:16:18Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-02-16T21:16:19Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"}]}events/openshift-kube-controller-manager-operator.json0000640000000000000000000013610615144705173022022 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:52:09Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-controller-manager-operator-78ff47c7c5 to 1","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:52:20Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-78ff47c7c5-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:55:36Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-78ff47c7c5-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:55:38Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:55:38Z","reason":"SuccessfulCreate","message":"Created pod: kube-controller-manager-operator-78ff47c7c5-7p9ft","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:56:57Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-controller-manager-operator/kube-controller-manager-operator-78ff47c7c5-7p9ft to master-0","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:56:58Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.13/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:56:58Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:07Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39\" in 8.673s (8.673s including waiting). Image size: 503717987 bytes.","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:12Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:12Z","reason":"CABundleUpdateRequired","message":"\"csr-controller-signer-ca\" in \"openshift-kube-controller-manager-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:12Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:12Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-controller-manager version \"raw-internal\" changed from \"\" to \"4.18.32\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"\" \"nodes\" \"\" \"\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"} {\"\" \"nodes\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.32\"}]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:12Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded changed from Unknown to False (\"NodeControllerDegraded: All master nodes are ready\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:12Z","reason":"LeaderElection","message":"kube-controller-manager-operator-78ff47c7c5-7p9ft_85bc662d-616c-410d-a649-b0c8f9f88c6a became leader","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:13Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\",Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:14Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:14Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated featureGates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:14Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:14Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated extendedArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:14Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"extendedArguments\": map[string]any{\n+ \t\t\"cluster-cidr\": []any{string(\"10.128.0.0/16\")},\n+ \t\t\"cluster-name\": []any{string(\"sno-5pjkm\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")},\n+ \t},\n+ \t\"featureGates\": []any{\n+ \t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"),\n+ \t\tstring(\"DisableKubeletCloudCredentialProviders=true\"),\n+ \t\tstring(\"GCPLabelsTags=true\"), string(\"HardwareSpeed=true\"),\n+ \t\tstring(\"IngressControllerLBSubnetsAWS=true\"), string(\"KMSv1=true\"),\n+ \t\tstring(\"ManagedBootImages=true\"), string(\"ManagedBootImagesAWS=true\"),\n+ \t\tstring(\"MultiArchInstallAWS=true\"), ...,\n+ \t},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:14Z","reason":"ConfigMissing","message":"no observedConfig","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:14Z","reason":"TargetUpdateRequired","message":"\"csr-signer\" in \"openshift-kube-controller-manager-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:15Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:16Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-controller-manager-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:16Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-controller-manager because it changed","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:16Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:16Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:17Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:17Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:17Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-controller-manager -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:18Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:18Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/csr-controller-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:19Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:19Z","reason":"ObserveServiceCAConfigMap","message":"observed change in config","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:19Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n \t\"extendedArguments\": map[string]any{\"cluster-cidr\": []any{string(\"10.128.0.0/16\")}, \"cluster-name\": []any{string(\"sno-5pjkm\")}, \"feature-gates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...}, \"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")}},\n \t\"featureGates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...},\n+ \t\"serviceServingCert\": map[string]any{\n+ \t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resources/configmaps/service-ca/ca-bundle.crt\"),\n+ \t},\n \t\"servingInfo\": map[string]any{\"cipherSuites\": []any{string(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"), string(\"TLS_CHACHA20_POLY1305_SHA256\"), string(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"), ...}, \"minTLSVersion\": string(\"VersionTLS12\")},\n }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:20Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:21Z","reason":"ServiceCreated","message":"Created Service/kube-controller-manager -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:23Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/kube-controller-manager-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:24Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-controller-manager-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:24Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/pv-recycler-controller -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:26Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:26Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nResourceSyncControllerDegraded: configmaps \\\"csr-controller-ca\\\" already exists\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:27Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:27Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:27Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:27Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/csr-controller-ca -n openshift-config-managed: configmaps \"csr-controller-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:27Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nResourceSyncControllerDegraded: configmaps \\\"csr-controller-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:28Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:33Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:36Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:39Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:41Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:41Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:43Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:44Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:45Z","reason":"SecretCreated","message":"Created Secret/serving-cert-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:46Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:46Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"GarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.13:54031-\u003e172.30.0.10:53: read: connection refused\\nNodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"GarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.13:54031-\u003e172.30.0.10:53: read: connection refused\\nNodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"GarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.13:36071-\u003e172.30.0.10:53: read: connection refused\\nNodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:46Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"GarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.13:36071-\u003e172.30.0.10:53: read: connection refused\\nNodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:46Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:47Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/config has changed,required configmap/cluster-policy-controller-config has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:47Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:48Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:51Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:51Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:51Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:57:59Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:58:00Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:58:01Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:58:02Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"required configmap/config has changed,required configmap/cluster-policy-controller-config has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T20:58:03Z","reason":"SATokenSignerControllerStuck","message":"unexpected addresses: 192.168.32.10","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T21:16:14Z","reason":"BackOff","message":"Back-off restarting failed container kube-controller-manager-operator in pod kube-controller-manager-operator-78ff47c7c5-7p9ft_openshift-kube-controller-manager-operator(7f2c3cda-f67e-4a6f-84ec-f702d2fdb29e)","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T21:16:28Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T21:16:29Z","reason":"Created","message":"Created container: kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-02-16T21:16:29Z","reason":"Started","message":"Started container kube-controller-manager-operator","type":"Normal"}]}events/openshift-kube-controller-manager.json0000640000000000000000000000147615144705173020172 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-16T20:57:51Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.46/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-16T20:57:52Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8ae0b5bab647ff989f276cead5f360bcb88c813f181d75dc3106eb5dbde0b39\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-16T20:57:52Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-02-16T20:57:52Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-apiserver.json0000640000000000000000000000143215144705173016367 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-16T20:58:00Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.55/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-16T20:58:00Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-16T20:58:01Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-02-16T20:58:01Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-apiserver-operator.json0000640000000000000000000023544015144705173020230 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:52:24Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-apiserver-operator-54984b6678 to 1","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:52:25Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-54984b6678-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:55:36Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-54984b6678-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:55:39Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:55:39Z","reason":"SuccessfulCreate","message":"Created pod: kube-apiserver-operator-54984b6678-cl5ld","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:56:57Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-apiserver-operator/kube-apiserver-operator-54984b6678-cl5ld to master-0","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:56:58Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.8/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:56:58Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:56:58Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:56:58Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:56:59Z","reason":"LeaderElection","message":"kube-apiserver-operator-54984b6678-cl5ld_96ce8d0c-62d9-4b37-aa45-47f8d1f3ee9f became leader","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:56:59Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:00Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/cpu-utilization -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:00Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-apiserver version \"raw-internal\" changed from \"\" to \"4.18.32\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:00Z","reason":"ServiceAccountIssuer","message":"Issuer set to default value \"https://kubernetes.default.svc\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:00Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.32\"}]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"All is well\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Upgradeable changed from Unknown to True (\"All is well\"),EvaluationConditionsDetected changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:01Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:02Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:02Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:02Z","reason":"SignerUpdateRequired","message":"\"localhost-recovery-serving-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:02Z","reason":"CABundleUpdateRequired","message":"\"loadbalancer-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:02Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\",Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; \")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:02Z","reason":"CABundleUpdateRequired","message":"\"localhost-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:02Z","reason":"SignerUpdateRequired","message":"\"node-system-admin-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:02Z","reason":"CABundleUpdateRequired","message":"\"service-network-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:03Z","reason":"SecretUpdated","message":"Updated Secret/aggregator-client-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:03Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:03Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:03Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-aggregator-client-ca\" in \"openshift-config-managed\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-network-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:04Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-to-kubelet-client-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:04Z","reason":"SecretUpdated","message":"Updated Secret/kube-apiserver-to-kubelet-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:04Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; \" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:04Z","reason":"TargetUpdateRequired","message":"\"service-network-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:04Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/loadbalancer-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:05Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/: configmaps \"loadbalancer-serving-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:05Z","reason":"TargetUpdateRequired","message":"\"localhost-serving-cert-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Upgradeable message changed from \"All is well\" to \"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced.\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:05Z","reason":"SecretUpdated","message":"Updated Secret/kube-control-plane-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:05Z","reason":"TargetUpdateRequired","message":"\"external-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:06Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:06Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:06Z","reason":"CABundleUpdateRequired","message":"\"kube-control-plane-signer-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:06Z","reason":"CABundleUpdateRequired","message":"\"localhost-recovery-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:06Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:06Z","reason":"CABundleUpdateRequired","message":"\"node-system-admin-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:07Z","reason":"SecretCreated","message":"Created Secret/bound-service-account-signing-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:07Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-apiserver-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:07Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:07Z","reason":"TargetUpdateRequired","message":"\"aggregator-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-aggregator-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:08Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-control-plane-signer-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:08Z","reason":"TargetUpdateRequired","message":"\"control-plane-node-admin-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:08Z","reason":"TargetUpdateRequired","message":"\"internal-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:08Z","reason":"SecretCreated","message":"Created Secret/localhost-serving-cert-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:08Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-to-kubelet-client-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:08Z","reason":"SecretCreated","message":"Created Secret/service-network-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:08Z","reason":"TargetUpdateRequired","message":"\"kubelet-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:09Z","reason":"TargetUpdateRequired","message":"\"node-system-admin-client\" in \"openshift-kube-apiserver-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:09Z","reason":"ConfigMapCreated","message":"Created ConfigMap/node-system-admin-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:09Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/: configmaps \"kube-control-plane-signer-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:09Z","reason":"TargetUpdateRequired","message":"\"kube-scheduler-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:09Z","reason":"TargetUpdateRequired","message":"\"localhost-recovery-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:09Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-recovery-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:09Z","reason":"SecretCreated","message":"Created Secret/external-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:10Z","reason":"SecretCreated","message":"Created Secret/aggregator-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:11Z","reason":"SecretCreated","message":"Created Secret/control-plane-node-admin-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:11Z","reason":"TargetUpdateRequired","message":"\"check-endpoints-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:11Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:11Z","reason":"SecretCreated","message":"Created Secret/internal-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:11Z","reason":"SecretCreated","message":"Created Secret/kubelet-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nNodeControllerDegraded: All master nodes are ready\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nCertRotation_CheckEndpointsClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:11Z","reason":"ServiceCreated","message":"Created Service/apiserver -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:11Z","reason":"RotationError","message":"configmaps \"kube-control-plane-signer-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:12Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:12Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-client -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:13Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:13Z","reason":"SecretCreated","message":"Created Secret/check-endpoints-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:13Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:13Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:13Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-auth-delegator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:13Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:13Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:13Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nCertRotation_CheckEndpointsClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nCertRotation_CheckEndpointsClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:14Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/check-endpoints-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:15Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/control-plane-node-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:16Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-apiserver-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:16Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/authentication-reader-for-authenticated-users -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:18Z","reason":"TargetUpdateRequired","message":"\"kube-controller-manager-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:18Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:18Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:19Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:19Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:19Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-requests -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:19Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:19Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:19Z","reason":"CustomResourceDefinitionUpdated","message":"Updated CustomResourceDefinition.apiextensions.k8s.io/apirequestcounts.apiserver.openshift.io because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:19Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/audit-errors -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:19Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/api-usage -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:19Z","reason":"SecretCreateFailed","message":"Failed to create Secret/: secrets \"kube-controller-manager-client-cert-key\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:19Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:20Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-slos-basic -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:20Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-kube-apiserver/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:20Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/podsecurity -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:21Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:24Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:25Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nCertRotation_CheckEndpointsClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nCertRotation_KubeControllerManagerClient_Degraded: secrets \\\"kube-controller-manager-client-cert-key\\\" already exists\\nCertRotation_CheckEndpointsClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:25Z","reason":"RotationError","message":"secrets \"kube-controller-manager-client-cert-key\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:26Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:26Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nCertRotation_KubeControllerManagerClient_Degraded: secrets \\\"kube-controller-manager-client-cert-key\\\" already exists\\nCertRotation_CheckEndpointsClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nCertRotation_CheckEndpointsClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:26Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:29Z","reason":"ObservedConfigWriteError","message":"Failed to write observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:30Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"admission\": map[string]any{\n+ \t\t\"pluginConfig\": map[string]any{\n+ \t\t\t\"PodSecurity\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/ExternalIPRanger\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/RestrictedEndpointsAdmission\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t},\n+ \t},\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"api-audiences\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"etcd-servers\": []any{string(\"https://192.168.32.10:2379\"), string(\"https://localhost:2379\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"goaway-chance\": []any{string(\"0\")},\n+ \t\t\"runtime-config\": []any{string(\"admissionregistration.k8s.io/v1beta1=true\")},\n+ \t\t\"send-retry-after-while-not-ready-once\": []any{string(\"true\")},\n+ \t\t\"service-account-issuer\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"service-account-jwks-uri\": []any{string(\"https://api.sno.openstack.lab:6443/openid/v1/jwks\")},\n+ \t\t\"shutdown-delay-duration\": []any{string(\"0s\")},\n+ \t},\n+ \t\"corsAllowedOrigins\": []any{string(`//127\\.0\\.0\\.1(:|$)`), string(\"//localhost(:|$)\")},\n+ \t\"gracefulTerminationDuration\": string(\"15\"),\n+ \t\"servicesSubnet\": string(\"172.30.0.0/16\"),\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"bindAddress\": string(\"0.0.0.0:6443\"),\n+ \t\t\"bindNetwork\": string(\"tcp4\"),\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t\t\"namedCertificates\": []any{\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t},\n+ \t\t},\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:30Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379,https://localhost:2379","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:30Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:30Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:30Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nCertRotation_CheckEndpointsClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nCertRotation_CheckEndpointsClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:31Z","reason":"ConfigMissing","message":"no observedConfig","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:32Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nCertRotation_CheckEndpointsClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubeapiservers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nCertRotation_CheckEndpointsClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:33Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:33Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nCertRotation_CheckEndpointsClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:38Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/kube-apiserver-client-ca -n openshift-config-managed: configmaps \"kube-apiserver-client-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:39Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nResourceSyncControllerDegraded: configmaps \\\"kube-apiserver-client-ca\\\" already exists\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:40Z","reason":"SecretCreated","message":"Created Secret/node-kubeconfigs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nResourceSyncControllerDegraded: configmaps \\\"kube-apiserver-client-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nNodeControllerDegraded: All master nodes are ready\" to \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:41Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:46Z","reason":"SecretCreated","message":"Created Secret/etcd-client-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:48Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:49Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:51Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:51Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:53Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T20:57:57Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T21:16:20Z","reason":"BackOff","message":"Back-off restarting failed container kube-apiserver-operator in pod kube-apiserver-operator-54984b6678-cl5ld_openshift-kube-apiserver-operator(0b02b740-5698-4e9a-90fe-2873bd0b0958)","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T21:16:31Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T21:16:31Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T21:16:31Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T21:21:41Z","reason":"LeaderElection","message":"kube-apiserver-operator-54984b6678-cl5ld_2899ecd9-509e-4155-bc9b-f1b5e2bd7117 became leader","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T21:21:41Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T21:21:41Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T21:21:47Z","reason":"InstallerPodFailed","message":"installer errors: installer: ving-cert\",\n (string) (len=21) \"user-serving-cert-000\",\n (string) (len=21) \"user-serving-cert-001\",\n (string) (len=21) \"user-serving-cert-002\",\n (string) (len=21) \"user-serving-cert-003\",\n (string) (len=21) \"user-serving-cert-004\",\n (string) (len=21) \"user-serving-cert-005\",\n (string) (len=21) \"user-serving-cert-006\",\n (string) (len=21) \"user-serving-cert-007\",\n (string) (len=21) \"user-serving-cert-008\",\n (string) (len=21) \"user-serving-cert-009\"\n },\n CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\",\n (string) (len=29) \"control-plane-node-kubeconfig\",\n (string) (len=26) \"check-endpoints-kubeconfig\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0216 20:58:01.711895 1 cmd.go:413] Getting controller reference for node master-0\nI0216 20:58:01.765190 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0216 20:58:01.765279 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0216 20:58:01.765301 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0216 20:58:01.776932 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0216 20:58:31.777093 1 cmd.go:524] Getting installer pods for node master-0\nF0216 20:58:45.781242 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-02-16T21:21:47Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeInstallerDegraded: 1 nodes are failing on revision 1:\\nNodeInstallerDegraded: installer: ving-cert\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-000\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-001\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-002\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-003\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-004\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-005\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-006\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-007\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-008\\\",\\nNodeInstallerDegraded: (string) (len=21) \\\"user-serving-cert-009\\\"\\nNodeInstallerDegraded: },\\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\\nNodeInstallerDegraded: (string) (len=20) \\\"aggregator-client-ca\\\",\\nNodeInstallerDegraded: (string) (len=9) \\\"client-ca\\\",\\nNodeInstallerDegraded: (string) (len=29) \\\"control-plane-node-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=26) \\\"check-endpoints-kubeconfig\\\"\\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=17) \\\"trusted-ca-bundle\\\"\\nNodeInstallerDegraded: CertDir: (string) (len=57) \\\"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\\\",\\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \\\"/etc/kubernetes/static-pod-resources\\\",\\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \\\"/etc/kubernetes/manifests\\\",\\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \\\"\\\",\\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\\nNodeInstallerDegraded: KubeletVersion: (string) \\\"\\\"\\nNodeInstallerDegraded: })\\nNodeInstallerDegraded: I0216 20:58:01.711895 1 cmd.go:413] Getting controller reference for node master-0\\nNodeInstallerDegraded: I0216 20:58:01.765190 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\\nNodeInstallerDegraded: I0216 20:58:01.765279 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I0216 20:58:01.765301 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I0216 20:58:01.776932 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\\nNodeInstallerDegraded: I0216 20:58:31.777093 1 cmd.go:524] Getting installer pods for node master-0\\nNodeInstallerDegraded: F0216 20:58:45.781242 1 cmd.go:109] Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\nNodeInstallerDegraded: \\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"}]}events/openshift-oauth-apiserver.json0000640000000000000000000000443715144705173016571 0ustar0000000000000000{"items":[{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T20:57:39Z","reason":"Scheduled","message":"Successfully assigned openshift-oauth-apiserver/apiserver-64f7f8746f-xj7z6 to master-0","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T20:57:39Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-64f7f8746f-xj7z6","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T20:57:39Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-64f7f8746f to 1","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T20:57:40Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.44/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T20:57:40Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192\"","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T20:57:42Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192\" in 2.499s (2.499s including waiting). Image size: 500175306 bytes.","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T20:57:43Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T20:57:43Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T20:57:45Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192\" already present on machine","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T20:57:46Z","reason":"Created","message":"Created container: oauth-apiserver","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-02-16T20:57:46Z","reason":"Started","message":"Started container oauth-apiserver","type":"Normal"}]}events/openshift-ingress.json0000640000000000000000000000444715144705173015126 0ustar0000000000000000{"items":[{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T20:57:31Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T20:57:31Z","reason":"SuccessfulCreate","message":"Created pod: router-default-864ddd5f56-z4bnk","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T20:57:31Z","reason":"ScalingReplicaSet","message":"Scaled up replica set router-default-864ddd5f56 to 1","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T21:06:25Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb\"","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T21:06:28Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb\" in 3.082s (3.082s including waiting). Image size: 481879166 bytes.","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T21:06:28Z","reason":"Created","message":"Created container: router","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T21:06:28Z","reason":"Started","message":"Started container router","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T21:06:38Z","reason":"Unhealthy","message":"Startup probe failed: HTTP probe failed with statuscode: 500","type":"Warning"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T21:12:00Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb\" already present on machine","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-02-16T21:21:26Z","reason":"ProbeError","message":"Startup probe error: HTTP probe failed with statuscode: 500\nbody: [-]backend-http failed: reason withheld\n[-]has-synced failed: reason withheld\n[+]process-running ok\nhealthz check failed\n\n","type":"Warning"}]}events/openshift-authentication-operator.json0000640000000000000000000022233215144705173020317 0ustar0000000000000000{"items":[{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:52:11Z","reason":"ScalingReplicaSet","message":"Scaled up replica set authentication-operator-755d954778 to 1","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:52:22Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-755d954778-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:55:38Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-755d954778-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:55:40Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:55:40Z","reason":"SuccessfulCreate","message":"Created pod: authentication-operator-755d954778-8gnq5","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:56:57Z","reason":"Scheduled","message":"Successfully assigned openshift-authentication-operator/authentication-operator-755d954778-8gnq5 to master-0","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:56:58Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.15/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:56:58Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:07Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963\" in 8.938s (8.938s including waiting). Image size: 508050651 bytes.","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:11Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:11Z","reason":"LeaderElection","message":"authentication-operator-755d954778-8gnq5_8e2e56cb-f49f-46ca-b6c5-62b1e4e507c6 became leader","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:11Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"operator\" changed from \"\" to \"4.18.32\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"operator\" \"4.18.32\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded changed from Unknown to False (\"RevisionControllerDegraded: configmap \\\"audit\\\" not found\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:12Z","reason":"ObserveAPIAudiences","message":"service account issuer changed from to https://kubernetes.default.svc","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:12Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:12Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:12Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:12Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthAPIServer\") of observed config: \" map[string]any(\\n- \\tnil,\\n+ \\t{\\n+ \\t\\t\\\"apiServerArguments\\\": map[string]any{\\n+ \\t\\t\\t\\\"api-audiences\\\": []any{string(\\\"https://kubernetes.default.svc\\\")},\\n+ \\t\\t\\t\\\"cors-allowed-origins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+ \\t\\t\\t\\\"etcd-servers\\\": []any{string(\\\"https://192.168.32.10:2379\\\")},\\n+ \\t\\t\\t\\\"tls-cipher-suites\\\": []any{\\n+ \\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"tls-min-version\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t},\\n+ \\t},\\n )\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:13Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available changed from Unknown to False (\"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:13Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:14Z","reason":"ObserveAuditProfile","message":"AuditProfile changed from '%!s(\u003cnil\u003e)' to 'map[audit-log-format:[json] audit-log-maxbackup:[10] audit-log-maxsize:[100] audit-log-path:[/var/log/oauth-server/audit.log] audit-policy-file:[/var/run/configmaps/audit/audit.yaml]]'","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:14Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:14Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:14Z","reason":"ObserveAPIServerURL","message":"loginURL changed from to https://api.sno.openstack.lab:6443","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:14Z","reason":"ObserveTemplates","message":"templates changed to map[\"error\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/errors.html\" \"login\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/login.html\" \"providerSelection\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/providers.html\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:14Z","reason":"ObserveTokenConfig","message":"accessTokenMaxAgeSeconds changed from %!d(float64=0) to %!d(float64=86400)","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:14Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \" map[string]any(\\n- \\tnil,\\n+ \\t{\\n+ \\t\\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+ \\t\\t\\\"oauthConfig\\\": map[string]any{\\n+ \\t\\t\\t\\\"assetPublicURL\\\": string(\\\"\\\"),\\n+ \\t\\t\\t\\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"),\\n+ \\t\\t\\t\\\"templates\\\": map[string]any{\\n+ \\t\\t\\t\\t\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t\\t\\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t\\t\\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"tokenConfig\\\": map[string]any{\\n+ \\t\\t\\t\\t\\\"accessTokenMaxAgeSeconds\\\": float64(86400),\\n+ \\t\\t\\t\\t\\\"authorizeTokenMaxAgeSeconds\\\": float64(300),\\n+ \\t\\t\\t},\\n+ \\t\\t},\\n+ \\t\\t\\\"serverArguments\\\": map[string]any{\\n+ \\t\\t\\t\\\"audit-log-format\\\": []any{string(\\\"json\\\")},\\n+ \\t\\t\\t\\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")},\\n+ \\t\\t\\t\\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")},\\n+ \\t\\t\\t\\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")},\\n+ \\t\\t\\t\\\"audit-policy-file\\\": []any{string(\\\"/var/run/configmaps/audit/audit.\\\"...)},\\n+ \\t\\t},\\n+ \\t\\t\\\"servingInfo\\\": map[string]any{\\n+ \\t\\t\\t\\\"cipherSuites\\\": []any{\\n+ \\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+ \\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+ \\t\\t\\t},\\n+ \\t\\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t},\\n+ \\t\\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n+ \\t},\\n )\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\",Progressing changed from Unknown to False (\"All is well\"),Available message changed from \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\" to \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:15Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:16Z","reason":"NoValidCertificateFound","message":"No valid client certificate for OpenShiftAuthenticatorCertRequester is found: unable to parse certificate: data does not contain any valid RSA or ECDSA certificates","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:16Z","reason":"CSRApproval","message":"The CSR \"system:openshift:openshift-authenticator-65qvj\" has been approved","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:16Z","reason":"CSRCreated","message":"A csr \"system:openshift:openshift-authenticator-65qvj\" is created for OpenShiftAuthenticatorCertRequester","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:17Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:17Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/audit -n openshift-authentication: namespaces \"openshift-authentication\" not found","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:18Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/audit -n openshift-oauth-apiserver: namespaces \"openshift-oauth-apiserver\" not found","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nAuditPolicyDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:18Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:18Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:20Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nAuditPolicyDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nAuditPolicyDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:20Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:22Z","reason":"ClientCertificateCreated","message":"A new client certificate for OpenShiftAuthenticatorCertRequester is available","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:22Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:22Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:23Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nAuditPolicyDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:24Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"All is well\" to \"AuthenticatorCertKeyProgressing: All is well\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/v4-0-config-system-trusted-ca-bundle -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:25Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:28Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-ocp-branding-template -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:28Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:29Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-apiserver-sa -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:29Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:29Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:32Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:32Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:35Z","reason":"ServiceCreated","message":"Created Service/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:36Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:36Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:38Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:39Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-router-certs -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:39Z","reason":"ObserveRouterSecret","message":"namedCertificates changed to []interface {}{map[string]interface {}{\"certFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"keyFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"names\":[]interface {}{\"*.apps.sno.openstack.lab\"}}}","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:39Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \" map[string]any{\\n \\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n \\t\\\"oauthConfig\\\": map[string]any{\\\"assetPublicURL\\\": string(\\\"\\\"), \\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"), \\\"templates\\\": map[string]any{\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...)}, \\\"tokenConfig\\\": map[string]any{\\\"accessTokenMaxAgeSeconds\\\": float64(86400), \\\"authorizeTokenMaxAgeSeconds\\\": float64(300)}},\\n \\t\\\"serverArguments\\\": map[string]any{\\\"audit-log-format\\\": []any{string(\\\"json\\\")}, \\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")}, \\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")}, \\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")}, ...},\\n \\t\\\"servingInfo\\\": map[string]any{\\n \\t\\t\\\"cipherSuites\\\": []any{string(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"), string(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"), string(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\\\"), ...},\\n \\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+ \\t\\t\\\"namedCertificates\\\": []any{\\n+ \\t\\t\\tmap[string]any{\\n+ \\t\\t\\t\\t\\\"certFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+ \\t\\t\\t\\t\\\"keyFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+ \\t\\t\\t\\t\\\"names\\\": []any{string(\\\"*.apps.sno.openstack.lab\\\")},\\n+ \\t\\t\\t},\\n+ \\t\\t},\\n \\t},\\n \\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n }\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \",Progressing changed from False to True (\"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\"),Available message changed from \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.139.70:443/healthz\\\": dial tcp 172.30.139.70:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.139.70:443/healthz\\\": dial tcp 172.30.139.70:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.139.70:443/healthz\\\": dial tcp 172.30.139.70:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.139.70:443/healthz\\\": dial tcp 172.30.139.70:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.139.70:443/healthz\\\": dial tcp 172.30.139.70:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.139.70:443/healthz\\\": dial tcp 172.30.139.70:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/oauth-serving-cert -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.139.70:443/healthz\\\": dial tcp 172.30.139.70:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.139.70:443/healthz\\\": dial tcp 172.30.139.70:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:45Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:50Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.oauth.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:50Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.user.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:50Z","reason":"OpenShiftAPICheckFailed","message":"\"oauth.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T20:57:50Z","reason":"OpenShiftAPICheckFailed","message":"\"user.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T21:03:33Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:047699c5a63593f45e9dd6f9fac0fa636ffc012331ee592891bfb08001bdd963\" already present on machine","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T21:03:34Z","reason":"Created","message":"Created container: authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T21:03:34Z","reason":"Started","message":"Started container authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T21:04:26Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.15:8443/healthz\": dial tcp 10.128.0.15:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T21:04:26Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.15:8443/healthz\": dial tcp 10.128.0.15:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-02-16T21:15:36Z","reason":"BackOff","message":"Back-off restarting failed container authentication-operator in pod authentication-operator-755d954778-8gnq5_openshift-authentication-operator(27c20f63-9bfb-4703-94d5-0c65475e08d1)","type":"Warning"}]}events/openshift-config-managed.json0000640000000000000000000000061015144705173016277 0ustar0000000000000000{"items":[{"namespace":"openshift-config-managed","lastTimestamp":"2026-02-16T20:57:33Z","reason":"PublishedRouterCA","message":"Published \"default-ingress-cert\" in \"openshift-config-managed\"","type":"Normal"},{"namespace":"openshift-config-managed","lastTimestamp":"2026-02-16T20:57:33Z","reason":"PublishedRouterCertificates","message":"Published router certificates","type":"Normal"}]}config/serviceaccounts.json0000640000000000000000000003563215144705172014617 0ustar0000000000000000{"serviceAccounts":{"TOTAL_COUNT":348,"namespaces":{"default":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-public":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-system":[{"name":"attachdetach-controller","secrets":1},{"name":"builder","secrets":1},{"name":"certificate-controller","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"clusterrole-aggregation-controller","secrets":1},{"name":"cronjob-controller","secrets":1},{"name":"daemon-set-controller","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"deployment-controller","secrets":1},{"name":"disruption-controller","secrets":1},{"name":"endpoint-controller","secrets":1},{"name":"endpointslice-controller","secrets":1},{"name":"endpointslicemirroring-controller","secrets":1},{"name":"ephemeral-volume-controller","secrets":1},{"name":"expand-controller","secrets":1},{"name":"generic-garbage-collector","secrets":1},{"name":"horizontal-pod-autoscaler","secrets":1},{"name":"job-controller","secrets":1},{"name":"legacy-service-account-token-cleaner","secrets":1},{"name":"namespace-controller","secrets":1},{"name":"node-controller","secrets":1},{"name":"persistent-volume-binder","secrets":1},{"name":"pod-garbage-collector","secrets":1},{"name":"pv-protection-controller","secrets":1},{"name":"pvc-protection-controller","secrets":1},{"name":"replicaset-controller","secrets":1},{"name":"replication-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"root-ca-cert-publisher","secrets":1},{"name":"service-account-controller","secrets":1},{"name":"service-ca-cert-publisher","secrets":1},{"name":"statefulset-controller","secrets":1},{"name":"ttl-after-finished-controller","secrets":1},{"name":"validatingadmissionpolicy-status-controller","secrets":1}],"openshift":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-sa","secrets":1}],"openshift-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-operator","secrets":1}],"openshift-authentication":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-openshift","secrets":1}],"openshift-authentication-operator":[{"name":"authentication-operator","secrets":1},{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-catalogd":[{"name":"builder","secrets":1},{"name":"catalogd-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager":[{"name":"builder","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"cloud-node-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"cluster-cloud-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-credential-operator":[{"name":"builder","secrets":1},{"name":"cloud-credential-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-network-config-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-platform-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-csi-drivers":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-machine-approver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-approver-sa","secrets":1}],"openshift-cluster-node-tuning-operator":[{"name":"builder","secrets":1},{"name":"cluster-node-tuning-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"tuned","secrets":1}],"openshift-cluster-olm-operator":[{"name":"builder","secrets":1},{"name":"cluster-olm-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-samples-operator":[{"name":"builder","secrets":1},{"name":"cluster-samples-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-storage-operator":[{"name":"builder","secrets":1},{"name":"cluster-storage-operator","secrets":1},{"name":"csi-snapshot-controller","secrets":1},{"name":"csi-snapshot-controller-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-version":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-managed":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-config-operator","secrets":1}],"openshift-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-sa","secrets":1}],"openshift-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-operator","secrets":1}],"openshift-dns":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns","secrets":1},{"name":"node-resolver","secrets":1}],"openshift-dns-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns-operator","secrets":1}],"openshift-etcd":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-backup-sa","secrets":1},{"name":"etcd-sa","secrets":1},{"name":"installer-sa","secrets":1}],"openshift-etcd-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-operator","secrets":1}],"openshift-host-network":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-image-registry":[{"name":"builder","secrets":1},{"name":"cluster-image-registry-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"node-ca","secrets":1},{"name":"pruner","secrets":1}],"openshift-infra":[{"name":"build-config-change-controller","secrets":1},{"name":"build-controller","secrets":1},{"name":"builder","secrets":1},{"name":"cluster-csr-approver-controller","secrets":1},{"name":"cluster-quota-reconciliation-controller","secrets":1},{"name":"default","secrets":1},{"name":"default-rolebindings-controller","secrets":1},{"name":"deployer","secrets":1},{"name":"deployer-controller","secrets":1},{"name":"deploymentconfig-controller","secrets":1},{"name":"image-import-controller","secrets":1},{"name":"image-trigger-controller","secrets":1},{"name":"ingress-to-route-controller","secrets":1},{"name":"namespace-security-allocation-controller","secrets":1},{"name":"node-bootstrapper","secrets":1},{"name":"origin-namespace-controller","secrets":1},{"name":"podsecurity-admission-label-syncer-controller","secrets":1},{"name":"privileged-namespaces-psa-label-syncer","secrets":1},{"name":"pv-recycler-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"serviceaccount-controller","secrets":1},{"name":"serviceaccount-pull-secrets-controller","secrets":1},{"name":"template-instance-controller","secrets":1},{"name":"template-instance-finalizer-controller","secrets":1},{"name":"unidling-controller","secrets":1}],"openshift-ingress":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"router","secrets":1}],"openshift-ingress-canary":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ingress-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ingress-operator","secrets":1}],"openshift-insights":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"gather","secrets":1},{"name":"operator","secrets":1}],"openshift-kni-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-kube-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-apiserver-operator","secrets":1}],"openshift-kube-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"kube-controller-manager-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-controller-manager-operator","secrets":1}],"openshift-kube-scheduler":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1},{"name":"openshift-kube-scheduler-sa","secrets":1}],"openshift-kube-scheduler-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-kube-scheduler-operator","secrets":1}],"openshift-kube-storage-version-migrator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-sa","secrets":1}],"openshift-kube-storage-version-migrator-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-operator","secrets":1}],"openshift-machine-api":[{"name":"builder","secrets":1},{"name":"cluster-autoscaler","secrets":1},{"name":"cluster-autoscaler-operator","secrets":1},{"name":"cluster-baremetal-operator","secrets":1},{"name":"control-plane-machine-set-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-api-controllers","secrets":1},{"name":"machine-api-operator","secrets":1},{"name":"machine-api-termination-handler","secrets":1}],"openshift-machine-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-config-controller","secrets":1},{"name":"machine-config-daemon","secrets":1},{"name":"machine-config-operator","secrets":1},{"name":"machine-config-server","secrets":1},{"name":"machine-os-builder","secrets":1},{"name":"machine-os-puller","secrets":1},{"name":"node-bootstrapper","secrets":1}],"openshift-marketplace":[{"name":"builder","secrets":1},{"name":"certified-operators","secrets":1},{"name":"community-operators","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"marketplace-operator","secrets":1},{"name":"redhat-marketplace","secrets":1},{"name":"redhat-operators","secrets":1}],"openshift-monitoring":[{"name":"builder","secrets":1},{"name":"cluster-monitoring-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-state-metrics","secrets":1},{"name":"metrics-server","secrets":1},{"name":"node-exporter","secrets":1},{"name":"openshift-state-metrics","secrets":1},{"name":"prometheus-operator","secrets":1},{"name":"prometheus-operator-admission-webhook","secrets":1}],"openshift-multus":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"metrics-daemon-sa","secrets":1},{"name":"multus","secrets":1},{"name":"multus-ac","secrets":1},{"name":"multus-ancillary-tools","secrets":1}],"openshift-network-diagnostics":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-diagnostics","secrets":1}],"openshift-network-node-identity":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-node-identity","secrets":1}],"openshift-network-operator":[{"name":"builder","secrets":1},{"name":"cluster-network-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"iptables-alerter","secrets":1}],"openshift-node":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-nutanix-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-oauth-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-apiserver-sa","secrets":1}],"openshift-openstack-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-operator-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"operator-controller-controller-manager","secrets":1}],"openshift-operator-lifecycle-manager":[{"name":"builder","secrets":1},{"name":"collect-profiles","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"olm-operator-serviceaccount","secrets":1}],"openshift-operators":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovirt-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovn-kubernetes":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ovn-kubernetes-control-plane","secrets":1},{"name":"ovn-kubernetes-node","secrets":1}],"openshift-route-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"route-controller-manager-sa","secrets":1}],"openshift-service-ca":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca","secrets":1}],"openshift-service-ca-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca-operator","secrets":1}],"openshift-user-workload-monitoring":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-vsphere-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}]}}}config/installplans.json0000640000000000000000000000010015144705171014100 0ustar0000000000000000{"items":null,"stats":{"TOTAL_COUNT":0,"TOTAL_NONUNIQ_COUNT":0}}config/node/logs/master-0.log0000640000000000000000000002250115144705156014541 0ustar0000000000000000Feb 16 21:18:34.739443 master-0 kubenswrapper[7926]: E0216 21:18:34.738824 7926 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-controller-manager\" with CrashLoopBackOff: \"back-off 5m0s restarting failed container=kube-controller-manager pod=bootstrap-kube-controller-manager-master-0_kube-system(80420f2e7c3cdda71f7d0d6ccbe6f9f3)\"" pod="kube-system/bootstrap-kube-controller-manager-master-0" podUID="80420f2e7c3cdda71f7d0d6ccbe6f9f3" Feb 16 21:18:49.738448 master-0 kubenswrapper[7926]: E0216 21:18:49.738398 7926 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-controller-manager\" with CrashLoopBackOff: \"back-off 5m0s restarting failed container=kube-controller-manager pod=bootstrap-kube-controller-manager-master-0_kube-system(80420f2e7c3cdda71f7d0d6ccbe6f9f3)\"" pod="kube-system/bootstrap-kube-controller-manager-master-0" podUID="80420f2e7c3cdda71f7d0d6ccbe6f9f3" Feb 16 21:19:04.744235 master-0 kubenswrapper[7926]: E0216 21:19:04.744182 7926 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-controller-manager\" with CrashLoopBackOff: \"back-off 5m0s restarting failed container=kube-controller-manager pod=bootstrap-kube-controller-manager-master-0_kube-system(80420f2e7c3cdda71f7d0d6ccbe6f9f3)\"" pod="kube-system/bootstrap-kube-controller-manager-master-0" podUID="80420f2e7c3cdda71f7d0d6ccbe6f9f3" Feb 16 21:19:15.739184 master-0 kubenswrapper[7926]: E0216 21:19:15.739120 7926 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-controller-manager\" with CrashLoopBackOff: \"back-off 5m0s restarting failed container=kube-controller-manager pod=bootstrap-kube-controller-manager-master-0_kube-system(80420f2e7c3cdda71f7d0d6ccbe6f9f3)\"" pod="kube-system/bootstrap-kube-controller-manager-master-0" podUID="80420f2e7c3cdda71f7d0d6ccbe6f9f3" Feb 16 21:19:28.744092 master-0 kubenswrapper[7926]: E0216 21:19:28.744016 7926 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-controller-manager\" with CrashLoopBackOff: \"back-off 5m0s restarting failed container=kube-controller-manager pod=bootstrap-kube-controller-manager-master-0_kube-system(80420f2e7c3cdda71f7d0d6ccbe6f9f3)\"" pod="kube-system/bootstrap-kube-controller-manager-master-0" podUID="80420f2e7c3cdda71f7d0d6ccbe6f9f3" Feb 16 21:19:57.824436 master-0 kubenswrapper[7926]: E0216 21:19:57.824133 7926 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="2cf5e26c-84a2-45c6-b7dc-ee96dad23175" containerName="installer" Feb 16 21:20:00.044193 master-0 kubenswrapper[7926]: E0216 21:20:00.044157 7926 secret.go:189] Couldn't get secret openshift-monitoring/node-exporter-tls: secret "node-exporter-tls" not found Feb 16 21:20:00.044251 master-0 kubenswrapper[7926]: E0216 21:20:00.044230 7926 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/7d6eb694-9a3d-49d1-bbc1-74ba4450d673-node-exporter-tls podName:7d6eb694-9a3d-49d1-bbc1-74ba4450d673 nodeName:}" failed. No retries permitted until 2026-02-16 21:20:00.544212605 +0000 UTC m=+1372.179112905 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "node-exporter-tls" (UniqueName: "kubernetes.io/secret/7d6eb694-9a3d-49d1-bbc1-74ba4450d673-node-exporter-tls") pod "node-exporter-ctvb2" (UID: "7d6eb694-9a3d-49d1-bbc1-74ba4450d673") : secret "node-exporter-tls" not found Feb 16 21:20:00.044540 master-0 kubenswrapper[7926]: E0216 21:20:00.044510 7926 secret.go:189] Couldn't get secret openshift-monitoring/openshift-state-metrics-tls: secret "openshift-state-metrics-tls" not found Feb 16 21:20:00.044594 master-0 kubenswrapper[7926]: E0216 21:20:00.044572 7926 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/f7b30888-5994-4968-9db6-9533ac60c92e-openshift-state-metrics-tls podName:f7b30888-5994-4968-9db6-9533ac60c92e nodeName:}" failed. No retries permitted until 2026-02-16 21:20:00.544555923 +0000 UTC m=+1372.179456433 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "openshift-state-metrics-tls" (UniqueName: "kubernetes.io/secret/f7b30888-5994-4968-9db6-9533ac60c92e-openshift-state-metrics-tls") pod "openshift-state-metrics-546cc7d765-s4j9z" (UID: "f7b30888-5994-4968-9db6-9533ac60c92e") : secret "openshift-state-metrics-tls" not found Feb 16 21:20:00.045233 master-0 kubenswrapper[7926]: E0216 21:20:00.044986 7926 secret.go:189] Couldn't get secret openshift-monitoring/kube-state-metrics-tls: secret "kube-state-metrics-tls" not found Feb 16 21:20:00.045233 master-0 kubenswrapper[7926]: E0216 21:20:00.045023 7926 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/e9bd1f48-6d45-4045-b18e-46ce3005d51d-kube-state-metrics-tls podName:e9bd1f48-6d45-4045-b18e-46ce3005d51d nodeName:}" failed. No retries permitted until 2026-02-16 21:20:00.545013536 +0000 UTC m=+1372.179913836 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-state-metrics-tls" (UniqueName: "kubernetes.io/secret/e9bd1f48-6d45-4045-b18e-46ce3005d51d-kube-state-metrics-tls") pod "kube-state-metrics-7cc9598d54-n467n" (UID: "e9bd1f48-6d45-4045-b18e-46ce3005d51d") : secret "kube-state-metrics-tls" not found Feb 16 21:20:05.211643 master-0 kubenswrapper[7926]: E0216 21:20:05.211188 7926 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="ebeb6876-0438-4961-a62a-68b41a676f17" containerName="collect-profiles" Feb 16 21:20:11.187953 master-0 kubenswrapper[7926]: E0216 21:20:11.187904 7926 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"ingress-operator\" with CrashLoopBackOff: \"back-off 5m0s restarting failed container=ingress-operator pod=ingress-operator-c588d8cb4-6ps2d_openshift-ingress-operator(cef33294-81fb-41a2-811d-2565f94514d1)\"" pod="openshift-ingress-operator/ingress-operator-c588d8cb4-6ps2d" podUID="cef33294-81fb-41a2-811d-2565f94514d1" Feb 16 21:20:24.742211 master-0 kubenswrapper[7926]: E0216 21:20:24.742119 7926 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"ingress-operator\" with CrashLoopBackOff: \"back-off 5m0s restarting failed container=ingress-operator pod=ingress-operator-c588d8cb4-6ps2d_openshift-ingress-operator(cef33294-81fb-41a2-811d-2565f94514d1)\"" pod="openshift-ingress-operator/ingress-operator-c588d8cb4-6ps2d" podUID="cef33294-81fb-41a2-811d-2565f94514d1" Feb 16 21:20:38.742100 master-0 kubenswrapper[7926]: E0216 21:20:38.741953 7926 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"ingress-operator\" with CrashLoopBackOff: \"back-off 5m0s restarting failed container=ingress-operator pod=ingress-operator-c588d8cb4-6ps2d_openshift-ingress-operator(cef33294-81fb-41a2-811d-2565f94514d1)\"" pod="openshift-ingress-operator/ingress-operator-c588d8cb4-6ps2d" podUID="cef33294-81fb-41a2-811d-2565f94514d1" Feb 16 21:20:51.739574 master-0 kubenswrapper[7926]: E0216 21:20:51.739511 7926 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"ingress-operator\" with CrashLoopBackOff: \"back-off 5m0s restarting failed container=ingress-operator pod=ingress-operator-c588d8cb4-6ps2d_openshift-ingress-operator(cef33294-81fb-41a2-811d-2565f94514d1)\"" pod="openshift-ingress-operator/ingress-operator-c588d8cb4-6ps2d" podUID="cef33294-81fb-41a2-811d-2565f94514d1" Feb 16 21:21:03.739719 master-0 kubenswrapper[7926]: E0216 21:21:03.739695 7926 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"ingress-operator\" with CrashLoopBackOff: \"back-off 5m0s restarting failed container=ingress-operator pod=ingress-operator-c588d8cb4-6ps2d_openshift-ingress-operator(cef33294-81fb-41a2-811d-2565f94514d1)\"" pod="openshift-ingress-operator/ingress-operator-c588d8cb4-6ps2d" podUID="cef33294-81fb-41a2-811d-2565f94514d1" Feb 16 21:21:15.740455 master-0 kubenswrapper[7926]: E0216 21:21:15.740391 7926 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"ingress-operator\" with CrashLoopBackOff: \"back-off 5m0s restarting failed container=ingress-operator pod=ingress-operator-c588d8cb4-6ps2d_openshift-ingress-operator(cef33294-81fb-41a2-811d-2565f94514d1)\"" pod="openshift-ingress-operator/ingress-operator-c588d8cb4-6ps2d" podUID="cef33294-81fb-41a2-811d-2565f94514d1" Feb 16 21:21:28.746311 master-0 kubenswrapper[7926]: E0216 21:21:28.746252 7926 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"ingress-operator\" with CrashLoopBackOff: \"back-off 5m0s restarting failed container=ingress-operator pod=ingress-operator-c588d8cb4-6ps2d_openshift-ingress-operator(cef33294-81fb-41a2-811d-2565f94514d1)\"" pod="openshift-ingress-operator/ingress-operator-c588d8cb4-6ps2d" podUID="cef33294-81fb-41a2-811d-2565f94514d1" Feb 16 21:21:39.738830 master-0 kubenswrapper[7926]: E0216 21:21:39.738799 7926 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"ingress-operator\" with CrashLoopBackOff: \"back-off 5m0s restarting failed container=ingress-operator pod=ingress-operator-c588d8cb4-6ps2d_openshift-ingress-operator(cef33294-81fb-41a2-811d-2565f94514d1)\"" pod="openshift-ingress-operator/ingress-operator-c588d8cb4-6ps2d" podUID="cef33294-81fb-41a2-811d-2565f94514d1"aggregated/unused_machine_configs_count.json0000640000000000000000000000004215144705156020140 0ustar0000000000000000{"unused_machineconfigs_count":21}config/machineconfigs/rendered-worker-2c2dea919cf2d7a2a500e7c50f03b150.json0000640000000000000000000004054015144705156024074 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","metadata":{"annotations":{"machineconfiguration.openshift.io/generated-by-controller-version":"0b0569287da3daea19bf47aa298037ccb4cbff98","machineconfiguration.openshift.io/release-image-version":"4.18.32"},"creationTimestamp":"2026-02-16T21:06:29Z","generation":1,"name":"rendered-worker-2c2dea919cf2d7a2a500e7c50f03b150","ownerReferences":[{"apiVersion":"machineconfiguration.openshift.io/v1","blockOwnerDeletion":true,"controller":true,"kind":"MachineConfigPool","name":"worker","uid":"9d023631-d130-47d2-80f1-218670697d02"}],"resourceVersion":"10622","uid":"b779c011-6e3f-44ee-b47f-f0fcd7e6d356"},"spec":{"baseOSExtensionsContainerImage":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee7b795566b8bd3a23d3186c8412e8cc1338556850ecac38c6734c20191fea91","config":{"ignition":{"version":"3.4.0"},"passwd":{"users":null},"storage":{"files":null},"systemd":{"units":[{"contents":"[Unit]\nDescription=Cleans NetworkManager state generated by dracut\n# Removal of this file signals firstboot completion\nConditionPathExists=!/etc/ignition-machine-config-encapsulated.json\n# This is opt-in for some deployment types, and opt-out for others.\nConditionPathExists=/var/lib/mco/nm-clean-initrd-state\nWants=network-pre.target\nBefore=network-pre.target\n\n[Service]\nType=oneshot\n# Remove any existing state possibly generated NM run by dracut. We want NM to\n# consider all profiles autoconnect priority when it starts instead of\n# remembering which profile was a device activated with when NM is run by\n# dracut.\nExecStart=/usr/local/bin/nm-clean-initrd-state.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"NetworkManager-clean-initrd-state.service"},{"dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"ENABLE_PROFILE_UNIX_SOCKET=true\"\n","name":"10-mco-profile-unix-socket.conf"},{"contents":"[Unit]\nAfter=kubelet-dependencies.target\nRequires=kubelet-dependencies.target\n","name":"05-mco-ordering.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"name":"crio.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"docker.socket"},{"contents":"[Unit]\nDescription=The firstboot OS update has completed\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target\n\n[Install]\nWantedBy=default.target\n","enabled":true,"name":"firstboot-osupdate.target"},{"dropins":[{"contents":"[Unit]\nAfter=ovs-configuration.service\nBefore=crio.service\n","name":"01-after-configure-ovs.conf"}],"name":"ipsec.service"},{"contents":"[Unit]\nDescription=Dynamically sets the system reserved for the kubelet\nWants=network-online.target\nAfter=network-online.target firstboot-osupdate.target\nBefore=kubelet-dependencies.target\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nRemainAfterExit=yes\nEnvironmentFile=/etc/node-sizing-enabled.env\nExecStart=/bin/bash /usr/local/sbin/dynamic-system-reserved-calc.sh ${NODE_SIZING_ENABLED} ${SYSTEM_RESERVED_MEMORY} ${SYSTEM_RESERVED_CPU} ${SYSTEM_RESERVED_ES}\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"kubelet-auto-node-size.service"},{"contents":"[Unit]\nDescription=Dependencies necessary to run kubelet\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target network-online.target\nWants=NetworkManager-wait-online.service crio-wipe.service\nWants=rpc-statd.service chrony-wait.service\n","name":"kubelet-dependencies.target"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet\nRequires=crio.service kubelet-dependencies.target\nAfter=kubelet-dependencies.target\nAfter=ostree-finalize-staged.service\n\n[Service]\nType=notify\nExecStartPre=/bin/mkdir --parents /etc/kubernetes/manifests\nExecStartPre=-/usr/sbin/restorecon -ri /var/lib/kubelet/pod-resources /usr/local/bin/kubenswrapper /usr/bin/kubensenter\nEnvironment=\"KUBELET_NODE_IP=0.0.0.0\"\nEnvironmentFile=/etc/os-release\nEnvironmentFile=-/etc/kubernetes/kubelet-workaround\nEnvironmentFile=-/etc/kubernetes/kubelet-env\nEnvironmentFile=/etc/node-sizing.env\n\nExecStart=/usr/local/bin/kubenswrapper \\\n /usr/bin/kubelet \\\n --config=/etc/kubernetes/kubelet.conf \\\n --bootstrap-kubeconfig=/etc/kubernetes/kubeconfig \\\n --kubeconfig=/var/lib/kubelet/kubeconfig \\\n --container-runtime-endpoint=/var/run/crio/crio.sock \\\n --runtime-cgroups=/system.slice/crio.service \\\n --node-labels=node-role.kubernetes.io/worker,node.openshift.io/os_id=${ID} \\\n --node-ip=${KUBELET_NODE_IP} \\\n --minimum-container-ttl-duration=6m0s \\\n --volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec \\\n --cloud-provider= \\\n \\\n --hostname-override=${KUBELET_NODE_NAME} \\\n --provider-id=${KUBELET_PROVIDERID} \\\n --pod-infra-container-image=quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1593b6aac7bb18c1bbb5d41693e8b8c7f0c0410fcc09e15de52d8bd53e356541 \\\n --system-reserved=cpu=${SYSTEM_RESERVED_CPU},memory=${SYSTEM_RESERVED_MEMORY},ephemeral-storage=${SYSTEM_RESERVED_ES} \\\n --v=${KUBELET_LOG_LEVEL}\n\nRestart=always\nRestartSec=10\n\n[Install]\nWantedBy=multi-user.target\n","dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"enabled":true,"name":"kubelet.service"},{"contents":"[Unit]\nDescription=Manages a mount namespace for kubernetes-specific mounts\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nRuntimeDirectory=kubens\nEnvironment=RUNTIME_DIRECTORY=%t/kubens\nEnvironment=BIND_POINT=%t/kubens/mnt\nEnvironment=ENVFILE=%t/kubens/env\n\n# Set up the runtime directory as an unbindable mountpoint\nExecStartPre=bash -c \"findmnt ${RUNTIME_DIRECTORY} || mount --make-unbindable --bind ${RUNTIME_DIRECTORY} ${RUNTIME_DIRECTORY}\"\n# Ensure the bind point exists\nExecStartPre=touch ${BIND_POINT}\n# Use 'unshare' to create the new mountpoint, then 'mount --make-rshared' so it cascades internally\nExecStart=unshare --mount=${BIND_POINT} --propagation slave mount --make-rshared /\n# Finally, set an env pointer for ease-of-use\nExecStartPost=bash -c 'echo \"KUBENSMNT=${BIND_POINT}\" \u003e \"${ENVFILE}\"'\n\n# On stop, a recursive unmount cleans up the namespace and bind-mounted unbindable parent directory\nExecStop=umount -R ${RUNTIME_DIRECTORY}\n\n[Install]\nWantedBy=multi-user.target\n","enabled":false,"name":"kubens.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Firstboot\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# Removal of this file signals firstboot completion\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\nAfter=machine-config-daemon-pull.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\n# Disable existing repos (if any) so that OS extensions would use embedded RPMs only\nExecStartPre=-/usr/bin/sh -c \"sed -i 's/enabled=1/enabled=0/' /etc/yum.repos.d/*.repo\"\n# Run this via podman because we want to use the nmstatectl binary in our container\nExecStart=/usr/bin/podman run --rm --privileged --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42' firstboot-complete-machineconfig --persist-nics\nExecStart=/usr/bin/podman run --rm --privileged --pid=host --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42' firstboot-complete-machineconfig\n[Install]\nRequiredBy=firstboot-osupdate.target\n","enabled":true,"name":"machine-config-daemon-firstboot.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Pull\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# This \"stamp file\" is unlinked when we complete\n# machine-config-daemon-firstboot.service\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\n# Run after crio-wipe so the pulled MCD image is protected against a corrupted storage from a forced shutdown\nWants=crio-wipe.service NetworkManager-wait-online.service\nAfter=crio-wipe.service NetworkManager-wait-online.service network.service\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nExecStartPre=/etc/machine-config-daemon/generate_podman_policy_args.sh\nExecStart=/bin/sh -c \"while ! /usr/bin/podman pull $(cat /tmp/podman_policy_args) --authfile=/var/lib/kubelet/config.json 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42'; do sleep 1; done\"\n\n[Install]\nRequiredBy=machine-config-daemon-firstboot.service\n","enabled":true,"name":"machine-config-daemon-pull.service"},{"contents":"[Unit]\nDescription=Applies per-node NMState network configuration\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service\nBefore=nmstate.service kubelet-dependencies.target ovs-configuration.service node-valid-hostname.service\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/usr/local/bin/nmstate-configuration.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"nmstate-configuration.service"},{"contents":"[Unit]\nDescription=Apply nmstate on-disk state\nDocumentation=man:nmstate.service(8) https://www.nmstate.io\nAfter=NetworkManager-wait-online.service\nBefore=network-online.target\nWants=NetworkManager-wait-online.service\nRequires=NetworkManager.service\n\n[Service]\nType=oneshot\nExecStart=/usr/bin/nmstatectl service\nRemainAfterExit=yes\n\n[Install]\nWantedBy=NetworkManager.service\n","enabled":true,"name":"nmstate.service"},{"contents":"[Unit]\nDescription=Wait for a non-localhost hostname\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nUser=root\nExecStart=/usr/local/bin/mco-hostname --wait\n\n# Wait up to 5min for the node to get a non-localhost name\nTimeoutSec=300\n\n[Install]\n# TODO: Change this to RequiredBy after we fix https://github.com/openshift/machine-config-operator/pull/3865#issuecomment-1746963115\nWantedBy=kubelet-dependencies.target\n","enabled":true,"name":"node-valid-hostname.service"},{"contents":"[Unit]\nDescription=Writes IP address configuration so that kubelet and crio services select a valid node IP\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service firstboot-osupdate.target\nBefore=kubelet-dependencies.target ovs-configuration.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/bin/podman run --rm \\\n --authfile /var/lib/kubelet/config.json \\\n --env 'ENABLE_NODEIP_DEBUG=true' \\\n --net=host \\\n --security-opt label=disable \\\n --volume /etc/systemd/system:/etc/systemd/system \\\n --volume /run/nodeip-configuration:/run/nodeip-configuration \\\n quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:07093043bca0089b3c56d9e5331e68f549541e5661e2a39a260aa534dc9528bd \\\n node-ip \\\n set \\\n --retry-on-failure \\\n --network-type OVNKubernetes \\\n ${NODEIP_HINT:-${KUBELET_NODEIP_HINT:-}}; \\\n do \\\n sleep 5; \\\n done\"\nExecStart=/bin/systemctl daemon-reload\nExecStartPre=/bin/mkdir -p /run/nodeip-configuration\nStandardOutput=journal+console\nStandardError=journal+console\n\nEnvironmentFile=-/etc/default/nodeip-configuration\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"nodeip-configuration.service"},{"enabled":true,"name":"openvswitch.service"},{"contents":"[Unit]\n# Kdump will generate it's initramfs based on the running state when kdump.service run\n# If OVS has already run, the kdump fails to gather a working network config,\n# which prevent network log exports, sush as SSH.\n# See https://issues.redhat.com/browse/OCPBUGS-28239\nAfter=kdump.service\nDescription=Configures OVS with proper host networking configuration\n# This service is used to move a physical NIC into OVS and reconfigure OVS to use the host IP\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=firstboot-osupdate.target\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service nmstate.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nExecStart=/usr/local/bin/configure-ovs.sh OVNKubernetes\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"ovs-configuration.service"},{"dropins":[{"contents":"[Service]\nRestart=always\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /var/lib/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /etc/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /run/openvswitch'\nExecStartPost=-/usr/bin/ovs-appctl vlog/set syslog:info\nExecReload=-/usr/bin/ovs-appctl vlog/set syslog:info\n","name":"10-ovs-vswitchd-restart.conf"}],"name":"ovs-vswitchd.service"},{"dropins":[{"contents":"[Service]\nRestart=always\n","name":"10-ovsdb-restart.conf"}],"enabled":true,"name":"ovsdb-server.service"},{"dropins":[{"contents":"","name":"10-mco-default-env.conf"}],"name":"rpm-ostreed.service"},{"contents":"[Unit]\nDescription=Ensure IKE SA established for existing IPsec connections.\nAfter=ipsec.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\nType=oneshot\nExecStart=/usr/local/bin/ipsec-connect-wait.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=ipsec.service\n","enabled":true,"name":"wait-for-ipsec-connect.service"},{"contents":"[Unit]\nDescription=Ensure primary IP is assigned and usable\nRequires=nmstate.service\nAfter=nmstate.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/local/bin/wait-for-primary-ip.sh; \\\n do \\\n sleep 10; \\\n done\"\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"wait-for-primary-ip.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"zincati.service"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet After Reboot Cleanup\nBefore=kubelet.service\n\n[Service]\nType=oneshot\nExecStart=/bin/rm -f /var/lib/kubelet/cpu_manager_state\nExecStart=/bin/rm -f /var/lib/kubelet/memory_manager_state\nExecStart=-/bin/rm -f /var/lib/kubelet/dra_manager_state\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"kubelet-cleanup.service"}]}},"extensions":[],"fips":false,"kernelArguments":["systemd.unified_cgroup_hierarchy=1","cgroup_no_v1=\"all\"","psi=0"],"kernelType":"default","osImageURL":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4aa42a4b31390d46f924ce2d0c4da772bfbf6a5e1e121bdb0f8b69f989e0a0db"}}config/machineconfigs/rendered-master-c4f31ac656de3dac86533ebda7753660.json0000640000000000000000000004333015144705156024107 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","metadata":{"annotations":{"machineconfiguration.openshift.io/generated-by-controller-version":"0b0569287da3daea19bf47aa298037ccb4cbff98","machineconfiguration.openshift.io/release-image-version":"4.18.32"},"creationTimestamp":"2026-02-16T21:06:29Z","generation":1,"name":"rendered-master-c4f31ac656de3dac86533ebda7753660","ownerReferences":[{"apiVersion":"machineconfiguration.openshift.io/v1","blockOwnerDeletion":true,"controller":true,"kind":"MachineConfigPool","name":"master","uid":"1ae64b87-0f37-463c-97e4-e0c747d1af3d"}],"resourceVersion":"10624","uid":"68ca9719-b931-4feb-afd8-3b304d0532ad"},"spec":{"baseOSExtensionsContainerImage":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ee7b795566b8bd3a23d3186c8412e8cc1338556850ecac38c6734c20191fea91","config":{"ignition":{"version":"3.4.0"},"passwd":{"users":null},"storage":{"disks":[{"device":"/dev/vdc","wipeTable":true},{"device":"/dev/vdd","wipeTable":true},{"device":"/dev/vde","wipeTable":true}],"files":null},"systemd":{"units":[{"contents":"[Unit]\nDescription=Cleans NetworkManager state generated by dracut\n# Removal of this file signals firstboot completion\nConditionPathExists=!/etc/ignition-machine-config-encapsulated.json\n# This is opt-in for some deployment types, and opt-out for others.\nConditionPathExists=/var/lib/mco/nm-clean-initrd-state\nWants=network-pre.target\nBefore=network-pre.target\n\n[Service]\nType=oneshot\n# Remove any existing state possibly generated NM run by dracut. We want NM to\n# consider all profiles autoconnect priority when it starts instead of\n# remembering which profile was a device activated with when NM is run by\n# dracut.\nExecStart=/usr/local/bin/nm-clean-initrd-state.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"NetworkManager-clean-initrd-state.service"},{"dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"ENABLE_PROFILE_UNIX_SOCKET=true\"\n","name":"10-mco-profile-unix-socket.conf"},{"contents":"[Unit]\nAfter=kubelet-dependencies.target\nRequires=kubelet-dependencies.target\n","name":"05-mco-ordering.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"name":"crio.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"docker.socket"},{"contents":"[Unit]\nDescription=The firstboot OS update has completed\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target\n\n[Install]\nWantedBy=default.target\n","enabled":true,"name":"firstboot-osupdate.target"},{"dropins":[{"contents":"[Unit]\nAfter=ovs-configuration.service\nBefore=crio.service\n","name":"01-after-configure-ovs.conf"}],"name":"ipsec.service"},{"contents":"[Unit]\nDescription=Dynamically sets the system reserved for the kubelet\nWants=network-online.target\nAfter=network-online.target firstboot-osupdate.target\nBefore=kubelet-dependencies.target\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nRemainAfterExit=yes\nEnvironmentFile=/etc/node-sizing-enabled.env\nExecStart=/bin/bash /usr/local/sbin/dynamic-system-reserved-calc.sh ${NODE_SIZING_ENABLED} ${SYSTEM_RESERVED_MEMORY} ${SYSTEM_RESERVED_CPU} ${SYSTEM_RESERVED_ES}\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"kubelet-auto-node-size.service"},{"contents":"[Unit]\nDescription=Dependencies necessary to run kubelet\nDocumentation=https://github.com/openshift/machine-config-operator/\nRequires=basic.target network-online.target\nWants=NetworkManager-wait-online.service crio-wipe.service\nWants=rpc-statd.service chrony-wait.service\n","name":"kubelet-dependencies.target"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet\nRequires=crio.service kubelet-dependencies.target\nAfter=kubelet-dependencies.target\nAfter=ostree-finalize-staged.service\n\n[Service]\nType=notify\nExecStartPre=/bin/mkdir --parents /etc/kubernetes/manifests\nExecStartPre=-/usr/sbin/restorecon -ri /var/lib/kubelet/pod-resources /usr/local/bin/kubenswrapper /usr/bin/kubensenter\nEnvironment=\"KUBELET_NODE_IP=0.0.0.0\"\nEnvironmentFile=/etc/os-release\nEnvironmentFile=-/etc/kubernetes/kubelet-workaround\nEnvironmentFile=-/etc/kubernetes/kubelet-env\nEnvironmentFile=/etc/node-sizing.env\n\nExecStart=/usr/local/bin/kubenswrapper \\\n /usr/bin/kubelet \\\n --config=/etc/kubernetes/kubelet.conf \\\n --bootstrap-kubeconfig=/etc/kubernetes/kubeconfig \\\n --kubeconfig=/var/lib/kubelet/kubeconfig \\\n --container-runtime-endpoint=/var/run/crio/crio.sock \\\n --runtime-cgroups=/system.slice/crio.service \\\n --node-labels=node-role.kubernetes.io/control-plane,node-role.kubernetes.io/master,node.openshift.io/os_id=${ID} \\\n --node-ip=${KUBELET_NODE_IP} \\\n --minimum-container-ttl-duration=6m0s \\\n --cloud-provider= \\\n --volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec \\\n \\\n --hostname-override=${KUBELET_NODE_NAME} \\\n --provider-id=${KUBELET_PROVIDERID} \\\n --register-with-taints=node-role.kubernetes.io/master=:NoSchedule \\\n --pod-infra-container-image=quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1593b6aac7bb18c1bbb5d41693e8b8c7f0c0410fcc09e15de52d8bd53e356541 \\\n --system-reserved=cpu=${SYSTEM_RESERVED_CPU},memory=${SYSTEM_RESERVED_MEMORY},ephemeral-storage=${SYSTEM_RESERVED_ES} \\\n --v=${KUBELET_LOG_LEVEL}\n\nRestart=always\nRestartSec=10\n\n[Install]\nWantedBy=multi-user.target\n","dropins":[{"contents":"# vim:set ft=systemd :\n#\n# This drop-in will enable any service built with this\n# github.com/containers/kubemntns library to properly join the mount namespace\n# managed by kubens.service\n#\n\n[Unit]\nAfter=kubens.service\n\n[Service]\nEnvironmentFile=-/run/kubens/env\n","name":"01-kubens.conf"},{"contents":"","name":"10-mco-default-env.conf"},{"contents":"[Service]\nEnvironment=\"GODEBUG=x509ignoreCN=0,madvdontneed=1\"\n","name":"10-mco-default-madv.conf"}],"enabled":true,"name":"kubelet.service"},{"contents":"[Unit]\nDescription=Manages a mount namespace for kubernetes-specific mounts\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nRuntimeDirectory=kubens\nEnvironment=RUNTIME_DIRECTORY=%t/kubens\nEnvironment=BIND_POINT=%t/kubens/mnt\nEnvironment=ENVFILE=%t/kubens/env\n\n# Set up the runtime directory as an unbindable mountpoint\nExecStartPre=bash -c \"findmnt ${RUNTIME_DIRECTORY} || mount --make-unbindable --bind ${RUNTIME_DIRECTORY} ${RUNTIME_DIRECTORY}\"\n# Ensure the bind point exists\nExecStartPre=touch ${BIND_POINT}\n# Use 'unshare' to create the new mountpoint, then 'mount --make-rshared' so it cascades internally\nExecStart=unshare --mount=${BIND_POINT} --propagation slave mount --make-rshared /\n# Finally, set an env pointer for ease-of-use\nExecStartPost=bash -c 'echo \"KUBENSMNT=${BIND_POINT}\" \u003e \"${ENVFILE}\"'\n\n# On stop, a recursive unmount cleans up the namespace and bind-mounted unbindable parent directory\nExecStop=umount -R ${RUNTIME_DIRECTORY}\n\n[Install]\nWantedBy=multi-user.target\n","enabled":false,"name":"kubens.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Firstboot\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# Removal of this file signals firstboot completion\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\nAfter=machine-config-daemon-pull.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\n# Disable existing repos (if any) so that OS extensions would use embedded RPMs only\nExecStartPre=-/usr/bin/sh -c \"sed -i 's/enabled=1/enabled=0/' /etc/yum.repos.d/*.repo\"\n# Run this via podman because we want to use the nmstatectl binary in our container\nExecStart=/usr/bin/podman run --rm --privileged --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42' firstboot-complete-machineconfig --persist-nics\nExecStart=/usr/bin/podman run --rm --privileged --pid=host --net=host -v /:/rootfs --entrypoint machine-config-daemon 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42' firstboot-complete-machineconfig\n[Install]\nRequiredBy=firstboot-osupdate.target\n","enabled":true,"name":"machine-config-daemon-firstboot.service"},{"contents":"[Unit]\nDescription=Machine Config Daemon Pull\n# Make sure it runs only on OSTree booted system\nConditionPathExists=/run/ostree-booted\n# This \"stamp file\" is unlinked when we complete\n# machine-config-daemon-firstboot.service\nConditionPathExists=/etc/ignition-machine-config-encapsulated.json\n# Run after crio-wipe so the pulled MCD image is protected against a corrupted storage from a forced shutdown\nWants=crio-wipe.service NetworkManager-wait-online.service\nAfter=crio-wipe.service NetworkManager-wait-online.service network.service\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nExecStartPre=/etc/machine-config-daemon/generate_podman_policy_args.sh\nExecStart=/bin/sh -c \"while ! /usr/bin/podman pull $(cat /tmp/podman_policy_args) --authfile=/var/lib/kubelet/config.json 'quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42'; do sleep 1; done\"\n\n[Install]\nRequiredBy=machine-config-daemon-firstboot.service\n","enabled":true,"name":"machine-config-daemon-pull.service"},{"contents":"[Unit]\nDescription=Applies per-node NMState network configuration\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service\nBefore=nmstate.service kubelet-dependencies.target ovs-configuration.service node-valid-hostname.service\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/usr/local/bin/nmstate-configuration.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"nmstate-configuration.service"},{"contents":"[Unit]\nDescription=Apply nmstate on-disk state\nDocumentation=man:nmstate.service(8) https://www.nmstate.io\nAfter=NetworkManager-wait-online.service\nBefore=network-online.target\nWants=NetworkManager-wait-online.service\nRequires=NetworkManager.service\n\n[Service]\nType=oneshot\nExecStart=/usr/bin/nmstatectl service\nRemainAfterExit=yes\n\n[Install]\nWantedBy=NetworkManager.service\n","enabled":true,"name":"nmstate.service"},{"contents":"[Unit]\nDescription=Wait for a non-localhost hostname\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\nRemainAfterExit=yes\nUser=root\nExecStart=/usr/local/bin/mco-hostname --wait\n\n# Wait up to 5min for the node to get a non-localhost name\nTimeoutSec=300\n\n[Install]\n# TODO: Change this to RequiredBy after we fix https://github.com/openshift/machine-config-operator/pull/3865#issuecomment-1746963115\nWantedBy=kubelet-dependencies.target\n","enabled":true,"name":"node-valid-hostname.service"},{"contents":"[Unit]\nDescription=Writes IP address configuration so that kubelet and crio services select a valid node IP\nWants=NetworkManager-wait-online.service\nAfter=NetworkManager-wait-online.service firstboot-osupdate.target\nBefore=kubelet-dependencies.target ovs-configuration.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/bin/podman run --rm \\\n --authfile /var/lib/kubelet/config.json \\\n --env 'ENABLE_NODEIP_DEBUG=true' \\\n --net=host \\\n --security-opt label=disable \\\n --volume /etc/systemd/system:/etc/systemd/system \\\n --volume /run/nodeip-configuration:/run/nodeip-configuration \\\n quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:07093043bca0089b3c56d9e5331e68f549541e5661e2a39a260aa534dc9528bd \\\n node-ip \\\n set \\\n --retry-on-failure \\\n --network-type OVNKubernetes \\\n ${NODEIP_HINT:-${KUBELET_NODEIP_HINT:-}}; \\\n do \\\n sleep 5; \\\n done\"\nExecStart=/bin/systemctl daemon-reload\nExecStartPre=/bin/mkdir -p /run/nodeip-configuration\nStandardOutput=journal+console\nStandardError=journal+console\n\nEnvironmentFile=-/etc/default/nodeip-configuration\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"nodeip-configuration.service"},{"enabled":true,"name":"openvswitch.service"},{"contents":"[Unit]\n# Kdump will generate it's initramfs based on the running state when kdump.service run\n# If OVS has already run, the kdump fails to gather a working network config,\n# which prevent network log exports, sush as SSH.\n# See https://issues.redhat.com/browse/OCPBUGS-28239\nAfter=kdump.service\nDescription=Configures OVS with proper host networking configuration\n# This service is used to move a physical NIC into OVS and reconfigure OVS to use the host IP\nRequires=openvswitch.service\nWants=NetworkManager-wait-online.service\nAfter=firstboot-osupdate.target\nAfter=NetworkManager-wait-online.service openvswitch.service network.service nodeip-configuration.service nmstate.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\n# Need oneshot to delay kubelet\nType=oneshot\nExecStart=/usr/local/bin/configure-ovs.sh OVNKubernetes\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nRequiredBy=kubelet-dependencies.target\n","enabled":true,"name":"ovs-configuration.service"},{"dropins":[{"contents":"[Service]\nRestart=always\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /var/lib/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /etc/openvswitch'\nExecStartPre=-/bin/sh -c '/usr/bin/chown -R :$${OVS_USER_ID##*:} /run/openvswitch'\nExecStartPost=-/usr/bin/ovs-appctl vlog/set syslog:info\nExecReload=-/usr/bin/ovs-appctl vlog/set syslog:info\n","name":"10-ovs-vswitchd-restart.conf"}],"name":"ovs-vswitchd.service"},{"dropins":[{"contents":"[Service]\nRestart=always\n","name":"10-ovsdb-restart.conf"}],"enabled":true,"name":"ovsdb-server.service"},{"dropins":[{"contents":"","name":"10-mco-default-env.conf"},{"contents":"# See https://github.com/openshift/machine-config-operator/issues/1897\n[Service]\nNice=10\nIOSchedulingClass=best-effort\nIOSchedulingPriority=6\n","name":"mco-controlplane-nice.conf"}],"name":"rpm-ostreed.service"},{"contents":"[Unit]\nDescription=Ensure IKE SA established for existing IPsec connections.\nAfter=ipsec.service\nBefore=kubelet-dependencies.target node-valid-hostname.service\n\n[Service]\nType=oneshot\nExecStart=/usr/local/bin/ipsec-connect-wait.sh\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=ipsec.service\n","enabled":true,"name":"wait-for-ipsec-connect.service"},{"contents":"[Unit]\nDescription=Ensure primary IP is assigned and usable\nRequires=nmstate.service\nAfter=nmstate.service\nBefore=kubelet-dependencies.target\n\n[Service]\nType=oneshot\n# Would prefer to do Restart=on-failure instead of this bash retry loop, but\n# the version of systemd we have right now doesn't support it. It should be\n# available in systemd v244 and higher.\nExecStart=/bin/bash -c \" \\\n until \\\n /usr/local/bin/wait-for-primary-ip.sh; \\\n do \\\n sleep 10; \\\n done\"\nStandardOutput=journal+console\nStandardError=journal+console\n\n[Install]\nWantedBy=network-online.target\n","enabled":true,"name":"wait-for-primary-ip.service"},{"dropins":[{"contents":"[Unit]\nConditionPathExists=/enoent\n","name":"mco-disabled.conf"}],"name":"zincati.service"},{"contents":"[Unit]\nDescription=Kubernetes Kubelet After Reboot Cleanup\nBefore=kubelet.service\n\n[Service]\nType=oneshot\nExecStart=/bin/rm -f /var/lib/kubelet/cpu_manager_state\nExecStart=/bin/rm -f /var/lib/kubelet/memory_manager_state\nExecStart=-/bin/rm -f /var/lib/kubelet/dra_manager_state\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"kubelet-cleanup.service"},{"contents":"[Unit]\nDescription=Run dnsmasq to provide local dns for Single Node OpenShift\nBefore=kubelet.service crio.service\nAfter=network.target ovs-configuration.service\n\n[Service]\nTimeoutStartSec=30\nExecStartPre=/usr/local/bin/dnsmasq_config.sh\nExecStart=/usr/sbin/dnsmasq -k\nRestart=always\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"dnsmasq.service"},{"enabled":true,"name":"iscsid.service"},{"contents":"[Unit]\nDescription=Create logical volume with name cinder-volumes.\nAfter=var.mount systemd-udev-settle.service\n\n[Service]\nType=oneshot\nExecCondition=/bin/bash -c '! /usr/sbin/vgdisplay cinder-volumes'\nExecStartPre=/usr/sbin/pvcreate /dev/vdc /dev/vdd /dev/vde\nExecStart=/usr/sbin/vgcreate cinder-volumes /dev/vdc /dev/vdd /dev/vde\nRemainAfterExit=yes\n\n[Install]\nWantedBy=multi-user.target\n","enabled":true,"name":"lv-cinder-volumes.service"},{"enabled":true,"name":"multipathd.service"}]}},"extensions":[],"fips":false,"kernelArguments":["net.ifnames=0","systemd.unified_cgroup_hierarchy=1","cgroup_no_v1=\"all\"","psi=0"],"kernelType":"default","osImageURL":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4aa42a4b31390d46f924ce2d0c4da772bfbf6a5e1e121bdb0f8b69f989e0a0db"}}config/clusteroperator/storage.json0000640000000000000000000000346715144705156016323 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"storage","uid":"b7472b75-bb42-4899-8091-1ee916510d9e","resourceVersion":"10227","generation":1,"creationTimestamp":"2026-02-16T20:51:54Z","annotations":{"capability.openshift.io/name":"Storage","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T21:06:03Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T21:06:03Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T21:06:03Z","reason":"AsExpected","message":"DefaultStorageClassControllerAvailable: No default StorageClass for this platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T21:06:03Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T21:06:03Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"","resource":"namespaces","name":"openshift-cluster-csi-drivers"},{"group":"operator.openshift.io","resource":"storages","name":"cluster"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"cluster-storage-operator-role"}],"extension":null}}config/clusteroperator/service-ca.json0000640000000000000000000000340415144705156016667 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"service-ca","uid":"95ee71d7-d400-43cf-a388-ad24a9479879","resourceVersion":"12092","generation":1,"creationTimestamp":"2026-02-16T20:51:54Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T20:57:12Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T20:57:17Z","reason":"AsExpected","message":"Progressing: All service-ca-operator deployments updated"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T20:57:13Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T20:57:13Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T20:57:11Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"servicecas","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-service-ca-operator"},{"group":"","resource":"namespaces","name":"openshift-service-ca"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-packageserver.json0000640000000000000000000000305215144705156024665 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-packageserver","uid":"45a6af06-6315-4346-b7d0-77d084b5c1b9","resourceVersion":"12941","generation":1,"creationTimestamp":"2026-02-16T20:51:55Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T20:57:52Z"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-16T20:57:52Z","reason":"ClusterServiceVersionNotSucceeded","message":"ClusterServiceVersion openshift-operator-lifecycle-manager/packageserver observed in phase Failed with reason: InstallCheckFailed, message: install timeout"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-16T21:20:52Z","message":"Working toward 0.0.1-snapshot"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T20:57:52Z","message":"Safe to upgrade"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"},{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-catalog.json0000640000000000000000000000255515144705156023464 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-catalog","uid":"909c55f7-4fb3-4dcf-bcb8-408f9822c317","resourceVersion":"9971","generation":1,"creationTimestamp":"2026-02-16T20:51:55Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T20:57:52Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T21:04:59Z","message":"Deployed 4.18.0-202601171746.p2.g357bb13.assembly.stream.el9-357bb13"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T20:57:52Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T20:57:52Z"}],"versions":[{"name":"operator","version":"4.18.32"},{"name":"operator-lifecycle-manager","version":"4.18.0-202601171746.p2.g357bb13.assembly.stream.el9-357bb13"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager.json0000640000000000000000000000264115144705156022050 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager","uid":"7fffa825-b059-4784-bdc5-a0efc0473f29","resourceVersion":"7396","generation":1,"creationTimestamp":"2026-02-16T20:51:54Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T20:57:52Z","message":"Deployed 4.18.0-202601171746.p2.g357bb13.assembly.stream.el9-357bb13"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T20:57:52Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T20:57:52Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T20:57:52Z"}],"versions":[{"name":"operator","version":"4.18.32"},{"name":"operator-lifecycle-manager","version":"4.18.0-202601171746.p2.g357bb13.assembly.stream.el9-357bb13"}],"relatedObjects":[{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/openshift-samples.json0000640000000000000000000000173315144705156020312 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-samples","uid":"9a9c6c03-5a2b-498a-954e-596a065af3e7","resourceVersion":"816","generation":1,"creationTimestamp":"2026-02-16T20:51:54Z","annotations":{"capability.openshift.io/name":"openshift-samples","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"samples.operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-samples-operator"},{"group":"template.openshift.io","resource":"templates","namespace":"openshift","name":""},{"group":"image.openshift.io","resource":"imagestreams","namespace":"openshift","name":""}],"extension":null}}config/clusteroperator/openshift-controller-manager.json0000640000000000000000000000346215144705156022442 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-controller-manager","uid":"64d8b906-774c-41a6-85a4-e10387926783","resourceVersion":"12138","generation":1,"creationTimestamp":"2026-02-16T20:51:54Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T20:57:12Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T21:16:16Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T21:16:16Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T20:57:16Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T20:57:12Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftcontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-controller-manager-operator"},{"group":"","resource":"namespaces","name":"openshift-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-route-controller-manager"}],"extension":null}}config/clusteroperator/openshift-apiserver.json0000640000000000000000000001216215144705156020644 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-apiserver","uid":"4c0b7d84-f2a8-4ffe-a6fb-8465795cf17a","resourceVersion":"7207","generation":1,"creationTimestamp":"2026-02-16T20:51:54Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T20:57:12Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T20:57:46Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-16T20:57:12Z","reason":"APIServices_Error","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/apps.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/authorization.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/build.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/image.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/project.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/quota.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/route.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/security.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.36:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.36:8443/apis/template.openshift.io/v1: 401"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T20:57:12Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T20:57:12Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"},{"name":"openshift-apiserver","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftapiservers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-apiserver"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"endpoints","namespace":"openshift-etcd","name":"host-etcd-2"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-apiserver","name":""},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.apps.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.authorization.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.build.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.image.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.project.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.quota.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.route.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.security.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.template.openshift.io"}],"extension":null}}config/clusteroperator/olm.json0000640000000000000000000001420515144705156015436 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"olm","uid":"a21c667d-d5dd-4d96-ba84-6eb2041fa76a","resourceVersion":"12174","generation":1,"creationTimestamp":"2026-02-16T20:51:54Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManagerV1","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T20:57:20Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T20:57:52Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T20:57:52Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T20:57:20Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T20:57:20Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-catalogd"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clustercatalogs.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-catalogd","name":"catalogd-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-catalogd","name":"catalogd-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-catalogd","name":"catalogd-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-catalogd","name":"catalogd-service"},{"group":"apps","resource":"deployments","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-certified-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-community-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-marketplace"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-operators"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":"catalogd-mutating-webhook-configuration"},{"group":"","resource":"namespaces","name":"openshift-operator-controller"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusterextensions.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-operator-controller","name":"operator-controller-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager-metrics-service"},{"group":"apps","resource":"deployments","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"operator.openshift.io","resource":"olms","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-olm-operator"}],"extension":null}}config/clusteroperator/node-tuning.json0000640000000000000000000000342215144705156017075 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"node-tuning","uid":"bb33f984-fb06-4b2f-9faa-bb6a06330559","resourceVersion":"12421","generation":1,"creationTimestamp":"2026-02-16T20:51:54Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T20:57:25Z","reason":"AsExpected","message":"Cluster has deployed 1/1 \"4.18.32\" operands"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T21:18:26Z","reason":"AsExpected","message":"Cluster version is \"4.18.32\""},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T20:57:24Z","reason":"AsExpected","message":"DaemonSet \"tuned\" available"}],"versions":[{"name":"ocp-tuned","version":"4.18.32"},{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-node-tuning-operator"},{"group":"tuned.openshift.io","resource":"profiles","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"tuned.openshift.io","resource":"tuneds","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"apps","resource":"daemonsets","namespace":"openshift-cluster-node-tuning-operator","name":"tuned"},{"group":"performance.openshift.io","resource":"performanceprofiles","name":""}],"extension":null}}config/clusteroperator/network.json0000640000000000000000000003614315144705156016345 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"network","uid":"7951dce5-f423-41e5-a8c8-5fa8a99013f0","resourceVersion":"7140","generation":1,"creationTimestamp":"2026-02-16T20:51:54Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","network.operator.openshift.io/last-seen-state":"{\"DaemonsetStates\":[],\"DeploymentStates\":[],\"StatefulsetStates\":[]}","network.operator.openshift.io/relatedClusterObjects":""},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}]},"spec":{},"status":{"conditions":[{"type":"ManagementStateDegraded","status":"False","lastTransitionTime":"2026-02-16T20:56:04Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T20:55:53Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T20:55:53Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T20:57:47Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T20:57:13Z"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"applied-cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"network-attachment-definitions.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ippools.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"overlappingrangeipreservations.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"nodeslicepools.whereabouts.cni.cncf.io"},{"group":"","resource":"namespaces","name":"openshift-multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-ancillary-tools"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-transient"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-group"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-cluster-readers"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"net-attach-def-project"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"default-cni-sysctl-allowlist"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"cni-copy-resources"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"whereabouts-config"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"multus-daemon-config"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus-additional-cni-plugins"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"metrics-daemon-sa"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"metrics-daemon-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"metrics-daemon-sa-rolebinding"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"network-metrics-daemon"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-network"},{"group":"","resource":"services","namespace":"openshift-multus","name":"network-metrics-service"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"","resource":"services","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ac"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-admission-controller-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-admission-controller-webhook"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"multus.openshift.io"},{"group":"apps","resource":"deployments","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-multus-admission-controller"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-multus","name":"prometheus-k8s-rules"},{"group":"","resource":"namespaces","name":"openshift-ovn-kubernetes"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressfirewalls.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressips.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressqoses.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminpolicybasedexternalroutes.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressservices.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"baselineadminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ipamclaims.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"userdefinednetworks.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusteruserdefinednetworks.k8s.ovn.org"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-nodes-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-kube-rbac-proxy"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-kube-rbac-proxy"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-config"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"ovn"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"signer"},{"group":"flowcontrol.apiserver.k8s.io","resource":"flowschemas","name":"openshift-ovn-kubernetes"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-cluster-reader"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-script-lib"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-editor"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-viewer"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"master-rules"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"networking-rules"},{"group":"","resource":"configmaps","namespace":"openshift-config-managed","name":"openshift-network-features"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-control-plane-metrics"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-node"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"","resource":"namespaces","name":"openshift-host-network"},{"group":"","resource":"resourcequotas","namespace":"openshift-host-network","name":"host-network-namespace-quotas"},{"group":"apps","resource":"deployments","namespace":"openshift-ovn-kubernetes","name":"ovnkube-control-plane"},{"group":"apps","resource":"daemonsets","namespace":"openshift-ovn-kubernetes","name":"ovnkube-node"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicies","name":"user-defined-networks-namespace-label"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicybindings","name":"user-defined-networks-namespace-label-binding"},{"group":"","resource":"namespaces","name":"openshift-network-diagnostics"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"kube-system","name":"network-diagnostics"},{"group":"apps","resource":"deployments","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config-managed","name":"openshift-network-public-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config-managed","name":"openshift-network-public-role-binding"},{"group":"","resource":"namespaces","name":"openshift-network-node-identity"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"system:openshift:scc:hostnetwork-v2"},{"group":"","resource":"configmaps","namespace":"openshift-network-node-identity","name":"ovnkube-identity-cm"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"network-node-identity.openshift.io"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-network-operator","name":"openshift-network-operator-ipsec-rules"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-iptables-alerter"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-iptables-alerter"},{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"iptables-alerter-script"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"","resource":"namespaces","name":"openshift-network-operator"},{"group":"operator.openshift.io","resource":"networks","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cloud-network-config-controller"}],"extension":null}}config/clusteroperator/monitoring.json0000640000000000000000000000333715144705156017040 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"monitoring","uid":"787cb336-3a85-4d14-95de-ef1b2f8509bf","resourceVersion":"6983","generation":1,"creationTimestamp":"2026-02-16T20:51:54Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"Unknown","lastTransitionTime":"2026-02-16T20:57:46Z"},{"type":"Degraded","status":"Unknown","lastTransitionTime":"2026-02-16T20:57:46Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-16T20:57:46Z","reason":"RollOutInProgress","message":"Rolling out the stack."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T20:57:46Z"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-monitoring"},{"group":"","resource":"namespaces","name":"openshift-user-workload-monitoring"},{"group":"monitoring.coreos.com","resource":"servicemonitors","name":""},{"group":"monitoring.coreos.com","resource":"podmonitors","name":""},{"group":"monitoring.coreos.com","resource":"prometheusrules","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagers","name":""},{"group":"monitoring.coreos.com","resource":"prometheuses","name":""},{"group":"monitoring.coreos.com","resource":"thanosrulers","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagerconfigs","name":""}],"extension":null}}config/clusteroperator/marketplace.json0000640000000000000000000000313315144705156017135 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"marketplace","uid":"e52d049d-fe37-43aa-ba22-503a593f475c","resourceVersion":"7031","generation":1,"creationTimestamp":"2026-02-16T20:51:54Z","annotations":{"capability.openshift.io/name":"marketplace","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T20:57:46Z","reason":"OperatorAvailable","message":"Successfully progressed to release version: 4.18.32"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T20:57:46Z","reason":"OperatorAvailable","message":"Available release version: 4.18.32"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T20:57:46Z","reason":"OperatorAvailable","message":"Marketplace is upgradeable"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T20:57:46Z","reason":"OperatorAvailable","message":"Available release version: 4.18.32"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-marketplace"},{"group":"operators.coreos.com","resource":"catalogsources","namespace":"openshift-marketplace","name":""}],"extension":null}}config/clusteroperator/machine-config.json0000640000000000000000000000546315144705156017524 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-config","uid":"c7096612-93d8-4e67-9c36-12e66e2e9761","resourceVersion":"10740","generation":1,"creationTimestamp":"2026-02-16T20:51:54Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T21:06:43Z","message":"Cluster version is 4.18.32"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T21:06:43Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T21:06:31Z","reason":"AsExpected","message":"Cluster has deployed [{operator 4.18.32} {operator-image quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42}]"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T21:06:31Z","reason":"AsExpected"},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-02-16T21:06:31Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.32"},{"name":"operator-image","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-config-operator"},{"group":"machineconfiguration.openshift.io","resource":"machineconfigpools","name":""},{"group":"machineconfiguration.openshift.io","resource":"controllerconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"kubeletconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"containerruntimeconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"machineconfigs","name":""},{"group":"operator.openshift.io","resource":"machineconfigurations","name":""},{"group":"","resource":"nodes","name":""},{"group":"","resource":"namespaces","name":"openshift-kni-infra"},{"group":"","resource":"namespaces","name":"openshift-openstack-infra"},{"group":"","resource":"namespaces","name":"openshift-ovirt-infra"},{"group":"","resource":"namespaces","name":"openshift-vsphere-infra"},{"group":"","resource":"namespaces","name":"openshift-nutanix-infra"},{"group":"","resource":"namespaces","name":"openshift-cloud-platform-infra"}],"extension":{"master":"all 1 nodes are at latest configuration rendered-master-c4f31ac656de3dac86533ebda7753660","worker":"all 0 nodes are at latest configuration rendered-worker-2c2dea919cf2d7a2a500e7c50f03b150"}}}config/clusteroperator/machine-approver.json0000640000000000000000000000253215144705156020107 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-approver","uid":"ded4db24-73d6-4e9c-b2bf-9eeb36e020cd","resourceVersion":"7909","generation":1,"creationTimestamp":"2026-02-16T20:51:54Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T20:58:00Z","reason":"AsExpected","message":"Cluster Machine Approver is available at 4.18.32"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T20:58:00Z","reason":"AsExpected"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T20:58:00Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T20:58:00Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-machine-approver"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""}],"extension":null}}config/clusteroperator/machine-api.json0000640000000000000000000000371315144705156017024 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-api","uid":"417c089b-4624-446c-8c82-1820647f1f5f","resourceVersion":"9830","generation":1,"creationTimestamp":"2026-02-16T20:51:54Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T21:04:59Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T21:04:59Z","reason":"AsExpected"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T21:04:59Z","reason":"AsExpected","message":"Cluster Machine API Operator is in NoOp mode"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T21:04:59Z"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"machines","namespace":"openshift-machine-api","name":""},{"group":"machine.openshift.io","resource":"machinesets","namespace":"openshift-machine-api","name":""},{"group":"machine.openshift.io","resource":"machinehealthchecks","namespace":"openshift-machine-api","name":""},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-machine-api","name":""},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-operator"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-controllers"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/kube-storage-version-migrator.json0000640000000000000000000000325315144705156022545 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-storage-version-migrator","uid":"66a382a8-904b-47d4-91c6-28a1872fdfc4","resourceVersion":"4830","generation":1,"creationTimestamp":"2026-02-16T20:51:54Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T20:57:11Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T20:57:16Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T20:57:16Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T20:57:11Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T20:57:11Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubestorageversionmigrators","name":"cluster"},{"group":"migration.k8s.io","resource":"storageversionmigrations","name":""},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator"},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator-operator"}],"extension":null}}config/clusteroperator/kube-scheduler.json0000640000000000000000000000414615144705156017554 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-scheduler","uid":"8216fa50-04ad-4c25-a344-ff56be281774","resourceVersion":"12315","generation":1,"creationTimestamp":"2026-02-16T20:51:54Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T20:57:11Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T21:17:21Z","reason":"AsExpected","message":"NodeInstallerProgressing: 1 node is at revision 4"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T21:17:21Z","reason":"AsExpected","message":"StaticPodsAvailable: 1 nodes are active; 1 node is at revision 4"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T20:57:11Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T20:57:11Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.32"},{"name":"kube-scheduler","version":"1.31.14"},{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeschedulers","name":"cluster"},{"group":"config.openshift.io","resource":"schedulers","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler-operator"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""}],"extension":null}}config/clusteroperator/kube-controller-manager.json0000640000000000000000000000427715144705156021376 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-controller-manager","uid":"426d31f1-20e3-4416-949a-2d79f50e94bf","resourceVersion":"7169","generation":1,"creationTimestamp":"2026-02-16T20:51:54Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T20:57:12Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-16T20:57:48Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-16T20:57:12Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T20:57:12Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T20:57:12Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubecontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager-operator"},{"group":"","resource":"namespaces","name":"kube-system"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""},{"group":"","resource":"nodes","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/kube-apiserver.json0000640000000000000000000001310415144705156017570 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-apiserver","uid":"d2048979-fee4-4d43-a646-20b34282cb90","resourceVersion":"13055","generation":1,"creationTimestamp":"2026-02-16T20:51:54Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T20:57:01Z","reason":"AsExpected","message":"NodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: ving-cert\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-000\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-001\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-002\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-003\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-004\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-005\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-006\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-007\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-008\",\nNodeInstallerDegraded: (string) (len=21) \"user-serving-cert-009\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\",\nNodeInstallerDegraded: (string) (len=29) \"control-plane-node-kubeconfig\",\nNodeInstallerDegraded: (string) (len=26) \"check-endpoints-kubeconfig\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I0216 20:58:01.711895 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I0216 20:58:01.765190 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I0216 20:58:01.765279 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I0216 20:58:01.765301 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I0216 20:58:01.776932 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I0216 20:58:31.777093 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F0216 20:58:45.781242 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: \nNodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-16T20:57:53Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-16T20:57:02Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T20:57:00Z","reason":"AsExpected","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced."},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-02-16T20:57:00Z","reason":"AsExpected","message":"All is well"}],"versions":[{"name":"raw-internal","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeapiservers","name":"cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":""},{"group":"security.openshift.io","resource":"securitycontextconstraints","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":""},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":""},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""},{"group":"apiserver.openshift.io","resource":"apirequestcounts","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/insights.json0000640000000000000000000000560315144705156016501 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"insights","uid":"916d7c7f-724e-4da3-bace-47e79dc4a737","resourceVersion":"12251","generation":1,"creationTimestamp":"2026-02-16T20:51:54Z","annotations":{"capability.openshift.io/name":"Insights","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T21:10:47Z","reason":"AsExpected","message":"Insights works as expected"},{"type":"ClusterTransferAvailable","status":"False","lastTransitionTime":"2026-02-16T21:16:47Z","reason":"NoClusterTransfer","message":"no available cluster transfer"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T21:10:47Z","reason":"AsExpected","message":"Insights works as expected"},{"type":"Disabled","status":"False","lastTransitionTime":"2026-02-16T21:10:47Z","reason":"AsExpected"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T21:10:47Z","reason":"AsExpected","message":"Monitoring the cluster"},{"type":"RemoteConfigurationAvailable","status":"True","lastTransitionTime":"2026-02-16T21:10:47Z","reason":"AsExpected"},{"type":"RemoteConfigurationValid","status":"True","lastTransitionTime":"2026-02-16T21:10:47Z","reason":"AsExpected"},{"type":"SCAAvailable","status":"True","lastTransitionTime":"2026-02-16T21:16:47Z","reason":"Updated","message":"SCA certs successfully updated in the etc-pki-entitlement secret"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T21:10:47Z","reason":"InsightsUpgradeable","message":"Insights operator can be upgraded"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-insights"},{"group":"apps","resource":"deployments","namespace":"openshift-insights","name":"insights-operator"},{"group":"","resource":"secrets","namespace":"openshift-config","name":"pull-secret"},{"group":"","resource":"secrets","namespace":"openshift-config","name":"support"},{"group":"","resource":"serviceaccounts","namespace":"openshift-insights","name":"gather"},{"group":"","resource":"serviceaccounts","namespace":"openshift-insights","name":"operator"},{"group":"","resource":"services","namespace":"openshift-insights","name":"metrics"},{"group":"","resource":"configmaps","namespace":"openshift-insights","name":"service-ca-bundle"},{"group":"operator.openshift.io","resource":"insightsoperators","name":"cluster"}],"extension":{"lastReportTime":null}}}config/clusteroperator/ingress.json0000640000000000000000000000467715144705156016335 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"ingress","uid":"aa95385c-b280-4e2f-956b-afa42794b4c8","resourceVersion":"11312","generation":1,"creationTimestamp":"2026-02-16T20:51:54Z","annotations":{"capability.openshift.io/name":"Ingress","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T20:57:32Z","reason":"IngressAvailable","message":"The \"default\" ingress controller reports Available=True."},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-16T20:57:31Z","reason":"Reconciling","message":"ingresscontroller \"default\" is progressing: IngressControllerProgressing: One or more status conditions indicate progressing: DeploymentRollingOut=True (DeploymentRollingOut: Waiting for router deployment rollout to finish: 0 of 1 updated replica(s) are available...\n)."},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T20:57:32Z","reason":"IngressNotDegraded","message":"The \"default\" ingress controller reports Degraded=False."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T20:57:31Z","reason":"Upgradeable"},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-02-16T20:57:31Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.32"},{"name":"ingress-controller","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb"},{"name":"canary-server","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3d21c51712e6e0cdd9c776479f6d1ab55bc1085df5bb5f583e69ee192d11fd3"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-ingress-operator"},{"group":"operator.openshift.io","resource":"ingresscontrollers","namespace":"openshift-ingress-operator","name":""},{"group":"ingress.operator.openshift.io","resource":"dnsrecords","namespace":"openshift-ingress-operator","name":""},{"group":"","resource":"namespaces","name":"openshift-ingress"},{"group":"","resource":"namespaces","name":"openshift-ingress-canary"}],"extension":null}}config/clusteroperator/image-registry.json0000640000000000000000000000132715144705156017600 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"image-registry","uid":"baa7b4b2-40d8-4898-adab-9b37b9cc2a70","resourceVersion":"763","generation":1,"creationTimestamp":"2026-02-16T20:51:54Z","annotations":{"capability.openshift.io/name":"ImageRegistry","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/etcd.json0000640000000000000000000000400215144705156015560 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"etcd","uid":"15649106-68ab-42da-b245-6d799d0ed565","resourceVersion":"12236","generation":1,"creationTimestamp":"2026-02-16T20:51:54Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T21:10:21Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready\nEtcdMembersDegraded: No unhealthy members found"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T21:16:34Z","reason":"AsExpected","message":"NodeInstallerProgressing: 1 node is at revision 2\nEtcdMembersProgressing: No unstarted etcd members found"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T21:10:23Z","reason":"AsExpected","message":"StaticPodsAvailable: 1 nodes are active; 1 node is at revision 2\nEtcdMembersAvailable: 1 members are available"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T20:57:12Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T20:57:12Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.32"},{"name":"etcd","version":"4.18.32"},{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"etcds","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"namespaces","name":"openshift-etcd"}],"extension":null}}config/clusteroperator/dns.json0000640000000000000000000000365515144705156015442 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"dns","uid":"97a313de-8dc5-4a69-af17-9e4f97c463f3","resourceVersion":"7707","generation":1,"creationTimestamp":"2026-02-16T20:51:54Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T20:57:57Z","reason":"AsExpected","message":"DNS \"default\" is available."},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T20:57:31Z","reason":"AsExpected","message":"Desired and current number of DNSes are equal"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T20:57:57Z","reason":"DNSNotDegraded"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T20:57:30Z","reason":"DNSUpgradeable","message":"DNS default is upgradeable: DNS Operator can be upgraded"}],"versions":[{"name":"kube-rbac-proxy","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0"},{"name":"operator","version":"4.18.32"},{"name":"coredns","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8ea13b0cbfe9be0d3d7ea80d50e512af6a453921a553c7c79b566530142b611b"},{"name":"openshift-cli","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e155421620a4ac28a759265f53059b75308fdd1491caeba6a9a34d2fbeab4954"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-dns-operator"},{"group":"operator.openshift.io","resource":"dnses","name":"default"},{"group":"","resource":"namespaces","name":"openshift-dns"}],"extension":null}}config/clusteroperator/csi-snapshot-controller.json0000640000000000000000000000322015144705156021436 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"csi-snapshot-controller","uid":"ccba3b28-df67-42f6-b3ae-9c2fe3283c10","resourceVersion":"12115","generation":1,"creationTimestamp":"2026-02-16T20:51:54Z","annotations":{"capability.openshift.io/name":"CSISnapshot","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T20:57:12Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T20:57:17Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T20:57:17Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T20:57:13Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T20:57:12Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"},{"name":"csi-snapshot-controller","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"operator.openshift.io","resource":"csisnapshotcontrollers","name":"cluster"}],"extension":null}}config/clusteroperator/control-plane-machine-set.json0000640000000000000000000000263515144705156021623 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"control-plane-machine-set","uid":"15cd80ea-6cea-422b-a332-d1737e5a0349","resourceVersion":"7614","generation":1,"creationTimestamp":"2026-02-16T20:51:54Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T20:57:55Z","reason":"AsExpected","message":"cluster operator is available"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T20:57:55Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T20:57:55Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T20:57:55Z","reason":"AsExpected","message":"cluster operator is upgradable"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"controlplanemachinesets","name":""},{"group":"machine.openshift.io","resource":"machines","name":""}],"extension":null}}config/clusteroperator/console.json0000640000000000000000000000131215144705156016304 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"console","uid":"bcbdde9c-fb15-41d9-8192-a2fc5a02aa29","resourceVersion":"764","generation":1,"creationTimestamp":"2026-02-16T20:51:54Z","annotations":{"capability.openshift.io/name":"Console","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/config-operator.json0000640000000000000000000000311615144705156017744 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"config-operator","uid":"68776dcb-739d-4c83-bb21-3f16b4b65372","resourceVersion":"3962","generation":1,"creationTimestamp":"2026-02-16T20:51:54Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T20:57:11Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T20:57:11Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T20:57:11Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T20:57:11Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T20:57:11Z","reason":"NoData"}],"versions":[{"name":"feature-gates","version":"4.18.32"},{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-operator"}],"extension":null}}config/clusteroperator/cluster-autoscaler.json0000640000000000000000000000265715144705156020500 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster-autoscaler","uid":"73fc15de-0bd4-42c0-9a39-324b3dae86fa","resourceVersion":"9832","generation":1,"creationTimestamp":"2026-02-16T20:51:54Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T21:04:59Z","reason":"AsExpected","message":"at version 4.18.32"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T21:04:59Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T21:04:59Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T21:04:59Z"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"autoscaling.openshift.io","resource":"machineautoscalers","namespace":"openshift-machine-api","name":""},{"group":"autoscaling.openshift.io","resource":"clusterautoscalers","namespace":"openshift-machine-api","name":""},{"group":"","resource":"namespaces","name":"openshift-machine-api"}],"extension":null}}config/clusteroperator/cloud-credential.json0000640000000000000000000002022415144705156020063 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-credential","uid":"bb209b89-2364-4d8b-a0b7-e4b2b7ea34ca","resourceVersion":"11548","generation":1,"creationTimestamp":"2026-02-16T20:51:54Z","annotations":{"capability.openshift.io/name":"CloudCredential","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T21:05:02Z","reason":"AsExpected","message":"All is well"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T21:05:02Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T21:05:02Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T21:05:02Z"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"aws-ebs-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"azure-disk-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"azure-file-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"cloud-credential-operator-gcp-ro-creds"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"cloud-credential-operator-iam-ro"},{"group":"operator.openshift.io","resource":"cloudcredentials","name":"cluster"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ibm-powervs-block-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ibm-vpc-block-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"manila-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-azure-cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-credential-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-aws"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cluster-csi-drivers"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-gcp-ccm"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-gcp-pd-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ibm-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-gcs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-ibmcos"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-ibmcos-powervs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-aws"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-ibmcloud"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-nutanix"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-powervs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-vsphere"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-network"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-nutanix-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-openstack-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-powervs-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vmware-vsphere-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vsphere-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vsphere-problem-detector"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ovirt-csi-driver-operator"}],"extension":null}}config/clusteroperator/cloud-controller-manager.json0000640000000000000000000000440215144705156021544 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-controller-manager","uid":"e955434e-7c35-4988-87d4-361c9a68beab","resourceVersion":"12066","generation":1,"creationTimestamp":"2026-02-16T20:51:54Z","annotations":{"capability.openshift.io/name":"CloudControllerManager","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}]},"spec":{},"status":{"conditions":[{"type":"CloudConfigControllerAvailable","status":"True","lastTransitionTime":"2026-02-16T21:05:05Z","reason":"AsExpected","message":"Cloud Config Controller works as expected"},{"type":"CloudConfigControllerDegraded","status":"False","lastTransitionTime":"2026-02-16T21:05:05Z","reason":"AsExpected","message":"Cloud Config Controller works as expected"},{"type":"TrustedCABundleControllerControllerAvailable","status":"True","lastTransitionTime":"2026-02-16T21:16:13Z","reason":"AsExpected","message":"Trusted CA Bundle Controller works as expected"},{"type":"TrustedCABundleControllerControllerDegraded","status":"False","lastTransitionTime":"2026-02-16T21:16:13Z","reason":"AsExpected","message":"Trusted CA Bundle Controller works as expected"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T21:05:32Z","reason":"AsExpected","message":"Cluster Cloud Controller Manager Operator is available at 4.18.32"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T21:05:32Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T21:16:13Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T21:16:13Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager-operator"},{"group":"config.openshift.io","resource":"clusteroperators","name":"cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager"}],"extension":null}}config/clusteroperator/baremetal.json0000640000000000000000000000427015144705156016604 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"baremetal","uid":"67d889a3-b932-41ec-b50e-00b6a905c3b4","resourceVersion":"9827","generation":1,"creationTimestamp":"2026-02-16T20:51:54Z","annotations":{"capability.openshift.io/name":"baremetal","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T21:04:59Z","reason":"WaitingForProvisioningCR"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T21:04:59Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T21:04:59Z","reason":"WaitingForProvisioningCR","message":"Waiting for Provisioning CR on BareMetal Platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T21:04:59Z"},{"type":"Disabled","status":"False","lastTransitionTime":"2026-02-16T21:04:59Z"}],"versions":[{"name":"operator","version":"4.18.32"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"provisioning","name":""},{"group":"metal3.io","resource":"hostfirmwaresettings","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"firmwareschemas","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"preprovisioningimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"bmceventsubscriptions","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostfirmwarecomponents","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"dataimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostupdatepolicies","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/authentication.json0000640000000000000000000000773215144705156017675 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"authentication","uid":"4cca9c91-e77c-400e-8366-1c13c0bd6130","resourceVersion":"7563","generation":1,"creationTimestamp":"2026-02-16T20:51:54Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T20:57:11Z","reason":"AsExpected","message":"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.139.70:443/healthz\": dial tcp 172.30.139.70:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-02-16T20:57:54Z","reason":"AsExpected","message":"AuthenticatorCertKeyProgressing: All is well"},{"type":"Available","status":"False","lastTransitionTime":"2026-02-16T20:57:13Z","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.44:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.44:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.44:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.44:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.139.70:443/healthz\": dial tcp 172.30.139.70:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods)."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-02-16T20:57:11Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-02-16T20:57:11Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.32"},{"name":"oauth-apiserver","version":"4.18.32"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"infrastructures","name":"cluster"},{"group":"config.openshift.io","resource":"oauths","name":"cluster"},{"group":"route.openshift.io","resource":"routes","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"services","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-authentication"},{"group":"","resource":"namespaces","name":"openshift-authentication-operator"},{"group":"","resource":"namespaces","name":"openshift-ingress"},{"group":"","resource":"namespaces","name":"openshift-oauth-apiserver"}],"extension":null}}config/running_containers.json0000640000000000000000000001011315144705156015311 0ustar0000000000000000{"images":{"0":"sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","1":"sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","10":"sha256:e155421620a4ac28a759265f53059b75308fdd1491caeba6a9a34d2fbeab4954","11":"sha256:b41a8ae60c0eafa4a13e6dcd0e79ba63b0d7bd2bdc28aaed434b3bef98a5dc95","12":"sha256:df623c15a78ca969fb8ad134bde911c2047bf82b50244ee8e523763b6587e072","13":"sha256:9f2b80358f029728d7f4ce46418bb6859d9ea7365de7b6f97a5f549ed6e77471","14":"sha256:a64a70eb2fef4095ba241021e37c52034c067c57121d6c588f8c7fd3dc24b55f","15":"sha256:240701090a5f8e40d4b88fa200cf63dffb11a8e2eae713cf3c629b016c2823b0","16":"sha256:cd019260c7aa2018ad976745ab7ff71deb43fe556a8972e5d6553facd5a65a49","17":"sha256:6dd9324942b3d09b4b9a768f36b47be4e555d947910ee3d115fc5448c95f7399","18":"sha256:0e446723bbab96c4e4662ff058d5eccba72d0c36d26c7b8b3f07183fa49d3ab9","19":"sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","2":"sha256:cc51710a07f6a46a72c7802009f13f26aa351caaa4adaebc0d4983c3601e8a2c","20":"sha256:9e96b53e74d1b802c2e63544e4689c9d262e9c996902c6e8a7f3ca34b23fdd50","21":"sha256:99ad83497ea12819957ccba33c807c6e4c5297621db568e5635202cb9cc69f8f","22":"sha256:cc03f91dbf08df9907c0ebad30c54a7fa92285b19ec4e440ed762b197378a861","23":"sha256:0100b616991bd8bca68d583e902283aa4cc0d388046437d5d68407190e3fb041","24":"registry.redhat.io/redhat/redhat-operator-index:v4.18","25":"sha256:5d54bd262ca625a326b01ea2bfd33db10a402c05590e6b710b0959712e1bf30b","26":"registry.redhat.io/redhat/community-operator-index:v4.18","27":"sha256:15c5e645edf257a08c061ad9ae7dab4293104a042b8396181d76dd28f396cebe","28":"sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","29":"sha256:f122c11c2f6a10ca150b136f7291d2e135b3a182d67809aa49727da289787cee","3":"sha256:8bed6766df40c0c172611f3e4555cd20db639eb505b2345abed6d5babdcbb5e3","30":"sha256:5c38d58b62290b59d0182b50ce3cfd87fbb7729f3ce6fc06ffa46d9805c7dd78","31":"sha256:3f08586dd67c2d3d21053a044138f1bbedceb0847f1af8c3aa76127d86135a58","32":"registry.redhat.io/redhat/certified-operator-index:v4.18","33":"sha256:0871b6c16b38a2eda5d1c89fd75079aff0775224307e940557e6fda6ba229f38","34":"sha256:d6ab8803bac3ebada13e90d9dd6208301b981488277cdeb847c25ff8002f5a30","35":"sha256:e3d21c51712e6e0cdd9c776479f6d1ab55bc1085df5bb5f583e69ee192d11fd3","36":"sha256:80531a0fe966e1cc0582c581951b09a7a4e42037c106748c44859110361b2c1b","37":"sha256:bbe162375a11ed3810a1081c30dd400f461f2421d5f1e27d8792048bbd216956","38":"sha256:1faa2081a881db884a86bdfe33fcb6a6af1d14c3e9ee5c44dfe4b09045684e13","39":"sha256:56dffbd86bfae06921432678caf184b335bf2fc6ac7ee128f48aee396d57ea55","4":"sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d","40":"sha256:19c3c8392b72ccf9a518d1d60fab0fd1e58a05b544caa79eb11bb68f00981d9d","41":"sha256:bfc52d6ca96f377d53757dc437ca720e860e3e016d16c084bd5f6f2e337d3a1d","42":"sha256:e786e28fbe0b95c4f5723bebc3abde1333b259fd26673716fc5638d88286d8b7","43":"sha256:c1a0aba9ead3a33353dc8a033699dfa4795f4050516677dad6ed4ac664094692","44":"sha256:8ea13b0cbfe9be0d3d7ea80d50e512af6a453921a553c7c79b566530142b611b","45":"sha256:e1c8b9784a60860a08bd47935f0767b7b7f8f36c5c0adb7623a31b82c01d4c09","46":"sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb","47":"sha256:dab7a82d88f90f1ef4ac307b16132d4d573a4fa9080acc3272ca084613bd902a","48":"registry.redhat.io/redhat/redhat-marketplace-index:v4.18","5":"sha256:9250bc5d881852654c420b833aa018257e927522e9d8e1b74307dd7b4b0bfc42","6":"sha256:aca57c8abaa83b2d1dce95fa7fe5b9416be70e100957ce48f212e2ec404387bc","7":"sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e","8":"sha256:cf24751d6b6d66fcfc26aa8e0f94a4248a3edab6dbfe3fe9651a90b6b4d92192","9":"sha256:fe683caef773a1963fc13f96afe58892563ea9921db8ac39369e3a9a05ea7181"},"containers":{"2026-02":{"0":18,"1":8,"10":2,"11":2,"12":2,"13":2,"14":2,"15":2,"16":2,"17":2,"18":2,"19":2,"2":7,"20":1,"21":1,"22":1,"23":1,"24":1,"25":1,"26":1,"27":1,"28":1,"29":1,"3":6,"30":1,"31":1,"32":1,"33":1,"34":1,"35":1,"36":1,"37":1,"38":1,"39":1,"4":5,"40":1,"41":1,"42":1,"43":1,"44":1,"45":1,"46":1,"47":1,"48":1,"5":4,"6":4,"7":2,"8":2,"9":2}}}config/pod/openshift-service-ca/service-ca-676cd8b9b5-cbj2r.json0000640000000000000000000001617715144705156022646 0ustar0000000000000000{"metadata":{"name":"service-ca-676cd8b9b5-cbj2r","generateName":"service-ca-676cd8b9b5-","namespace":"openshift-service-ca","uid":"99ab949e-bd0d-45a7-95d1-8381d9f1f5f3","resourceVersion":"10144","creationTimestamp":"2026-02-16T20:57:13Z","labels":{"app":"service-ca","pod-template-hash":"676cd8b9b5","service-ca":"true"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.31/23\"],\"mac_address\":\"0a:58:0a:80:00:1f\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.31/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.31\"\n ],\n \"mac\": \"0a:58:0a:80:00:1f\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"service-ca-676cd8b9b5","uid":"2f6e39b8-797d-4baf-ab3c-a1be3a4ee60f","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"signing-key","secret":{"secretName":"signing-key","defaultMode":420}},{"name":"signing-cabundle","configMap":{"name":"signing-cabundle","defaultMode":420}},{"name":"kube-api-access-hv45g","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"service-ca-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5abe992def861ec075251ae17bbd66fa23bd05bd3701953c0fdcf68a8d161f1e","command":["service-ca-operator","controller"],"args":["-v=2"],"ports":[{"containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"120Mi"}},"volumeMounts":[{"name":"signing-key","mountPath":"/var/run/secrets/signing-key"},{"name":"signing-cabundle","mountPath":"/var/run/configmaps/signing-cabundle"},{"name":"kube-api-access-hv45g","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000580000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"service-ca","serviceAccount":"service-ca","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c24,c14"},"fsGroup":1000580000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:16Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:13Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:05:46Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:05:46Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:13Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.31","podIPs":[{"ip":"10.128.0.31"}],"startTime":"2026-02-16T20:57:13Z","containerStatuses":[{"name":"service-ca-controller","state":{"running":{"startedAt":"2026-02-16T21:05:45Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"W0216 21:03:09.213499 1 cmd.go:257] Using insecure, self-signed certificates\nI0216 21:03:09.213872 1 crypto.go:601] Generating new CA for service-ca-controller-signer@1771275789 cert, and key in /tmp/serving-cert-840895483/serving-signer.crt, /tmp/serving-cert-840895483/serving-signer.key\nI0216 21:03:09.601208 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0216 21:03:09.601821 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0216 21:03:09.601837 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0216 21:03:09.601937 1 observer_polling.go:159] Starting file observer\nW0216 21:04:33.829134 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get replicasets.apps service-ca-676cd8b9b5)\nI0216 21:04:33.829339 1 builder.go:304] service-ca-controller version -\nI0216 21:04:33.830764 1 dynamic_serving_content.go:116] \"Loaded a new cert/key pair\" name=\"serving-cert::/tmp/serving-cert-840895483/tls.crt::/tmp/serving-cert-840895483/tls.key\"\nI0216 21:05:32.406706 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController\nF0216 21:05:32.406827 1 cmd.go:182] failed checking connectivity: client rate limiter Wait returned an error: context deadline exceeded\n","startedAt":"2026-02-16T21:03:09Z","finishedAt":"2026-02-16T21:05:32Z","containerID":"cri-o://11a0f236b15a97d8bb8db30a3ecfba40559eb738b2fbad78fcc9824a0ec8620e"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5abe992def861ec075251ae17bbd66fa23bd05bd3701953c0fdcf68a8d161f1e","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5abe992def861ec075251ae17bbd66fa23bd05bd3701953c0fdcf68a8d161f1e","containerID":"cri-o://5d2c22738802536774d55c1e4c6c8ed59ce5c575ebb78dadfcb7c71eb7f34d22","started":true,"volumeMounts":[{"name":"signing-key","mountPath":"/var/run/secrets/signing-key"},{"name":"signing-cabundle","mountPath":"/var/run/configmaps/signing-cabundle"},{"name":"kube-api-access-hv45g","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-service-ca-operator/service-ca-operator-5dc4688546-q5vjl.json0000640000000000000000000001623315144705156026221 0ustar0000000000000000{"metadata":{"name":"service-ca-operator-5dc4688546-q5vjl","generateName":"service-ca-operator-5dc4688546-","namespace":"openshift-service-ca-operator","uid":"2ab0a907-7abe-4808-ba21-bdda1506eae2","resourceVersion":"10190","creationTimestamp":"2026-02-16T20:55:39Z","labels":{"app":"service-ca-operator","pod-template-hash":"5dc4688546"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.18/23\"],\"mac_address\":\"0a:58:0a:80:00:12\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.18/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.18\"\n ],\n \"mac\": \"0a:58:0a:80:00:12\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"service-ca-operator-5dc4688546","uid":"3afd881e-0af7-4e4e-903d-805969b82785","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"service-ca-operator-config","defaultMode":420}},{"name":"kube-api-access-9pw88","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"service-ca-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5abe992def861ec075251ae17bbd66fa23bd05bd3701953c0fdcf68a8d161f1e","command":["service-ca-operator","operator"],"args":["--config=/var/run/configmaps/config/operator-config.yaml","-v=2"],"env":[{"name":"CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5abe992def861ec075251ae17bbd66fa23bd05bd3701953c0fdcf68a8d161f1e"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"}],"resources":{"requests":{"cpu":"10m","memory":"80Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-9pw88","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"service-ca-operator","serviceAccount":"service-ca-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c18,c12"},"runAsUser":1001,"runAsGroup":1001,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:09Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:56:58Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:05:58Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:05:58Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:56:57Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.18","podIPs":[{"ip":"10.128.0.18"}],"startTime":"2026-02-16T20:56:58Z","containerStatuses":[{"name":"service-ca-operator","state":{"running":{"startedAt":"2026-02-16T21:05:57Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0216 21:03:09.217474 1 cmd.go:253] Using service-serving-cert provided certificates\nI0216 21:03:09.217630 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0216 21:03:09.218382 1 observer_polling.go:159] Starting file observer\nI0216 21:03:09.218887 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0216 21:03:09.218910 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nW0216 21:04:33.822977 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get replicasets.apps service-ca-operator-5dc4688546)\nI0216 21:04:33.823200 1 builder.go:304] service-ca-operator version -\nI0216 21:04:33.824344 1 dynamic_serving_content.go:116] \"Loaded a new cert/key pair\" name=\"serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key\"\nI0216 21:05:32.406185 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController\nF0216 21:05:32.406508 1 cmd.go:182] failed checking connectivity: client rate limiter Wait returned an error: context deadline exceeded\n","startedAt":"2026-02-16T21:03:09Z","finishedAt":"2026-02-16T21:05:32Z","containerID":"cri-o://715050d13195531641370ad04c7754b8cef8bb72e0896de25aaafb35a02054c9"}},"ready":true,"restartCount":4,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5abe992def861ec075251ae17bbd66fa23bd05bd3701953c0fdcf68a8d161f1e","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5abe992def861ec075251ae17bbd66fa23bd05bd3701953c0fdcf68a8d161f1e","containerID":"cri-o://957672c63eb7430bfeb7424cf0d3c859bba34c6e865fdeff7ddd7689e1cdc21a","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-9pw88","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}operator-controller-controller-manager-85c9b89969-qzs2g.json0000640000000000000000000002474515144705156032272 0ustar0000000000000000config/pod/openshift-operator-controller{"metadata":{"name":"operator-controller-controller-manager-85c9b89969-qzs2g","generateName":"operator-controller-controller-manager-85c9b89969-","namespace":"openshift-operator-controller","uid":"1a986ba3-2aea-4133-a05b-f69d4e0d8d3b","resourceVersion":"11920","creationTimestamp":"2026-02-16T20:57:36Z","labels":{"control-plane":"operator-controller-controller-manager","pod-template-hash":"85c9b89969"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.43/23\"],\"mac_address\":\"0a:58:0a:80:00:2b\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.43/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.43\"\n ],\n \"mac\": \"0a:58:0a:80:00:2b\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"manager","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"operator-controller-controller-manager-85c9b89969","uid":"edb6ec99-443d-4454-88db-cd2781fe2f5c","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cache","emptyDir":{}},{"name":"ca-certs","projected":{"sources":[{"configMap":{"name":"operator-controller-trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"ca-bundle.crt"}],"optional":false}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"optional":false}}],"defaultMode":420}},{"name":"etc-containers","hostPath":{"path":"/etc/containers","type":"Directory"}},{"name":"etc-docker","hostPath":{"path":"/etc/docker","type":"Directory"}},{"name":"kube-api-access-vxtft","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae30b3ab740f21c451d0272bceacb99fa34d22bbf2ea22f1e1e18230a156104b","command":["/manager"],"args":["--health-probe-bind-address=:8081","--metrics-bind-address=127.0.0.1:8080","--leader-elect","--catalogd-cas-dir=/var/ca-certs","--v=2","--global-pull-secret=openshift-config/pull-secret"],"env":[{"name":"SSL_CERT_DIR","value":"/var/ca-certs"}],"resources":{"requests":{"cpu":"10m","memory":"64Mi"}},"volumeMounts":[{"name":"cache","mountPath":"/var/cache"},{"name":"ca-certs","readOnly":true,"mountPath":"/var/ca-certs"},{"name":"etc-containers","readOnly":true,"mountPath":"/etc/containers"},{"name":"etc-docker","readOnly":true,"mountPath":"/etc/docker"},{"name":"kube-api-access-vxtft","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":15,"timeoutSeconds":1,"periodSeconds":20,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":5,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","args":["--secure-listen-address=0.0.0.0:8443","--http2-disable","--upstream=http://127.0.0.1:8080/","--logtostderr=true","--v=2"],"ports":[{"name":"https","containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"5m","memory":"64Mi"}},"volumeMounts":[{"name":"kube-api-access-vxtft","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":10,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"operator-controller-controller-manager","serviceAccount":"operator-controller-controller-manager","nodeName":"master-0","securityContext":{"seLinuxOptions":{"type":"spc_t"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchExpressions":[{"key":"kubernetes.io/arch","operator":"In","values":["amd64","arm64","ppc64le","s390x"]},{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:39Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:36Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:13:06Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:13:06Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:36Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.43","podIPs":[{"ip":"10.128.0.43"}],"startTime":"2026-02-16T20:57:36Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-16T20:57:38Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://3ca24ad1f8d41b0227373cdca70f4d0ead865f343ffe91de92638dd9fb5c6f20","started":true,"volumeMounts":[{"name":"kube-api-access-vxtft","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"manager","state":{"running":{"startedAt":"2026-02-16T21:13:00Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"ork.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"c5aaf783-b097-4586-a339-3b609e33606d\"\nI0216 21:07:47.997684 1 clustercatalog_controller.go:90] \"reconcile ending\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"c5aaf783-b097-4586-a339-3b609e33606d\"\nI0216 21:07:47.997819 1 clustercatalog_controller.go:54] \"reconcile starting\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"97660f39-eb06-4e5a-bf7a-91b00d466d8f\"\nI0216 21:07:52.301404 1 clustercatalog_controller.go:90] \"reconcile ending\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"97660f39-eb06-4e5a-bf7a-91b00d466d8f\"\nE0216 21:11:45.893137 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0216 21:12:45.897018 1 leaderelection.go:436] error retrieving resource lock openshift-operator-controller/9c4404e7.operatorframework.io: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io 9c4404e7.operatorframework.io)\nI0216 21:12:58.884893 1 leaderelection.go:297] failed to renew lease openshift-operator-controller/9c4404e7.operatorframework.io: timed out waiting for the condition\nE0216 21:12:58.885003 1 main.go:362] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\n","startedAt":"2026-02-16T21:01:27Z","finishedAt":"2026-02-16T21:12:58Z","containerID":"cri-o://073bfd97b3802cf7e422558b7f0d96ac1c7a887d6a785fb5000fa99850a0b06e"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae30b3ab740f21c451d0272bceacb99fa34d22bbf2ea22f1e1e18230a156104b","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae30b3ab740f21c451d0272bceacb99fa34d22bbf2ea22f1e1e18230a156104b","containerID":"cri-o://cfd3ff2ce35aabfb3b796de6fbfb52e6ac44fbba7a139e8b846a35594c70ba5c","started":true,"volumeMounts":[{"name":"cache","mountPath":"/var/cache"},{"name":"ca-certs","mountPath":"/var/ca-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-containers","mountPath":"/etc/containers","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-docker","mountPath":"/etc/docker","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-vxtft","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-network-operator/network-operator-6fcf4c966-n4hfs.json0000640000000000000000000002543615144705156025403 0ustar0000000000000000{"metadata":{"name":"network-operator-6fcf4c966-n4hfs","generateName":"network-operator-6fcf4c966-","namespace":"openshift-network-operator","uid":"1b61063e-775e-421d-bf73-a6ef134293a0","resourceVersion":"12165","creationTimestamp":"2026-02-16T20:55:39Z","labels":{"name":"network-operator","pod-template-hash":"6fcf4c966"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"network-operator-6fcf4c966","uid":"ad5c19ad-3357-491a-8421-f8f4d0a5167e","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"host-etc-kube","hostPath":{"path":"/etc/kubernetes","type":"Directory"}},{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420,"optional":true}},{"name":"kube-api-access-x7pk6","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"network-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e","command":["/bin/bash","-c","#!/bin/bash\nset -o allexport\nif [[ -f /etc/kubernetes/apiserver-url.env ]]; then\n source /etc/kubernetes/apiserver-url.env\nelse\n echo \"Error: /etc/kubernetes/apiserver-url.env is missing\"\n exit 1\nfi\nexec /usr/bin/cluster-network-operator start --listen=0.0.0.0:9104\n"],"ports":[{"name":"cno","hostPort":9104,"containerPort":9104,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.32"},{"name":"KUBE_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:67d1623cf33e4a5ecaa5ec7f1dae3af4e0e0478489b3a628de2062dca1473c7e"},{"name":"KUBE_RBAC_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0"},{"name":"MULTUS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fe683caef773a1963fc13f96afe58892563ea9921db8ac39369e3a9a05ea7181"},{"name":"MULTUS_ADMISSION_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bbe162375a11ed3810a1081c30dd400f461f2421d5f1e27d8792048bbd216956"},{"name":"CNI_PLUGINS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e786e28fbe0b95c4f5723bebc3abde1333b259fd26673716fc5638d88286d8b7"},{"name":"BOND_CNI_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5c38d58b62290b59d0182b50ce3cfd87fbb7729f3ce6fc06ffa46d9805c7dd78"},{"name":"WHEREABOUTS_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:df623c15a78ca969fb8ad134bde911c2047bf82b50244ee8e523763b6587e072"},{"name":"ROUTE_OVERRRIDE_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:15c5e645edf257a08c061ad9ae7dab4293104a042b8396181d76dd28f396cebe"},{"name":"MULTUS_NETWORKPOLICY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:67d61d27aa46f8c1f49f2f691ebeec6a8465c1506c83e876415fcf6be19c2d77"},{"name":"OVN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec"},{"name":"OVN_NB_RAFT_ELECTION_TIMER","value":"10"},{"name":"OVN_SB_RAFT_ELECTION_TIMER","value":"16"},{"name":"OVN_NORTHD_PROBE_INTERVAL","value":"10000"},{"name":"OVN_CONTROLLER_INACTIVITY_PROBE","value":"180000"},{"name":"OVN_NB_INACTIVITY_PROBE","value":"60000"},{"name":"EGRESS_ROUTER_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfc52d6ca96f377d53757dc437ca720e860e3e016d16c084bd5f6f2e337d3a1d"},{"name":"NETWORK_METRICS_DAEMON_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:80531a0fe966e1cc0582c581951b09a7a4e42037c106748c44859110361b2c1b"},{"name":"NETWORK_CHECK_SOURCE_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e"},{"name":"NETWORK_CHECK_TARGET_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e"},{"name":"NETWORK_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e"},{"name":"CLOUD_NETWORK_CONFIG_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae9731fa23b96fe0a08e198d4cab6bb4e4b81a006a45b1e68948ffcac4e0bf9c"},{"name":"CLI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e155421620a4ac28a759265f53059b75308fdd1491caeba6a9a34d2fbeab4954"},{"name":"FRR_K8S_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7862391b6b069f985d3ba652ff80f29fedce94493a013b8e464e2d7bde964da4"},{"name":"NETWORKING_CONSOLE_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a913cef121c9a6c3ddc57b01fc807bb042e5a903489c05f99e6e2da9e6ec0b98"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"host-etc-kube","readOnly":true,"mountPath":"/etc/kubernetes"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-x7pk6","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-network-operator","serviceAccount":"cluster-network-operator","nodeName":"master-0","hostNetwork":true,"securityContext":{"runAsUser":65534,"runAsNonRoot":true},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"name":"network-operator"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:55:52Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:55:47Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:16:23Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:16:23Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:55:39Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-16T20:55:47Z","containerStatuses":[{"name":"network-operator","state":{"running":{"startedAt":"2026-02-16T21:16:23Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"\", \\\"AutomatedEtcdBackup\\\", \\\"BootcNodeManagement\\\", \\\"CSIDriverSharedResource\\\", \\\"ClusterAPIInstall\\\", \\\"ClusterAPIInstallIBMCloud\\\", \\\"ClusterMonitoringConfig\\\", \\\"ConsolePluginContentSecurityPolicy\\\", \\\"DNSNameResolver\\\", \\\"DynamicResourceAllocation\\\", \\\"EtcdBackendQuota\\\", \\\"EventedPLEG\\\", \\\"Example\\\", \\\"ExternalOIDC\\\", \\\"ExternalOIDCWithUIDAndExtraClaimMappings\\\", \\\"GCPClusterHostedDNS\\\", \\\"GatewayAPI\\\", \\\"ImageStreamImportMode\\\", \\\"IngressControllerDynamicConfigurationManager\\\", \\\"InsightsConfig\\\", \\\"InsightsConfigAPI\\\", \\\"InsightsOnDemandDataGather\\\", \\\"InsightsRuntimeExtractor\\\", \\\"MachineAPIMigration\\\", \\\"MachineAPIOperatorDisableMachineHealthCheckController\\\", \\\"MachineAPIProviderOpenStack\\\", \\\"MachineConfigNodes\\\", \\\"MaxUnavailableStatefulSet\\\", \\\"MetricsCollectionProfiles\\\", \\\"MinimumKubeletVersion\\\", \\\"MixedCPUsAllocation\\\", \\\"MultiArchInstallAzure\\\", \\\"NodeSwap\\\", \\\"NutanixMultiSubnets\\\", \\\"OVNObservability\\\", \\\"OpenShiftPodSecurityAdmission\\\", \\\"PinnedImages\\\", \\\"PlatformOperators\\\", \\\"ProcMountType\\\", \\\"RouteAdvertisements\\\", \\\"RouteExternalCertificate\\\", \\\"ServiceAccountTokenNodeBinding\\\", \\\"SignatureStores\\\", \\\"SigstoreImageVerification\\\", \\\"TranslateStreamCloseWebsocketRequests\\\", \\\"UpgradeStatus\\\", \\\"UserNamespacesPodSecurityStandards\\\", \\\"UserNamespacesSupport\\\", \\\"VSphereMultiNetworks\\\", \\\"VolumeAttributesClass\\\", \\\"VolumeGroupSnapshot\\\"}},Source:EventSource{Component:cluster-network-operator,Host:,},FirstTimestamp:2026-02-16 21:14:21.011449973 +0000 UTC m=+486.950262842,LastTimestamp:2026-02-16 21:14:21.011449973 +0000 UTC m=+486.950262842,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cluster-network-operator,ReportingInstance:,}\"\nW0216 21:15:21.013468 1 builder.go:130] graceful termination failed, controllers failed with error: failed to add controllers to manager: the server was unable to return a response in the time allotted, but may still be processing the request (get clusteroperators.config.openshift.io network)\n","startedAt":"2026-02-16T21:06:14Z","finishedAt":"2026-02-16T21:15:21Z","containerID":"cri-o://aab44606d671f216ff3793ef915c84f815301082904e4bc4a12b70d23d7c13c3"}},"ready":true,"restartCount":5,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:aacc2698d097e25bf26e35393ef3536f7a240880d0a87f46a2b7ea3c13731d1e","containerID":"cri-o://8fc2cca192f72b63cdb1729b01edf727b51348c41be1bedd0f2a185d025ba61f","started":true,"volumeMounts":[{"name":"host-etc-kube","mountPath":"/etc/kubernetes","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-x7pk6","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-network-node-identity/network-node-identity-tpj6f.json0000640000000000000000000002463415144705156025735 0ustar0000000000000000{"metadata":{"name":"network-node-identity-tpj6f","generateName":"network-node-identity-","namespace":"openshift-network-node-identity","uid":"88f19cea-60ed-4977-a906-75deec51fc3d","resourceVersion":"11917","creationTimestamp":"2026-02-16T20:56:23Z","labels":{"app":"network-node-identity","component":"network","controller-revision-hash":"69d96c74cb","kubernetes.io/os":"linux","openshift.io/component":"network","pod-template-generation":"1","type":"infra"},"annotations":{"openshift.io/required-scc":"hostnetwork-v2","openshift.io/scc":"hostnetwork-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"DaemonSet","name":"network-node-identity","uid":"adb55065-8e88-4806-bb7b-3eb1546150fa","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"webhook-cert","secret":{"secretName":"network-node-identity-cert","defaultMode":420}},{"name":"env-overrides","configMap":{"name":"env-overrides","defaultMode":420,"optional":true}},{"name":"ovnkube-identity-cm","configMap":{"name":"ovnkube-identity-cm","items":[{"key":"additional-cert-acceptance-cond.json","path":"additional-cert-acceptance-cond.json"},{"key":"additional-pod-admission-cond.json","path":"additional-pod-admission-cond.json"}],"defaultMode":420}},{"name":"kube-api-access-x85fb","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"webhook","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n# OVN-K will try to remove hybrid overlay node annotations even when the hybrid overlay is not enabled.\n# https://github.com/ovn-org/ovn-kubernetes/blob/ac6820df0b338a246f10f412cd5ec903bd234694/go-controller/pkg/ovn/master.go#L791\nho_enable=\"--enable-hybrid-overlay\"\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start webhook\"\n# extra-allowed-user: service account `ovn-kubernetes-control-plane`\n# sets pod annotations in multi-homing layer3 network controller (cluster-manager)\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --webhook-cert-dir=\"/etc/webhook-cert\" \\\n --webhook-host=127.0.0.1 \\\n --webhook-port=9743 \\\n ${ho_enable} \\\n --enable-interconnect \\\n --disable-approver \\\n --extra-allowed-user=\"system:serviceaccount:openshift-ovn-kubernetes:ovn-kubernetes-control-plane\" \\\n --wait-for-kubernetes-api=200s \\\n --pod-admission-conditions=\"/var/run/ovnkube-identity-config/additional-pod-admission-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"2"},{"name":"KUBERNETES_NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-x85fb","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}},{"name":"approver","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start approver\"\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --disable-webhook \\\n --csr-acceptance-conditions=\"/var/run/ovnkube-identity-config/additional-cert-acceptance-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"4"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-x85fb","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":200,"dnsPolicy":"Default","nodeSelector":{"beta.kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"network-node-identity","serviceAccount":"network-node-identity","nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c23,c22"},"supplementalGroups":[1000550000],"fsGroup":1000550000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchFields":[{"key":"metadata.name","operator":"In","values":["master-0"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:56:40Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:56:23Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:11:59Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:11:59Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:56:23Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-16T20:56:23Z","containerStatuses":[{"name":"approver","state":{"running":{"startedAt":"2026-02-16T21:11:58Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"ontroller-runtime/pkg/cache/internal/informers.go:114\"\nI0216 21:06:33.001771 1 reflector.go:430] \"Caches populated\" logger=\"controller-runtime.cache\" type=\"*v1.CertificateSigningRequest\" reflector=\"sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114\"\nI0216 21:06:33.100534 1 controller.go:186] \"Starting Controller\" controller=\"certificatesigningrequest\" controllerGroup=\"certificates.k8s.io\" controllerKind=\"CertificateSigningRequest\"\nI0216 21:06:33.100590 1 controller.go:195] \"Starting workers\" controller=\"certificatesigningrequest\" controllerGroup=\"certificates.k8s.io\" controllerKind=\"CertificateSigningRequest\" worker count=1\nI0216 21:06:33.101064 1 approver.go:230] Finished syncing CSR csr-5ffh6 for unknown node in 44.941µs\nI0216 21:06:33.101248 1 approver.go:230] Finished syncing CSR csr-kpmtv for unknown node in 33.291µs\nE0216 21:11:28.105818 1 leaderelection.go:429] Failed to update lock optimistically: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded, falling back to slow path\nE0216 21:11:43.105081 1 leaderelection.go:436] error retrieving resource lock openshift-network-node-identity/ovnkube-identity: Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded\nI0216 21:11:43.105138 1 leaderelection.go:297] failed to renew lease openshift-network-node-identity/ovnkube-identity: context deadline exceeded\nE0216 21:11:58.105558 1 leaderelection.go:322] Failed to release lock: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nF0216 21:11:58.105745 1 ovnkubeidentity.go:309] error running approver: leader election lost\n","startedAt":"2026-02-16T20:59:45Z","finishedAt":"2026-02-16T21:11:58Z","containerID":"cri-o://035e7d01b329ab00b5fb0dd3b6a5b55ee6bd504dee86517456bdcc1b06cd6e19"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","containerID":"cri-o://d9983e5644ba5577e1eefab6fb7488cd7e2a9580d6b33554cb3e17eb89d03fd5","started":true,"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-x85fb","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"webhook","state":{"running":{"startedAt":"2026-02-16T20:56:39Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e5b6b8ee694f3fd3cb9494b50110abbf01839036c632aece1719d091d844fec","containerID":"cri-o://f0fb0335aec7d732c2c504647e8162c4e320963f1f173436478e3f5209ced684","started":true,"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-x85fb","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-machine-config-operator/kube-rbac-proxy-crio-master-0.json0000640000000000000000000001513615144705156026267 0ustar0000000000000000{"metadata":{"name":"kube-rbac-proxy-crio-master-0","namespace":"openshift-machine-config-operator","uid":"9036f674-7dbf-4dfe-855e-4505cedeb419","resourceVersion":"3894","creationTimestamp":"2026-02-16T20:55:54Z","annotations":{"kubernetes.io/config.hash":"b3322fd3717f4aec0d8f54ec7862c07e","kubernetes.io/config.mirror":"b3322fd3717f4aec0d8f54ec7862c07e","kubernetes.io/config.seen":"2026-02-16T20:55:04.730947201Z","kubernetes.io/config.source":"file","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"c38c4104-28e6-4348-a07e-dd94820db5ac","controller":true}]},"spec":{"volumes":[{"name":"etc-kube","hostPath":{"path":"/etc/kubernetes","type":""}},{"name":"var-lib-kubelet","hostPath":{"path":"/var/lib/kubelet","type":""}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","command":["/bin/bash","-ec"],"args":["echo -n \"Waiting for kubelet key and certificate to be available\"\nwhile [ -n \"$(test -e /var/lib/kubelet/pki/kubelet-server-current.pem)\" ] ; do\n echo -n \".\"\n sleep 1\n (( tries += 1 ))\n if [[ \"${tries}\" -gt 10 ]]; then\n echo \"Timed out waiting for kubelet key and cert.\"\n exit 1\n fi\ndone\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"var-lib-kubelet","mountPath":"/var","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"kube-rbac-proxy-crio","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","args":["--secure-listen-address=:9637","--config-file=/etc/kubernetes/crio-metrics-proxy.cfg","--client-ca-file=/etc/kubernetes/kubelet-ca.crt","--logtostderr=true","--kubeconfig=/var/lib/kubelet/kubeconfig","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12","--upstream=http://127.0.0.1:9537","--tls-cert-file=/var/lib/kubelet/pki/kubelet-server-current.pem","--tls-private-key-file=/var/lib/kubelet/pki/kubelet-server-current.pem"],"ports":[{"hostPort":9637,"containerPort":9637,"protocol":"TCP"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-kube","readOnly":true,"mountPath":"/etc/kubernetes","mountPropagation":"HostToContainer"},{"name":"var-lib-kubelet","readOnly":true,"mountPath":"/var/lib/kubelet","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:09Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:09Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:09Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:09Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:09Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-16T20:57:09Z","initContainerStatuses":[{"name":"setup","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-16T20:55:08Z","finishedAt":"2026-02-16T20:55:08Z","containerID":"cri-o://1c9bfe3aaee57fe250198f3484327052043637146bacc2e7c8dfb22afd3d4c6c"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://1c9bfe3aaee57fe250198f3484327052043637146bacc2e7c8dfb22afd3d4c6c","started":false}],"containerStatuses":[{"name":"kube-rbac-proxy-crio","state":{"running":{"startedAt":"2026-02-16T20:55:55Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"W0216 20:55:27.203310 1 deprecated.go:66] \n==== Removed Flag Warning ======================\n\nlogtostderr is removed in the k8s upstream and has no effect any more.\n\n===============================================\n\t\t\nI0216 20:55:27.203539 1 kube-rbac-proxy.go:530] Reading config file: /etc/kubernetes/crio-metrics-proxy.cfg\nE0216 20:55:27.204985 1 run.go:72] \"command failed\" err=\"failed to load kubeconfig: unable to build rest config based on provided path to kubeconfig file: invalid configuration: [unable to read client-cert /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory, unable to read client-key /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory]\"\n","startedAt":"2026-02-16T20:55:27Z","finishedAt":"2026-02-16T20:55:27Z","containerID":"cri-o://34cedb032f29de87a57c244cfdac89c6368a83bd489ea19dfd7e57624682d8a7"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://9ea7eb4c5b7177a7e2ac3c5dca26fbf5f811d30a8d29e8b826572146fe10d264","started":true}],"qosClass":"Burstable"}}config/pod/openshift-machine-api/machine-api-operator-bd7dd5c46-27jwb.json0000640000000000000000000002376715144705156024702 0ustar0000000000000000{"metadata":{"name":"machine-api-operator-bd7dd5c46-27jwb","generateName":"machine-api-operator-bd7dd5c46-","namespace":"openshift-machine-api","uid":"ba294358-051a-4f09-b182-710d3d6778c5","resourceVersion":"11937","creationTimestamp":"2026-02-16T20:58:03Z","labels":{"k8s-app":"machine-api-operator","pod-template-hash":"bd7dd5c46"},"annotations":{"capability.openshift.io/name":"MachineAPI","k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.65/23\"],\"mac_address\":\"0a:58:0a:80:00:41\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.65/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.65\"\n ],\n \"mac\": \"0a:58:0a:80:00:41\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"machine-api-operator","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"machine-api-operator-bd7dd5c46","uid":"4a2aff73-ba32-4f05-93b4-fb5a2a60b807","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config","configMap":{"name":"kube-rbac-proxy","defaultMode":420}},{"name":"images","configMap":{"name":"machine-api-operator-images","defaultMode":420}},{"name":"machine-api-operator-tls","secret":{"secretName":"machine-api-operator-tls","defaultMode":420}},{"name":"kube-api-access-qf2w4","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","args":["--secure-listen-address=0.0.0.0:8443","--upstream=http://localhost:8080/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key","--config-file=/etc/kube-rbac-proxy/config-file.yaml","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305","--logtostderr=true","--v=3"],"ports":[{"name":"https","containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"config","mountPath":"/etc/kube-rbac-proxy"},{"name":"machine-api-operator-tls","mountPath":"/etc/tls/private"},{"name":"kube-api-access-qf2w4","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000500000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}},{"name":"machine-api-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fa28b66298c8b34f2c7b357b012e663e3954cfc7c85aa1e44651a79aeaf8b2a9","command":["/machine-api-operator"],"args":["start","--images-json=/etc/machine-api-operator-config/images/images.json","--alsologtostderr","--v=3"],"env":[{"name":"RELEASE_VERSION","value":"4.18.32"},{"name":"COMPONENT_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"METRICS_PORT","value":"8080"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"images","mountPath":"/etc/machine-api-operator-config/images"},{"name":"kube-api-access-qf2w4","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000500000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"machine-api-operator","serviceAccount":"machine-api-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c22,c19"},"fsGroup":1000500000,"seccompProfile":{"type":"RuntimeDefault"}},"imagePullSecrets":[{"name":"machine-api-operator-dockercfg-xg8bz"}],"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:03:42Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:58:03Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:13:34Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:13:34Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:58:03Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.65","podIPs":[{"ip":"10.128.0.65"}],"startTime":"2026-02-16T20:58:03Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-16T21:03:34Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://aed7b29fd5a17d326bf662963e39c91ff6d183ab7d2ccddb9bff04832a578f45","started":true,"volumeMounts":[{"name":"config","mountPath":"/etc/kube-rbac-proxy"},{"name":"machine-api-operator-tls","mountPath":"/etc/tls/private"},{"name":"kube-api-access-qf2w4","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"machine-api-operator","state":{"running":{"startedAt":"2026-02-16T21:13:33Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"sourceVersion:\"9822\", FieldPath:\"\"}): type: 'Normal' reason: 'Status upgrade' Progressing towards operator: 4.18.32\nI0216 21:04:59.567547 1 sync.go:77] Provider is NoOp, skipping synchronisation\nI0216 21:04:59.576143 1 status.go:99] Syncing status: available\nI0216 21:04:59.609994 1 status.go:69] Syncing status: re-syncing\nI0216 21:04:59.693936 1 request.go:632] Waited for 83.828794ms due to client-side throttling, not priority and fairness, request: PUT:https://172.30.0.1:443/apis/config.openshift.io/v1/clusteroperators/machine-api/status\nI0216 21:04:59.704083 1 sync.go:77] Provider is NoOp, skipping synchronisation\nI0216 21:04:59.894569 1 request.go:632] Waited for 190.403145ms due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/apis/config.openshift.io/v1/clusteroperators/machine-api\nI0216 21:04:59.898461 1 status.go:99] Syncing status: available\nI0216 21:05:00.094818 1 request.go:632] Waited for 196.155338ms due to client-side throttling, not priority and fairness, request: PUT:https://172.30.0.1:443/apis/config.openshift.io/v1/clusteroperators/machine-api/status\nE0216 21:11:45.824453 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0216 21:12:45.826508 1 leaderelection.go:436] error retrieving resource lock openshift-machine-api/machine-api-operator: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io machine-api-operator)\nI0216 21:12:58.821063 1 leaderelection.go:297] failed to renew lease openshift-machine-api/machine-api-operator: timed out waiting for the condition\nE0216 21:13:32.823452 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded\nF0216 21:13:32.823498 1 start.go:104] Leader election lost\n","startedAt":"2026-02-16T21:03:41Z","finishedAt":"2026-02-16T21:13:32Z","containerID":"cri-o://c7880afa219acb0ac5e4138682f8fc8b3e3931790fad2a804808d6e2f5933f3f"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fa28b66298c8b34f2c7b357b012e663e3954cfc7c85aa1e44651a79aeaf8b2a9","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fa28b66298c8b34f2c7b357b012e663e3954cfc7c85aa1e44651a79aeaf8b2a9","containerID":"cri-o://7e9f03ac4e3d4bf6f1a92c87252a343c03624e9e2d9c4c0aa92f759bfcd3bf24","started":true,"volumeMounts":[{"name":"images","mountPath":"/etc/machine-api-operator-config/images"},{"name":"kube-api-access-qf2w4","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-machine-api/control-plane-machine-set-operator-d8bf84b88-8pqbl.json0000640000000000000000000001762415144705156027520 0ustar0000000000000000{"metadata":{"name":"control-plane-machine-set-operator-d8bf84b88-8pqbl","generateName":"control-plane-machine-set-operator-d8bf84b88-","namespace":"openshift-machine-api","uid":"302156cc-9dca-4a66-9e6a-ba2c7e738c92","resourceVersion":"11936","creationTimestamp":"2026-02-16T20:57:51Z","labels":{"k8s-app":"control-plane-machine-set-operator","pod-template-hash":"d8bf84b88"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.47/23\"],\"mac_address\":\"0a:58:0a:80:00:2f\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.47/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.47\"\n ],\n \"mac\": \"0a:58:0a:80:00:2f\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"control-plane-machine-set-operator-d8bf84b88","uid":"a2a04016-5a88-42f1-9781-9ac6c542a019","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"control-plane-machine-set-operator-tls","secret":{"secretName":"control-plane-machine-set-operator-tls","defaultMode":420}},{"name":"kube-api-access-zxcg6","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"control-plane-machine-set-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:47c1d88223ffb35bb36a4d2bde736fb3e45f08e204519387e0e52e3e3dc00cfb","command":["/manager"],"args":["-v=2","--leader-elect=true","--leader-elect-lease-duration=137s","--leader-elect-renew-deadline=107s","--leader-elect-retry-period=26s","--leader-elect-resource-namespace=openshift-machine-api"],"ports":[{"name":"https","containerPort":9443,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.32"},{"name":"COMPONENT_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"control-plane-machine-set-operator-tls","mountPath":"/tmp/k8s-webhook-server/serving-certs"},{"name":"kube-api-access-zxcg6","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000500000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"control-plane-machine-set-operator","serviceAccount":"control-plane-machine-set-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c22,c19"},"fsGroup":1000500000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:55Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:51Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:13:32Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:13:32Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:51Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.47","podIPs":[{"ip":"10.128.0.47"}],"startTime":"2026-02-16T20:57:51Z","containerStatuses":[{"name":"control-plane-machine-set-operator","state":{"running":{"startedAt":"2026-02-16T21:13:31Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"ble\" controller=\"controlplanemachineset\" reconcileID=\"a75961a8-80e7-4fe5-bf08-cae6cdfc46c3\" namespace=\"openshift-machine-api\" name=\"cluster\"\nI0216 21:07:14.468757 1 controller.go:184] \"Finished reconciling control plane machine set\" controller=\"controlplanemachineset\" reconcileID=\"a75961a8-80e7-4fe5-bf08-cae6cdfc46c3\" namespace=\"openshift-machine-api\" name=\"cluster\"\nI0216 21:07:14.468795 1 controller.go:170] \"Reconciling control plane machine set\" controller=\"controlplanemachineset\" reconcileID=\"01dbead5-861a-4da9-aa6c-f2871dbf61e6\" namespace=\"openshift-machine-api\" name=\"cluster\"\nI0216 21:07:14.468813 1 controller.go:178] \"No control plane machine set found, setting operator status available\" controller=\"controlplanemachineset\" reconcileID=\"01dbead5-861a-4da9-aa6c-f2871dbf61e6\" namespace=\"openshift-machine-api\" name=\"cluster\"\nI0216 21:07:14.468832 1 controller.go:184] \"Finished reconciling control plane machine set\" controller=\"controlplanemachineset\" reconcileID=\"01dbead5-861a-4da9-aa6c-f2871dbf61e6\" namespace=\"openshift-machine-api\" name=\"cluster\"\nE0216 21:11:42.454171 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0216 21:12:42.457769 1 leaderelection.go:436] error retrieving resource lock openshift-machine-api/control-plane-machine-set-leader: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io control-plane-machine-set-leader)\nI0216 21:12:55.448455 1 leaderelection.go:297] failed to renew lease openshift-machine-api/control-plane-machine-set-leader: timed out waiting for the condition\nE0216 21:13:30.220360 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded\nE0216 21:13:30.220432 1 main.go:233] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\n","startedAt":"2026-02-16T21:01:27Z","finishedAt":"2026-02-16T21:13:30Z","containerID":"cri-o://cf5bd07d44ef1049857af620840ed7780e94db377ae50a689034fcd0589dd325"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:47c1d88223ffb35bb36a4d2bde736fb3e45f08e204519387e0e52e3e3dc00cfb","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:47c1d88223ffb35bb36a4d2bde736fb3e45f08e204519387e0e52e3e3dc00cfb","containerID":"cri-o://f78d754f1df309b0cad8a0e20f5eb08891911c8e6d19e1d3fa298a8f6933a83c","started":true,"volumeMounts":[{"name":"control-plane-machine-set-operator-tls","mountPath":"/tmp/k8s-webhook-server/serving-certs"},{"name":"kube-api-access-zxcg6","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-machine-api/cluster-baremetal-operator-7bc947fc7d-xwptz.json0000640000000000000000000002062315144705156026464 0ustar0000000000000000{"metadata":{"name":"cluster-baremetal-operator-7bc947fc7d-xwptz","generateName":"cluster-baremetal-operator-7bc947fc7d-","namespace":"openshift-machine-api","uid":"8b648d9e-a892-4951-b0e2-fed6b16273d4","resourceVersion":"12096","creationTimestamp":"2026-02-16T20:57:59Z","labels":{"k8s-app":"cluster-baremetal-operator","pod-template-hash":"7bc947fc7d"},"annotations":{"capability.openshift.io/name":"baremetal","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.58/23\"],\"mac_address\":\"0a:58:0a:80:00:3a\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.58/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.58\"\n ],\n \"mac\": \"0a:58:0a:80:00:3a\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-baremetal-operator-7bc947fc7d","uid":"e422d898-8df4-4ece-b584-28503deec642","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cert","secret":{"secretName":"cluster-baremetal-webhook-server-cert","defaultMode":420}},{"name":"config","configMap":{"name":"baremetal-kube-rbac-proxy","defaultMode":420}},{"name":"cluster-baremetal-operator-tls","secret":{"secretName":"cluster-baremetal-operator-tls","defaultMode":420}},{"name":"images","configMap":{"name":"cluster-baremetal-operator-images","defaultMode":420}},{"name":"kube-api-access-sgj2q","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-baremetal-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7b8fb1f11df51c131f5be8ddfc1b1c95ac13481f58d2dcd5a465a4a8341c0f49","command":["/usr/bin/cluster-baremetal-operator"],"args":["--enable-leader-election"],"ports":[{"name":"webhook-server","containerPort":9443,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.32"},{"name":"COMPONENT_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"METRICS_PORT","value":"8080"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"cert","readOnly":true,"mountPath":"/etc/cluster-baremetal-operator/tls"},{"name":"images","readOnly":true,"mountPath":"/etc/cluster-baremetal-operator/images"},{"name":"kube-api-access-sgj2q","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]}}},{"name":"baremetal-kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","args":["--secure-listen-address=0.0.0.0:8443","--upstream=http://localhost:8080/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305","--config-file=/etc/baremetal-kube-rbac-proxy/config-file.yaml","--logtostderr=true","--v=10"],"ports":[{"name":"https","containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"config","mountPath":"/etc/baremetal-kube-rbac-proxy"},{"name":"cluster-baremetal-operator-tls","mountPath":"/etc/tls/private"},{"name":"kube-api-access-sgj2q","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]}}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-baremetal-operator","serviceAccount":"cluster-baremetal-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c22,c19"},"runAsUser":65534,"runAsNonRoot":true},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:58:29Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:59Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:16:16Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:16:16Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:59Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.58","podIPs":[{"ip":"10.128.0.58"}],"startTime":"2026-02-16T20:57:59Z","containerStatuses":[{"name":"baremetal-kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-16T20:58:29Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://9c3555dd069a7df80fae789b4b23ce84596b7c133210eeb7b11b618ce5d733b4","started":true,"volumeMounts":[{"name":"config","mountPath":"/etc/baremetal-kube-rbac-proxy"},{"name":"cluster-baremetal-operator-tls","mountPath":"/etc/tls/private"},{"name":"kube-api-access-sgj2q","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"cluster-baremetal-operator","state":{"running":{"startedAt":"2026-02-16T21:16:15Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"E0216 21:16:02.895911 1 main.go:144] \"unable to get enabled features\" err=\"unable to determine Platform: the server was unable to return a response in the time allotted, but may still be processing the request (get infrastructures.config.openshift.io cluster)\"\n","startedAt":"2026-02-16T21:15:02Z","finishedAt":"2026-02-16T21:16:02Z","containerID":"cri-o://6a46714853e2a885d7f0ea06667526f3f7b240b0bd635da8d5cae43fd1dadc87"}},"ready":true,"restartCount":6,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7b8fb1f11df51c131f5be8ddfc1b1c95ac13481f58d2dcd5a465a4a8341c0f49","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7b8fb1f11df51c131f5be8ddfc1b1c95ac13481f58d2dcd5a465a4a8341c0f49","containerID":"cri-o://127d340a22fe8099cebc2264bacf3eeab221a7653bb8d4c8d30630cf81318a3f","started":true,"volumeMounts":[{"name":"cert","mountPath":"/etc/cluster-baremetal-operator/tls","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"images","mountPath":"/etc/cluster-baremetal-operator/images","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-sgj2q","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-machine-api/cluster-autoscaler-operator-67fd9768b5-557vd.json0000640000000000000000000002477615144705156026235 0ustar0000000000000000{"metadata":{"name":"cluster-autoscaler-operator-67fd9768b5-557vd","generateName":"cluster-autoscaler-operator-67fd9768b5-","namespace":"openshift-machine-api","uid":"1d7d0416-5f50-42bd-826b-92eecf9adcec","resourceVersion":"11942","creationTimestamp":"2026-02-16T20:58:00Z","labels":{"k8s-app":"cluster-autoscaler-operator","pod-template-hash":"67fd9768b5"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.59/23\"],\"mac_address\":\"0a:58:0a:80:00:3b\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.59/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.59\"\n ],\n \"mac\": \"0a:58:0a:80:00:3b\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"cluster-autoscaler-operator","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-autoscaler-operator-67fd9768b5","uid":"8b01f849-1197-422a-a3a3-b757ec12c2e8","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cert","secret":{"secretName":"cluster-autoscaler-operator-cert","items":[{"key":"tls.crt","path":"tls.crt"},{"key":"tls.key","path":"tls.key"}],"defaultMode":420}},{"name":"auth-proxy-config","configMap":{"name":"kube-rbac-proxy-cluster-autoscaler-operator","defaultMode":420}},{"name":"kube-api-access-25mkq","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","args":["--secure-listen-address=0.0.0.0:9192","--upstream=http://127.0.0.1:9191/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key","--config-file=/etc/kube-rbac-proxy/config-file.yaml","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305","--logtostderr=true","--v=3"],"ports":[{"name":"metrics","containerPort":9192,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"auth-proxy-config","readOnly":true,"mountPath":"/etc/kube-rbac-proxy"},{"name":"cert","readOnly":true,"mountPath":"/etc/tls/private"},{"name":"kube-api-access-25mkq","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000500000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}},{"name":"cluster-autoscaler-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bd8adea550cbbaf16cb9409b31ec8b997320d247f9f30c80608ac1fbf9c7a07e","command":["cluster-autoscaler-operator"],"args":["-alsologtostderr"],"ports":[{"containerPort":8443,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.32"},{"name":"WATCH_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"CLUSTER_AUTOSCALER_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"LEADER_ELECTION_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"CLUSTER_AUTOSCALER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0ae90d63bfd8c5d349436cdde4879b9e9b7688cbda159a8ef0c3035d4fc68468"},{"name":"WEBHOOKS_CERT_DIR","value":"/etc/cluster-autoscaler-operator/tls"},{"name":"WEBHOOKS_PORT","value":"8443"},{"name":"METRICS_PORT","value":"9191"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"cert","readOnly":true,"mountPath":"/etc/cluster-autoscaler-operator/tls"},{"name":"kube-api-access-25mkq","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000500000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-autoscaler-operator","serviceAccount":"cluster-autoscaler-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c22,c19"},"fsGroup":1000500000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:58:29Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:58:00Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:13:55Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:13:55Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:58:00Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.59","podIPs":[{"ip":"10.128.0.59"}],"startTime":"2026-02-16T20:58:00Z","containerStatuses":[{"name":"cluster-autoscaler-operator","state":{"running":{"startedAt":"2026-02-16T21:13:54Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"6 21:11:06.091334 1 status.go:450] No ClusterAutoscaler. Reporting available.\nI0216 21:11:06.091356 1 status.go:244] Operator status available: at version 4.18.32\nI0216 21:11:06.955289 1 status.go:450] No ClusterAutoscaler. Reporting available.\nI0216 21:11:06.955319 1 status.go:244] Operator status available: at version 4.18.32\nE0216 21:12:06.964416 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0216 21:12:21.950601 1 status.go:426] failed to get dependency machine-api status: the server was unable to return a response in the time allotted, but may still be processing the request (get clusteroperators.config.openshift.io machine-api)\nW0216 21:12:21.950640 1 status.go:271] Operator status degraded: error checking machine-api status: the server was unable to return a response in the time allotted, but may still be processing the request (get clusteroperators.config.openshift.io machine-api)\nE0216 21:13:06.966074 1 leaderelection.go:436] error retrieving resource lock openshift-machine-api/cluster-autoscaler-operator-leader: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io cluster-autoscaler-operator-leader)\nI0216 21:13:19.956884 1 leaderelection.go:297] failed to renew lease openshift-machine-api/cluster-autoscaler-operator-leader: timed out waiting for the condition\nE0216 21:13:21.952868 1 status.go:311] status reporting failed: the server was unable to return a response in the time allotted, but may still be processing the request (get clusteroperators.config.openshift.io cluster-autoscaler)\nE0216 21:13:53.962183 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded\nF0216 21:13:53.962268 1 main.go:43] Failed to start operator: leader election lost\n","startedAt":"2026-02-16T20:58:28Z","finishedAt":"2026-02-16T21:13:53Z","containerID":"cri-o://2805492f11ff17f7e51a6fba30471dee89ec93e40bd6ce6db4b158be70c75964"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bd8adea550cbbaf16cb9409b31ec8b997320d247f9f30c80608ac1fbf9c7a07e","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bd8adea550cbbaf16cb9409b31ec8b997320d247f9f30c80608ac1fbf9c7a07e","containerID":"cri-o://62b487940e9059c7edfccc46f4b46f6733b0bfea4f437b53500d0c8a0ca74fd9","started":true,"volumeMounts":[{"name":"cert","mountPath":"/etc/cluster-autoscaler-operator/tls","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-25mkq","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-16T20:58:02Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://292b6b8cf180e68ad44412d08d309be8106bcaf05b10681c44231906c9b5f8fa","started":true,"volumeMounts":[{"name":"auth-proxy-config","mountPath":"/etc/kube-rbac-proxy","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"cert","mountPath":"/etc/tls/private","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-25mkq","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-storage-version-migrator-operator-cd5474998-56v4p.json0000640000000000000000000002017615144705156035436 0ustar0000000000000000config/pod/openshift-kube-storage-version-migrator-operator{"metadata":{"name":"kube-storage-version-migrator-operator-cd5474998-56v4p","generateName":"kube-storage-version-migrator-operator-cd5474998-","namespace":"openshift-kube-storage-version-migrator-operator","uid":"c7333319-3fe6-4b3f-b600-6b6df49fcaff","resourceVersion":"12167","creationTimestamp":"2026-02-16T20:55:39Z","labels":{"app":"kube-storage-version-migrator-operator","pod-template-hash":"cd5474998"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.9/23\"],\"mac_address\":\"0a:58:0a:80:00:09\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.9/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.9\"\n ],\n \"mac\": \"0a:58:0a:80:00:09\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-storage-version-migrator-operator-cd5474998","uid":"77611ff1-7d9c-4055-bdbb-4c621a19ec8d","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"config","defaultMode":420}},{"name":"kube-api-access-qx2kd","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-storage-version-migrator-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e391fce0b2e04f22fc089597db9e0671ba7f8b5b3a709151b5f33dd23b262144","command":["cluster-kube-storage-version-migrator-operator","start"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:240701090a5f8e40d4b88fa200cf63dffb11a8e2eae713cf3c629b016c2823b0"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e391fce0b2e04f22fc089597db9e0671ba7f8b5b3a709151b5f33dd23b262144"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.32"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-qx2kd","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1001,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-storage-version-migrator-operator","serviceAccount":"kube-storage-version-migrator-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c19,c14"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:09Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:56:57Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:16:23Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:16:23Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:56:57Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.9","podIPs":[{"ip":"10.128.0.9"}],"startTime":"2026-02-16T20:56:57Z","containerStatuses":[{"name":"kube-storage-version-migrator-operator","state":{"running":{"startedAt":"2026-02-16T21:16:22Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"sion-migrator-operator/openshift-kube-storage-version-migrator-operator-lock\nI0216 21:14:22.678102 1 event.go:377] Event(v1.ObjectReference{Kind:\"Lease\", Namespace:\"openshift-kube-storage-version-migrator-operator\", Name:\"openshift-kube-storage-version-migrator-operator-lock\", UID:\"234a6303-b533-4a0c-b74a-935fa504f06b\", APIVersion:\"coordination.k8s.io/v1\", ResourceVersion:\"11716\", FieldPath:\"\"}): type: 'Normal' reason: 'LeaderElection' kube-storage-version-migrator-operator-cd5474998-56v4p_247a60bb-edfe-491e-97ee-925bc29a2237 became leader\nE0216 21:14:56.682017 1 event.go:359] \"Server rejected event (will not retry!)\" err=\"Timeout: request did not complete within requested timeout - context deadline exceeded\" event=\"\u0026Event{ObjectMeta:{openshift-kube-storage-version-migrator-operator-lock.1894d68ee4ec541c openshift-kube-storage-version-migrator-operator 0 0001-01-01 00:00:00 +0000 UTC \u003cnil\u003e \u003cnil\u003e map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Lease,Namespace:openshift-kube-storage-version-migrator-operator,Name:openshift-kube-storage-version-migrator-operator-lock,UID:234a6303-b533-4a0c-b74a-935fa504f06b,APIVersion:coordination.k8s.io/v1,ResourceVersion:11716,FieldPath:,},Reason:LeaderElection,Message:kube-storage-version-migrator-operator-cd5474998-56v4p_247a60bb-edfe-491e-97ee-925bc29a2237 became leader,Source:EventSource{Component:openshift-kube-storage-version-migrator-operator,Host:,},FirstTimestamp:2026-02-16 21:14:22.677840924 +0000 UTC m=+487.721739672,LastTimestamp:2026-02-16 21:14:22.677840924 +0000 UTC m=+487.721739672,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:openshift-kube-storage-version-migrator-operator,ReportingInstance:,}\"\nW0216 21:15:22.681705 1 builder.go:136] graceful termination failed, controllers failed with error: the server was unable to return a response in the time allotted, but may still be processing the request (get clusteroperators.config.openshift.io kube-storage-version-migrator)\n","startedAt":"2026-02-16T21:06:14Z","finishedAt":"2026-02-16T21:15:22Z","containerID":"cri-o://220f76e0bb64fd419313cb573cd97bbb54f9d2b5998f9525c7d9045abc13cfb5"}},"ready":true,"restartCount":6,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e391fce0b2e04f22fc089597db9e0671ba7f8b5b3a709151b5f33dd23b262144","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e391fce0b2e04f22fc089597db9e0671ba7f8b5b3a709151b5f33dd23b262144","containerID":"cri-o://d5f7b3fcfb5c9f94add7386a8d0fa1915b7e46a3ef046408fb3358fa3cd8f9a5","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-qx2kd","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-7485d55966-xzww8.json0000640000000000000000000001572115144705156031755 0ustar0000000000000000{"metadata":{"name":"openshift-kube-scheduler-operator-7485d55966-xzww8","generateName":"openshift-kube-scheduler-operator-7485d55966-","namespace":"openshift-kube-scheduler-operator","uid":"e7adbe32-b8b9-438e-a2e3-f93146a97424","resourceVersion":"10181","creationTimestamp":"2026-02-16T20:55:39Z","labels":{"app":"openshift-kube-scheduler-operator","pod-template-hash":"7485d55966"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.7/23\"],\"mac_address\":\"0a:58:0a:80:00:07\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.7/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.7\"\n ],\n \"mac\": \"0a:58:0a:80:00:07\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-kube-scheduler-operator-7485d55966","uid":"6a63c0ce-2fe3-4e36-aa2b-2ee1d88b19b4","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-scheduler-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-kube-scheduler-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-scheduler-operator-container","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","command":["cluster-kube-scheduler-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6299220482f0e3c3f393e5eda761e3fab67e96ddffbf71a7a77408359401533d"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-kube-scheduler-operator","serviceAccount":"openshift-kube-scheduler-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:09Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:56:57Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:05:57Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:05:57Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:56:57Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.7","podIPs":[{"ip":"10.128.0.7"}],"startTime":"2026-02-16T20:56:57Z","containerStatuses":[{"name":"kube-scheduler-operator-container","state":{"running":{"startedAt":"2026-02-16T21:05:56Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0216 21:03:34.627961 1 cmd.go:253] Using service-serving-cert provided certificates\nI0216 21:03:34.628117 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0216 21:03:34.630219 1 observer_polling.go:159] Starting file observer\nW0216 21:04:34.644738 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get replicasets.apps openshift-kube-scheduler-operator-7485d55966)\nI0216 21:04:34.644864 1 builder.go:304] openshift-cluster-kube-scheduler-operator version 4.18.0-202601180343.p2.g971ffbb.assembly.stream.el9-971ffbb-971ffbb8239a8c49f1254e5fdaab854eed224f31\nF0216 21:05:32.407270 1 cmd.go:182] failed checking connectivity: client rate limiter Wait returned an error: context deadline exceeded\n","startedAt":"2026-02-16T21:03:34Z","finishedAt":"2026-02-16T21:05:32Z","containerID":"cri-o://6a7d7b13e17869969e9d31d79faa72dfb3a8d8453f67a2323e3dc0a1300a1e65"}},"ready":true,"restartCount":4,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f56d01ef06fe016c748e8c87538dea8e9fcc84856eb116bd3597cc8e042e9f0a","containerID":"cri-o://47333b4dc4c4506a75d09ea9dbae2fc9aaa9a5e9656c7290cd679c62408950cd","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-ingress-operator/ingress-operator-c588d8cb4-6ps2d.json0000640000000000000000000002513515144705156025251 0ustar0000000000000000{"metadata":{"name":"ingress-operator-c588d8cb4-6ps2d","generateName":"ingress-operator-c588d8cb4-","namespace":"openshift-ingress-operator","uid":"cef33294-81fb-41a2-811d-2565f94514d1","resourceVersion":"12877","creationTimestamp":"2026-02-16T20:55:38Z","labels":{"name":"ingress-operator","pod-template-hash":"c588d8cb4"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.26/23\"],\"mac_address\":\"0a:58:0a:80:00:1a\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.26/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.26\"\n ],\n \"mac\": \"0a:58:0a:80:00:1a\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"ingress-operator-c588d8cb4","uid":"2dcbed3f-dade-4450-aa23-af39651d746c","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420}},{"name":"trusted-ca","configMap":{"name":"trusted-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420}},{"name":"bound-sa-token","projected":{"sources":[{"serviceAccountToken":{"audience":"openshift","expirationSeconds":3600,"path":"token"}}],"defaultMode":420}},{"name":"kube-api-access-5tklr","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"ingress-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3d21c51712e6e0cdd9c776479f6d1ab55bc1085df5bb5f583e69ee192d11fd3","command":["ingress-operator","start","--namespace","$(WATCH_NAMESPACE)","--image","$(IMAGE)","--canary-image","$(CANARY_IMAGE)","--release-version","$(RELEASE_VERSION)"],"env":[{"name":"RELEASE_VERSION","value":"4.18.32"},{"name":"WATCH_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6b318889972c37662382a2905888bb3f1cfd71a433b6afa3504cc12f3c6fa6eb"},{"name":"CANARY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3d21c51712e6e0cdd9c776479f6d1ab55bc1085df5bb5f583e69ee192d11fd3"}],"resources":{"requests":{"cpu":"10m","memory":"56Mi"}},"volumeMounts":[{"name":"trusted-ca","readOnly":true,"mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"bound-sa-token","readOnly":true,"mountPath":"/var/run/secrets/openshift/serviceaccount"},{"name":"kube-api-access-5tklr","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","args":["--logtostderr","--secure-listen-address=:9393","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256","--upstream=http://127.0.0.1:60000/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key"],"ports":[{"name":"metrics","containerPort":9393,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"40Mi"}},"volumeMounts":[{"name":"metrics-tls","readOnly":true,"mountPath":"/etc/tls/private"},{"name":"kube-api-access-5tklr","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"ingress-operator","serviceAccount":"ingress-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c12,c4"},"runAsNonRoot":true,"fsGroup":1000140000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:31Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:56:58Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:20:11Z","reason":"ContainersNotReady","message":"containers with unready status: [ingress-operator]"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:20:11Z","reason":"ContainersNotReady","message":"containers with unready status: [ingress-operator]"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:56:57Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.26","podIPs":[{"ip":"10.128.0.26"}],"startTime":"2026-02-16T20:56:58Z","containerStatuses":[{"name":"ingress-operator","state":{"waiting":{"reason":"CrashLoopBackOff","message":"back-off 5m0s restarting failed container=ingress-operator pod=ingress-operator-c588d8cb4-6ps2d_openshift-ingress-operator(cef33294-81fb-41a2-811d-2565f94514d1)"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"onciler error\t{\"controller\": \"canary_controller\", \"object\": {\"name\":\"default\",\"namespace\":\"openshift-ingress-operator\"}, \"namespace\": \"openshift-ingress-operator\", \"name\": \"default\", \"reconcileID\": \"cf3a9fbf-bd33-484a-91d6-99f27a5e2f01\", \"error\": \"failed to ensure canary route: failed to get API group resources: unable to retrieve the complete list of server APIs: route.openshift.io/v1: the server is currently unable to handle the request\"}\n2026-02-16T21:20:10.709Z\tINFO\toperator.init\tmanager/runnable_group.go:226\tAll workers finished\t{\"controller\": \"canary_controller\"}\n2026-02-16T21:20:10.709Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tStopping and waiting for caches\nW0216 21:20:10.710264 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.IngressClass ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0216 21:20:10.710293 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.DNSRecord ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\n2026-02-16T21:20:10.710Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tStopping and waiting for webhooks\n2026-02-16T21:20:10.710Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tStopping and waiting for HTTP servers\n2026-02-16T21:20:10.710Z\tINFO\toperator.init.controller-runtime.metrics\truntime/asm_amd64.s:1695\tShutting down metrics server with timeout of 1 minute\n2026-02-16T21:20:10.710Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tWait completed, proceeding to shutdown the manager\n2026-02-16T21:20:10.711Z\tERROR\toperator.main\tcobra/command.go:989\terror starting\t{\"error\": \"failed to wait for route_metrics_controller caches to sync: timed out waiting for cache to be synced for Kind *v1.Route\"}\n2026-02-16T21:20:10.711Z\tINFO\toperator.main\truntime/asm_amd64.s:1695\tfile watch events channel closed\n","startedAt":"2026-02-16T21:18:09Z","finishedAt":"2026-02-16T21:20:10Z","containerID":"cri-o://cddc9c1d447dc5a0250ef24bddae48c93c58b480b6bca11a2ff7438d4148bf8f"}},"ready":false,"restartCount":6,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3d21c51712e6e0cdd9c776479f6d1ab55bc1085df5bb5f583e69ee192d11fd3","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3d21c51712e6e0cdd9c776479f6d1ab55bc1085df5bb5f583e69ee192d11fd3","containerID":"cri-o://cddc9c1d447dc5a0250ef24bddae48c93c58b480b6bca11a2ff7438d4148bf8f","started":false,"volumeMounts":[{"name":"trusted-ca","mountPath":"/etc/pki/ca-trust/extracted/pem","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"bound-sa-token","mountPath":"/var/run/secrets/openshift/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-5tklr","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-16T20:57:30Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://d15df1caa93fcce85a632cd318aaf9104964d846efd2e5a897c570b4ebb61cb3","started":true,"volumeMounts":[{"name":"metrics-tls","mountPath":"/etc/tls/private","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-5tklr","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-controller-manager-operator-5f5f84757d-k42w9.json0000640000000000000000000001642515144705156033371 0ustar0000000000000000config/pod/openshift-controller-manager-operator{"metadata":{"name":"openshift-controller-manager-operator-5f5f84757d-k42w9","generateName":"openshift-controller-manager-operator-5f5f84757d-","namespace":"openshift-controller-manager-operator","uid":"695549c8-d1fc-429d-9c9f-0a5915dc6074","resourceVersion":"10422","creationTimestamp":"2026-02-16T20:55:40Z","labels":{"app":"openshift-controller-manager-operator","pod-template-hash":"5f5f84757d"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.23/23\"],\"mac_address\":\"0a:58:0a:80:00:17\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.23/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.23\"\n ],\n \"mac\": \"0a:58:0a:80:00:17\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-controller-manager-operator-5f5f84757d","uid":"4476268e-9ee9-445c-8d01-54080770c621","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access-7bcmr","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f353131d8a1223db7f637c9851016b3a348d80c2b2be663a2db6d01e14ddca88","command":["cluster-openshift-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.32"},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f122c11c2f6a10ca150b136f7291d2e135b3a182d67809aa49727da289787cee"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"},{"name":"ROUTE_CONTROLLER_MANAGER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0871b6c16b38a2eda5d1c89fd75079aff0775224307e940557e6fda6ba229f38"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-7bcmr","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-controller-manager-operator","serviceAccount":"openshift-controller-manager-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c17,c9"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:09Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:56:57Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:06:22Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:06:22Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:56:57Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.23","podIPs":[{"ip":"10.128.0.23"}],"startTime":"2026-02-16T20:56:57Z","containerStatuses":[{"name":"openshift-controller-manager-operator","state":{"running":{"startedAt":"2026-02-16T21:06:21Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0216 21:03:34.531459 1 cmd.go:253] Using service-serving-cert provided certificates\nI0216 21:03:34.531615 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0216 21:03:34.532269 1 observer_polling.go:159] Starting file observer\nW0216 21:04:34.552256 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get replicasets.apps openshift-controller-manager-operator-5f5f84757d)\nI0216 21:04:34.552462 1 builder.go:304] openshift-controller-manager-operator version 4.18.0-202601170315.p2.gf1711cf.assembly.stream.el9-f1711cf-f1711cf30f683ec0eaa187cd5168caae9e8c1254\nF0216 21:05:32.406062 1 cmd.go:182] failed checking connectivity: client rate limiter Wait returned an error: context deadline exceeded\n","startedAt":"2026-02-16T21:03:34Z","finishedAt":"2026-02-16T21:05:32Z","containerID":"cri-o://abce7c467580f27265b653bd89f53e6e0d6413f3687b039b9f58c8dd18d3f0ce"}},"ready":true,"restartCount":5,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f353131d8a1223db7f637c9851016b3a348d80c2b2be663a2db6d01e14ddca88","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f353131d8a1223db7f637c9851016b3a348d80c2b2be663a2db6d01e14ddca88","containerID":"cri-o://b759be244b2ba22ad1884f9e0274ee8a722d66b1e8a5b2b9389cb48c9ae341b5","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-7bcmr","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-config-operator/openshift-config-operator-7c6bdb986f-xbd96.json0000640000000000000000000002132415144705156026776 0ustar0000000000000000{"metadata":{"name":"openshift-config-operator-7c6bdb986f-xbd96","generateName":"openshift-config-operator-7c6bdb986f-","namespace":"openshift-config-operator","uid":"59237aa6-6250-4619-8ee5-abae59f04b57","resourceVersion":"9983","creationTimestamp":"2026-02-16T20:55:40Z","labels":{"app":"openshift-config-operator","pod-template-hash":"7c6bdb986f"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.19/23\"],\"mac_address\":\"0a:58:0a:80:00:13\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.19/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.19\"\n ],\n \"mac\": \"0a:58:0a:80:00:13\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-config-operator-7c6bdb986f","uid":"15347499-56bd-4aa4-9462-dc12ccce31ba","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"config-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"available-featuregates","emptyDir":{"sizeLimit":"100Mi"}},{"name":"kube-api-access-vklwz","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"initContainers":[{"name":"openshift-api","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9cc42212fb15c1f3e6a88acaaa4919c9693be3c6099ea849d28855e231dc9e44","command":["write-available-featuresets","--asset-output-dir=/available-featuregates","--payload-version=$(OPERATOR_IMAGE_VERSION)"],"env":[{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"available-featuregates","mountPath":"/available-featuregates"},{"name":"kube-api-access-vklwz","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"containers":[{"name":"openshift-config-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2431778975829348e271dc9bf123c7a24c81a52537a61414cd17c8436436078b","command":["cluster-config-operator","operator","--operator-version=$(OPERATOR_IMAGE_VERSION)","--authoritative-feature-gate-dir=/available-featuregates"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2431778975829348e271dc9bf123c7a24c81a52537a61414cd17c8436436078b"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.32"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"available-featuregates","mountPath":"/available-featuregates"},{"name":"kube-api-access-vklwz","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":3,"timeoutSeconds":1,"periodSeconds":3,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":3,"timeoutSeconds":1,"periodSeconds":3,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-config-operator","serviceAccount":"openshift-config-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c13,c2"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:00Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:00Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:05:33Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:05:33Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:56:57Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.19","podIPs":[{"ip":"10.128.0.19"}],"startTime":"2026-02-16T20:56:58Z","initContainerStatuses":[{"name":"openshift-api","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-16T20:57:00Z","finishedAt":"2026-02-16T20:57:00Z","containerID":"cri-o://61defc533791601dd8ff505e57b675aac367c1fe0144fefa77509ab84c3b3331"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9cc42212fb15c1f3e6a88acaaa4919c9693be3c6099ea849d28855e231dc9e44","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9cc42212fb15c1f3e6a88acaaa4919c9693be3c6099ea849d28855e231dc9e44","containerID":"cri-o://61defc533791601dd8ff505e57b675aac367c1fe0144fefa77509ab84c3b3331","started":false,"volumeMounts":[{"name":"available-featuregates","mountPath":"/available-featuregates"},{"name":"kube-api-access-vklwz","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"containerStatuses":[{"name":"openshift-config-operator","state":{"running":{"startedAt":"2026-02-16T21:05:24Z"}},"lastState":{"terminated":{"exitCode":137,"reason":"Error","message":"I0216 21:04:43.998030 1 cmd.go:250] Using service-serving-cert provided certificates\nI0216 21:04:43.998254 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0216 21:04:43.999642 1 observer_polling.go:159] Starting file observer\nI0216 21:04:44.023217 1 builder.go:298] config-operator version 4.18.0-202601171614.p2.g85cb407.assembly.stream.el9-85cb407-85cb40728227fac13a2983fb6e3170d67cf62075\nI0216 21:04:54.168988 1 cmd.go:138] Received SIGTERM or SIGINT signal, shutting down controller.\nI0216 21:04:59.001101 1 observer_polling.go:162] Shutting down file observer\n","startedAt":"2026-02-16T21:04:43Z","finishedAt":"2026-02-16T21:05:24Z","containerID":"cri-o://0715c2c6bc16d3adc1361563ad51b4de11f77937d1f51eb61f3cd34b96856d0c"}},"ready":true,"restartCount":7,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2431778975829348e271dc9bf123c7a24c81a52537a61414cd17c8436436078b","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2431778975829348e271dc9bf123c7a24c81a52537a61414cd17c8436436078b","containerID":"cri-o://302bf12f6109c01eb273603d5fb2413e60f821dd662712bbc7e00c4eafc2b54f","started":true,"volumeMounts":[{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"available-featuregates","mountPath":"/available-featuregates"},{"name":"kube-api-access-vklwz","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-storage-operator/csi-snapshot-controller-operator-7b87b97578-v7xdv.json0000640000000000000000000001611215144705156032120 0ustar0000000000000000{"metadata":{"name":"csi-snapshot-controller-operator-7b87b97578-v7xdv","generateName":"csi-snapshot-controller-operator-7b87b97578-","namespace":"openshift-cluster-storage-operator","uid":"4085413c-9af1-4d2a-ba0f-33b42025cb7f","resourceVersion":"10161","creationTimestamp":"2026-02-16T20:55:40Z","labels":{"app":"csi-snapshot-controller-operator","pod-template-hash":"7b87b97578"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.25/23\"],\"mac_address\":\"0a:58:0a:80:00:19\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.25/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.25\"\n ],\n \"mac\": \"0a:58:0a:80:00:19\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"csi-snapshot-controller-operator-7b87b97578","uid":"88d7baaa-5091-4c10-b580-22a7b288b045","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"kube-api-access-dw9lp","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"csi-snapshot-controller-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:13d06502c0f0a3c73f69bf8d0743718f7cfc46e71f4a12916517ad7e9bff17e1","args":["start","-v=2"],"env":[{"name":"OPERAND_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a26b20d3ef7b75aeb05acf9be2702f9d478822c43f679ff578811843692b960c"},{"name":"WEBHOOK_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8729815d028242b26db06f2ff44816d022e0e7eac34b7b8df11d27d938fe057e"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.32"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"65Mi"}},"volumeMounts":[{"name":"kube-api-access-dw9lp","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000150000,"readOnlyRootFilesystem":false,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"csi-snapshot-controller-operator","serviceAccount":"csi-snapshot-controller-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c12,c9"},"runAsNonRoot":true,"fsGroup":1000150000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:09Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:56:58Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:05:48Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:05:48Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:56:57Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.25","podIPs":[{"ip":"10.128.0.25"}],"startTime":"2026-02-16T20:56:58Z","containerStatuses":[{"name":"csi-snapshot-controller-operator","state":{"running":{"startedAt":"2026-02-16T21:05:47Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"W0216 21:03:34.526217 1 cmd.go:254] Using insecure, self-signed certificates\nI0216 21:03:34.530239 1 crypto.go:601] Generating new CA for csi-snapshot-controller-operator-signer@1771275814 cert, and key in /tmp/serving-cert-1577600964/serving-signer.crt, /tmp/serving-cert-1577600964/serving-signer.key\nI0216 21:03:34.857372 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0216 21:03:34.858415 1 observer_polling.go:159] Starting file observer\nW0216 21:04:34.876384 1 builder.go:266] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get replicasets.apps csi-snapshot-controller-operator-7b87b97578)\nI0216 21:04:34.876495 1 builder.go:298] csi-snapshot-controller-operator version -\nI0216 21:04:34.877064 1 dynamic_serving_content.go:116] \"Loaded a new cert/key pair\" name=\"serving-cert::/tmp/serving-cert-1577600964/tls.crt::/tmp/serving-cert-1577600964/tls.key\"\nI0216 21:05:32.406950 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController\nF0216 21:05:32.407162 1 cmd.go:179] failed checking connectivity: client rate limiter Wait returned an error: context deadline exceeded\n","startedAt":"2026-02-16T21:03:34Z","finishedAt":"2026-02-16T21:05:32Z","containerID":"cri-o://5bb447e9b562fe2a3fcb45b723cffb38257ea64157f142954fe58414909efdd3"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:13d06502c0f0a3c73f69bf8d0743718f7cfc46e71f4a12916517ad7e9bff17e1","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:13d06502c0f0a3c73f69bf8d0743718f7cfc46e71f4a12916517ad7e9bff17e1","containerID":"cri-o://a7f8b5655aa5f928db7106989ad4301d85bb293edb63d14ebb1059dcd9ca8910","started":true,"volumeMounts":[{"name":"kube-api-access-dw9lp","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-storage-operator/csi-snapshot-controller-74b6595c6d-pc6x9.json0000640000000000000000000001402115144705156030224 0ustar0000000000000000{"metadata":{"name":"csi-snapshot-controller-74b6595c6d-pc6x9","generateName":"csi-snapshot-controller-74b6595c6d-","namespace":"openshift-cluster-storage-operator","uid":"b1ac9776-54c4-46ce-b898-01c8cf35e593","resourceVersion":"12363","creationTimestamp":"2026-02-16T20:57:12Z","labels":{"app":"csi-snapshot-controller","pod-template-hash":"74b6595c6d"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.28/23\"],\"mac_address\":\"0a:58:0a:80:00:1c\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.28/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.28\"\n ],\n \"mac\": \"0a:58:0a:80:00:1c\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"csi-snapshot-controller-74b6595c6d","uid":"09db00e2-08fd-458d-b0f7-d1c973b14884","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"kube-api-access-vzx4s","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"snapshot-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a26b20d3ef7b75aeb05acf9be2702f9d478822c43f679ff578811843692b960c","args":["--v=2","--leader-election=true","--leader-election-lease-duration=137s","--leader-election-renew-deadline=107s","--leader-election-retry-period=26s","--leader-election-namespace=openshift-cluster-storage-operator"],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"kube-api-access-vzx4s","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000150000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"csi-snapshot-controller","serviceAccount":"csi-snapshot-controller","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c12,c9"},"runAsNonRoot":true,"fsGroup":1000150000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"app":"csi-snapshot-controller"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:16Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:12Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:17:50Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:17:50Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:12Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.28","podIPs":[{"ip":"10.128.0.28"}],"startTime":"2026-02-16T20:57:12Z","containerStatuses":[{"name":"snapshot-controller","state":{"running":{"startedAt":"2026-02-16T21:17:49Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"I0216 21:14:36.982752 1 feature_gate.go:387] feature gates: {map[]}\nI0216 21:14:36.982947 1 main.go:169] Version: 68a18d7e135100109ca9e677bea11f9ad9d000e5\nI0216 21:14:36.984241 1 main.go:220] Start NewCSISnapshotController with kubeconfig [] resyncPeriod [15m0s]\nE0216 21:15:06.993930 1 main.go:98] Failed to list v1 volumesnapshots with error=Get \"https://172.30.0.1:443/apis/snapshot.storage.k8s.io/v1/volumesnapshots?limit=1\": context deadline exceeded\nE0216 21:15:06.994022 1 main.go:246] Exiting due to failure to ensure CRDs exist during startup: context deadline exceeded\n","startedAt":"2026-02-16T21:14:36Z","finishedAt":"2026-02-16T21:15:06Z","containerID":"cri-o://473abb156ae2a59c96465c39d4a668c4215a0ddadc4067a2a5c3edc0e671f3a6"}},"ready":true,"restartCount":6,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a26b20d3ef7b75aeb05acf9be2702f9d478822c43f679ff578811843692b960c","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a26b20d3ef7b75aeb05acf9be2702f9d478822c43f679ff578811843692b960c","containerID":"cri-o://dbf27d3e8d5c7c62e35cbb6423a4806befc25edd2d78c5f0092f98b1bff2b619","started":true,"volumeMounts":[{"name":"kube-api-access-vzx4s","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-storage-operator/cluster-storage-operator-75b869db96-g4w5m.json0000640000000000000000000003101715144705156030411 0ustar0000000000000000{"metadata":{"name":"cluster-storage-operator-75b869db96-g4w5m","generateName":"cluster-storage-operator-75b869db96-","namespace":"openshift-cluster-storage-operator","uid":"aa2e9bbc-3962-45f5-a7cc-2dc059409e70","resourceVersion":"10232","creationTimestamp":"2026-02-16T20:58:01Z","labels":{"name":"cluster-storage-operator","pod-template-hash":"75b869db96"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.61/23\"],\"mac_address\":\"0a:58:0a:80:00:3d\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.61/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.61\"\n ],\n \"mac\": \"0a:58:0a:80:00:3d\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-storage-operator-75b869db96","uid":"6de4b471-941b-4721-bcdf-16f708263b6c","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cluster-storage-operator-serving-cert","secret":{"secretName":"cluster-storage-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"kube-api-access-wx8bf","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-storage-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a90d19460fbc705172df7759a3da394930623c6b6974620b79ffa07bab53c51f","command":["cluster-storage-operator","start"],"args":["start","-v=2","--terminate-on-files=/var/run/secrets/serving-cert/tls.crt","--terminate-on-files=/var/run/secrets/serving-cert/tls.key"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.32"},{"name":"AWS_EBS_DRIVER_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ed6a7048363c48409eed14cb305e8f2437f35f28abce6e7dd7b4bd1ea06aca0a"},{"name":"AWS_EBS_DRIVER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:08dcdfe78978b0e70e260df4ec206b22f21d7248256e4bbc058b188cd1601d45"},{"name":"GCP_PD_DRIVER_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:83402ec46858a4af6aa942398120e625060d1054b01f0153687878ff1bb7cdd5"},{"name":"GCP_PD_DRIVER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9cd09c76f15748683e540f57fb78c18e3997fac265de588558d9523cb01af762"},{"name":"OPENSTACK_CINDER_DRIVER_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8b61ee2b7a6814324bdf1fbf6c5c72b994b9b0069a85e1f92a0cc9fc2633bd93"},{"name":"OPENSTACK_CINDER_DRIVER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e503dc23e8e6a2988adc1a8e109401358217ca17ac8ac523bfd669e5a3504055"},{"name":"OVIRT_DRIVER_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a79394247657bf440e71b0ebff47026d760c71b1b03510019b3c519de7253c79"},{"name":"OVIRT_DRIVER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:059265b72f841516e2152ad96e660e7603aa31d267c0f6f8f7fca3bef4b39ae8"},{"name":"MANILA_DRIVER_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4c9bfdc66ceaf66bc9b66d332a5579b412cc560200b82793a37996bd1a828734"},{"name":"MANILA_DRIVER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9660025e2bde36358f60d15143e8a3a085ca716f5b73f0e6d3ef65286fb4cb09"},{"name":"MANILA_NFS_DRIVER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a60c6b58097bb0ced1170dd3a6c88bfc2f05e19755bfef3045a227da15b8ac84"},{"name":"PROVISIONER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c784d65851be8f4a512f82b94d946e36f291e1ca49332ec95db7261ad10b2476"},{"name":"ATTACHER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6cbbb8e2f4020c8d006b00901483ebc2968e06f1ce90cb73215724002a29177f"},{"name":"RESIZER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ab299b63908b76729b260c067f218831ef64c0ad4e0c2c36030ddf0b365048f8"},{"name":"SNAPSHOTTER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:914c6b5117522525c98560617c07726d91adc1e6336f44e0aea726a3fcb0bfb5"},{"name":"NODE_DRIVER_REGISTRAR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1435a805d3433bd5e3b6141ed30055f8b6350e1c56f9f8b3ba4febdbef794cb4"},{"name":"LIVENESS_PROBE_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d18454f3b49661c052375ef14c9f6ca31589a61abe2f6d23ec0cbf49288b3685"},{"name":"VSPHERE_PROBLEM_DETECTOR_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:08f673ee7702801a2229a13c2ef383556976503890054fbd4f87472aa7a1fab3"},{"name":"AZURE_DISK_DRIVER_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9163ea4b3eb96fc7706df4523b999333d0f24dd169a54b2ebc885ba1dd51fccf"},{"name":"AZURE_DISK_DRIVER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e35c62a0fcebd639016430efea319a3571be216f11c41d17e6dd7c6c8f3937ca"},{"name":"AZURE_FILE_DRIVER_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:70b0e5be749c3b4f016c82409ba4f2559ea72213665592fded48376efc8ae274"},{"name":"AZURE_FILE_DRIVER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cfd9360077ac2629442bad5789a8a51bbf63eeea208ba32187483ddd65a96400"},{"name":"KUBE_RBAC_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0"},{"name":"VMWARE_VSPHERE_DRIVER_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a5dd49c88c7a2214ce16e99ef9837adcf0471e938793880f9f337d9a9431b79d"},{"name":"VMWARE_VSPHERE_DRIVER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e40c4396a04373eb38c18fb54dcce637ee1d8e71a3ecb877e73f37a44e6aa3b2"},{"name":"VMWARE_VSPHERE_SYNCER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3fb40f87d68dba42b6064e3f46436649422174bdf900788a4d0068cb5679310c"},{"name":"CLUSTER_CLOUD_CONTROLLER_MANAGER_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9f2b80358f029728d7f4ce46418bb6859d9ea7365de7b6f97a5f549ed6e77471"},{"name":"IBM_VPC_BLOCK_DRIVER_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:23b0e71b138eb4c9e23e073f11974dd0f054d1cb78bc36227497076c0e8c1764"},{"name":"IBM_VPC_BLOCK_DRIVER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6b88e42f7000f64593afa03762f3147c0f9f0cdddd2ad762942ba6ec38198a06"},{"name":"POWERVS_BLOCK_CSI_DRIVER_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7d7e306ec16e50a8b5b527a78fdb62e8583866c2c0cf91b3befc8646e51deaa8"},{"name":"POWERVS_BLOCK_CSI_DRIVER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:288324251d8152a4370b64afc0626097649087d8cf38be8ac0dc8cd02fbd291c"},{"name":"TOOLS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ffa02bd6af0b44d4955aba57f727e13671f503393926be6d8965e31dcfcd6e3c"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"cluster-storage-operator-serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-wx8bf","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-storage-operator","serviceAccount":"cluster-storage-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c12,c9"},"runAsUser":11411,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:58:29Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:58:01Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:06:03Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:06:03Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:58:01Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.61","podIPs":[{"ip":"10.128.0.61"}],"startTime":"2026-02-16T20:58:01Z","containerStatuses":[{"name":"cluster-storage-operator","state":{"running":{"startedAt":"2026-02-16T21:06:02Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0216 21:03:09.165312 1 cmd.go:250] Using service-serving-cert provided certificates\nI0216 21:03:09.165520 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0216 21:03:09.166289 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0216 21:03:09.166306 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0216 21:03:09.166804 1 observer_polling.go:159] Starting file observer\nI0216 21:03:09.166930 1 observer_polling.go:159] Starting file observer\nW0216 21:04:33.826061 1 builder.go:266] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get replicasets.apps cluster-storage-operator-75b869db96)\nI0216 21:04:33.826393 1 builder.go:298] cluster-storage-operator version 4.18.0-202601191214.p2.g43fe40d.assembly.stream.el9-43fe40d-43fe40ddc11a8453f83273bbea82ae6295b496f9\nI0216 21:04:33.827494 1 dynamic_serving_content.go:116] \"Loaded a new cert/key pair\" name=\"serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key\"\nI0216 21:05:32.415110 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController\nF0216 21:05:32.415310 1 cmd.go:179] failed checking connectivity: client rate limiter Wait returned an error: context deadline exceeded\n","startedAt":"2026-02-16T21:03:09Z","finishedAt":"2026-02-16T21:05:32Z","containerID":"cri-o://86b2625e01e86e20ad843cc517b662e8d0574773dfe24c22fbbf50abc8c0ea7f"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a90d19460fbc705172df7759a3da394930623c6b6974620b79ffa07bab53c51f","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a90d19460fbc705172df7759a3da394930623c6b6974620b79ffa07bab53c51f","containerID":"cri-o://e121208e065bd981ec8f120b4bddfef2011a7578aefea2e29754d83b50431d3d","started":true,"volumeMounts":[{"name":"cluster-storage-operator-serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-wx8bf","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-olm-operator/cluster-olm-operator-55b69c6c48-pdjn4.json0000640000000000000000000002443515144705156026732 0ustar0000000000000000{"metadata":{"name":"cluster-olm-operator-55b69c6c48-pdjn4","generateName":"cluster-olm-operator-55b69c6c48-","namespace":"openshift-cluster-olm-operator","uid":"5e062e07-8076-444c-b476-4eb2848e9613","resourceVersion":"10197","creationTimestamp":"2026-02-16T20:55:40Z","labels":{"name":"cluster-olm-operator","pod-template-hash":"55b69c6c48"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.24/23\"],\"mac_address\":\"0a:58:0a:80:00:18\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.24/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.24\"\n ],\n \"mac\": \"0a:58:0a:80:00:18\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-olm-operator-55b69c6c48","uid":"31ae7c8f-154a-4d06-a788-eb9f66bb0322","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cluster-olm-operator-serving-cert","secret":{"secretName":"cluster-olm-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"operand-assets","emptyDir":{}},{"name":"kube-api-access-dfmv6","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"initContainers":[{"name":"copy-catalogd-manifests","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3bb3c46533b24f1a6a6669117dc888ed8f0c7ae56b34068a4ff2052335e34c4e","command":["/bin/sh"],"args":["-c","cp -a /openshift/manifests /operand-assets/catalogd"],"resources":{},"volumeMounts":[{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-dfmv6","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000380000,"allowPrivilegeEscalation":false}},{"name":"copy-operator-controller-manifests","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae30b3ab740f21c451d0272bceacb99fa34d22bbf2ea22f1e1e18230a156104b","command":["/bin/sh"],"args":["-c","cp -a /openshift/manifests /operand-assets/operator-controller"],"resources":{},"volumeMounts":[{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-dfmv6","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000380000,"allowPrivilegeEscalation":false}}],"containers":[{"name":"cluster-olm-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:333e6572029953b4c4676076f0991ee6e5c7d28cbe2887c71b1682f19831d8a1","command":["/cluster-olm-operator"],"args":["start"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"OPERATOR_NAME","value":"cluster-olm-operator"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.32"},{"name":"KUBE_RBAC_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0"},{"name":"CATALOGD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3bb3c46533b24f1a6a6669117dc888ed8f0c7ae56b34068a4ff2052335e34c4e"},{"name":"OPERATOR_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae30b3ab740f21c451d0272bceacb99fa34d22bbf2ea22f1e1e18230a156104b"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"cluster-olm-operator-serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-dfmv6","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000380000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-olm-operator","serviceAccount":"cluster-olm-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c20,c0"},"runAsNonRoot":true,"fsGroup":1000380000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:09Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:15Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:05:59Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:05:59Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:56:57Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.24","podIPs":[{"ip":"10.128.0.24"}],"startTime":"2026-02-16T20:56:58Z","initContainerStatuses":[{"name":"copy-catalogd-manifests","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-16T20:57:11Z","finishedAt":"2026-02-16T20:57:11Z","containerID":"cri-o://30eb3e8a1a561e4df2b728e0e98a6145e2dd7a64784f0071e688e9e9f5cc6bbc"}},"lastState":{},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3bb3c46533b24f1a6a6669117dc888ed8f0c7ae56b34068a4ff2052335e34c4e","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3bb3c46533b24f1a6a6669117dc888ed8f0c7ae56b34068a4ff2052335e34c4e","containerID":"cri-o://30eb3e8a1a561e4df2b728e0e98a6145e2dd7a64784f0071e688e9e9f5cc6bbc","started":false,"volumeMounts":[{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-dfmv6","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"copy-operator-controller-manifests","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-16T20:57:15Z","finishedAt":"2026-02-16T20:57:15Z","containerID":"cri-o://9949cb3f0ffb40ac03674e827a655fd8962fd631e7432c2ead34043e0e4d8864"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae30b3ab740f21c451d0272bceacb99fa34d22bbf2ea22f1e1e18230a156104b","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae30b3ab740f21c451d0272bceacb99fa34d22bbf2ea22f1e1e18230a156104b","containerID":"cri-o://9949cb3f0ffb40ac03674e827a655fd8962fd631e7432c2ead34043e0e4d8864","started":false,"volumeMounts":[{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-dfmv6","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"containerStatuses":[{"name":"cluster-olm-operator","state":{"running":{"startedAt":"2026-02-16T21:05:58Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I0216 21:03:34.196918 1 cmd.go:250] Using service-serving-cert provided certificates\nI0216 21:03:34.197124 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0216 21:03:34.197491 1 observer_polling.go:159] Starting file observer\nW0216 21:04:34.211410 1 builder.go:266] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get replicasets.apps cluster-olm-operator-55b69c6c48)\nI0216 21:04:34.211522 1 builder.go:298] cluster-olm-operator version 4.18.0-202601181212.p2.g88088e4.assembly.stream.el9-88088e4-88088e4bfe9f55ea7ab2c4331cebee727c8c0c34\nF0216 21:05:32.407405 1 cmd.go:179] failed checking connectivity: client rate limiter Wait returned an error: context deadline exceeded\n","startedAt":"2026-02-16T21:03:34Z","finishedAt":"2026-02-16T21:05:32Z","containerID":"cri-o://b805375f7b42f31b0863c18246ff6bd98c4c77aa1ad1eb2b469a42772d48301d"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:333e6572029953b4c4676076f0991ee6e5c7d28cbe2887c71b1682f19831d8a1","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:333e6572029953b4c4676076f0991ee6e5c7d28cbe2887c71b1682f19831d8a1","containerID":"cri-o://75c97c8fc1fe4bc7ed998eb0ff8eb423dc36feffc10982a1abea2a451f308726","started":true,"volumeMounts":[{"name":"cluster-olm-operator-serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-dfmv6","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-ff6c9b66-kh4d4.json0000640000000000000000000002066215144705156031640 0ustar0000000000000000{"metadata":{"name":"cluster-node-tuning-operator-ff6c9b66-kh4d4","generateName":"cluster-node-tuning-operator-ff6c9b66-","namespace":"openshift-cluster-node-tuning-operator","uid":"2506c282-0b37-4ece-8a0c-885d0b7f7901","resourceVersion":"11941","creationTimestamp":"2026-02-16T20:55:40Z","labels":{"name":"cluster-node-tuning-operator","pod-template-hash":"ff6c9b66"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.12/23\"],\"mac_address\":\"0a:58:0a:80:00:0c\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.12/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.12\"\n ],\n \"mac\": \"0a:58:0a:80:00:0c\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-node-tuning-operator-ff6c9b66","uid":"a1555e34-703d-4985-bf71-6348bd3f930d","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"node-tuning-operator-tls","secret":{"secretName":"node-tuning-operator-tls","defaultMode":420}},{"name":"apiservice-cert","secret":{"secretName":"performance-addon-operator-webhook-cert","items":[{"key":"tls.crt","path":"apiserver.crt"},{"key":"tls.key","path":"apiserver.key"}],"defaultMode":420}},{"name":"trusted-ca","configMap":{"name":"trusted-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420,"optional":true}},{"name":"kube-api-access-6qd6r","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-node-tuning-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:56dffbd86bfae06921432678caf184b335bf2fc6ac7ee128f48aee396d57ea55","command":["cluster-node-tuning-operator"],"args":["-v=0"],"ports":[{"name":"metrics","containerPort":60000,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.32"},{"name":"WATCH_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"RESYNC_PERIOD","value":"600"},{"name":"CLUSTER_NODE_TUNED_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:56dffbd86bfae06921432678caf184b335bf2fc6ac7ee128f48aee396d57ea55"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"node-tuning-operator-tls","mountPath":"/etc/secrets"},{"name":"trusted-ca","mountPath":"/var/run/configmaps/trusted-ca/"},{"name":"apiservice-cert","mountPath":"/apiserver.local.config/certificates"},{"name":"kube-api-access-6qd6r","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]},"readOnlyRootFilesystem":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-node-tuning-operator","serviceAccount":"cluster-node-tuning-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c16,c0"},"runAsUser":499,"runAsNonRoot":true},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:23Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:56:57Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:13:42Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:13:42Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:56:57Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.12","podIPs":[{"ip":"10.128.0.12"}],"startTime":"2026-02-16T20:56:57Z","containerStatuses":[{"name":"cluster-node-tuning-operator","state":{"running":{"startedAt":"2026-02-16T21:13:41Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"ntrollerKind\":\"PerformanceProfile\",\"source\":\"kind source: *v1.RuntimeClass\"}\n{\"level\":\"info\",\"ts\":\"2026-02-16T21:09:09Z\",\"msg\":\"Starting EventSource\",\"controller\":\"performanceprofile\",\"controllerGroup\":\"performance.openshift.io\",\"controllerKind\":\"PerformanceProfile\",\"source\":\"kind source: *v1.MachineConfigPool\"}\n{\"level\":\"info\",\"ts\":\"2026-02-16T21:09:09Z\",\"msg\":\"Starting EventSource\",\"controller\":\"performanceprofile\",\"controllerGroup\":\"performance.openshift.io\",\"controllerKind\":\"PerformanceProfile\",\"source\":\"kind source: *v1.Profile\"}\n{\"level\":\"info\",\"ts\":\"2026-02-16T21:09:09Z\",\"msg\":\"Starting Controller\",\"controller\":\"performanceprofile\",\"controllerGroup\":\"performance.openshift.io\",\"controllerKind\":\"PerformanceProfile\"}\nI0216 21:09:09.159745 1 controller.go:1443] started events processor/controller\nI0216 21:09:09.166093 1 server.go:104] starting metrics server\n{\"level\":\"info\",\"ts\":\"2026-02-16T21:09:09Z\",\"msg\":\"Starting workers\",\"controller\":\"performanceprofile\",\"controllerGroup\":\"performance.openshift.io\",\"controllerKind\":\"PerformanceProfile\",\"worker count\":1}\nE0216 21:11:53.106057 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0216 21:12:53.109460 1 leaderelection.go:436] error retrieving resource lock openshift-cluster-node-tuning-operator/node-tuning-operator-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io node-tuning-operator-lock)\nI0216 21:13:06.102180 1 leaderelection.go:297] failed to renew lease openshift-cluster-node-tuning-operator/node-tuning-operator-lock: timed out waiting for the condition\nE0216 21:13:40.107171 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded\nF0216 21:13:40.107307 1 main.go:242] manager exited with non-zero code: leader election lost\n","startedAt":"2026-02-16T21:03:34Z","finishedAt":"2026-02-16T21:13:40Z","containerID":"cri-o://c78e5502c7df20a63c6e359691ad6478f7f26c7822d2c31d3780654e26b107fb"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:56dffbd86bfae06921432678caf184b335bf2fc6ac7ee128f48aee396d57ea55","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:56dffbd86bfae06921432678caf184b335bf2fc6ac7ee128f48aee396d57ea55","containerID":"cri-o://9f90d50c443b02c7e534aaa4189343a67e0f379619e2d5c07740a2f0b49e9999","started":true,"volumeMounts":[{"name":"node-tuning-operator-tls","mountPath":"/etc/secrets"},{"name":"trusted-ca","mountPath":"/var/run/configmaps/trusted-ca/"},{"name":"apiservice-cert","mountPath":"/apiserver.local.config/certificates"},{"name":"kube-api-access-6qd6r","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-machine-approver/machine-approver-8569dd85ff-kvhs4.json0000640000000000000000000002143515144705156027022 0ustar0000000000000000{"metadata":{"name":"machine-approver-8569dd85ff-kvhs4","generateName":"machine-approver-8569dd85ff-","namespace":"openshift-cluster-machine-approver","uid":"065fcd43-1572-4152-b77b-a6b7ab52a081","resourceVersion":"11931","creationTimestamp":"2026-02-16T21:10:56Z","labels":{"app":"machine-approver","pod-template-hash":"8569dd85ff"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"machine-approver-8569dd85ff","uid":"8c6f1a00-5b77-40bc-ab67-057fbe01c17d","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"auth-proxy-config","configMap":{"name":"kube-rbac-proxy","defaultMode":420}},{"name":"machine-approver-tls","secret":{"secretName":"machine-approver-tls","defaultMode":420}},{"name":"config","configMap":{"name":"machine-approver-config","defaultMode":440,"optional":true}},{"name":"kube-api-access-trcfg","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","args":["--secure-listen-address=0.0.0.0:9192","--upstream=http://127.0.0.1:9191/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key","--config-file=/etc/kube-rbac-proxy/config-file.yaml","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305","--logtostderr=true","--v=3"],"ports":[{"name":"https","hostPort":9192,"containerPort":9192,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"auth-proxy-config","mountPath":"/etc/kube-rbac-proxy"},{"name":"machine-approver-tls","mountPath":"/etc/tls/private"},{"name":"kube-api-access-trcfg","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"machine-approver-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e7ac69aff2f28f6b3cbdb166c7dac7a3490167bcd670cd7057bdde1e1e7684d","command":["/usr/bin/machine-approver"],"args":["--config=/var/run/configmaps/config/config.yaml","-v=2","--logtostderr","--leader-elect=true","--leader-elect-lease-duration=137s","--leader-elect-renew-deadline=107s","--leader-elect-retry-period=26s","--leader-elect-resource-namespace=openshift-cluster-machine-approver","--api-group-version=machine.openshift.io/v1beta1","--max-concurrent-reconciles=10"],"env":[{"name":"RELEASE_VERSION","value":"4.18.32"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"kube-api-access-trcfg","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"machine-approver-sa","serviceAccount":"machine-approver-sa","nodeName":"master-0","hostNetwork":true,"securityContext":{},"imagePullSecrets":[{"name":"machine-approver-sa-dockercfg-vqmt8"}],"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:10:57Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:10:56Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:13:46Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:13:46Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:10:56Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-16T21:10:56Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-16T21:10:57Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://09791bd713ecaeccf489060fc2fec30269d2977979f66329e6c0231f6abbbe33","started":true,"volumeMounts":[{"name":"auth-proxy-config","mountPath":"/etc/kube-rbac-proxy"},{"name":"machine-approver-tls","mountPath":"/etc/tls/private"},{"name":"kube-api-access-trcfg","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"machine-approver-controller","state":{"running":{"startedAt":"2026-02-16T21:13:45Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"tificatesigningrequest\" controllerGroup=\"certificates.k8s.io\" controllerKind=\"CertificateSigningRequest\" source=\"kind source: *v1.CertificateSigningRequest\"\nI0216 21:10:57.412800 1 controller.go:175] \"Starting EventSource\" controller=\"certificatesigningrequest\" controllerGroup=\"certificates.k8s.io\" controllerKind=\"CertificateSigningRequest\" source=\"kind source: *v1.ConfigMap\"\nI0216 21:10:57.412813 1 controller.go:183] \"Starting Controller\" controller=\"certificatesigningrequest\" controllerGroup=\"certificates.k8s.io\" controllerKind=\"CertificateSigningRequest\"\nI0216 21:10:57.416691 1 reflector.go:368] Caches populated for *v1.ClusterOperator from github.com/openshift/cluster-machine-approver/status.go:99\nI0216 21:10:57.552079 1 reflector.go:368] Caches populated for *v1.ConfigMap from sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106\nI0216 21:10:57.618843 1 controller.go:217] \"Starting workers\" controller=\"certificatesigningrequest\" controllerGroup=\"certificates.k8s.io\" controllerKind=\"CertificateSigningRequest\" worker count=10\nE0216 21:11:57.422271 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0216 21:12:57.424723 1 leaderelection.go:436] error retrieving resource lock openshift-cluster-machine-approver/cluster-machine-approver-leader: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io cluster-machine-approver-leader)\nI0216 21:13:10.418058 1 leaderelection.go:297] failed to renew lease openshift-cluster-machine-approver/cluster-machine-approver-leader: timed out waiting for the condition\nE0216 21:13:44.422762 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded\nF0216 21:13:44.422895 1 main.go:244] unable to run the manager: leader election lost\n","startedAt":"2026-02-16T21:10:57Z","finishedAt":"2026-02-16T21:13:44Z","containerID":"cri-o://577a19cb609733c40b24d16a4cfb15f4698079667a2b3110eeef59cec7643dff"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e7ac69aff2f28f6b3cbdb166c7dac7a3490167bcd670cd7057bdde1e1e7684d","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1e7ac69aff2f28f6b3cbdb166c7dac7a3490167bcd670cd7057bdde1e1e7684d","containerID":"cri-o://6fa5335e554ef3afb4d68268a5f6f2e23524b3ac6a1926bda3c2a121662cce25","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"kube-api-access-trcfg","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-catalogd/catalogd-controller-manager-67bc7c997f-8kdgg.json0000640000000000000000000002536515144705156025741 0ustar0000000000000000{"metadata":{"name":"catalogd-controller-manager-67bc7c997f-8kdgg","generateName":"catalogd-controller-manager-67bc7c997f-","namespace":"openshift-catalogd","uid":"e8194cdc-3133-49e2-9579-a747c0bf2b16","resourceVersion":"11945","creationTimestamp":"2026-02-16T20:57:36Z","labels":{"control-plane":"catalogd-controller-manager","pod-template-hash":"67bc7c997f"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.42/23\"],\"mac_address\":\"0a:58:0a:80:00:2a\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.42/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.42\"\n ],\n \"mac\": \"0a:58:0a:80:00:2a\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"manager","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"catalogd-controller-manager-67bc7c997f","uid":"a9b6479b-7191-4e78-9af6-246be996bf61","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cache","emptyDir":{}},{"name":"catalogserver-certs","secret":{"secretName":"catalogserver-cert","items":[{"key":"tls.crt","path":"tls.crt"},{"key":"tls.key","path":"tls.key"}],"defaultMode":420,"optional":false}},{"name":"ca-certs","projected":{"sources":[{"configMap":{"name":"catalogd-trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"ca-bundle.crt"}],"optional":false}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"optional":false}}],"defaultMode":420}},{"name":"etc-containers","hostPath":{"path":"/etc/containers","type":"Directory"}},{"name":"etc-docker","hostPath":{"path":"/etc/docker","type":"Directory"}},{"name":"kube-api-access-hxvhm","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","args":["--secure-listen-address=0.0.0.0:7443","--http2-disable","--upstream=http://127.0.0.1:8080/","--logtostderr=true","--v=2"],"ports":[{"name":"https","containerPort":7443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"5m","memory":"64Mi"}},"volumeMounts":[{"name":"kube-api-access-hxvhm","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}},{"name":"manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3bb3c46533b24f1a6a6669117dc888ed8f0c7ae56b34068a4ff2052335e34c4e","command":["./manager"],"args":["--leader-elect","--metrics-bind-address=127.0.0.1:8080","--external-address=catalogd-service.openshift-catalogd.svc","--tls-cert=/var/certs/tls.crt","--tls-key=/var/certs/tls.key","--v=2","--global-pull-secret=openshift-config/pull-secret"],"env":[{"name":"SSL_CERT_DIR","value":"/var/ca-certs"}],"resources":{"requests":{"cpu":"100m","memory":"200Mi"}},"volumeMounts":[{"name":"cache","mountPath":"/var/cache/"},{"name":"catalogserver-certs","mountPath":"/var/certs"},{"name":"ca-certs","readOnly":true,"mountPath":"/var/ca-certs"},{"name":"etc-containers","readOnly":true,"mountPath":"/etc/containers"},{"name":"etc-docker","readOnly":true,"mountPath":"/etc/docker"},{"name":"kube-api-access-hxvhm","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":15,"timeoutSeconds":1,"periodSeconds":20,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":5,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":10,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"catalogd-controller-manager","serviceAccount":"catalogd-controller-manager","nodeName":"master-0","securityContext":{"seLinuxOptions":{"type":"spc_t"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchExpressions":[{"key":"kubernetes.io/arch","operator":"In","values":["amd64","arm64","ppc64le","s390x"]},{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:38Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:36Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:13:26Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:13:26Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:36Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.42","podIPs":[{"ip":"10.128.0.42"}],"startTime":"2026-02-16T20:57:36Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-02-16T20:57:37Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:93bf1697031cce06c4e576aa1ba5d8bda7e91b918627ed1d61f8c89a95a111f0","containerID":"cri-o://22968a9882928f70bec5424cc2346763d1decd6df62181dc2fb45946d7faa2c0","started":true,"volumeMounts":[{"name":"kube-api-access-hxvhm","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"manager","state":{"running":{"startedAt":"2026-02-16T21:13:13Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"=\"openshift-redhat-marketplace\" namespace=\"\" name=\"openshift-redhat-marketplace\" reconcileID=\"c9013d05-9582-42f7-bfed-e8fa71816f36\"\nI0216 21:07:47.550724 1 clustercatalog_controller.go:86] \"reconcile starting\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"5e9fbb1c-e710-47ba-9ebb-7c0950f5adda\"\nI0216 21:07:47.550877 1 clustercatalog_controller.go:134] \"reconcile ending\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"5e9fbb1c-e710-47ba-9ebb-7c0950f5adda\"\nI0216 21:07:51.391163 1 serverutil.go:96] \"handled request\" logger=\"catalogd-http-server\" host=\"10.128.0.43\" username=\"-\" method=\"GET\" uri=\"/catalogs/openshift-redhat-operators/api/v1/all\" protocol=\"HTTP/1.1\" status=200 size=14496882\nE0216 21:11:59.484636 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE0216 21:12:59.488088 1 leaderelection.go:436] error retrieving resource lock openshift-catalogd/catalogd-operator-lock: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io catalogd-operator-lock)\nI0216 21:13:12.476388 1 leaderelection.go:297] failed to renew lease openshift-catalogd/catalogd-operator-lock: timed out waiting for the condition\nE0216 21:13:12.476501 1 main.go:351] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\nI0216 21:13:12.476566 1 internal.go:538] \"Stopping and waiting for non leader election runnables\"\nI0216 21:13:12.476610 1 internal.go:542] \"Stopping and waiting for leader election runnables\"\n","startedAt":"2026-02-16T21:01:27Z","finishedAt":"2026-02-16T21:13:12Z","containerID":"cri-o://4f5444c17822db01691b9d03f3dd6a819e814eea7a63f23ec45ece42ea5fba62"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3bb3c46533b24f1a6a6669117dc888ed8f0c7ae56b34068a4ff2052335e34c4e","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3bb3c46533b24f1a6a6669117dc888ed8f0c7ae56b34068a4ff2052335e34c4e","containerID":"cri-o://e04872ea2c764c93d171f84352e60786a5be1d211e2a3194644c313a82c96c0c","started":true,"volumeMounts":[{"name":"cache","mountPath":"/var/cache/"},{"name":"catalogserver-certs","mountPath":"/var/certs"},{"name":"ca-certs","mountPath":"/var/ca-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-containers","mountPath":"/etc/containers","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-docker","mountPath":"/etc/docker","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-hxvhm","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/crd/volumesnapshotcontents.snapshot.storage.k8s.io.json0000640000000000000000000005444315144705156023452 0ustar0000000000000000{"metadata":{"name":"volumesnapshotcontents.snapshot.storage.k8s.io","uid":"423f2ed8-5912-4d70-aa34-a215037a3141","resourceVersion":"4274","generation":1,"creationTimestamp":"2026-02-16T20:57:12Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/955","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"scope":"Cluster","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the\nunderlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system.\nRequired.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on\nthe underlying storage system should be deleted when its bound VolumeSnapshot is deleted.\nSupported values are \"Retain\" and \"Delete\".\n\"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept.\n\"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted.\nFor dynamically provisioned snapshots, this field will automatically be filled in by the\nCSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding\nVolumeSnapshotClass.\nFor pre-existing snapshots, users MUST specify this field when creating the\n VolumeSnapshotContent object.\nRequired.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on\nthe underlying storage system.\nThis MUST be the same as the name returned by the CSI GetPluginName() call for\nthat driver.\nRequired.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned\nor already exists, and just requires a Kubernetes object representation.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on\nthe underlying storage system for which a Kubernetes object representation\nwas (or should be) created.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"snapshotHandle is immutable"}]},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot\nshould be dynamically taken from.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeHandle is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.volumeHandle) || has(self.volumeHandle)","message":"volumeHandle is required once set"},{"rule":"!has(oldSelf.snapshotHandle) || has(self.snapshotHandle)","message":"snapshotHandle is required once set"},{"rule":"(has(self.volumeHandle) \u0026\u0026 !has(self.snapshotHandle)) || (!has(self.volumeHandle) \u0026\u0026 has(self.snapshotHandle))","message":"exactly one of volumeHandle and snapshotHandle must be set"}]},"sourceVolumeMode":{"description":"SourceVolumeMode is the mode of the volume whose snapshot is taken.\nCan be either “Filesystem” or “Block”.\nIf not specified, it indicates the source volume's mode is unknown.\nThis field is immutable.\nThis field is an alpha field.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"sourceVolumeMode is immutable"}]},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be)\ncreated.\nNote that after provisioning, the VolumeSnapshotClass may be deleted or\nrecreated with different set of values, and as such, should not be referenced\npost-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this\nVolumeSnapshotContent object is bound.\nVolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to\nthis VolumeSnapshotContent's name for the bidirectional binding to be valid.\nFor a pre-existing VolumeSnapshotContent object, name and namespace of the\nVolumeSnapshot object MUST be provided for binding to happen.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string\nshould contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2].\nFor example, if the object reference is to a container within a pod, this would take on a value like:\n\"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered\nthe event) or if no container name is specified \"spec.containers[2]\" (container with\nindex 2 in this pod). This syntax is chosen only to have some well-defined way of\nreferencing a part of an object.\nTODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}},"x-kubernetes-map-type":"atomic","x-kubernetes-validations":[{"rule":"has(self.name) \u0026\u0026 has(self.__namespace__)","message":"both spec.volumeSnapshotRef.name and spec.volumeSnapshotRef.namespace must be set"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.sourceVolumeMode) || has(self.sourceVolumeMode)","message":"sourceVolumeMode is required once set"}]},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it indicates the creation time is unknown.\nThe format of this field is a Unix nanoseconds time encoded as an int64.\nOn Unix, the command `date +%s%N` returns the current time in nanoseconds\nsince 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nUpon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system.\nIf not specified, it indicates that dynamic snapshot creation has either failed\nor it is still in progress.","type":"string"},"volumeGroupSnapshotHandle":{"description":"VolumeGroupSnapshotHandle is the CSI \"group_snapshot_id\" of a group snapshot\non the underlying storage system.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshotContent is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshotContent","schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the underlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system. Required.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted. Supported values are \"Retain\" and \"Delete\". \"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept. \"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted. For dynamically provisioned snapshots, this field will automatically be filled in by the CSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding VolumeSnapshotClass. For pre-existing snapshots, users MUST specify this field when creating the VolumeSnapshotContent object. Required.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on the underlying storage system. This MUST be the same as the name returned by the CSI GetPluginName() call for that driver. Required.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned or already exists, and just requires a Kubernetes object representation. This field is immutable after creation. Required.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on the underlying storage system for which a Kubernetes object representation was (or should be) created. This field is immutable.","type":"string"},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot should be dynamically taken from. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be) created. Note that after provisioning, the VolumeSnapshotClass may be deleted or recreated with different set of values, and as such, should not be referenced post-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this VolumeSnapshotContent object is bound. VolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to this VolumeSnapshotContent's name for the bidirectional binding to be valid. For a pre-existing VolumeSnapshotContent object, name and namespace of the VolumeSnapshot object MUST be provided for binding to happen. This field is immutable after creation. Required.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string should contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2]. For example, if the object reference is to a container within a pod, this would take on a value like: \"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered the event) or if no container name is specified \"spec.containers[2]\" (container with index 2 in this pod). This syntax is chosen only to have some well-defined way of referencing a part of an object. TODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}}}}},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it indicates the creation time is unknown. The format of this field is a Unix nanoseconds time encoded as an int64. On Unix, the command `date +%s%N` returns the current time in nanoseconds since 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any. Upon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system. If not specified, it indicates that dynamic snapshot creation has either failed or it is still in progress.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-02-16T20:57:12Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-02-16T20:57:12Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"},{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-02-16T20:57:12Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/955"}],"acceptedNames":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"storedVersions":["v1"]}}config/crd/volumesnapshots.snapshot.storage.k8s.io.json0000640000000000000000000004563015144705156022055 0ustar0000000000000000{"metadata":{"name":"volumesnapshots.snapshot.storage.k8s.io","uid":"f13f0bac-be2d-4006-9ba0-efb906508b16","resourceVersion":"4247","generation":1,"creationTimestamp":"2026-02-16T20:57:12Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/814","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"scope":"Namespaced","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time\nsnapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user.\nMore info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots\nRequired.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim\nobject representing the volume from which a snapshot should be created.\nThis PVC is assumed to be in the same namespace as the VolumeSnapshot\nobject.\nThis field should be set if the snapshot does not exists, and needs to be\ncreated.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"persistentVolumeClaimName is immutable"}]},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent\nobject representing an existing volume snapshot.\nThis field should be set if the snapshot already exists and only needs a representation in Kubernetes.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeSnapshotContentName is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.persistentVolumeClaimName) || has(self.persistentVolumeClaimName)","message":"persistentVolumeClaimName is required once set"},{"rule":"!has(oldSelf.volumeSnapshotContentName) || has(self.volumeSnapshotContentName)","message":"volumeSnapshotContentName is required once set"},{"rule":"(has(self.volumeSnapshotContentName) \u0026\u0026 !has(self.persistentVolumeClaimName)) || (!has(self.volumeSnapshotContentName) \u0026\u0026 has(self.persistentVolumeClaimName))","message":"exactly one of volumeSnapshotContentName and persistentVolumeClaimName must be set"}]},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass\nrequested by the VolumeSnapshot.\nVolumeSnapshotClassName may be left nil to indicate that the default\nSnapshotClass should be used.\nA given cluster may have multiple default Volume SnapshotClasses: one\ndefault per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass,\nVolumeSnapshotSource will be checked to figure out what the associated\nCSI Driver is, and the default VolumeSnapshotClass associated with that\nCSI Driver will be used. If more than one VolumeSnapshotClass exist for\na given CSI Driver and more than one have been marked as default,\nCreateSnapshot will fail and generate an event.\nEmpty string is not allowed for this field.","type":"string","x-kubernetes-validations":[{"rule":"size(self) \u003e 0","message":"volumeSnapshotClassName must not be the empty string when set"}]}}},"status":{"description":"status represents the current information of a snapshot.\nConsumers must verify binding between VolumeSnapshot and\nVolumeSnapshotContent objects is successful (by validating that both\nVolumeSnapshot and VolumeSnapshotContent point at each other) before\nusing this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent\nobject to which this VolumeSnapshot object intends to bind to.\nIf not specified, it indicates that the VolumeSnapshot object has not been\nsuccessfully bound to a VolumeSnapshotContent object yet.\nNOTE: To avoid possible security issues, consumers must verify binding between\nVolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that\nboth VolumeSnapshot and VolumeSnapshotContent point at each other) before using\nthis object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nThis field could be helpful to upper level controllers(i.e., application controller)\nto decide whether they should continue on waiting for the snapshot to be created\nbased on the type of error reported.\nThe snapshot controller will keep retrying when an error occurs during the\nsnapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume\nfrom this snapshot.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"volumeGroupSnapshotName":{"description":"VolumeGroupSnapshotName is the name of the VolumeGroupSnapshot of which this\nVolumeSnapshot is a part of.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshot is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshot","schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time snapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user. More info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots Required.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from. This field is immutable after creation. Required.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim object representing the volume from which a snapshot should be created. This PVC is assumed to be in the same namespace as the VolumeSnapshot object. This field should be set if the snapshot does not exists, and needs to be created. This field is immutable.","type":"string"},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent object representing an existing volume snapshot. This field should be set if the snapshot already exists and only needs a representation in Kubernetes. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass requested by the VolumeSnapshot. VolumeSnapshotClassName may be left nil to indicate that the default SnapshotClass should be used. A given cluster may have multiple default Volume SnapshotClasses: one default per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass, VolumeSnapshotSource will be checked to figure out what the associated CSI Driver is, and the default VolumeSnapshotClass associated with that CSI Driver will be used. If more than one VolumeSnapshotClass exist for a given CSI Driver and more than one have been marked as default, CreateSnapshot will fail and generate an event. Empty string is not allowed for this field.","type":"string"}}},"status":{"description":"status represents the current information of a snapshot. Consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent object to which this VolumeSnapshot object intends to bind to. If not specified, it indicates that the VolumeSnapshot object has not been successfully bound to a VolumeSnapshotContent object yet. NOTE: To avoid possible security issues, consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any. This field could be helpful to upper level controllers(i.e., application controller) to decide whether they should continue on waiting for the snapshot to be created based on the type of error reported. The snapshot controller will keep retrying when an error occurs during the snapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume from this snapshot. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-02-16T20:57:12Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/814"},{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-02-16T20:57:12Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-02-16T20:57:12Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"}],"acceptedNames":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"storedVersions":["v1"]}}config/configmaps/kube-system/cluster-config-v1/install-config0000640000000000000000000000155515144705156023225 0ustar0000000000000000apiVersion: v1 baseDomain: xxxxxxxxxxxxx compute: - hyperthreading: Enabled name: worker platform: {} replicas: 0 controlPlane: hyperthreading: Enabled name: master platform: {} replicas: 1 metadata: creationTimestamp: null name: sno networking: clusterNetwork: - cidr: 10.128.0.0/16 hostPrefix: 23 machineNetwork: - cidr: 192.168.32.0/24 networkType: OVNKubernetes serviceNetwork: - 172.30.0.0/16 platform: none: {} publish: External pullSecret: "" sshKey: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt0000640000000000000000000000010115144705156025435 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/openshift-install-manifests/version0000640000000000000000000000000715144705156025144 0ustar0000000000000000v4.18.0config/configmaps/openshift-config/openshift-install-manifests/invoker0000640000000000000000000000001715144705156025135 0ustar0000000000000000agent-installerconfig/configmaps/openshift-config/kube-root-ca.crt/ca.crt0000640000000000000000000000030315144705156022255 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/initial-kube-apiserver-server-ca/ca-bundle.crt0000640000000000000000000000050515144705156026711 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt0000640000000000000000000000010115144705156023414 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt0000640000000000000000000000010115144705156023210 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt0000640000000000000000000000010115144705156025500 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- aggregated/ingress_controllers_certs.json0000640000000000000000000000045715144705156017543 0ustar0000000000000000[{"name":"router-ca","namespace":"openshift-ingress-operator","not_before":"2026-02-16T20:57:30Z","not_after":"2028-02-16T20:57:31Z","controllers":[]},{"name":"router-certs-default","namespace":"openshift-ingress","not_before":"2026-02-16T20:57:31Z","not_after":"2028-02-16T20:57:32Z","controllers":[]}]events/openshift-cluster-version.json0000640000000000000000000002250415144705156016613 0ustar0000000000000000{"items":[{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T20:51:25Z","reason":"LeaderElection","message":"master-0_0d21e366-3b99-4dca-a1ae-413aa851e0ea became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T20:51:32Z","reason":"LeaderElection","message":"master-0_0d21e366-3b99-4dca-a1ae-413aa851e0ea stopped leading","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T20:51:34Z","reason":"LeaderElection","message":"master-0_4b0da1c2-06d3-43ab-bcd4-f8dd23116b7b became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T20:51:42Z","reason":"ScalingReplicaSet","message":"Scaled up replica set cluster-version-operator-76959b6567 to 1","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T20:51:51Z","reason":"LeaderElection","message":"master-0_6970ba0f-e1d2-4969-8f5b-764c7fd66d38 became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T20:51:52Z","reason":"RetrievePayload","message":"Retrieving and verifying payload version=\"4.18.32\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T20:51:52Z","reason":"LoadPayload","message":"Loading payload version=\"4.18.32\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T20:51:54Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.32\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\" architecture=\"amd64\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T20:52:23Z","reason":"FailedCreate","message":"Error creating: pods \"cluster-version-operator-76959b6567-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T20:55:38Z","reason":"FailedCreate","message":"Error creating: pods \"cluster-version-operator-76959b6567-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T20:55:40Z","reason":"Scheduled","message":"Successfully assigned openshift-cluster-version/cluster-version-operator-76959b6567-7jlsw to master-0","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T20:55:40Z","reason":"SuccessfulCreate","message":"Created pod: cluster-version-operator-76959b6567-7jlsw","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T20:56:51Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"cluster-version-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T20:57:13Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"cluster-version-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T20:57:17Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T20:57:20Z","reason":"LeaderElection","message":"master-0_73b1bae5-5368-48e8-a7f3-1a6436f2613a became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T20:57:20Z","reason":"Started","message":"Started container cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T20:57:20Z","reason":"Created","message":"Created container: cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T20:57:20Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\" in 3.158s (3.158s including waiting). Image size: 512819769 bytes.","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T20:57:22Z","reason":"RetrievePayload","message":"Retrieving and verifying payload version=\"4.18.32\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T20:57:22Z","reason":"LoadPayload","message":"Loading payload version=\"4.18.32\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T20:57:23Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.32\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\" architecture=\"amd64\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T20:57:34Z","reason":"Killing","message":"Stopping container cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T20:57:34Z","reason":"ScalingReplicaSet","message":"Scaled down replica set cluster-version-operator-76959b6567 to 0 from 1","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T20:57:34Z","reason":"SuccessfulDelete","message":"Deleted pod: cluster-version-operator-76959b6567-7jlsw","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T20:57:37Z","reason":"ScalingReplicaSet","message":"Scaled up replica set cluster-version-operator-649c4f5445 to 1","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T20:57:37Z","reason":"SuccessfulCreate","message":"Created pod: cluster-version-operator-649c4f5445-n994s","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T20:57:37Z","reason":"Scheduled","message":"Successfully assigned openshift-cluster-version/cluster-version-operator-649c4f5445-n994s to master-0","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T20:57:38Z","reason":"LeaderElection","message":"master-0_aced1f52-ed36-43d7-bf87-443a66a0890f became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T20:57:40Z","reason":"RetrievePayload","message":"Retrieving and verifying payload version=\"4.18.32\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T20:57:40Z","reason":"LoadPayload","message":"Loading payload version=\"4.18.32\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T20:57:42Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.32\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\" architecture=\"amd64\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T21:04:14Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\" already present on machine","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T21:04:14Z","reason":"Created","message":"Created container: cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T21:04:14Z","reason":"Started","message":"Started container cluster-version-operator","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T21:10:42Z","reason":"LeaderElection","message":"master-0_2c57ebd6-962a-4a4f-86da-82cd68a4b297 became leader","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T21:10:43Z","reason":"RetrievePayload","message":"Retrieving and verifying payload version=\"4.18.32\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T21:10:43Z","reason":"LoadPayload","message":"Loading payload version=\"4.18.32\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\"","type":"Normal"},{"namespace":"openshift-cluster-version","lastTimestamp":"2026-02-16T21:10:45Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.32\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\" architecture=\"amd64\"","type":"Normal"}]}config/pod/openshift-cluster-version/cluster-version-operator-649c4f5445-n994s.json0000640000000000000000000001374015144705156026460 0ustar0000000000000000{"metadata":{"name":"cluster-version-operator-649c4f5445-n994s","generateName":"cluster-version-operator-649c4f5445-","namespace":"openshift-cluster-version","uid":"a5d4ac48-aed3-46b9-9b2a-d741121e05b4","resourceVersion":"9315","creationTimestamp":"2026-02-16T20:57:37Z","labels":{"k8s-app":"cluster-version-operator","pod-template-hash":"649c4f5445"},"annotations":{"openshift.io/required-scc":"hostaccess","openshift.io/scc":"hostaccess"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-version-operator-649c4f5445","uid":"e4a8f4cf-7cd8-479b-bf49-3b61096e9854","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"etc-ssl-certs","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"etc-cvo-updatepayloads","hostPath":{"path":"/etc/cvo/updatepayloads","type":""}},{"name":"serving-cert","secret":{"secretName":"cluster-version-operator-serving-cert","defaultMode":420}},{"name":"service-ca","configMap":{"name":"openshift-service-ca.crt","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-version-operator","image":"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","args":["start","--release-image=quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","--enable-auto-update=false","--listen=0.0.0.0:9099","--serving-cert-file=/etc/tls/serving-cert/tls.crt","--serving-key-file=/etc/tls/serving-cert/tls.key","--v=2","--always-enable-capabilities=Ingress"],"env":[{"name":"OPERATOR_IMAGE_VERSION","value":"0.0.1-snapshot"},{"name":"KUBERNETES_SERVICE_PORT","value":"6443"},{"name":"KUBERNETES_SERVICE_HOST","value":"api-int.sno.openstack.lab"},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}},{"name":"CLUSTER_PROFILE","value":"self-managed-high-availability"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-ssl-certs","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"etc-cvo-updatepayloads","readOnly":true,"mountPath":"/etc/cvo/updatepayloads"},{"name":"serving-cert","readOnly":true,"mountPath":"/etc/tls/serving-cert"},{"name":"service-ca","readOnly":true,"mountPath":"/etc/tls/service-ca"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000040000,"runAsNonRoot":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":130,"dnsPolicy":"Default","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"default","serviceAccount":"default","automountServiceAccountToken":false,"nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c6,c5"},"fsGroup":1000040000},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:38Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:37Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:04:15Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T21:04:15Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-02-16T20:57:37Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-02-16T20:57:37Z","containerStatuses":[{"name":"cluster-version-operator","state":{"running":{"startedAt":"2026-02-16T21:04:14Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-02-16T20:57:37Z","finishedAt":"2026-02-16T21:04:13Z","containerID":"cri-o://22be26c79a1d2adc3db5f6e113ba92cfcf47f9a286ce35fb6273d18f0ea1545e"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","imageID":"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","containerID":"cri-o://6343280e0df4085e2272811bcce84fa21c423071562a8310728970f3dd76b136","started":true,"volumeMounts":[{"name":"etc-ssl-certs","mountPath":"/etc/ssl/certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-cvo-updatepayloads","mountPath":"/etc/cvo/updatepayloads","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"serving-cert","mountPath":"/etc/tls/serving-cert","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca","mountPath":"/etc/tls/service-ca","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/id0000640000000000000000000000004415144705156011032 0ustar0000000000000000db9ec505-5071-4af6-a5e1-f59ba291c74cconfig/version.json0000640000000000000000000000671515144705156013106 0ustar0000000000000000{"metadata":{"name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","resourceVersion":"12353","generation":2,"creationTimestamp":"2026-02-16T20:51:29Z"},"spec":{"clusterID":"db9ec505-5071-4af6-a5e1-f59ba291c74c","channel":"stable-4.18","signatureStores":null},"status":{"desired":{"version":"4.18.32","image":"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","url":"https://access.redhat.com/errata/RHSA-2026:1062","channels":["candidate-4.18","candidate-4.19","candidate-4.20","eus-4.18","fast-4.18","stable-4.18"]},"history":[{"state":"Partial","startedTime":"2026-02-16T20:51:54Z","completionTime":null,"version":"4.18.32","image":"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc","verified":false}],"observedGeneration":2,"versionHash":"mWssvFsfzgI=","capabilities":{"enabledCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"],"knownCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"]},"conditions":[{"type":"RetrievedUpdates","status":"True","lastTransitionTime":"2026-02-16T20:51:54Z"},{"type":"Upgradeable","status":"False","lastTransitionTime":"2026-02-16T20:51:54Z","reason":"AdminAckRequired","message":"Kubernetes 1.32 and therefore OpenShift 4.19 remove several APIs which require admin consideration. Please see the knowledge article https://access.redhat.com/articles/7112216 for details and instructions."},{"type":"ImplicitlyEnabledCapabilities","status":"False","lastTransitionTime":"2026-02-16T20:51:54Z","reason":"AsExpected","message":"Capabilities match configured spec"},{"type":"ReleaseAccepted","status":"True","lastTransitionTime":"2026-02-16T20:51:54Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.32\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:6177c447b98c36a42fd45fa2ba413da73d14d0a7ad3aecfa977554f5ae9583cc\" architecture=\"amd64\""},{"type":"Available","status":"False","lastTransitionTime":"2026-02-16T20:51:54Z"},{"type":"Failing","status":"True","lastTransitionTime":"2026-02-16T21:16:30Z","reason":"MultipleErrors","message":"Multiple errors are preventing progress:\n* Cluster operators authentication, image-registry, kube-apiserver, kube-controller-manager, monitoring, openshift-apiserver, openshift-samples, operator-lifecycle-manager-packageserver are not available\n* Could not update imagestream \"openshift/driver-toolkit\" (617 of 906): the server is down or not responding\n* Could not update oauthclient \"console\" (550 of 906): the server does not recognize this resource, check extension API servers\n* Could not update role \"openshift-console-operator/prometheus-k8s\" (823 of 906): resource may have been deleted\n* Could not update role \"openshift-console/prometheus-k8s\" (827 of 906): resource may have been deleted"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-02-16T20:51:54Z","reason":"MultipleErrors","message":"Unable to apply 4.18.32: an unknown error has occurred: MultipleErrors"}],"availableUpdates":null}}events/openshift-machine-api.json0000640000000000000000000002166315144705156015627 0ustar0000000000000000{"items":[{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T20:59:29Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_machine-api-operator-bd7dd5c46-27jwb_openshift-machine-api_ba294358-051a-4f09-b182-710d3d6778c5_0(2ea08fae7f0fe005631de4aa1d290d78a9b2eafa8d3effd7d1490e1aeb811190): error adding pod openshift-machine-api_machine-api-operator-bd7dd5c46-27jwb to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"2ea08fae7f0fe005631de4aa1d290d78a9b2eafa8d3effd7d1490e1aeb811190\" Netns:\"/var/run/netns/fa83b52f-64f2-4d3b-b725-49e7a507dc56\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-machine-api;K8S_POD_NAME=machine-api-operator-bd7dd5c46-27jwb;K8S_POD_INFRA_CONTAINER_ID=2ea08fae7f0fe005631de4aa1d290d78a9b2eafa8d3effd7d1490e1aeb811190;K8S_POD_UID=ba294358-051a-4f09-b182-710d3d6778c5\" Path:\"\" ERRORED: error configuring pod [openshift-machine-api/machine-api-operator-bd7dd5c46-27jwb] networking: Multus: [openshift-machine-api/machine-api-operator-bd7dd5c46-27jwb/ba294358-051a-4f09-b182-710d3d6778c5]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod machine-api-operator-bd7dd5c46-27jwb in out of cluster comm: SetNetworkStatus: failed to update the pod machine-api-operator-bd7dd5c46-27jwb in out of cluster comm: status update failed for pod /: Get \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-machine-api/pods/machine-api-operator-bd7dd5c46-27jwb?timeout=1m0s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T21:00:30Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_machine-api-operator-bd7dd5c46-27jwb_openshift-machine-api_ba294358-051a-4f09-b182-710d3d6778c5_0(401e080120bb7e6bb9cb0590c2933b1d35142b51b9a53c449d90c9b6be9e20d0): error adding pod openshift-machine-api_machine-api-operator-bd7dd5c46-27jwb to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"401e080120bb7e6bb9cb0590c2933b1d35142b51b9a53c449d90c9b6be9e20d0\" Netns:\"/var/run/netns/576a436e-cf10-4a8d-ae28-cfcd61d89dd3\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-machine-api;K8S_POD_NAME=machine-api-operator-bd7dd5c46-27jwb;K8S_POD_INFRA_CONTAINER_ID=401e080120bb7e6bb9cb0590c2933b1d35142b51b9a53c449d90c9b6be9e20d0;K8S_POD_UID=ba294358-051a-4f09-b182-710d3d6778c5\" Path:\"\" ERRORED: error configuring pod [openshift-machine-api/machine-api-operator-bd7dd5c46-27jwb] networking: Multus: [openshift-machine-api/machine-api-operator-bd7dd5c46-27jwb/ba294358-051a-4f09-b182-710d3d6778c5]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod machine-api-operator-bd7dd5c46-27jwb in out of cluster comm: SetNetworkStatus: failed to update the pod machine-api-operator-bd7dd5c46-27jwb in out of cluster comm: status update failed for pod /: Get \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-machine-api/pods/machine-api-operator-bd7dd5c46-27jwb?timeout=1m0s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T21:01:32Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_machine-api-operator-bd7dd5c46-27jwb_openshift-machine-api_ba294358-051a-4f09-b182-710d3d6778c5_0(16c8f55fdb667148773fbcb9e5873521ffb7d7797e9168cf0473cb64c1e9dcd1): error adding pod openshift-machine-api_machine-api-operator-bd7dd5c46-27jwb to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"16c8f55fdb667148773fbcb9e5873521ffb7d7797e9168cf0473cb64c1e9dcd1\" Netns:\"/var/run/netns/d4bdedfa-6587-46e6-a26e-14849ab87001\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-machine-api;K8S_POD_NAME=machine-api-operator-bd7dd5c46-27jwb;K8S_POD_INFRA_CONTAINER_ID=16c8f55fdb667148773fbcb9e5873521ffb7d7797e9168cf0473cb64c1e9dcd1;K8S_POD_UID=ba294358-051a-4f09-b182-710d3d6778c5\" Path:\"\" ERRORED: error configuring pod [openshift-machine-api/machine-api-operator-bd7dd5c46-27jwb] networking: Multus: [openshift-machine-api/machine-api-operator-bd7dd5c46-27jwb/ba294358-051a-4f09-b182-710d3d6778c5]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod machine-api-operator-bd7dd5c46-27jwb in out of cluster comm: SetNetworkStatus: failed to update the pod machine-api-operator-bd7dd5c46-27jwb in out of cluster comm: status update failed for pod /: Get \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-machine-api/pods/machine-api-operator-bd7dd5c46-27jwb?timeout=1m0s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T21:02:33Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_machine-api-operator-bd7dd5c46-27jwb_openshift-machine-api_ba294358-051a-4f09-b182-710d3d6778c5_0(0635c9bdd3ba6fe3a3fc6f165d6449517b4a9d55061936375067ee85f5cdd8d8): error adding pod openshift-machine-api_machine-api-operator-bd7dd5c46-27jwb to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"0635c9bdd3ba6fe3a3fc6f165d6449517b4a9d55061936375067ee85f5cdd8d8\" Netns:\"/var/run/netns/39e5bfe6-235d-4d80-b791-a6cd1b76c21e\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-machine-api;K8S_POD_NAME=machine-api-operator-bd7dd5c46-27jwb;K8S_POD_INFRA_CONTAINER_ID=0635c9bdd3ba6fe3a3fc6f165d6449517b4a9d55061936375067ee85f5cdd8d8;K8S_POD_UID=ba294358-051a-4f09-b182-710d3d6778c5\" Path:\"\" ERRORED: error configuring pod [openshift-machine-api/machine-api-operator-bd7dd5c46-27jwb] networking: Multus: [openshift-machine-api/machine-api-operator-bd7dd5c46-27jwb/ba294358-051a-4f09-b182-710d3d6778c5]: error setting the networks status: SetPodNetworkStatusAnnotation: failed to update the pod machine-api-operator-bd7dd5c46-27jwb in out of cluster comm: SetNetworkStatus: failed to update the pod machine-api-operator-bd7dd5c46-27jwb in out of cluster comm: status update failed for pod /: Get \"https://api-int.sno.openstack.lab:6443/api/v1/namespaces/openshift-machine-api/pods/machine-api-operator-bd7dd5c46-27jwb?timeout=1m0s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-02-16T21:14:29Z","reason":"BackOff","message":"Back-off restarting failed container cluster-baremetal-operator in pod cluster-baremetal-operator-7bc947fc7d-xwptz_openshift-machine-api(8b648d9e-a892-4951-b0e2-fed6b16273d4)","type":"Warning"}]}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/edit.json0000640000000000000000000002231415144705156025504 0ustar0000000000000000{"metadata":{"name":"edit","uid":"775abb36-bec9-413e-8870-c14f08d511dc","resourceVersion":"12697","creationTimestamp":"2026-02-16T20:50:30Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults","rbac.authorization.k8s.io/aggregate-to-admin":"true"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["get","list","watch"],"apiGroups":["metrics.k8s.io"],"resources":["pods","nodes"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-edit":"true"}}]}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/admin.json0000640000000000000000000002520115144705156025645 0ustar0000000000000000{"metadata":{"name":"admin","uid":"434300b2-6064-4900-80c0-20253c4a239b","resourceVersion":"12699","creationTimestamp":"2026-02-16T20:50:30Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["get","list","watch"],"apiGroups":["metrics.k8s.io"],"resources":["pods","nodes"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["watch","list","get"],"apiGroups":["k8s.cni.cncf.io"],"resources":["network-attachment-definitions"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindings","roles"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["rbac.authorization.k8s.io"],"resources":["rolebindings","roles"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["localresourceaccessreviews","localsubjectaccessreviews","subjectrulesreviews"]},{"verbs":["create"],"apiGroups":["authorization.k8s.io"],"resources":["localsubjectaccessreviews"]},{"verbs":["delete","get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["resourceaccessreviews","subjectaccessreviews"]},{"verbs":["create"],"apiGroups":["","security.openshift.io"],"resources":["podsecuritypolicyreviews","podsecuritypolicyselfsubjectreviews","podsecuritypolicysubjectreviews"]},{"verbs":["get","list","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindingrestrictions"]},{"verbs":["admin","edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["delete","get","patch","update"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["update"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-admin":"true"}}]}}config/node/master-0.json0000640000000000000000000000703115144705156013766 0ustar0000000000000000{"metadata":{"name":"master-0","uid":"c38c4104-28e6-4348-a07e-dd94820db5ac","resourceVersion":"12891","creationTimestamp":"2026-02-16T20:55:38Z","labels":{"beta.kubernetes.io/arch":"amd64","beta.kubernetes.io/os":"linux","kubernetes.io/arch":"amd64","kubernetes.io/hostname":"master-0","kubernetes.io/os":"linux","node-role.kubernetes.io/control-plane":"","node-role.kubernetes.io/master":"","node-role.kubernetes.io/worker":"","node.openshift.io/os_id":"rhcos"},"annotations":{"k8s.ovn.org/host-cidrs":"","k8s.ovn.org/l3-gateway-config":"","k8s.ovn.org/node-chassis-id":"","k8s.ovn.org/node-encap-ips":"","k8s.ovn.org/node-id":"","k8s.ovn.org/node-masquerade-subnet":"","k8s.ovn.org/node-primary-ifaddr":"","k8s.ovn.org/node-subnets":"","k8s.ovn.org/node-transit-switch-port-ifaddr":"","k8s.ovn.org/remote-zone-migrated":"","k8s.ovn.org/zone-name":"","machineconfiguration.openshift.io/controlPlaneTopology":"SingleReplica","machineconfiguration.openshift.io/currentConfig":"rendered-master-c4f31ac656de3dac86533ebda7753660","machineconfiguration.openshift.io/desiredConfig":"rendered-master-c4f31ac656de3dac86533ebda7753660","machineconfiguration.openshift.io/desiredDrain":"uncordon-rendered-master-c4f31ac656de3dac86533ebda7753660","machineconfiguration.openshift.io/lastAppliedDrain":"uncordon-rendered-master-c4f31ac656de3dac86533ebda7753660","machineconfiguration.openshift.io/lastObservedServerCAAnnotation":"false","machineconfiguration.openshift.io/lastSyncedControllerConfigResourceVersion":"10691","machineconfiguration.openshift.io/reason":"","machineconfiguration.openshift.io/state":"Done","volumes.kubernetes.io/controller-managed-attach-detach":"true"}},"spec":{},"status":{"capacity":{"cpu":"16","ephemeral-storage":"209124332Ki","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"49330228Ki","pods":"250"},"allocatable":{"cpu":"15500m","ephemeral-storage":"191655242229","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"48179252Ki","pods":"250"},"conditions":[{"type":"MemoryPressure","status":"False","lastHeartbeatTime":"2026-02-16T21:20:32Z","lastTransitionTime":"2026-02-16T20:55:38Z","reason":"KubeletHasSufficientMemory","message":"kubelet has sufficient memory available"},{"type":"DiskPressure","status":"False","lastHeartbeatTime":"2026-02-16T21:20:32Z","lastTransitionTime":"2026-02-16T20:55:38Z","reason":"KubeletHasNoDiskPressure","message":"kubelet has no disk pressure"},{"type":"PIDPressure","status":"False","lastHeartbeatTime":"2026-02-16T21:20:32Z","lastTransitionTime":"2026-02-16T20:55:38Z","reason":"KubeletHasSufficientPID","message":"kubelet has sufficient PID available"},{"type":"Ready","status":"True","lastHeartbeatTime":"2026-02-16T21:20:32Z","lastTransitionTime":"2026-02-16T20:56:57Z","reason":"KubeletReady","message":"kubelet is posting ready status"}],"addresses":[{"type":"InternalIP","address":"192.168.32.10"},{"type":"Hostname","address":"master-0"}],"daemonEndpoints":{"kubeletEndpoint":{"Port":10250}},"nodeInfo":{"machineID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","systemUUID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","bootID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","kernelVersion":"5.14.0-427.107.1.el9_4.x86_64","osImage":"Red Hat Enterprise Linux CoreOS 418.94.202601202224-0","containerRuntimeVersion":"cri-o://1.31.13-3.rhaos4.18.gite0b87e5.el9","kubeletVersion":"v1.31.14","kubeProxyVersion":"v1.31.14","operatingSystem":"linux","architecture":"amd64"},"runtimeHandlers":[{"name":"crun","features":{"recursiveReadOnlyMounts":true}},{"name":"","features":{"recursiveReadOnlyMounts":true}},{"name":"runc","features":{"recursiveReadOnlyMounts":true}}]}}config/machineconfigpools/worker.json0000640000000000000000000001013515144705156016570 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-02-16T21:05:33Z","generation":2,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","pools.operator.machineconfiguration.openshift.io/worker":""},"name":"worker","resourceVersion":"10682","uid":"9d023631-d130-47d2-80f1-218670697d02"},"spec":{"configuration":{"name":"rendered-worker-2c2dea919cf2d7a2a500e7c50f03b150","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-worker"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-workers-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-ssh"}]},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"worker"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/worker":""}},"paused":false},"status":{"certExpirys":[{"bundle":"KubeAPIServerServingCAData","expiry":"2036-02-14T20:40:33Z","subject":"CN=admin-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-02-17T20:47:22Z","subject":"CN=kube-csr-signer_@1771275434"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-02-17T20:47:22Z","subject":"CN=kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-02-16T20:47:22Z","subject":"CN=kube-apiserver-to-kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-02-16T20:47:22Z","subject":"CN=kube-control-plane-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2036-02-14T20:47:20Z","subject":"CN=kubelet-bootstrap-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-02-16T20:57:02Z","subject":"CN=openshift-kube-apiserver-operator_node-system-admin-signer@1771275422"}],"conditions":[{"lastTransitionTime":"2026-02-16T21:06:30Z","message":"","reason":"","status":"False","type":"RenderDegraded"},{"lastTransitionTime":"2026-02-16T21:06:34Z","message":"All nodes are updated with MachineConfig rendered-worker-2c2dea919cf2d7a2a500e7c50f03b150","reason":"","status":"True","type":"Updated"},{"lastTransitionTime":"2026-02-16T21:06:34Z","message":"","reason":"","status":"False","type":"Updating"},{"lastTransitionTime":"2026-02-16T21:06:34Z","message":"","reason":"","status":"False","type":"NodeDegraded"},{"lastTransitionTime":"2026-02-16T21:06:34Z","message":"","reason":"","status":"False","type":"Degraded"}],"configuration":{"name":"rendered-worker-2c2dea919cf2d7a2a500e7c50f03b150","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-worker"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-worker-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-workers-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-worker-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-worker-ssh"}]},"degradedMachineCount":0,"machineCount":0,"observedGeneration":2,"readyMachineCount":0,"unavailableMachineCount":0,"updatedMachineCount":0}}config/machineconfigpools/master.json0000640000000000000000000001241015144705156016550 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-02-16T21:05:33Z","generation":2,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","operator.machineconfiguration.openshift.io/required-for-upgrade":"","pools.operator.machineconfiguration.openshift.io/master":""},"name":"master","resourceVersion":"10684","uid":"1ae64b87-0f37-463c-97e4-e0c747d1af3d"},"spec":{"configuration":{"name":"rendered-master-c4f31ac656de3dac86533ebda7753660","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-master"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-master-dnsmasq-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-masters-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-nable-iscsi"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-netifnames-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-lv-cinder-volumes"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-multipath-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-ssh"}]},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"master"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/master":""}},"paused":false},"status":{"certExpirys":[{"bundle":"KubeAPIServerServingCAData","expiry":"2036-02-14T20:40:33Z","subject":"CN=admin-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-02-17T20:47:22Z","subject":"CN=kube-csr-signer_@1771275434"},{"bundle":"KubeAPIServerServingCAData","expiry":"2026-02-17T20:47:22Z","subject":"CN=kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-02-16T20:47:22Z","subject":"CN=kube-apiserver-to-kubelet-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-02-16T20:47:22Z","subject":"CN=kube-control-plane-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2036-02-14T20:47:20Z","subject":"CN=kubelet-bootstrap-kubeconfig-signer,OU=openshift"},{"bundle":"KubeAPIServerServingCAData","expiry":"2027-02-16T20:57:02Z","subject":"CN=openshift-kube-apiserver-operator_node-system-admin-signer@1771275422"}],"conditions":[{"lastTransitionTime":"2026-02-16T21:06:30Z","message":"","reason":"","status":"False","type":"RenderDegraded"},{"lastTransitionTime":"2026-02-16T21:06:35Z","message":"All nodes are updated with MachineConfig rendered-master-c4f31ac656de3dac86533ebda7753660","reason":"","status":"True","type":"Updated"},{"lastTransitionTime":"2026-02-16T21:06:35Z","message":"","reason":"","status":"False","type":"Updating"},{"lastTransitionTime":"2026-02-16T21:06:35Z","message":"","reason":"","status":"False","type":"NodeDegraded"},{"lastTransitionTime":"2026-02-16T21:06:35Z","message":"","reason":"","status":"False","type":"Degraded"}],"configuration":{"name":"rendered-master-c4f31ac656de3dac86533ebda7753660","source":[{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"00-master"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-container-runtime"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"01-master-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-master-dnsmasq-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"50-masters-chrony-configuration"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-nable-iscsi"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"90-master-netifnames-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-lv-cinder-volumes"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"91-master-multipath-conf"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"97-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"98-master-generated-kubelet"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-generated-registries"},{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfig","name":"99-master-ssh"}]},"degradedMachineCount":0,"machineCount":1,"observedGeneration":2,"readyMachineCount":1,"unavailableMachineCount":0,"updatedMachineCount":1}}config/namespaces_with_overlapping_uids.json0000640000000000000000000000000215144705156020204 0ustar0000000000000000[]config/validatingwebhookconfigurations/prometheusrules.openshift.io.json0000640000000000000000000000511515144705156025740 0ustar0000000000000000{"metadata":{"name":"prometheusrules.openshift.io","uid":"35e64145-4d11-46f8-bb00-cff212c30e69","resourceVersion":"11959","generation":2,"creationTimestamp":"2026-02-16T21:06:29Z","labels":{"app.kubernetes.io/component":"controller","app.kubernetes.io/managed-by":"cluster-monitoring-operator","app.kubernetes.io/name":"prometheus-operator","app.kubernetes.io/part-of":"openshift-monitoring"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"prometheusrules.openshift.io","clientConfig":{"service":{"namespace":"openshift-monitoring","name":"prometheus-operator-admission-webhook","path":"/admission-prometheusrules/validate","port":8443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["monitoring.coreos.com"],"apiVersions":["v1"],"resources":["prometheusrules"],"scope":"Namespaced"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":5,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/performance-addon-operator.json0000640000000000000000000000552115144705156025304 0ustar0000000000000000{"metadata":{"name":"performance-addon-operator","uid":"ad359a8d-f212-4a78-a607-bd120bed90b0","resourceVersion":"4791","generation":2,"creationTimestamp":"2026-02-16T20:52:22Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}]},"webhooks":[{"name":"vwb.performance.openshift.io","clientConfig":{"service":{"namespace":"openshift-cluster-node-tuning-operator","name":"performance-addon-operator-service","path":"/validate-performance-openshift-io-v2-performanceprofile","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["performance.openshift.io"],"apiVersions":["v2"],"resources":["performanceprofiles"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/network-node-identity.openshift.io.json0000640000000000000000000001075515144705156026743 0ustar0000000000000000{"metadata":{"name":"network-node-identity.openshift.io","uid":"6bce977a-3140-4994-b6de-98a25e11935c","resourceVersion":"7189","generation":1,"creationTimestamp":"2026-02-16T20:57:48Z","ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"17900784-12f9-410e-a815-ce7fe10a9476","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"node.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/node","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["nodes/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"pod.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/pod","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["pods/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/multus.openshift.io.json0000640000000000000000000000506715144705156024031 0ustar0000000000000000{"metadata":{"name":"multus.openshift.io","uid":"60893af2-7bbe-4163-b3b3-a25af7dc709f","resourceVersion":"4787","generation":2,"creationTimestamp":"2026-02-16T20:56:07Z","labels":{"app":"multus-admission-controller"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"17900784-12f9-410e-a815-ce7fe10a9476","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"multus-validating-config.k8s.io","clientConfig":{"service":{"namespace":"openshift-multus","name":"multus-admission-controller","path":"/validate","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["k8s.cni.cncf.io"],"apiVersions":["v1"],"resources":["network-attachment-definitions"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"NoneOnDryRun","timeoutSeconds":30,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io.json0000640000000000000000000000537315144705156030644 0ustar0000000000000000{"metadata":{"name":"controlplanemachineset.machine.openshift.io","uid":"08e30c5e-7965-4794-9f6d-46b8a36dc240","resourceVersion":"11958","generation":2,"creationTimestamp":"2026-02-16T21:10:54Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}]},"webhooks":[{"name":"controlplanemachineset.machine.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"control-plane-machine-set-operator","path":"/validate-machine-openshift-io-v1-controlplanemachineset","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["machine.openshift.io"],"apiVersions":["v1"],"resources":["controlplanemachinesets"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration.json0000640000000000000000000000500215144705156032115 0ustar0000000000000000{"metadata":{"name":"cluster-baremetal-validating-webhook-configuration","uid":"e256bb2c-241f-4acc-93ca-03bd12e81186","resourceVersion":"11962","generation":2,"creationTimestamp":"2026-02-16T21:05:01Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"vprovisioning.kb.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-baremetal-webhook-service","path":"/validate-metal3-io-v1alpha1-provisioning","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["metal3.io"],"apiVersions":["v1alpha1"],"resources":["provisionings"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1","v1beta1"]}]}config/validatingwebhookconfigurations/autoscaling.openshift.io.json0000640000000000000000000001102715144705156025002 0ustar0000000000000000{"metadata":{"name":"autoscaling.openshift.io","uid":"c5b31001-d9de-4bb1-9d27-0a893d67a313","resourceVersion":"12371","generation":4,"creationTimestamp":"2026-02-16T21:04:36Z","labels":{"k8s-app":"cluster-autoscaler-operator"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"clusterautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-clusterautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1"],"resources":["clusterautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"machineautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-machineautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1beta1"],"resources":["machineautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/alertmanagerconfigs.openshift.io.json0000640000000000000000000000514315144705156026506 0ustar0000000000000000{"metadata":{"name":"alertmanagerconfigs.openshift.io","uid":"45e21bc4-d2b3-4daf-afeb-38fb04baa293","resourceVersion":"11960","generation":2,"creationTimestamp":"2026-02-16T21:06:29Z","labels":{"app.kubernetes.io/component":"controller","app.kubernetes.io/managed-by":"cluster-monitoring-operator","app.kubernetes.io/name":"prometheus-operator","app.kubernetes.io/part-of":"openshift-monitoring"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"alertmanagerconfigs.openshift.io","clientConfig":{"service":{"namespace":"openshift-monitoring","name":"prometheus-operator-admission-webhook","path":"/admission-alertmanagerconfigs/validate","port":8443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["monitoring.coreos.com"],"apiVersions":["v1alpha1"],"resources":["alertmanagerconfigs"],"scope":"Namespaced"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":5,"admissionReviewVersions":["v1"]}]}config/authentication.json0000640000000000000000000000116515144705156014432 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"987ea4f0-d719-4676-985f-202f94fe8b7a","resourceVersion":"1063","generation":1,"creationTimestamp":"2026-02-16T20:52:00Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3"}]},"spec":{"type":"","oauthMetadata":{"name":""},"serviceAccountIssuer":""},"status":{"integratedOAuthMetadata":{"name":""},"oidcClients":null}}config/machinehealthchecks/openshift-machine-api/machine-api-termination-handler.json0000640000000000000000000000163315144705156027653 0ustar0000000000000000{"apiVersion":"machine.openshift.io/v1beta1","kind":"MachineHealthCheck","metadata":{"annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"creationTimestamp":"2026-02-16T21:11:03Z","generation":1,"labels":{"api":"clusterapi","k8s-app":"termination-handler"},"name":"machine-api-termination-handler","namespace":"openshift-machine-api","ownerReferences":[{"apiVersion":"config.openshift.io/v1","controller":true,"kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3"}],"resourceVersion":"11551","uid":"57282cb0-cfd0-419b-be08-43946a04f786"},"spec":{"maxUnhealthy":"100%","nodeStartupTimeout":"0","selector":{"matchLabels":{"machine.openshift.io/interruptible-instance":""}},"unhealthyConditions":[{"status":"True","timeout":"0s","type":"Terminating"}]}}config/infrastructure.json0000640000000000000000000000106515144705156014472 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"cdf4dbb8-858c-46b7-90b8-9b31f1dec737","resourceVersion":"534","generation":1,"creationTimestamp":"2026-02-16T20:51:23Z"},"spec":{"cloudConfig":{"name":""},"platformSpec":{"type":"None"}},"status":{"infrastructureName":"xxx-xxxxx","platform":"None","platformStatus":{"type":"None"},"etcdDiscoveryDomain":"","apiServerURL":"https://api.sno.openstack.lab:6443","apiServerInternalURI":"https://api-int.sno.openstack.lab:6443","controlPlaneTopology":"SingleReplica","infrastructureTopology":"SingleReplica","cpuPartitioning":"None"}}config/image.json0000640000000000000000000000111715144705156012472 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"8ee0a1fa-6fce-4e49-86c9-7cdf311a31fd","resourceVersion":"1571","generation":1,"creationTimestamp":"2026-02-16T20:52:11Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3"}]},"spec":{"additionalTrustedCA":{"name":""},"registrySources":{},"imageStreamImportMode":""},"status":{}}config/oauth.json0000640000000000000000000000114415144705156012530 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"977f3323-5a7f-4430-be81-20d711af82d5","resourceVersion":"1675","generation":1,"creationTimestamp":"2026-02-16T20:52:13Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3"}]},"spec":{"tokenConfig":{},"templates":{"login":{"name":""},"providerSelection":{"name":""},"error":{"name":""}}},"status":{}}config/featuregate.json0000640000000000000000000000613615144705156013712 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"0ed15b0b-84a1-474a-b02d-d3d053e8f49c","resourceVersion":"643","generation":1,"creationTimestamp":"2026-02-16T20:51:45Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true"}},"spec":{},"status":{"featureGates":[{"version":"4.18.32","enabled":[{"name":"AWSEFSDriverVolumeMetrics"},{"name":"AdminNetworkPolicy"},{"name":"AlibabaPlatform"},{"name":"AzureWorkloadIdentity"},{"name":"BareMetalLoadBalancer"},{"name":"BuildCSIVolumes"},{"name":"ChunkSizeMiB"},{"name":"CloudDualStackNodeIPs"},{"name":"DisableKubeletCloudCredentialProviders"},{"name":"GCPLabelsTags"},{"name":"HardwareSpeed"},{"name":"IngressControllerLBSubnetsAWS"},{"name":"KMSv1"},{"name":"ManagedBootImages"},{"name":"ManagedBootImagesAWS"},{"name":"MultiArchInstallAWS"},{"name":"MultiArchInstallGCP"},{"name":"NetworkDiagnosticsConfig"},{"name":"NetworkLiveMigration"},{"name":"NetworkSegmentation"},{"name":"NewOLM"},{"name":"NodeDisruptionPolicy"},{"name":"OnClusterBuild"},{"name":"PersistentIPsForVirtualization"},{"name":"PrivateHostedZoneAWS"},{"name":"SetEIPForNLBIngressController"},{"name":"StreamingCollectionEncodingToJSON"},{"name":"StreamingCollectionEncodingToProtobuf"},{"name":"VSphereControlPlaneMachineSet"},{"name":"VSphereDriverConfiguration"},{"name":"VSphereMultiVCenters"},{"name":"VSphereStaticIPs"},{"name":"ValidatingAdmissionPolicy"}],"disabled":[{"name":"AWSClusterHostedDNS"},{"name":"AdditionalRoutingCapabilities"},{"name":"AutomatedEtcdBackup"},{"name":"BootcNodeManagement"},{"name":"CSIDriverSharedResource"},{"name":"ClusterAPIInstall"},{"name":"ClusterAPIInstallIBMCloud"},{"name":"ClusterMonitoringConfig"},{"name":"ConsolePluginContentSecurityPolicy"},{"name":"DNSNameResolver"},{"name":"DynamicResourceAllocation"},{"name":"EtcdBackendQuota"},{"name":"EventedPLEG"},{"name":"Example"},{"name":"ExternalOIDC"},{"name":"ExternalOIDCWithUIDAndExtraClaimMappings"},{"name":"GCPClusterHostedDNS"},{"name":"GatewayAPI"},{"name":"ImageStreamImportMode"},{"name":"IngressControllerDynamicConfigurationManager"},{"name":"InsightsConfig"},{"name":"InsightsConfigAPI"},{"name":"InsightsOnDemandDataGather"},{"name":"InsightsRuntimeExtractor"},{"name":"MachineAPIMigration"},{"name":"MachineAPIOperatorDisableMachineHealthCheckController"},{"name":"MachineAPIProviderOpenStack"},{"name":"MachineConfigNodes"},{"name":"MaxUnavailableStatefulSet"},{"name":"MetricsCollectionProfiles"},{"name":"MinimumKubeletVersion"},{"name":"MixedCPUsAllocation"},{"name":"MultiArchInstallAzure"},{"name":"NodeSwap"},{"name":"NutanixMultiSubnets"},{"name":"OVNObservability"},{"name":"OpenShiftPodSecurityAdmission"},{"name":"PinnedImages"},{"name":"PlatformOperators"},{"name":"ProcMountType"},{"name":"RouteAdvertisements"},{"name":"RouteExternalCertificate"},{"name":"ServiceAccountTokenNodeBinding"},{"name":"SignatureStores"},{"name":"SigstoreImageVerification"},{"name":"TranslateStreamCloseWebsocketRequests"},{"name":"UpgradeStatus"},{"name":"UserNamespacesPodSecurityStandards"},{"name":"UserNamespacesSupport"},{"name":"VSphereMultiNetworks"},{"name":"VolumeAttributesClass"},{"name":"VolumeGroupSnapshot"}]}]}}config/proxy.json0000640000000000000000000000031315144705156012566 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"233ae2f6-b602-4758-922a-c5f749761e2e","resourceVersion":"554","generation":1,"creationTimestamp":"2026-02-16T20:51:25Z"},"spec":{"trustedCA":{"name":""}},"status":{}}config/pdbs/openshift-operator-lifecycle-manager/packageserver-pdb.json0000640000000000000000000000173615144705156025131 0ustar0000000000000000{"metadata":{"name":"packageserver-pdb","namespace":"openshift-operator-lifecycle-manager","uid":"b031fcc4-c3e8-4db5-a12d-f84257804f21","resourceVersion":"10265","generation":1,"creationTimestamp":"2026-02-16T20:52:13Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3","controller":true}]},"spec":{"selector":{"matchLabels":{"app":"packageserver"}},"maxUnavailable":1},"status":{"observedGeneration":1,"disruptionsAllowed":1,"currentHealthy":1,"desiredHealthy":0,"expectedPods":1,"conditions":[{"type":"DisruptionAllowed","status":"True","observedGeneration":1,"lastTransitionTime":"2026-02-16T21:06:19Z","reason":"SufficientPods","message":""}]}}config/clusteroperator/imageregistry.operator.openshift.io/imagepruner/cluster.json0000640000000000000000000000163115144705156027756 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"0c7351f9-2275-48ec-8b02-2636f1672eb1","resourceVersion":"5972","generation":1,"creationTimestamp":"2026-02-16T20:57:30Z"},"spec":{"schedule":"","suspend":false,"keepTagRevisions":3,"successfulJobsHistoryLimit":3,"failedJobsHistoryLimit":3,"ignoreInvalidImageReferences":true,"logLevel":"Normal"},"status":{"observedGeneration":1,"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-02-16T20:57:31Z","reason":"AsExpected","message":"Pruner CronJob has been created"},{"type":"Failed","status":"False","lastTransitionTime":"2026-02-16T20:57:31Z","reason":"Complete","message":"Pruner completed successfully"},{"type":"Scheduled","status":"True","lastTransitionTime":"2026-02-16T20:57:31Z","reason":"Scheduled","message":"The pruner job has been scheduled"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-02-16T20:57:31Z","reason":"AsExpected"}]}}config/apiserver.json0000640000000000000000000000121615144705156013410 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"5562ec96-eeb6-42af-825f-e7b018b50d67","resourceVersion":"792","generation":1,"creationTimestamp":"2026-02-16T20:51:55Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","oauth-apiserver.openshift.io/secure-token-storage":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"c4d9ae9e-7665-49cc-8a39-4572a3c989d3"}]},"spec":{"servingCerts":{},"clientCA":{"name":""},"encryption":{},"audit":{"profile":"Default"}},"status":{}}config/schedulers/cluster.json0000640000000000000000000000052415144705156015233 0ustar0000000000000000{"kind":"Scheduler","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster","uid":"8713a9cd-65ee-4e53-b8e0-caf92bd40b12","resourceVersion":"560","generation":1,"creationTimestamp":"2026-02-16T20:51:26Z"},"spec":{"policy":{"name":""},"profileCustomizations":{"dynamicResourceAllocation":""},"mastersSchedulable":true},"status":{}}config/mutatingwebhookconfigurations/catalogd-mutating-webhook-configuration.json0000640000000000000000000000533615144705156027506 0ustar0000000000000000{"metadata":{"name":"catalogd-mutating-webhook-configuration","uid":"8ca07420-f8ad-437e-8914-7e44d3ae9e34","resourceVersion":"5812","generation":2,"creationTimestamp":"2026-02-16T20:57:28Z","annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"inject-metadata-name.olm.operatorframework.io","clientConfig":{"service":{"namespace":"openshift-catalogd","name":"catalogd-service","path":"/mutate-olm-operatorframework-io-v1-clustercatalog","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["olm.operatorframework.io"],"apiVersions":["v1"],"resources":["clustercatalogs"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"],"reinvocationPolicy":"Never","matchConditions":[{"name":"MissingOrIncorrectMetadataNameLabel","expression":"'name' in object.metadata \u0026\u0026 (!has(object.metadata.labels) || !('olm.operatorframework.io/metadata.name' in object.metadata.labels) || object.metadata.labels['olm.operatorframework.io/metadata.name'] != object.metadata.name)"}]}]}config/network.json0000640000000000000000000000117015144705156013100 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"5f30a0c9-9bca-42cf-998d-d04221fad74e","resourceVersion":"3213","generation":2,"creationTimestamp":"2026-02-16T20:51:25Z"},"spec":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","externalIP":{"policy":{}},"networkDiagnostics":{"mode":"","sourcePlacement":{"nodeSelector":null,"tolerations":null},"targetPlacement":{"nodeSelector":null,"tolerations":null}}},"status":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","clusterNetworkMTU":8900}}config/ingress.json0000640000000000000000000000043615144705156013065 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"44229542-8ea2-46aa-91de-dd681f70470d","resourceVersion":"548","generation":1,"creationTimestamp":"2026-02-16T20:51:24Z"},"spec":{"domain":"apps.sno.openstack.lab","loadBalancer":{"platform":{"type":""}}},"status":{"defaultPlacement":"ControlPlane"}}